How WinSux configures Windows Defender and security features
WinSux significantly reduces Windows security protections. The settings on this page are optimized for performance and low latency but leave your system substantially more exposed to malware, ransomware, and unauthorized access. Only proceed if you understand and accept these trade-offs.
Most security settings require elevated privileges beyond standard Administrator. WinSux handles this by running commands as NT SERVICE\TrustedInstaller and by rebooting into Safe Mode before applying Defender settings.
WinSux uses a Run-Trusted function that temporarily hijacks the TrustedInstaller service to execute commands at the TrustedInstaller privilege level. TrustedInstaller has ownership over protected system registry keys and files that even SYSTEM cannot modify directly.
The service binary path is restored immediately after execution. Each Defender registry change in stepone.ps1 is run twice: once via Run-Trusted and once as a standard Administrator, to maximise the chance of the write succeeding regardless of current tamper protection state.
Defender settings that Windows actively re-enables at runtime must be written while Defender is not running. WinSux sets up stepone.ps1 to run via Winlogon\Userinit on the next boot, then forces a Safe Mode boot:
# Register stepone.ps1 to run at next logon (via Winlogon Userinit)reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" ` /v "Userinit" /t REG_SZ ` /d "powershell.exe -nop -ep bypass -WindowStyle Maximized -f C:\Windows\Temp\stepone.ps1"# Boot into Safe Modebcdedit /set {current} safeboot minimal
stepone.ps1 restores the Userinit key and removes the Safe Mode flag after it completes, then restarts into normal mode.
The value is intentionally set to 0 (not 1). Windows enforces this key and resets it, so WinSux triggers the write to assert TrustedInstaller ownership. The Safe Mode execution prevents the runtime enforcement from firing during the write.
Disables Controlled Folder Access (ransomware protection). Controlled Folder Access blocks unauthorized writes to protected folders such as Documents and Desktop.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity]"Enabled"=dword:00000000; "ChangedInBootCycle" and "WasEnabledBy" are deleted
VBS may be re-enabled by software such as anti-cheat systems (e.g. FACEIT). WinSux includes a comment noting this. You may need to re-run the relevant portion of stepone.ps1 after uninstalling such software.