Original Message:
Sent: Feb 21, 2026 10:36 PM
From: Henry Ng
Subject: How to Disable Hyper-V in Windows 11 24H2
I am very disappointed at Microsoft. I tried everything in this forum, to yet no success. My brother's PC does not have Hyper-V on. Both of us are on windows 11 Home, 25h2. This has been driving me crazy for 2 days now. Should I just throw windows in the trash and go Linux? My workflows require adobe creative cloud, however, which does not have Linux support, unfortunately, so I'm stuck with Microsoft.
Original Message:
Sent: Feb 07, 2026 09:00 AM
From: richard612
Subject: How to Disable Hyper-V in Windows 11 24H2
I have a 25H2 installation here. Applied the above, ran the DG Readiness tool successfully, but the hypervisor continued to load:
Get-WinEvent -LogName system | Where-Object { $_.ProviderName -like 'Microsoft-Windows-Hyper*' }
ProviderName: Microsoft-Windows-Hyper-V-Hypervisor
TimeCreated Id LevelDisplayName Message
----------- -- ---------------- -------
2026-02-06 22:09:42 165 Information Hypervisor configured mitigations for CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130 for virtual machines.…
2026-02-06 22:09:42 156 Information Hypervisor configured mitigations for CVE-2018-3646 for virtual machines.…
2026-02-06 22:09:42 129 Information Hypervisor initialized I/O remapping.…
2026-02-06 22:09:42 2 Information Hypervisor scheduler type is 0x1.
2026-02-06 22:09:42 1 Information Hypervisor successfully started.
Let's see if I can disable the hypervisor without help from Group Policy as several Windows editions have no such thing.
I've unlinked the relevant GPO from the domain, restored Device Guard to "not configured" in local Group Policy, run a gpupdate, then re-ran the DG Readiness ps1 script.
Then I rebooted TWICE -- 1st time so that whatever might alter the config has a chance to do so and 2nd for said alterations to go into effect.
On the first reboot I hit F3 at the "F3 to disable" blah-blah UEFI loader prompt; there's no hypervisor load this time. Sure enough on the 2nd reboot I have Microsoft-Windows-Hyper-V-Hypervisor | Hypervisor successfully started in the event log. Oof.
Windows Defender has no knob to turn Credential Guard off:
Per MS website
Cred Guard does use Virtualization-based Security (VBS). Check the registry and I have:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\CredentialGuard]"Enabled"=dword:00000001[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\KeyGuard\Status]
"IsTestConfig"=dword:00000000
"LsaIsoLaunchAttempted"=dword:00000001
"LsaIsoLaunchError"=dword:00000000
"ExecSystemProcessesError"=dword:00000000
"NumAttemptedRestarts"=dword:00000001
"NumSuccessfulRestarts"=dword:00000000
"KeyGuardEnabled"=dword:00000001
"CredGuardEnabled"=dword:00000001
"IsSecureKernelRunning"=dword:00000001
"EncryptionKeyAvailable"=dword:00000001
"EncryptionKeyPersistent"=dword:00000001
"SecretsMode"=dword:00000001
Flipped "KeyGuardEnabled" and "CredGuardEnabled" to 0 then reboot. No dice. Still have a hypervisor.
Key path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
Key name: LsaCfgFlags
Type: REG_DWORD
Value: 0
Key path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
Key name: LsaCfgFlags
Type: REG_DWORD
Value: 0
Now we're getting somewhere! Applied these, making sure the earlier reg keys were also returned to 0. Boom, 1-2-3 reboots and no hypervisor!🎉
---
What's going wrong?
How about line 1207 of theDG_Readiness_Tool_v3.6.ps1PowerShell script:
ExecuteCommandAndLog 'REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v "LsaCfgFlags" /f'
...but Microsoft's Disable Credential Guard guidance (linked above) has:
[RageNoises.wav]
So anyway, I reckon
DG_Readiness_Tool_v3.6.ps1 remains useful as it chains the "
press F3 to disable Credential Guard" shim into UEFI boot (thus performing
Disable Credential Guard with UEFI lock for us).
I've also stumbled across these:
My system does have this key. I wonder if its presence was helping to keep "default enablement" in a state of, uh, enablement.
Going forward, to OP's guide I'd add something about:
- doing all steps in one go (i.e. no reboot until the end) since Credential Guard re-enabling itself during the next boot may undo one or more steps (e.g. it re-creates reg keys which we do not want and may re-implement UEFI lock).
- rechecking everything if hypervisor removal fails, given the way "default enablement" can take over.
