Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"FeatureSettingsOverride"=dword:00000003
"FeatureSettingsOverrideMask"=dword:00000003
Since a Windows update (summer 2025), it's these values now2. From the Registry screen, add this reg file:
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "FeatureSettingsOverride"=dword:00000003 "FeatureSettingsOverrideMask"=dword:00000003
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"FeatureSettingsOverride"=dword:2000003
"FeatureSettingsOverrideMask"=dword:00000003
Did you use the value "00000000" ?
You need to test with the correct value.
What about
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\kernel]
"MitigationAuditOptions"
"MitigationOptions"
?
I have set them all to zero and/or deleted them and didn't notice any change, but I haven't measured too strictly.
Also in IFEO...
What about security? I put my hopes in double (reverse) Security Through Obscurity -> No attacker expects these "defences" to be disabled, but I enjoy better performance.![]()
The number of options in that field has changed over the years
still NOT compatible with Windows 10 RS3 REG_BINARY MitigationOptions format
I have always remove defender. Haven't had a malware or infection on my PC in probably over 15 years. I also turn off DEP and any other security measures. I feel why have it when I haven't had a issue in such a long time.I guess I picked the "zeroes=off" logic from here (or from similar pages from that time).
But I can definitely feel the performance difference when I turn off everything manually through GUI in Defender (exploit guard). Of course, it is well known that VBS takes a great performance hit, but no one can agree about the percentage. And it's not only VBS there.
I am also sure I could feel the difference between DEP on and off in XP days, although many swore they couldn't.
What I am not sure of, is whether when I take out Defender with NTLite, do these kernel settings remain or not (does it use defaults or not; and how to turn them off). I think that's worth investigating for NTLite usage.
At the time, when I tested it with benchmarks, removing Processor microcode update - Servicing didn't change performance, unlike modifying the registry.
But since certain microcode (BIOS) updates, the gains are less significant than before.
EDIT : But to get the true performance, you need to use a BIOS with the microcode from before this modification.
That's where I really see the difference in benchmarks with the modded BIOS.
Hi. Could you please elaborate on how exactly did you modify mcupdate_GenuineIntel.dll? Also if it's the same for mcupdate_AuthenticAMD.Did you use the value "00000000" ?
You need to test with the correct value.
I was also modifying the mcupdate_GenuineIntel.dll file so that Windows would only "take into account" the BIOS microcode.
Otherwise, Windows uses the more recent version of the microcode between that file and the BIOS.
I haven't done any testing in a long time, and the latest microcode revisions are better than the first ones after that famous patch.
But in normal use, the difference isn't really noticeable, it's more apparent in benchmarks.
As for security, I figure if someone wants to "hack" your PC, they'll always find a way.
EDIT : But to get the true performance, you need to use a BIOS with the microcode from before this modification.
That's where I really see the difference in benchmarks with the modded BIOS.
Since Windows 11 24h2, for an Intel CPU, you delete (or rename as you wish) the mcupdate_GenuineIntel.dll file and rename the mcupdate_AuthenticAMD.dll file to mcupdate_GenuineIntel.dllHi. Could you please elaborate on how exactly did you modify mcupdate_GenuineIntel.dll? Also if it's the same for mcupdate_AuthenticAMD.
I did this and the registry modification listed by you above. Does the "FeatureSettings" not need a specific value as well? The problem is STIBP remains enabled which is the main performance hog. Even the earliest bios that supports ryzen 5000 still has this component. Have you tried removing it directly from the bios? Does it not brick the bios? I have flashback option in case it bricks it but still... I found 2 instances of Stibp file on my bios with MMTool.Since Windows 11 24h2, for an Intel CPU, you delete (or rename as you wish) the mcupdate_GenuineIntel.dll file and rename the mcupdate_AuthenticAMD.dll file to mcupdate_GenuineIntel.dll
Do the opposite with an AMD CPU.
Alternatively, you can also use a empty .txt file, eg, that you rename to mcupdate_GenuineIntel.dll (with the .dll extension) for Intel
And mcupdate_AuthenticAMD.dll for AMD
And in NTlite, you just need to keep the "Processor microcode update (xxxx)" component associated with the CPU
=> Processor microcode update (AMD) for AMD, eg
If you want to "mod" the DLL, it's best to rename it afterwards