Additional Microsoft Defender tools and services that provide security across various platforms and environments
When using CrowdStrike (or any third-party AV) as the primary antivirus, Microsoft Defender Antivirus does not behave the same way it does in standalone environments. There are three different states involved:
- Active mode
Passive mode
Periodic (limited) scanning mode
These are not the same thing.
Setting the registry value:
HKLM\SOFTWARE\Microsoft\Windows Defender ForceDefenderPassiveMode = 1
places Defender into passive mode, but it does not automatically enable periodic scanning or definition update behavior in the same way as toggling it from the Windows Security UI.
When you enabled Periodic scanning manually, Windows triggered multiple internal state changes (services, policy evaluation, WMI providers, and other configuration keys). That’s why you observed a large number of registry changes — it’s not controlled by a single registry value.
Also, the key you referenced:
HKLM\SOFTWARE\Microsoft\Windows Defender\PUAProtection
only controls Potentially Unwanted Application (PUA) detection. It does not affect passive mode, update state, or definition reporting. So modifying that key would not resolve a “definitions out of date” condition.
Another important factor: if Tamper Protection is enabled, registry-based changes to Defender settings may not apply as expected.
Before pushing additional registry changes domain-wide, I would clarify exactly what your security team is measuring:
Security intelligence (definition) version?
Engine version?
Windows Security UI health state?
Or a compliance scanner expecting Defender to be active?
In environments with third-party AV, Defender being passive is expected behavior. If definition updates are required for compliance tracking, periodic scanning must be enabled through supported policy methods rather than attempting to replicate the UI behavior with registry edits.
Relevant Microsoft documentation: