Additional Microsoft Defender tools and services that provide security across various platforms and environments
Windows Defender is blocking parts of the apps because SmartScreen and Defender are treating them as potentially unwanted or untrusted, even when real‑time protection is turned off and exclusions are configured. The behavior is controlled from Protection history and from Virus & threat protection settings.
Use these steps to unblock and stabilize the development scenario:
- Check Protection history and explicitly allow the blocked items
- Open Windows Security.
- Go to Virus & threat protection → Protection history.
- Look for entries that say This app has been blocked or similar for the binaries built by Visual Studio (for example,
MSBuild.exe, test executables, or DLLs under the development folders). - Select each relevant entry, choose Actions, then select Allow.
- Rebuild or re‑run the project so the files are created again; SmartScreen/Defender should now allow them.
- Prefer targeted exclusions instead of disabling real‑time protection
Disabling real‑time protection only works temporarily and can leave the device vulnerable. Instead, keep real‑time protection On and:
- In Windows Security → Virus & threat protection → Manage settings.
- Under Exclusions, select Add or remove exclusions.
- Add exclusions only for the specific build output folders or files that are repeatedly flagged and that are known to be safe.
- Verify Virus & threat protection settings
- In Virus & threat protection → Manage settings, confirm that:
- Real-time protection is enabled (recommended) so only the explicitly excluded or allowed items are bypassed.
- If a non‑Microsoft antivirus was installed, ensure it is not conflicting; Defender will turn itself off when a compatible AV is active.
- In Virus & threat protection → Manage settings, confirm that:
- If a specific tool in the toolchain is being flagged as a vulnerable driver or similar
If any alert mentions a vulnerable driver (for example,
VulnerableDriver:WinNT/Winring0) for a development or monitoring tool, either update that tool to a safe version or, if absolutely necessary, add a one‑off exclusion for that file using the same Exclusions workflow as above. This workaround increases risk and should be used only when required.
These steps align Defender’s SmartScreen and antivirus decisions with the development workflow by explicitly allowing the blocked binaries through Protection history and using scoped exclusions, instead of repeatedly turning protection off.
References: