Policy
Turn off routine remediation
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, Windows7, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2008, WindowsServer2012, WindowsServer2012R2, WindowsServer2016, WindowsVista
This policy setting allows you to configure whether Microsoft Defender Antivirus automatically takes action on all detected threats. The action to be taken on a particular threat is determined by the combination of the policy-defined action, user-defined action, and the signature-defined action. If you enable this policy setting, Microsoft Defender Antivirus does not automatically take action on the detected threats, but prompts users to choose from the actions available for each threat. If you disable or do not configure this policy setting, Microsoft Defender Antivirus automatically takes action on all detected threats after a nonconfigurable delay of approximately five seconds.
Registry values
How enabled and disabled states update the registry.
| Registry location | Type | Enabled value | Disabled value |
|---|---|---|---|
| HKLM\Software\Policies\Microsoft\Windows Defender\DisableRoutinelyTakingAction | REG_DWORD | 1 | 0 |
Policy elements
Inputs and configuration options exposed by this policy.
This policy has no additional user input fields.
Other policies in this category
Explore related policies at the same level.
- ComputerAllow antimalware service to remain running alwaysAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerAllow antimalware service to startup with normal priorityAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerConfigure detection for potentially unwanted applicationsAt least Windows Server 2016, Windows 10 Version 1607
- ComputerConfigure local administrator merge behavior for listsAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerConfigure scheduled task times randomization windowAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerControl whether exclusions are visible to local usersAt least Windows Server 2016, Windows 10 Version 1607
- ComputerControl whether or not exclusions are visible to Local AdminsAt least Windows Server 2016, Windows 10 Version 1607
- ComputerDefine addresses to bypass proxy serverAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerDefine proxy auto-config (.pac) for connecting to the networkAt least Windows Server 2016, Windows 10
- ComputerDefine proxy server for connecting to the networkAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerDefine the directory path to copy support log filesAt least Windows Server 2016, Windows 10 Version 1607
- ComputerRandomize scheduled task timesAt least Windows Server 2012, Windows 8 or Windows RT