Unable to turn off security that relies on virtualization technology.
Unable to turn off security that relies on virtualization technology.
Essentially, the problem began when I attempted to complete tasks in my virtual machine. Initially, I dismissed it due to lack of time, but now it's affecting my work. I'm looking for ways to turn it off for VMs, Ryzen Master, Nox, and similar applications. So far, I've tried adjusting settings in the Group Policy Manager, modifying the registry, uninstalling Hyper-V, and disabling my AMD TPM. None of these steps have resolved the issue. What's puzzling is that Windows Defender shows VBS enabled under Device Security, yet when I open the core isolation tab, the memory integrity switch is off. Turning it on triggers an error about potential incompatibility. I've followed nearly every guide available, but nothing seems to work. I'm using a Ryzen 7 1700 with MSI B350 Gaming Pro Carbon BIOS, Corsair Vengeance 32 GB at 2933 MHz, and Windows version 17763.437. Any assistance would be greatly appreciated—feel free to ask anything you need.
Same here guys – I’ve tried all possible solutions. Even added a registry entry that someone suggested as a perfect fix, but it didn’t help. The issue was actually in Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard DWord: EnableVirtualizationBasedSecurity set to 0. I’m about to reboot and reinstall it to check if anything improved. This is totally unrealistic because everything functioned before the upgrade.
To ensure Ryzen Master functions, turn off virtualization in the BIOS settings. This process isn't related to Hyper-V or Windows configurations.
If your setup uses virtualization security with UEFI lock, you need to turn it off in the bootloader. Refer to the documentation at the provided link. Remove these registry entries: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\LsaCfgFlags, HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DeviceGuard\LsaCfgFlag, HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DeviceGuard\EnableVirtualizationBasedSecurity, and HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DeviceGuard\RequirePlatformSecurityFeatures. Use bcdedit to disable the features. From an elevated command prompt, execute the following commands: mountvol X: /s copy %WINDIR%\System32\SecConfig.efi X:\EFI\Microsoft\Boot\SecConfig.efi /Y bcdedit /create {0cb3b571-2f2e-4343-a879-d86a476d7215} /d "DebugTool" /application osloader bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} path "\EFI\Microsoft\Boot\SecConfig.efi" bcdedit /set {bootmgr} bootsequence {0cb3b571-2f2e-4343-a879-d86a476d7215} bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} loadoptions DISABLE-LSA-ISO,DISABLE-VBS bcdedit /set vsmlaunchtype off bcdedit /set {0cb3b571-2f2e-4343-a879-d86a476d7215} device partition=X: mountvol X: /d Disable Windows Defender Credential Guard for a virtual machine. From the host, you can also disable Windows Defender Credential Guard for a virtual machine using: Set-VMSecurity -VMName <VMName> -VirtualizationBasedSecurityOptOut $true