Update (October 14, 2019): Tamper protection is now generally available for Microsoft Defender ATP customers and enabled by default for home users
We are committed to making our solutions resis...
Click OK to save. Link this GPO to your Computers container and then run gpupdate in Powershell on Windows Server . The value of register that controlling Tamper Protection must be 5 to be active. You can't change this value without system account. This script will check the value of the registry and if the value is not 5 - the script will change it to 5. The changes will be applied on client computers after two restarts. First is for changing the registry value to 5 . Second restart is for applying changes in Windows Defender. In two words - link this GPO to target machine. You may run gpupdate on target machines or force the GPO, because otherwise the restarts may be 3 times. If you want to disable Windows Tamper Protection with this method, you must change value to 0 or other different than 5.
The start-sleep in the begin is to wait for the system to start Windows Defender. You can use this script in Powershell, but you must run Powershell with NT\System account (eg. with PSexec -> psexec.exe -s -i powershell.exe) . In this case the script can be entered without start-sleep in the begin 🙂 This is tested on about 180 computers in company and working. The problem with turned off Tamper Protection still exits after upgrade to Windows 10 version 1909! . Sorry for my bad English and have a nice day!