Dedicated Trojan and spyware guard for Windows systems

Source: Internet
Author: User

To cope with the security challenges posed by the proliferation of Trojans, spyware and other malware on the network, Microsoft also launched a dedicated program for anti-Trojan and spyware: Microsoft Defender. Although it is still a test version, some of its features surprise us. Let's take a look at it.

Installation and upgrade

If you have already installed Microsoft Defender, you can use its automatic update function to upgrade it. For friends who are about to taste, you canHttp://www.mydown.com/soft/256/256792.html. During installation, you can click "Next". After the installation is complete, a quick system scan is automatically performed.

Tip: On the main interface, you can use the small arrow next to "Scan (View)" to quickly switch between Scan modes.

  Basic settings

To exert the power of Microsoft Defender, we recommend that you set the basic Settings in "Tools/Settings/General setting (Tools/Settings/General Settings)" on the main interface: select all the options in "Automatic scan" to automatically scan when the machine is idle. When suspicious files are found, the software will process them according to the preset actions; windows defender classifies the scanned suspicious files into three levels: High, Medium, and low. In "default actions) "Three different operations such as" prompt, ignore, and delete "can be automatically executed for different levels of threats (1). For security reasons, we recommend that you select" signature dafult (default prompt) ".

In addition, you can select all the options in "Real-time protection options" to enable Microsoft Defender to start automatically with the system, real-time Monitoring of registry, IE downloads, add-ons, and system configuration modifications; if you do not want windows defender to scan certain files or folders, in "Advanced options (Advanced options) "Check the two options and then use the" Add (Add) "button to import the file or folder. If there are multiple users on your machine, to enable each user to be protected by windows defender, select two options in "Administrator options" and click "Save.

  View the "Black and White" list

After the above settings, let's see how it works: Install the latest version of the Internet Express. During the installation process, the software will automatically create a shortcut icon in the IE browser, in this case, Microsoft Defender has intercepted it (2 ).

In this case, you can select whether to allow the Action to be written from the Action drop-down menu, and then click "Apply Actions" to save the operation, after detecting this operation, the custom action will be automatically executed.

On the Tools tab, Quarantined items records the key suspicious files that are isolated during the scan process, when confirming that the software is malware, you can use the Remove button to delete it. If it is not malware, you can use the Restore button to Restore it; the "Allowed items (Allow projects)" records the file records that are Allowed to be executed. You can delete these records when you are no longer Allowed to perform the corresponding operations, in this way, the same operation will be intercepted again (3 ).

  View process details

Almost all users care about the processes on the current machine, and there are many third-party process viewing tools. Now we can use Windows defender to view background programs, and the features will definitely surprise you.

It's not uncommon to worry about the several svchost.exe programs found in the process, fearing that there are "fake" processes in it. In this case, you can switch to "Software Explorer" on the "Tools" tab and click the drop-down button of "Category, in the drop-down menu, you can select a category based on the programs that are started with the system, the programs that are running, the programs that are accessing the network, and the system network components in use. Select "Currently Running Program", find it in the process list, and select the Program marked with "Host Program" to see its purpose.

Tip: In the process Prompt window, buttons such as "end", "delete", "refresh", and "Call Task Manager" are also set to help you take actions on suspicious programs at any time.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.