To change the setting (other than inspecting the GPO setting), this can be performed via the registry...
(
NOTE:
If this setting is changed directly(disabled), it will revert(enabled) after reboot, once the GPO settings are applied, and any applications not already loaded prior to receiving the GPO, may continue to fail). Maintaining persistence is achieved via GPO, unless a GPO for this setting does not exist...
Open Windows Registry Editor (As Admin) - Click start > run, type regedit
- Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SCMConfig
- Verify if the following 'enabled' value exists 'EnableSvchostMitigationPolicy'=dword:00000001
- Change the dword value from 1 to 0, to disable
- Reboot to apply & persist setting (Unless GPO is in place)
From MS articles listed below:
"Important - Enabling this policy could cause compatibility issues with third-party software that uses svchost.exe processes (for example, third-party antivirus software)."
"The first and most important change is that we are removing the Computer Configuration setting, “Enable svchost.exe mitigation options” (in System\Service Control Manager Settings\Security Settings) from the Windows 10 and Windows Server baselines at this time because of reports that in its current implementation it causes more compatibility issues than we had anticipated."