Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
programming4us
Windows 7

Conquering Malicious Software : Conquering Spyware with Windows Defender

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
10/11/2012 6:32:33 PM

Spyware (and its close cousin adware) isn't specifically designed to cause your computer harm. But even without the direct intent to do harm, spyware can have serious consequences. Too much spyware can bog your system down, causing everything to run slower than it should. Spyware can make unwanted changes to your Internet settings, causing your Web browser to act in unexpected ways. Spyware can lead to many annoying pop-up ads. In the worst cases, it can send personally identifiable information about you to identity thieves.

Most spyware comes from software that you can download for free, such as screen savers, custom toolbars, and file-sharing programs. However, it can also be installed automatically from scripts and programs embedded in Web pages.

There are many programs on the market that are designed to prevent and eliminate spyware (and adware). But you don't have to spend any money or download any third-party programs to protect your system from these threats. You can use Windows Defender, which comes with Windows 7 for free. Despite its focus on spyware, Defender actually protects your computer from any potentially unwanted programs. That includes many types of adware, Trojan horses, and rootkits.

1. Opening Windows Defender

Windows Defender doesn't need to be open to protect your computer. But you can do other things with Defender that do require opening the program. As with most programs, you have many ways to open Defender. Use whichever is most convenient for you at the moment:

  • Open the Control Panel and click the All Control Panel Items link in the left pane; then, open Windows Defender.

  • Press , type def in the Search box, and click Windows Defender.

When Windows Defender opens, it looks something like Figure 1.

2. Removing spyware from your computer

Windows Defender offers many tools for fighting spyware. One of them is the ability to scan your system for any spyware that you might have already acquired. You can do a Full Scan, which takes a while but gives you the peace of mind of knowing that your system is free of malicious spyware. Or you can do a Quick Scan. As its name implies, the Quick Scan takes less time because it focuses on areas where spyware is most likely hiding. You can also opt for a Custom Scan, which lets you choose which drives you want to scan. To perform a scan, click the arrow next to the Scan button, as shown in Figure 2, and then select the desired scan option.

NOTE

If you're unable to scan for spyware from a standard account, an administrator may need to enable scanning for you. 

A full scan takes several minutes, so you need to be patient. When the scan is complete, you should see a clean bill of health. If not, suspicious items will be quarantined (disabled). You should be taken to the quarantined list automatically, though you can get there any time by choosing Tools => Quarantined Items.

Figure 1. Windows Defender.

Figure 2. Scan for spyware.

Each item in the quarantined list has an alert level associated with it. Here's what each alert level means:

  • Severe: This item is known to compromise the security of your computer. It should be removed immediately.

  • High: This item may be too new to be well known. But all indications point to malicious intent, so the item should be removed immediately.

  • Medium: This item appears to collect personal information or change Internet settings. Review the item details. If you do not recognize or trust the publisher, block or remove the item.

  • Low: This is a potentially unwanted item that should be removed if you did not intentionally install it yourself.

  • Not Yet Classified: This item is unrecognized but is potentially something you don't want on your computer.

To remove an item, click its name and click Remove. You can usually click Remove All, because valid, useful programs are rarely detected as spyware or other potentially unwanted items. If in doubt, you can leave the item quarantined for a while. Use your computer normally to see whether some useful program no longer works. After you've determined that everything is okay, you can go back into Quarantined Items and remove anything you left behind.

Should you ever encounter a false positive (where an innocent program is quarantined), don't remove it. Instead, click its name and then click Restore.

2.1. Doing a quick scan

A full scan takes some time because it scans every file on your hard disk. You can save some time by doing a quick scan. A quick scan checks only new files and the kinds of files commonly used by spyware. After you've done a single full scan, quick scans are sufficient.

2.2. Doing a custom scan

A custom scan lets you scan a specific drive or folder. For example, if someone sends you a CD or DVD, you might want to check that disk before copying or opening any files from it.

For downloads, you might consider creating a subfolder within your Documents folder, perhaps named Unscanned or something similar. Whenever you download a file or save an e-mail attachment that you don't trust 100 percent, save it to that Unscanned folder. Then scan just the folder to make sure all is well. If the files check out okay, you can then move them to any folder you like. Or, in the case of a downloaded program, click the icon to start the program installation.

To do a custom scan, click Scan in Windows Defender and choose Custom Scan. Then click the Select button and click to select the drive you want to scan. Or, expand any drive icon and select the specific folder you want to scan. Then click OK to start the scan.

2.3. Automatic scanning

You can also set up Defender to automatically scan your system daily, weekly, or however often you wish. You must be logged in to an account with administrative privileges to set up automatic scanning. From the Administrator account, start Windows Defender normally. Then click Tools and Options. Automatic scanning options appear as shown in Figure 3.

Figure 3. Automatic scanning options.

To enable automatic scanning, make sure the Automatically Scan My Computer (Recommended) check box is selected (checked). Then you can set a schedule for scanning. For example, if you use a desktop computer that you leave on 24 hours a day, choose Daily and a time during which you're unlikely to be using the computer. If the computer isn't turned on when the scheduled time arrives, the scan will take place the next time you start the computer. Choose the type of scan you want to perform on the schedule.

If your computer is on and online 24 hours a day, you can also choose Check for Updated Definitions before Scanning. Doing so ensures that Defender is up-to-date with all known spyware when it scans.

Under the Default Actions heading, you can choose how you want an automatic scan to treat Severe, High, Medium, and Low alert items, as follows:

  • Recommended Action Based on Definitions: Choose this option to take the action that's recommended in the item's definition.

