-
Notifications
You must be signed in to change notification settings - Fork 3k
Description
| - name: Disable Windows Defender with DISM |
What did you do?
ℹ Please replace this with what you did.
Ran atomic test case : T1562.001-27
What did you expect to happen?
ℹ Please replace this with what you expected to happen.
Thought the test case will be successfully executed
What happened instead?
ℹ Please replace this with of what happened instead.
Executing test: T1562.001-27 Disable Windows Defender with DISM Error: 0x800f080c Feature name Windows-Defender is unknown. A Windows feature name was not recognized. Use the /Get-Features option to find the name of the feature in the image and try the command again. Exit code: -2146498548 Done executing test: T1562.001-27 Disable Windows Defender with DISM
Your Environment
- Which specific operating system are you running (e.g. Windows 7 SP1 32-bit)? Windows11
- Did you run the test from an elevated or root prompt? Yes, powershell as admin
- If relevant, which atomic test is this specific to? T1562.001-27
Possible Solution:
Error 0x800f080c = “Feature name not recognized” — the specified feature doesn’t exist in your system image.
In modern Windows 10/11 builds (and Windows Server 2019/2022), Windows Defender is now part of the Microsoft Defender Antivirus component — it’s integrated and not managed through DISM anymore.
DISM no longer lists a feature literally named Windows-Defender.
To check the actual Defender-related features available, run:
dism /online /Get-Features | findstr /I "Defender"
dism /online /Get-Features | Select-String "Defender"
Typical valid Defender-related features you might see include:
However, note:
None of these control the core antivirus service anymore.
The antivirus is managed by:
Set-MpPreference PowerShell cmdlets
or via Group Policy / Registry
or via Windows Security settings.
If your goal is to simulate disabling Defender (e.g., for Atomic Red Team T1562.001-27):
Use this updated PowerShell-based test instead of DISM:
Set-MpPreference -DisableRealtimeMonitoring $true
That correctly disables real-time protection (with admin rights) and aligns with the MITRE test intent.