DESKTOP

Windows 7 : Using Advanced Security Options (part 2) - Configuring Windows Defender

9/28/2011 5:57:52 PM

3. Configuring Windows Defender

The Tools menu is used to configure Windows Defender. As shown in Figure 5, the following items can be accessed through the Tools menu:

  • Options

  • Microsoft Spy Net

  • Quarantined Items

  • Allowed Items

  • Windows Defender Website

  • Microsoft Malware Protection Center

Figure 5. Windows Defender Tools And Settings page

Let's take a look at each one of these Windows Defender Tools options in greater detail.

3.1. Options

Clicking Options on the Tools menu will enable you to configure the default behavior of Windows Defender. You can configure the following options:

  • Automatic Scanning configures Windows Defender to automatically scan your computer. You can also configure how often automatic scans should occur, the time that scans will occur, the type of scan to perform, whether definitions should be updated before scanning, and whether the default actions should be taken on any spyware that is found.

  • Default Actions configures the actions Windows Defender should take on high, medium, and low alert items. You can configure each level so that Windows Defender can take the default action for that level, always remove the item, or always ignore the item.

  • Real-Time Protection configures whether real-time protection is enabled, which security agents you want to run, how you should be notified about threats, and whether a Windows Defender icon is displayed in the notification area.

  • Excluded Files And Folders allows you to set up files and folders that are to be excluded during a scan.

  • Excluded File Types lets you configure certain file types that will be excluded from a scan, as shown in Figure 6. For example, you can exclude all files with the .doc filename extension if needed.

Figure 6. Excluded File Types

  • The options on the Advanced page configure whether archived files and folders are scanned, whether email is scanned, whether removable drives are scanned, whether heuristics are used to detect unanalyzed software, whether a restore point is created before removing spyware, and which file locations are exempt from scanning.

  • The options on the Administrator page configure whether Windows Defender is enabled and whether you display items from all users on this computer.

The next option that we will look at from the Windows Defenders Tools is Microsoft SpyNet.

3.2. Microsoft SpyNet

Microsoft SpyNet is an online community that can help you find out how others respond to software that has not yet been classified by Microsoft. Participation in SpyNet is voluntary (see Figure 7), and a subscription is free. If you choose to participate, your observations will be added to the community so that others can learn from your experiences.

Figure 7. Microsoft SpyNet participation options

To join the SpyNet community, click Microsoft SpyNet on the Tools menu, then choose either a basic or advanced membership. The level of membership will specify how much information is sent to Microsoft when potentially unwanted software is found on your computer.

By default, I Do Not Want To Join Microsoft SpyNet at this time is selected, but you can choose to participate in SpyNet by selecting the appropriate radio button. If you choose not to participate, no information will be sent to Microsoft and Windows Defender will not alert you regarding unanalyzed software.

3.3. Quarantined Items

Software that has been quarantined by Windows Defender is placed in Quarantined Items. Quarantined software will remain here until you remove it. If you find that a legitimate application is accidentally removed by Windows Defender, you can restore the application from Quarantined Items.

3.4. Allowed Items

Software that has been marked as allowed will be added to the Allowed Items list. Only trusted software should be added to this list. Windows Defender will not alert you regarding any software found on the Allowed Items list. If you find that a potentially dangerous application has been added to the Allowed Items list, you can remove it from the list so that Windows Defender can detect it.

3.5. Windows Defender Website

Clicking Windows Defender Website will open up Internet Explorer and take you to the Windows Defender website. Here, you can find information on Windows Defender, spy ware, and security.

3.6. Microsoft Malware Protection Center

Clicking Microsoft Malware Protection Center will open up Internet Explorer and take you to the Malware Protection Center website. Here, you can find information on anti-malware research and responses.

3.7. History Menu Option

There is also a History menu option next to the tools option. The History menu option is used to see what actions have been taken by Windows Defender. Informarion is included about each application, the alert level, the action taken, the date, and the status. Information will be retained until you click the Clear History button.

Other  
  •  Windows 7 : Configuring User Account Control
  •  Windows 7 : Managing and Applying LGPOs (part 3) - Using Local Policies
  •  Windows 7 : Managing and Applying LGPOs (part 2) - Using Account Policies
  •  Windows 7 : Managing and Applying LGPOs (part 1) - Configuring Local Security Policies
  •  Windows 7 : Managing Security
  •  Windows 7 : Creating and Managing Groups
  •  Windows 7 : Managing User Properties
  •  Windows 7 : Working with User Accounts (part 2)
  •  Windows 7 : Working with User Accounts (part 1)
  •  Windows Server : Designing a Software Update Infrastructure (part 2)
  •  Windows Server : Designing a Software Update Infrastructure (part 1)
  •  Securing Windows Server 2008 in the Branch Office
  •  Windows 7 : Configuring Network Connectivity - Configuring DirectAccess
  •  Windows 7 : Configuring Network Connectivity - Understanding BranchCache
  •  Windows 7 : Configuring Remote Management
  •  Configuring Windows 7 on a Network
  •  Windows Server : Branch Office Deployment - Branch Office Services (part 2)
  •  Windows Server : Branch Office Deployment - Branch Office Services (part 1)
  •  Windows Server : Planning Application Virtualization
  •  Windows 7 : Understanding TCP/IP (part 2)
  •  
    Top 10
    SQL Server 2008 : Common performance problems (part 2)
    SQL Server 2008 : Common performance problems (part 1) - Procedure cache bloating
    SQL Server 2008 : SQLOS schedulers, Wait analysis
    Windows Server 2003 : Recovering from System Failure
    Windows Server 2003 : Advanced Backup and Restore (part 2) - Scheduling Backup Jobs, Shadow Copies of Shared Folders
    Windows Server 2003 : Advanced Backup and Restore (part 1) - Managing Media, Backup Options, The Ntbackup Command
    Windows Server 2003 : Managing and Implementing Disaster Recovery - Restoring Data
    Microsoft .NET : Design Principles and Patterns - From Objects to Aspects (part 2) - AOP in Action
    Microsoft .NET : Design Principles and Patterns - From Objects to Aspects (part 1) - Aspect-Oriented Programming
    ASP.NET 4 in VB 2010 : The Data Controls - Editing with the GridView
    Most View
    Systems for All Budgets (Part 3) - WS 1000, Silent 1000
    Windows Phone 7 Development : Using a WebBrowser Control to Display Web Content
    How Secure Is Your Pin? (Part 2)
    MySQL for Python : Creating Users and Granting Access - GRANT access in MySQL
    Low- Pass Filter Removal (Part 3)
    Exchange Server 2007: Recover a Non-Mailbox Role
    Collaborating Within an Exchange Server Environment Using Microsoft Office SharePoint Server 2007 : Understanding the History of SharePoint Technologies
    Nokia 808 PureView – It Is All About The Photos
    ASP.NET State Management Techniques : The Role of the Global.asax File
    Group Test: Web Browsers (Part 3) : Safari 5.1.7
    G.skill ARES DDR3 2133MHz 8GB Kit
    Undelete 10 - Fairly Easy To Use
    Custom: Installation Nation (Part 2)
    Silverlight Recipes : Managing XAML Resources
    300 Lumen LED Flash For iPhone
    Onyx Calypso 9.7 Tablet
    Windows Server 2003 : Protecting Network Communications with Internet Protocol Security - IPSec Basics (part 2) - Differences Between AH and ESP, Process and Procedure
    Exchange Server 2010 Coexistence : Coexistence with Exchange Server 2003
    Nokia Lumia 900 - The Brightest Star In Lumia Series
    Canon IXUS 500 HS - Small-But-Mighty Premium Compact