Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"FeatureSettingsOverride"=dword:00000003
"FeatureSettingsOverrideMask"=dword:00000003
Since a Windows update (summer 2025), it's these values now2. From the Registry screen, add this reg file:
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "FeatureSettingsOverride"=dword:00000003 "FeatureSettingsOverrideMask"=dword:00000003
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"FeatureSettingsOverride"=dword:2000003
"FeatureSettingsOverrideMask"=dword:00000003
Did you use the value "00000000" ?
You need to test with the correct value.
What about
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\kernel]
"MitigationAuditOptions"
"MitigationOptions"
?
I have set them all to zero and/or deleted them and didn't notice any change, but I haven't measured too strictly.
Also in IFEO...
What about security? I put my hopes in double (reverse) Security Through Obscurity -> No attacker expects these "defences" to be disabled, but I enjoy better performance.![]()
The number of options in that field has changed over the years
still NOT compatible with Windows 10 RS3 REG_BINARY MitigationOptions format
I have always remove defender. Haven't had a malware or infection on my PC in probably over 15 years. I also turn off DEP and any other security measures. I feel why have it when I haven't had a issue in such a long time.I guess I picked the "zeroes=off" logic from here (or from similar pages from that time).
But I can definitely feel the performance difference when I turn off everything manually through GUI in Defender (exploit guard). Of course, it is well known that VBS takes a great performance hit, but no one can agree about the percentage. And it's not only VBS there.
I am also sure I could feel the difference between DEP on and off in XP days, although many swore they couldn't.
What I am not sure of, is whether when I take out Defender with NTLite, do these kernel settings remain or not (does it use defaults or not; and how to turn them off). I think that's worth investigating for NTLite usage.
At the time, when I tested it with benchmarks, removing Processor microcode update - Servicing didn't change performance, unlike modifying the registry.
But since certain microcode (BIOS) updates, the gains are less significant than before.
EDIT : But to get the true performance, you need to use a BIOS with the microcode from before this modification.
That's where I really see the difference in benchmarks with the modded BIOS.