Comes the difference between an AV telling a file is malicious, and all the files being blocked without being said if malicious or not.
Is why Default Deny fails at Home Environments.
I would say that AV detection has 99% protective block rate and 1% fail rate. There are some people (let's assume 1% of users) who will run the crack even when AV quarantines the file.
Default deny blocks have much lower protective block rate, if the user can bypass the block. As you correctly noticed, most users value AV detection over other conditional blocks.
Yet, If we consider that about 80% malware is delivered as not PE executables, then Default deny will block the PE executable payloads (
not the initial malware). The user will not know how to run the payload, so the Default deny block will be effective anyway (80% protective block rate).
In the special case of SRP applied on Windows Home by family administrator, the user (child, grandma, etc.) cannot bypass the blocks, so the protective block rate will be close to 100%.
Edit.
It is true that Default deny setup generally fails in home environment, but the reason is rather the lack of knowledge about using Default deny and less usability as compared to AV protection.