- after execution then both before and after the first reboot, checking
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\CredentialGuard]to ensure there's no "Enabled"=dword:00000001for any of the VBS-dependent technologies. - leave nothing to chance by creating explicit
"Enabled"=dword:00000000keys for all VBS-dependent technologies under theCredentialGuardkey. I don't have a full list but I'll bet we can crowdsource one... - adding a check for the two
LsaCfgFlags reg keys; user shall create/modify if needed. - Group Policy may be ineffective in some cases. In my case it was definitely not working. I'm contemplating a hand-crafted .ADMX/.ADML we might use to help with this project.
Original Message:
Sent: Mar 13, 2025 11:30 AM
From: pepe gonzales
Subject: How to Disable Hyper-V in Windows 11 24H2
In this guide, I will explain how to disable Hyper-V in Windows and use Intel VT-x/EPT or AMD-V/RVI in any virtualization program, such as VirtualBox or VMware (in my case). The final step (6) is the key to disabling it in version 24H2, which has a bug that prevents it from being disabled.
Step 1: Stop Any Currently Running Hyper-V Services
- Click on the Start menu.
- Type services (without quotes) and press [ENTER].
- In the Services window, browse through the list and look for any services that include "Hyper-V" (e.g., "HV Host Service").
- If any of these services are running, right-click on them and select Stop.
- Close the Services window.
Step 2: Ensure Hyper-V and Related Features Are Not Installed
- Click on the Start menu.
- Type Features (without quotes) and select "Turn Windows Features on or off".
- In the Windows Features window, ensure the following options are unchecked:
- Hyper-V (including all sub-items).
- Windows Hypervisor Platform.
- Linux subsystem for windows
- Click OK and wait for the changes to apply.
- Restart your computer if prompted.
Step 3: Disable "hypervisorlaunchtype"
- Click on the Start menu.
- Type powershell (without quotes), right-click on Windows PowerShell, and select Run as administrator.
- In the PowerShell window, type the following command and press [ENTER]:
- bcdedit /set hypervisorlaunchtype off
- Close the PowerShell window.
Step 4: Disable Device Guard (If Applicable)
Note:
- This step may not apply to all versions of Windows.
- The Group Policy Editor (gpedit.msc) is not available in Windows 11 Home.
- Click on the Start menu.
- Type gpedit.msc (without quotes) and press [ENTER].
- In the Group Policy Editor, navigate to:
- Local Computer Policy > Computer Configuration > Administrative Templates > System > Device Guard
- Double-click on "Turn on Virtualization Based Security".
- Select Disabled and click OK.
Step 5: Disable "Memory Integrity" in Core Isolation
- Click on the Start menu.
- Type core isolation (without quotes) and press [ENTER].
- In the Core Isolation window, ensure that "Memory Integrity" is turned Off.
- Close the window.
Step 6: Mandatory step for Windows 11 24H2
Windows 11 24H2 has a known issue where Hyper-V might still interfere even after following the above steps. To resolve this, you'll need to use the Microsoft Device Guard and Credential Guard Hardware Readiness Tool:
- Download the Device Guard and Credential Guard hardware readiness tool from Microsoft.
- Extract the downloaded ZIP file.
- Use the tool to disable Device Guard and Credential Guard:
- Open PowerShell window as an administrator.
- Navigate to the folder where you extracted the tool.
- Firs run this command to get Execution Policy:
- Set-ExecutionPolicy Unrestricted -Scope Process
- Now run the script with the -disable parameter to disable Device and Credential Guard
- DG_Readiness_Tool_v3.6.ps1 -Disable
- Reboot your computer.
- During the boot process, Windows will ask you to confirm the changes. Follow the on-screen instructions to proceed (Just press F3).
Note: Disabling Device Guard and Credential Guard will temporarily disable your Windows Hello PIN. However, you can re-enable it later without any issues.
Step 7: Confirm Hyper-V is Fully Disabled
- After rebooting, open a PowerShell window as an administrator.
- Run the following command to ensure Hyper-V is fully disabled:
- bcdedit /set hypervisorlaunchtype off
- Reboot your computer again.
Additional Notes
This method worked for me on Windows 11 24H2 for VMware Workstation and Virtualbox After completing these steps. I hope this actually helps someone, because I almost lost my mind trying to fix this
As far as I understand, this happens because in the new version, the security of the Windows Hello PIN and others things are based on the hypervisor, although it should be disabled if you want to disable the hypervisor, Microsoft should provide a simpler option to disable it completely and take the risks.
I am not responsible if someone breaks their system or creates a security breach. I'm just trying to help, something Microsoft doesn't do, considering that the original deactivation guide is the same as always.