Trial Report of Microsoft free anti-virus software Microsoft Security Essentials Beta

Source: Internet
Author: User
Tags security essentials

Microsoft released the anti-virus software Beta version named after Microsoft Security Essentials to customers in the United States, Brazil, Israel, and China on Tuesday. Currently, only the English version is available. I downloaded the version for a while, let's talk about my experiences.

First, you must have a live account and pass the genuine verification of the Microsoft operating system. The download process is too cumbersome, it is worth mentioning that Microsoft is also playing with the Download Manager, that is, to install a browser plug-in before the download, as shown in the download interface.

498) this. style. width = 498; "border = 0>
Figure 1 download Microsoft Security Essentials using Microsoft's Download Manager

After downloading the file, the file name is 7.5mand mssefullinstall-x86fre-en-us-xp.exe. You must double-click to start the installation and verify the operating system version. According to Microsoft's tradition, you only need to click Next to complete the installation. If you choose to upgrade the virus database at the end of installation, the system automatically connects to the upgrade server to upgrade to the latest version of the virus database, as shown in.

498) this. style. width = 498; "border = 0>
Figure-2 upgrade to the latest virus Database

As shown in the preceding figure, there are a total of four tag pages. After the upgrade is complete, it performs a quick scan automatically, as shown in the scan result.

498) this. style. width = 498; "border = 0>
Figure-3 quick scan results

From the figure above, we can see three scan options, which are basically the same as common anti-virus software. When you move the mouse over the three scan options, a TIPS prompt is displayed, which gives a brief description of each option. The following figure shows the history tab.

498) this. style. width = 498; "border = 0>
Figure-4 history Tab

From the figure above, we can see three filtering options: displaying all detected projects, isolating projects and allowed projects. This uidesign is still very good, at least I think we can see the corresponding content with just a few clicks. Let's take a look at how the tab looks like.

498) this. style. width = 498; "border = 0>
Figure 5 setting page

As shown in the preceding figure, the settings include Scan Scheduling, default behavior, real-time scan, excluded files and locations, excluded file types, excluded processes, advanced and Microsoft Spynet.

Scan Scheduling allows you to set a fixed scan date, time, and scan type. You can also select to upgrade the virus database before scanning, and scan only when the computer is not busy. The specified location of the scheduled scan is not supported, that is, the custom scan area.

The default behavior setting interface allows you to set the corresponding behavior of each warning level. According to Microsoft's tradition, four warning levels are included: severe, high, medium, and low, for the default behaviors corresponding to the severe and high warning levels, Microsoft Security Essentials recommends three behaviors: Remove and isolate, A "allow" is added for the default behavior corresponding to the medium and low warning levels ". We didn't see any prompt box asking the user to confirm the option. We don't know whether the design is good or not. Only the benevolent sees the wise and wise sees the wise.

The real-time scan setting interface allows you to set whether to enable the real-time scan function. Two options are provided: scanning active files and programs on the computer, and scanning all downloaded attachments and files. I think this setting is simple and practical.

The excluded files and locations page allows you to add files and locations that are automatically skipped during scanning and real-time monitoring. However, you cannot select multiple locations and files at a time.

On the excluded file type setting page, you can directly enter the file types that are skipped during scanning and real-time monitoring. Here, you cannot enter multiple file suffixes at a time.

The excluded process interface allows you to set the process that can be skipped during scanning and real-time monitoring. Here, you cannot select multiple processes at a time. Although it is a process, it actually allows users to select executable files, including cmd, bat, pif, scf, exe, com, and scr types.

On the Advanced Settings page, you can select whether to scan archive files, that is, common zip, cab, and rarfile types. The second option is whether to scan mobile devices. This option is not selected by default, why is no default choice for today's mobile devices? The third option is to create a restore point, that is, to create a restore point When deleting a file. If the machine discovers a large number of viruses and wants to delete many files, this function is useful, in case important files are deleted, they can be restored. The fourth option is to allow all users to view historical results. In my opinion, this option is a little redundant.

The Microsoft Spynet interface allows users to choose to become a member of the Microsoft Spynet online community. There are two options: one is an ordinary member and the other is a senior member. The common member only sends basic information to Microsoft, senior members send more information to Microsoft. For privacy protection, we recommend that you select an ordinary member.

Summary

After a two-hour trial, the overall feeling is 4 characters, simple and practical, but some defects are also exposed. The second is that the upgrade speed is satisfactory, which is also related to the current few users. The fast scanning speed is satisfactory, and the CPU usage is about 45%.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.