Skip to content

Problem & Solution: ERROR executing T1562.001-27 | Atomic Test Name: Disable Windows Defender with DISM #3208

@sayandip-chatterjee

Description

@sayandip-chatterjee

- name: Disable Windows Defender with DISM

What did you do?

ℹ Please replace this with what you did.
Ran atomic test case : T1562.001-27

What did you expect to happen?

ℹ Please replace this with what you expected to happen.
Thought the test case will be successfully executed

What happened instead?

ℹ Please replace this with of what happened instead.

Executing test: T1562.001-27 Disable Windows Defender with DISM Error: 0x800f080c Feature name Windows-Defender is unknown. A Windows feature name was not recognized. Use the /Get-Features option to find the name of the feature in the image and try the command again. Exit code: -2146498548 Done executing test: T1562.001-27 Disable Windows Defender with DISM

Your Environment

  • Which specific operating system are you running (e.g. Windows 7 SP1 32-bit)? Windows11
  • Did you run the test from an elevated or root prompt? Yes, powershell as admin
  • If relevant, which atomic test is this specific to? T1562.001-27

Possible Solution:

Error 0x800f080c = “Feature name not recognized” — the specified feature doesn’t exist in your system image.

In modern Windows 10/11 builds (and Windows Server 2019/2022), Windows Defender is now part of the Microsoft Defender Antivirus component — it’s integrated and not managed through DISM anymore.
DISM no longer lists a feature literally named Windows-Defender.

To check the actual Defender-related features available, run:
dism /online /Get-Features | findstr /I "Defender"
dism /online /Get-Features | Select-String "Defender"

Typical valid Defender-related features you might see include:

Image

However, note:

None of these control the core antivirus service anymore.
The antivirus is managed by:
Set-MpPreference PowerShell cmdlets
or via Group Policy / Registry
or via Windows Security settings.

If your goal is to simulate disabling Defender (e.g., for Atomic Red Team T1562.001-27):

Use this updated PowerShell-based test instead of DISM:
Set-MpPreference -DisableRealtimeMonitoring $true

That correctly disables real-time protection (with admin rights) and aligns with the MITRE test intent.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions