@aftech,
What does the content of the registry keys below look like on your computer?
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Policy
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Protected
No; it was just as you mentioned exactly, until few days ago.I use the fresh updated Windows 11 24H2 (Pro and Home editions) build 26100.3915.
After the Windows restart, the tweak is removed - the registry key is set to 0, and the SAC OFF setting is recovered in the Security Center.
It seems that in Windows 11 IoT Enterprise LTSC, the tweak can work differently.
@aftech,
What does the content of the registry keys below look like on your computer?
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Policy
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Protected
If I'm correct, the SWH default for PowerShell Restrictions is Option 1. The info for PowerShell Restrictions in the SWH menu changes when I select other options or Not Configured.It is rather clear. When pressing the <PowerShell> button, you will see some events blocked by PowerShell Constrained Language Mode and others blocked by the Windows Policy that prevents running PS1 scripts (see option <1> on the picture below):
View attachment 288350
If you do not block PS1 scripts, those scripts are still restricted by Constrained Language Mode (SRP restriction in SWH). However, you can whitelist PS1 scripts to avoid Constrained Language Mode restrictions.
If you choose blocking PS1 scripts by option <1>, all PS1 scripts are blocked (even system scripts). You can only run PowerShell CMDLines (still restricted by Constrained Language Mode) embedded in executables, shortcuts, batch scripts, VBS scripts, etc..
I had turned off SAC through Windows Security. The reg tweak works here, and I could turn on SAC. I restarted the system, checked Windows Security, and SAC is on.Clean install is not necessary.
Just navigate to Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Policy
and change the value of "VerifiedAndReputablePolicyState" from 0 to 1
I can switch off and on SAC this way.
If I'm correct, the SWH default for PowerShell Restrictions is Option 1. The info for PowerShell Restrictions in the SWH menu changes when I select other options or Not Configured.
Does this info mean if I see blocks in the PowerShell logs, I cannot whitelist those blocks like I can for the SRP blocks?
malwaretips.com
I can use Run by SmartScreen if WDAC blocks an app. Is it possible WDAC allows an app, but Run by SmartScreen may block it or find it unsafe?
I had turned off SAC through Windows Security. The reg tweak works here, and I could turn on SAC. I restarted the system, checked Windows Security, and SAC is on.
Edition: Windows 11 Pro
Version: 24H2
Installed on: 3/29/2025
OS build: 26100.3775
Experience: Windows Feature Experience Pack 1000.26100.66.0
I understand that; the help file mentions "except for files restricted by Constrained Language Mode." I meant the "yes" part. Can you explain it a bit?Yes and No. The blocks related to PowerShell Constrained Language Mode can be avoided by adding the path of PS1 script to the SWH whitelist.
I turned off SAC when I installed WHHLight, and that was a few days back. I shut down the system every day.Could you repeat this exactly as follows:
Do it in the Virtual Machine, because there is a possibility that SAC will be permanently OFF (like on my machines).
- Turn OFF SAC in the Security Center.
- Restart Windows.
- Check if SAC is OFF and use the reg tweak to turn it ON.
- Restart Windows.
- Check the SAC in the Security Center.
I understand that; the help file mentions "except for files restricted by Constrained Language Mode." I meant the "yes" part. Can you explain it a bit?
malwaretips.com
I lack detailed knowledge of exploitable processes; I believe my question or its answer doesn't require security mitigation expertise. Perhaps I didn't explain my question well enough. I'll attempt to explain it in the clearest way I can.I can, but first, look here:
![]()
Guide | How To - How do you secure PowerShell?
I noticed that many users are interested in securing Windows Home from PowerShell attacks. There are a few ways to do it, using GPO, reg tweaks or SRP. A. Disabling PowerShell script execution by reg tweak (Windows 7+): [HKEY_LOCAL_MACHINE \Software\Policies\Microsoft\Windows\PowerShell]...malwaretips.com
I do not know what you know about Windows built-in PowerShell security mitigations. So, we could talk in different languages.
@aftech, @rashmi
I found some differences in the Registry content.
The reg tweak changes the value of VerifiedAndReputablePolicyState in the reg key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Policy
It seems that this works if the value of VerifiedAndReputablePolicyStateMinValueSeen is set to 1 in another key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Protected
On my machine, the value of VerifiedAndReputablePolicyStateMinValueSeen is set to 0 and protected by the system (cannot be changed manually).
So, Windows does not change the SAC to ON.
View attachment 288356
I have SAC turned off, and the value of VerifiedAndReputablePolicyStateMinValueSeen is 1. I also cannot change the value to 0; it throws an error.
Update: I didn't restart the system after turning SAC off. After restarting the system, the value of VerifiedAndReputablePolicyStateMinValueSeen is 0.
Update: I cannot turn SAC on now. I change the value in the "Policy" key to 1. Windows Security confirms SAC is on, but after a system restart, it shows SAC is off. The value in the "Policy" key is back to 0. I cannot change the value in the "Protected" key to 1.
I turned SAC off a few days back. Today, I could turn SAC on with the reg tweak at least once, i.e., it was on after a system restart. I couldn't turn SAC on after turning it off again.As I expected, the Security Center is fooled on our machines by this reg tweak to show that SAC is ON (until Windows restart), but actually it is not.
Slightly more advanced reg tweaks worked a few years ago (see my post below):
https://malwaretips.com/threads/win...tware-restriction-policies.61871/post-1006923
But if I correctly remember, those tweaks also stopped working on Windows Home and Pro in the year 2023.
It says if you enable the "Allow security intelligence updates from Microsoft Update" group policy setting, Defender will update separately from Windows Update. It would affect ConfigureDefender/WHHLight configurations, right?
I vaguely recall seeing something about avoiding group policy configuration in forum threads or help files. Can I set up group policy while using WHHLight (SWH, SS, WDAC, CD, FH, DAE) on the system?I do not think so.
ConfigureDefender settings are unrelated to Microsoft Defender updates.