System Protections
Step 3 of 4 — Disable Windows security features that block injection.
Each product requires different system protections to be disabled. Select your product below — your selection will be remembered across all setup pages.
Most of these changes require a PC restart to take effect. You can make all changes first and do a single restart at the end.
- HOOK (Fortnite / Apex)
- SAFEST (Rust)
- SQUAD (Rust)
- MATRIX (Arc Raiders)
Disable TPM
- Restart your PC and enter BIOS/UEFI (press
F2,Del, orF12during boot — varies by motherboard) - Navigate to the Security or Trusted Computing section
- Find TPM, Intel PTT, or AMD fTPM and set it to Disabled
- Save and exit BIOS
- Intel boards: Look for Intel Platform Trust Technology (PTT)
- AMD boards: Look for AMD fTPM or AMD PSP fTPM
- ASUS: Security → Trusted Computing → TPM Device Selection → Disable
- MSI: Settings → Security → Trusted Computing → Disable
- Gigabyte: Peripherals → Intel PTT / AMD CPU fTPM → Disabled
Some newer laptops have TPM permanently enabled or locked by the manufacturer. If you cannot find a TPM option in your BIOS, your device may not be compatible. Check our Terms of Service — it is your responsibility to verify compatibility before purchasing.
Windows 11 Only — Additional Steps
If you are on Windows 11, you must also complete these extra steps. Windows 10 users can skip this section.
Disable Vulnerable Driver Blocklist (Registry Edit)
- Press
Win + R, typeregedit, and press Enter - Navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Config - Find VulnerableDriverBlocklistEnable and double-click it
- Set the value to
0and click OK
If VulnerableDriverBlocklistEnable doesn't exist:
- Right-click in the right pane → New → DWORD (32-bit) Value
- Name it
VulnerableDriverBlocklistEnable - Set the value to
0
Disable Core Isolation
- Open Settings → Privacy & Security → Windows Security
- Click Device Security → Core isolation details
- Turn off all toggles:
- Memory Integrity
- Kernel-mode Hardware-enforced Stack Protection (if present)
- Microsoft Vulnerable Driver Blocklist (if present)
- Any other toggles shown
Reboot
Restart your PC to apply all changes.
Verify
After restarting, press Win + R → type msinfo32 → check:
| Setting | Should Be |
|---|---|
| TPM | Not found / Off |
| Memory Integrity | Off |
Disable Core Isolation
- Open Windows Security → Device Security → Core isolation details
- Turn off every toggle on this page:
- Memory Integrity (HVCI)
- Kernel-mode Hardware-enforced Stack Protection (if present)
- Microsoft Vulnerable Driver Blocklist (if present)
- Any other toggles shown
Disable Exploit Protections
- Open Windows Security → App & browser control
- Click Exploit protection settings
- In the System settings tab, set all of the following to Off by default:
- Control flow guard (CFG)
- Data Execution Prevention (DEP)
- Force randomization for images (Mandatory ASLR)
- Randomize memory allocations (Bottom-up ASLR)
- High-entropy ASLR
- Validate exception chains (SEHOP)
- Validate heap integrity
Set every single one to Off by default. Missing even one can cause injection to fail.
Disable Virtualization
In BIOS
- Restart your PC and enter BIOS/UEFI (press
F2,Del, orF12during boot) - Find Intel VT-x / Intel Virtualization Technology (Intel) or SVM Mode (AMD)
- Set to Disabled
- Save and exit
In Windows
- Press
Win + R, typeoptionalfeatures, press Enter - Uncheck the following:
- Hyper-V (all sub-entries)
- Virtual Machine Platform
- Windows Hypervisor Platform
- Click OK
Disable Secure Boot
- Restart and enter BIOS/UEFI
- Find Secure Boot (usually under Security or Boot)
- Set to Disabled
- Save and exit
Reboot
Restart your PC to apply all changes.
Verify
After restarting, press Win + R → type msinfo32 → check:
| Setting | Should Be |
|---|---|
| Memory Integrity | Off |
| Virtualization-based security | Not enabled |
| Secure Boot State | Off |
Disable VBS / HVCI (Core Isolation)
- Open Settings → Privacy & Security → Windows Security
- Click Device Security → Core isolation details
- Turn off all toggles — especially Memory Integrity
- Restart your PC
If Memory Integrity Won't Turn Off
If VBS is still showing as enabled after restart:
- Open Command Prompt as Administrator (right-click Start → Terminal (Admin))
- Run the following command:
bcdedit /set hypervisorlaunchtype off - Restart your PC
Disable Kernel DMA Protection
In BIOS
- Restart and enter BIOS (press
Del,F2, orF10during boot) - Disable VT-d (Intel) or IOMMU / AMD-Vi (AMD):
- Intel: Usually under CPU Configuration or Chipset settings
- AMD: Usually under NBIO Configuration or IOMMU settings
- Save and exit BIOS
In Windows (optional)
- Open Windows Security → Device Security → Core isolation
- Turn off Memory access protection (if present)
Disable Meltdown & Spectre Mitigations (KVA Shadow)
-
Open Command Prompt as Administrator
-
Run these two commands one by one:
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 3 /fREG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f -
Restart your PC
Reboot
Restart your PC to apply all changes.
Verify
After restarting, press Win + R → type msinfo32 → check:
| Setting | Should Be |
|---|---|
| Virtualization-based security | Not enabled |
| Kernel DMA Protection | Off |
| Memory Integrity | Off |
Disable TPM
- Restart your PC and enter BIOS/UEFI (press
F2,Del, orF12during boot) - Navigate to the Security or Trusted Computing section
- Find TPM, Intel PTT, or AMD fTPM and set it to Disabled
- Save and exit
- Intel boards: Look for Intel Platform Trust Technology (PTT)
- AMD boards: Look for AMD fTPM or AMD PSP fTPM
- ASUS: Security → Trusted Computing → TPM Device Selection → Disable
- MSI: Settings → Security → Trusted Computing → Disable
- Gigabyte: Peripherals → Intel PTT / AMD CPU fTPM → Disabled
Some newer laptops have TPM permanently enabled or locked by the manufacturer. If you cannot find a TPM option in your BIOS, your device may not be compatible. Check our Terms of Service — it is your responsibility to verify compatibility before purchasing.
Disable Virtualization
In BIOS
- While in BIOS, find Intel VT-x / Intel Virtualization Technology (Intel) or SVM Mode (AMD)
- Set to Disabled
- Save and exit
In Windows
- Press
Win + R, typeoptionalfeatures, press Enter - Uncheck:
- Hyper-V (all sub-entries)
- Virtual Machine Platform
- Windows Hypervisor Platform
- Click OK
Disable Secure Boot
- Restart and enter BIOS/UEFI
- Find Secure Boot (usually under Security or Boot)
- Set to Disabled
- Save and exit
Reboot
Restart your PC to apply all changes.
Verify
After restarting, press Win + R → type msinfo32 → check:
| Setting | Should Be |
|---|---|
| TPM | Not found / Off |
| Virtualization-based security | Not enabled |
| Secure Boot State | Off |