.


Category MAIN  

Defender Windows


2015-12-27 00:00:00


Defender Windows - is a product of Microsoft, created to keep track of spyware software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software. The software warns users when spyware or potentially dangerous software tries to install itself or run on your own computer. Windows Defender also warns that when programs attempt to change important parameters of the operating system.

Due to the fact that Windows Defender is a component of the system, an update for this software can be downloaded from the Windows Update site or using Windows Server Update Services WSUS, Windows Defender that helps respond to recent changes in the environment, spyware and riskware software.

Opening the Defender Windows

Open Windows Defender, you can in the following ways:

    Click on "Start" button to open a menu in the search box, type Defender, and then open the application in the found results can also enter in the search box % windir% system32 control. exe/ name Microsoft. WindowsDefender Open the "Control Panel" from the list of components of the control panel, select the "Defender Windows»

update and check your computer

program Windows Defender helps protect your computer from spyware and malicious software in two ways:

    From the operating system check for spyware that might be installed on computers, by protection system in real time to alert the user that a spyware program tries to install itself or run on your computer
In

if Windows Defender updates have been downloaded via the "Update Windows» or manually when you open Windows Defender, you will see that for further work you need to upgrade the program. To do this, click on the "Check for Updates»

You can also check for updates manually by clicking on the arrow next to the Help button and selecting "Check for Updates».

Once you select this option, Windows Defender connects to the server Windows Update or WSUS server in your organization. Depending on the speed of your Internet connection, this process can take from a few seconds to several minutes. Next, the program will load the update from the server. To cancel the download updates, you can click "Cancel».

After the program installs the latest updates in the main window you will see the Windows Defender:

    Alert detected spyware or potentially dangerous software, was briefed on the status of the update, which displays the time the installation is complete renovation, as well as the time during which update was downloaded and installed, detailed information about the state of the Defender Windows. It displays information about the latest computer scan - the date, time and type of check schedule information check database updates spyware, and you know whether you have enabled the function to protect your computer in real time.

In that case, if the program was opened for the first time, right after install the update, you will need to inspect your computer. To do this, click on the "Check now».

The program Windows Defender offers three types of test:

Quick Scan. During a quick check scanner sweeps only those parts of the system where the highest probability of occurrence of spyware or potentially dangerous software. This check on the time it takes just a few minutes. By default, the Windows Defender program chose this type of validation, and it can be started at any time reaped the link "Check." Full Scan. During a full scan for spyware and potentially dangerous software scans all files on the hard drive, system memory, as well as all the currently running applications. In addition, during a full scan performs a full scan of all folders on your computer, which can significantly affect the performance of the system. Depending on the characteristics of the computer and the written information, the full scan may take one hour or more.

After checking the computer in the main window of Windows Defender, you can see informational messages, similar to the ones that you saw after the upgrade program. In the "Unwanted or potentially dangerous programs not found" displays the status of the computer. In statistics, you can check to see the type of the last check, scan start time, the time during which the computer has been scanned, and the number of scanned objects. The status area is identical to that displayed in the Windows Defender after update.

Journal of Windows Defender and objects quarantined

The magazine

Windows Defender, you can see all the action that took place over spyware and potentially dangerous programs detected on your computer. In the "Actions on programs" displays a list of all malicious programs and actions that Windows Defender with them performed. To view detailed information about any action, select it and click on "View". When prompted UAC provide confirmation. To delete all the items in the list, click on "Clear History." In order to view all the objects that you run allowed, go to "Permitted objects." To view, delete, or restore all objects, which launch was banned Defender Windows, go to "What`s in quarantine».

page "in quarantine" you can see all application which was banned by the Defender Windows. In the "Select the action applied" displays all the objects that the program wished dangerous. To view a particular program, click on it twice left mouse button. To display all the items in the list, click on the button "Browse". When prompted UAC provide confirmation. Placing in quarantine program, Windows Defender moves it to a special place on your computer. For each object you can press the "Delete" or "Restore". For the removal of all infected objects, you can click on the "Delete all».

Community Microsoft SpyNet

Community Microsoft SpyNet is an online community that helps to choose how to protect against spyware and potentially unwanted programs. This community also helps prevent the spread of new spyware. Using the software, Windows Defender you have the opportunity to join this community and pass on information about Microsoft server detected on your computer is a dangerous new software. Some information will be sent automatically. Join this community you can in the following ways:

? menu of Windows Defender, go to "History". In the "Do you want to help prevent the spread of potentially dangerous and unwanted programs?", Click on "Join the Microsoft SpyNet».

menu of Windows Defender, go to "Programs" and click on "What`s in quarantine." In the "Do you want to help prevent the spread of potentially dangerous and unwanted programs?", Click on "Join the Microsoft SpyNet».

menu of Windows Defender, go to "Programs", then click on "Permitted objects." In the "Do you want to help prevent the spread of potentially dangerous and unwanted programs?", Click on "Join the Microsoft SpyNet».

menu of Windows Defender, go to "Programs", then click on "Microsoft SpyNet».

