I prefer not to use an antivirus with Comodo Firewall. Sordum's DefenderControl has been disabling/reenabling Microsoft Defender successfully for me. DefenderControl is a discontinued tool now, and though it works absolutely well, I'm looking for a stable or Windows built-in solution.
You’re basically in the “Comodo Firewall + hard‑off Defender, no AV” camp, and DefenderControl has just been a convenient front‑end for that. With that in mind:
- There is no fully supported, built‑in Microsoft switch for “no AV at all” on Windows 11 when no third‑party AV is present.
- What DefenderControl does is essentially exactly what you’ve already been discussing: change Defender service/driver start values and a few related settings.
- Major updates can revert those changes, but that usually just means “Defender is back”, not “Windows is broken”.
So the realistic goal is a method that:
- Uses only Windows’ own tools (regedit/PowerShell/Group Policy).
- Is easy to re‑apply after a big update.
- Is easy to undo if you ever want Defender back.
1. No AV + Comodo: what Windows officially supports
By design, Windows 10/11 wants:
- At least one registered AV provider (Defender or third‑party).
- If a third‑party AV is installed, Defender can go passive / limited.
- If no AV is installed, Microsoft really doesn’t provide an “official” way for home users to have no AV at all.
That’s why:
- Group Policy “Turn off Microsoft Defender Antivirus” alone is not reliable on newer Windows 11 when there’s no other AV.
- Old tricks like
DisableAntiSpyware are now ignored.
For a
hard off with no AV, Microsoft doesn’t give you a clean GUI button. You’re down to exactly what you’re already using: service/driver tweaks (what DefenderControl does), or similar done manually.
2. A “built‑in” replacement for DefenderControl
Given your goal, the closest to a “stable, built‑in” solution is:
- Use .reg files + Safe Mode to do the same Start‑value changes DefenderControl does.
- Keep clean “disable” and “enable” reg files so you can toggle without guesswork.
For example (conceptually):
a) Hard‑disable file (run in Safe Mode)
Create a
DisableDefenderHard.reg with content like (adjust to exactly match what you already tested):
Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense]
"Start"=dword:00000004
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdBoot]
"Start"=dword:00000004
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdFilter]
"Start"=dword:00000004
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisDrv]
"Start"=dword:00000004
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisSvc]
"Start"=dword:00000004
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend]
"Start"=dword:00000004
Apply in
Safe Mode, reboot → Defender AV and related drivers don’t start.
b) Re‑enable file (run in Safe Mode)
Create an
EnableDefenderHard.reg with the
default values (these are the ones you already quoted):
Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense]
"Start"=dword:00000003
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdBoot]
"Start"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdFilter]
"Start"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisDrv]
"Start"=dword:00000003
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisSvc]
"Start"=dword:00000003
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend]
"Start"=dword:00000002
Apply in
Safe Mode, reboot → Defender is back in its normal state.
That’s essentially DefenderControl, but:
- Fully transparent (you see exactly what’s being changed).
- Not dependent on a third‑party EXE that may break on a future build.
- Easy to re‑run after a big Windows upgrade.
3. What feature updates will do to this
On a feature upgrade (or a big build jump):
- Windows may overwrite or recreate those service keys with default Start values.
- Result: Defender is active again, sometimes with Tamper Protection ON.
- Your system doesn’t usually “break”; you just lose your “hard off” until you re‑apply it.
So the routine becomes:
- After each big Windows upgrade:
- Check Windows Security → if Defender is on again (and you still don’t want it), reboot to Safe Mode, run your DisableDefenderHard.reg, reboot.
4. Re‑enabling Defender later: will it be a nightmare?
Not if you keep things disciplined:
- Always export the original keys (
Sense, WdBoot, WdFilter, WdNisDrv, WdNisSvc, WinDefend) once, before you start.
- Keep your EnableDefenderHard.reg safe.
- Keep System Restore turned on and a Windows install USB handy (as general safety nets).
Then, to re‑enable:
- Boot to Safe Mode.
- Import EnableDefenderHard.reg (or your original exported .reg).
- Reboot.
- Open Windows Security to verify everything is back.
You should
not need a reset for this, unless some unrelated system corruption happens or the registry keys are heavily damaged.
5. What about “softer” methods (UI, Group Policy, PowerShell)?
Because you don’t want any AV at all:
- UI toggles (real‑time protection off, etc.) tend to be temporary and can be overridden by Windows or Tamper Protection.
- Group Policy “Turn off Microsoft Defender Antivirus” is no longer a reliable way to keep Defender off on modern Win 11 when no other AV is present.
- PowerShell (
Set-MpPreference -DisableRealtimeMonitoring $true) is also subject to being reverted, and Tamper Protection will fight it.
Those methods are great if you just want to
minimize Defender while using another AV; they’re not strong enough for a true “no AV” setup.
6. Security angle (just so it’s explicit)
Running
only Comodo Firewall (HIPS/containment) with no AV is a niche, advanced setup:
- It can work if:
- You’re very careful with what you run.
- You keep Comodo well‑configured and up to date.
- You accept that there’s no signature‑based safety net.
- It gives you:
- Less bloat and scanning.
- More reliance on HIPS/sandbox behavior and your own decisions.
From a Windows/Microsoft point of view, this configuration is “unsupported” in the sense that they expect
some AV; hence the lack of an official off‑switch.
Summary
- There’s no official, built‑in, one‑click way to permanently disable Defender on Windows 11 when no other AV is installed.
- DefenderControl was just automating what you can safely do yourself:
- Make two .reg files (disable/enable) for the key Defender services.
- Apply them in Safe Mode when you want to toggle Defender.
- Feature updates will likely re‑enable Defender, but that normally doesn’t “break” anything; you simply re‑apply your disable .reg afterwards.
- Re‑enabling should not require a reset if you keep proper backups of the original registry values.
If you’d like, you can post the exact reg values you’re currently using (anonymized, just the service keys), and I can double‑check them for consistency so that your “enable” file really matches a stock configuration.