Windows Defender Configuration
Toggleable Defender
Windows Defender is toggleable during AtlasOS installation with enable as the recommended option.- Enabled (Recommended)
- Disabled (Advanced)
Pros:
- Real-time malware protection
- Automatic threat updates
- Cloud-delivered protection
- Ransomware protection
- Network protection
- Minimal on modern systems
- Slight background CPU usage
- Some disk I/O for scanning
Post-Installation Toggle
Defender can be toggled after installation through the Atlas folder, allowing you to change your decision later.
CPU Security Mitigations
Toggleable Mitigations
CPU security mitigations protect against vulnerabilities like Spectre and Meltdown but can impact performance.Understanding Mitigations
What are CPU Mitigations?
What are CPU Mitigations?
CPU mitigations are software-based protections against hardware vulnerabilities in processors, including:
- Spectre - Exploits speculative execution
- Meltdown - Breaks isolation between applications and OS
- L1TF - Terminal Fault vulnerability
- MDS - Microarchitectural Data Sampling
- TAA - TSX Asynchronous Abort
Performance Impact
Performance Impact
Modern CPUs (8th gen Intel / Zen 2 AMD and newer):
- 0-5% performance impact
- Hardware mitigations built-in
- Software mitigations less necessary
- 5-30% performance impact in some workloads
- No hardware mitigations
- Software mitigations cause more overhead
Security Risk of Disabling
Security Risk of Disabling
Disabling mitigations exposes your system to:
- Privilege escalation attacks
- Memory content disclosure
- Cross-process data leakage
- Sandbox escape vulnerabilities
- High for multi-user systems
- High for systems running untrusted code
- Medium for gaming-only systems
- Low for air-gapped systems
Core Isolation
Memory Integrity and VBS
Core Isolation (Virtualization-Based Security) can be disabled during installation for performance.What is Core Isolation?
Core Isolation uses hardware virtualization to create a secure area of memory isolated from the operating system. Features included:- Memory Integrity (HVCI) - Prevents code injection attacks
- Kernel-mode Code Integrity - Validates kernel drivers
- Credential Guard - Protects domain credentials
- Enabled
- Disabled
Benefits:
- Protection against kernel exploits
- Driver signature enforcement
- Advanced malware protection
- Credential theft prevention
- TPM 2.0
- UEFI firmware
- Virtualization support (VT-x/AMD-V)
- 64-bit processor
- 5-15% gaming performance reduction
- Minimal impact on productivity apps
- Some driver incompatibilities
Core Isolation can be toggled after installation in Windows Security settings or through the Atlas folder.
Remote Access Security
Remote Assistance Disabled
Remote Assistance is disabled by default as an unused and potentially vulnerable feature.- Unsolicited remote assistance requests
- Remote control of your computer
- Firewall exceptions for remote assistance
- Potential exploitation of remote access vulnerabilities
- Reduced attack surface
- Eliminates remote desktop vulnerabilities
- Prevents social engineering attacks
- No unauthorized remote access
Network Security
Anonymous SAM Enumeration
Anonymous enumeration of Security Account Manager (SAM) is blocked. Configuration:security/block-anonymous-enum-sam.yml
Prevents:
- Anonymous users from listing local accounts
- Discovery of usernames and security identifiers
- Reconnaissance for brute force attacks
- Information leakage
Network Sharing Security
AtlasOS includes several network security hardening tweaks:Anonymous Access Restriction
Configuration:
networking/shares/restrict-anonymous-access.ymlPrevents anonymous users from accessing network sharesAnonymous Enumeration Block
Configuration:
networking/shares/restrict-anonymous-enumeration.ymlBlocks enumeration of shares and sessions by anonymous usersSMB Bandwidth Settings
Configuration:
networking/shares/disable-smb-bandwidth-throttling.ymlOptimizes SMB performance while maintaining securityLLMNR Disabled
Configuration:
networking/disable-llmnr.ymlDisables Link-Local Multicast Name Resolution to prevent spoofing attacksWindows Update Security
Automatic Updates Configuration
Windows Updates are important for security, but automatic updates can be disabled with notifications.Security Visibility Features
Hidden Unused Security Pages
Unused Windows Security pages are hidden to simplify the security interface. Configuration:debloat/hide-unused-security-pages.yml
Pages hidden:
- Family options (on non-family editions)
- Device security (when features are disabled)
- Empty or non-functional sections
This improves usability without reducing security - only cosmetic changes to Settings.
Security Recommendations
Keep Windows Defender Enabled
Unless you have specific reasons and alternative protection, keep Defender enabled for real-time protection.
Enable Mitigations on Modern CPUs
On CPUs from 2018 or newer, keep mitigations enabled for minimal performance impact and maximum security.
Consider Core Isolation
If you don’t game competitively or use incompatible software, enable Core Isolation for advanced protection.
Install Security Updates
Regularly check for and install Windows security updates, even with automatic updates disabled.
Security Trade-offs
Maximum Security
- Defender enabled
- All mitigations enabled
- Core Isolation enabled
- Automatic updates enabled
- Remote features disabled
Balanced (Recommended)
- Defender enabled
- Mitigations enabled (modern CPU)
- Core Isolation disabled
- Manual updates with notifications
- Remote features disabled
Performance Priority
- Defender disabled (with alternative AV)
- Mitigations disabled (old CPU only)
- Core Isolation disabled
- Manual updates
- Remote features disabled
Maximum Performance
- All features disabled
Alternative Security Solutions
If you disable Windows Defender, consider these alternatives:- Kaspersky Free - Strong protection, low resource usage
- Bitdefender Free - Excellent detection rates
- Malwarebytes - Good for malware removal
- ESET NOD32 - Lightweight and effective
Security Monitoring
After installation, monitor security status:- Windows Security Center - Check security status
- Event Viewer - Review security events
- Firewall Logs - Monitor connection attempts
- Task Scheduler - Verify no malicious tasks
Related Features
- Privacy Features - Privacy improvements that complement security
- Performance Features - Understanding performance vs security trade-offs
- Usability Features - Security UI improvements