In the "Join the community Microsoft SpyNet» select their level of participation and click "Save».

information is stored in the registry. More information can be found in the reference to the registry Windows.

Programs and parameters Defender Windows

In the programs and parameters Defender Windows, which opens when you click on the "Programs" menu, you can:

    Back to change the settings dialogue Defender Windows; Join the community Microsoft SpyNet; View objects in quarantine and permitted facilities; Go to the web site of the program Windows Defender and "Center of the Microsoft Malware Protection".

By default, Windows Defender performs a quick scan every day at eight o`clock in the evening. You can change the frequency, time and many more settings, go to the application settings.

Under "Automatically check" you can specify the type and frequency of the scan on the computer.

unchecking "Automatically scan my computer", you completely disable your computer protected. In the drop-down lists "Frequency", "Estimated time" and "Type" you can change the values that are specified by default. The same result can be achieved by changing various settings in the registry. These parameters can be found in reference to the registry Windows.

If you select "Check for updates installed before checking", before automatic check of your computer will run the update. Also, this option can be set by using the registry. These parameters can be found in reference to the registry Windows.

By checking on the option "Run scan only idle" check will be executed only if at the time of automatic test will not perform any action. This can also be done by means of the system registry. These parameters can be found in reference to the registry Windows.

tab, the default action, you can set actions to be performed upon detection of spyware or malicious software all provided in Windows Defender severity. For each of the following levels are available: "Recommended action based on the definitions", "Delete" or "Quarantine". Also available installation action means the registry. These parameters can be found in reference to the registry Windows.

select "Apply recommended actions", Windows Defender will not you issue a request and immediately begin to perform the actions that you set in this dialog. Also, you can do it by means of the registry. These parameters can be found in reference to the registry Windows.

On the "Real-time protection" to prevent the launch of spyware and potentially unwanted programs on your computer, select "Use real-time protection." These parameters can be found in reference to the registry Windows.

addition, you can check the boxes "Checking the downloaded files and attachments" and "Scan performed on the computer" for the appropriate action. This can also be done with the system registry. These parameters can be found in reference to the registry Windows.

In the "Excluded files and folders" by clicking on the "Add" button and selecting from the dialogue "Browse files and folders" certain files or folders, you can exclude them from the objects to be scanned. This can also be done with the system registry. These parameters can be found in reference to the registry Windows.

tab "Excluded file types" you can add extensions that will not be scanned. Adding only the file extension in the format "*.jpg», the operating system automatically detects the file type and add them to the list. Using the registry can exclude file types. These parameters can be found in reference to the registry Windows.

the tab "Details" you can select five additional options to check your computer:

    "Scan archive files" - Scan archive files and folders, but it can take longer. "Check email" - checking the contents of email messages and file attachments. "Scan removable media" - checking the contents of removable media. "Use heuristics" - the use of heuristic search spyware and potentially dangerous software. So the magazine programs can penetrate even those programs, details of which are absent in the updates. "Create a restore point" - creating a restore point before each uninstall programs from quarantine.

All these parameters can be set using the system registry. These parameters can be found in reference to the registry Windows.

The last tab settings Defender Windows "Administrator" you can completely disable the program by unchecking the option to "Use this program", as well as in the magazine of an administrative account to display all the spyware and potentially unwanted programs for all users in the current computer the option "Show elements of all computer users." These actions you can perform using the registry. These parameters can be found in reference to the registry Windows.

Conclusion

Despite all the advantages of component Defender Windows, preferably on your computer using Windows Firewall and antivirus software.

Send an error message
If you find an error in the text, select it with the mouse and press Ctrl + ENTER, specify the correct text without error.





Related articles

 Remove obsolete icons from the taskbar notification area
 Where to download and how to install additional themes for Windows 7?
 Adding Personalization window in Windows 7 Starter and Windows 7 Home Basic
 Manually Add a new device driver
 


Site is a private collection of materials and is an amateur informational and educational resource. All information is obtained from public sources. The administration does not apply for authorship of the materials used. All rights belong to their owners