  • Remove: Choose this option if you want the item removed automatically when found.

  • Quarantine: Choose this option to have Windows Defender place the item in quarantine and prevent it from running until you review it and choose to either restore it or delete it.

  • Allow: Have Defender add the software to the allowed list and allow it to run on the computer. This option is available only for the Medium and Low alert items.

If in doubt about what to choose, your best bet is to choose the Recommend Action Based on Definitions option. Each malware item that Defender identifies has a definition that specifies its intent, severity, and recommended actions. The definitions are created by human experts who have previously found and analyzed the item. Unless you're an expert yourself, your best bet is to allow those expert definitions to choose a course of action.

2.4. Preventing Spyware

You've probably heard the saying "An ounce of prevention is worth a pound of cure." That's certainly true of spyware. Getting rid of spyware that has already infected your computer is a good thing. But preventing it from getting there in the first place is even better. That's where real-time protection comes into play. The term "real time" means "as it's happening."

The Windows Defender real-time protection analyzes files as they approach your computer from the Internet. Any spyware or suspicious-looking files are blocked to keep your computer from being infected.

Real-time protection is turned on by default. You can control whether it's on or off, and optionally tweak what it monitors by clicking Tools in Defender and choosing Options. Click Real-Time Protection to see the real-time options shown in Figure 4.

Following is a description of the options available for real-time protection:

  • Use Real-Time Protection (Recommended): Turn on real-time protection.

  • Scan Downloaded Files and Attachments: Monitor ActiveX controls and software installation programs that are downloaded, installed, or run from your Web browser.

    Figure 4. Defender real-time protection options.
  • Scan Programs That Run on My Computer: Monitor other programs installed on your computer to search for suspicious activity.

2.5. Excluding Files and Folders

In some situations, you might want to exclude certain files or folders from being scanned by Windows Defender. For example, if there are folders or files that you know are safe but could take a long time for Windows Defender to scan or could cause problems when scanned, you can exclude them. You can also exclude files based on their file type.

To set folder or file exclusions, click the Excluded Files and Folders link in the Windows Defender Options page. Click Add, select a folder or file, and click OK. Repeat the process for any other folders or files you want excluded.

To exclude files by type, click the Excluded File Types link. Click in the text box, type the file extension of the files you want to exclude from scanning, and click Add. Then, click Save to save your changes.

2.6. Advanced and Administrator Configuration Options

If you click Advanced in the Defender Options window, you see the Advanced options shown in Figure 5. These options include:

  • Scan Archive Files: Scan inside archive files such as zip and CAB files for malware.

  • Scan E-Mail: Scan the contents and attachments of e-mail for malware.

  • Scan Removable Drives: Scan USB and other removable media for malware.

  • Use Heuristics: When scanning, detect malware by matching partial malware signatures. This option can enable Defender to identify threats that have been modified (derivative threats) since the signature was released.

  • Create Restore Point: Create a Windows Restore Point prior to applying actions to detected items to enable you to roll back Windows to its previous state.


Clicking Administrator in the Options page lets you configure two additional options for Windows Defender. The Use This Program option, when selected, enables Defender. Deselecting this option turns off Defender. Unless Defender is causing a problem with your computer or a specific program, you should leave this option selected to enable Defender to protect your system. The second option, Display Items from All Users of This Computer, enables you to see the History, Allowed items, and Quarantined items for all users. These items are normally hidden.

3. Disallowing Allowed Programs

There may be times when you allow a program that you know and trust to run without any warnings from Windows Defender. These get added to the allowed programs list when Windows Defender alerts you about an item and you click Always Allow. Later, you might change your mind about that. If you do, you can click Tools in Defender to open its Options page. Then click Allowed Items. From there you can click any item and choose Remove from List to have Windows Defender start monitoring the program again.

Figure 5. Advanced Defender configuration options.

4. Joining the SpyNet Community

The SpyNet community is a huge group of Windows Defender users who keep a watchful eye on potential spyware. Joining the community allows you to see how others are treating suspicious software that hasn't yet been classified by experts. Seeing how others deal with a suspicious file can help you make decisions about suspicious files on your computer. When Defender finds a suspicious file, the community's rating appears as a graph indicating the number of members who have allowed the item.

To join the Microsoft SpyNet community, open Windows Defender, click Tools, and choose Microsoft SpyNet. Then choose the Basic Membership, Advanced Membership, or No Membership option as described on the page that opens.

5. Windows Defender Web Site

The Windows Defender Web site is a great resource for staying up-to-date with spyware threats and tools. The Community link on that page offers further resources for live interaction with others grappling with spyware decisions and experts to help you make those decisions. You can get to the Web site by clicking the Windows Defender Web site link on Defender's Tools page.
Other -----------------
- Parental Controls and Family Safety : Using Parental Controls from Windows Live
- Parental Controls and Family Safety : Using the Built-In Parental Controls
- Using Shared Resources : Mapping Drive Letters to Shared Folders, Using Shared Media
- Using Shared Resources : Transferring Files between Computers, Using a Shared Printer
- Microsoft Outlook 2010 : Using SharePoint Contacts in Outlook
- Microsoft Outlook 2010 : Adding SharePoint Calendars to Outlook
- Microsoft Visio 2010 : Organizing and Annotating Diagrams - Callouts
- Microsoft Visio 2010 : Organizing and Annotating Diagrams - Groups
- Microsoft PowerPoint 2010 : Creating Support Materials - Printing an Outline, Exporting Handouts or Notes Pages to Word
- Microsoft PowerPoint 2010 : Creating Speaker Notes
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server