3. Configuring Windows Defender
The Tools menu is used to configure Windows Defender. As shown in Figure 5, the following items can be accessed through the Tools menu:
Let's take a look at each one of these Windows Defender Tools options in greater detail.
3.1. Options
Clicking Options on
the Tools menu will enable you to configure the default behavior of
Windows Defender. You can configure the following options:
Automatic
Scanning configures Windows Defender to automatically scan your
computer. You can also configure how often automatic scans should occur,
the time that scans will occur, the type of scan to perform, whether
definitions should be updated before scanning, and whether the default
actions should be taken on any spyware that is found.
Default
Actions configures the actions Windows Defender should take on high,
medium, and low alert items. You can configure each level so that
Windows Defender can take the default action for that level, always
remove the item, or always ignore the item.
Real-Time
Protection configures whether real-time protection is enabled, which
security agents you want to run, how you should be notified about
threats, and whether a Windows Defender icon is displayed in the
notification area.
Excluded Files And Folders allows you to set up files and folders that are to be excluded during a scan.
Excluded File Types lets you configure certain file types that will be excluded from a scan, as shown in Figure 6. For example, you can exclude all files with the .doc filename extension if needed.
The options on the
Advanced page configure whether archived files and folders are scanned,
whether email is scanned, whether removable drives are scanned, whether
heuristics are used to detect unanalyzed software, whether a restore
point is created before removing spyware, and which file locations are
exempt from scanning.
The
options on the Administrator page configure whether Windows Defender is
enabled and whether you display items from all users on this computer.
The next option that we will look at from the Windows Defenders Tools is Microsoft SpyNet.
3.2. Microsoft SpyNet
Microsoft SpyNet
is an online community that can help you find out how others respond to
software that has not yet been classified by Microsoft. Participation
in SpyNet is voluntary (see Figure 7),
and a subscription is free. If you choose to participate, your
observations will be added to the community so that others can learn
from your experiences.
To join the SpyNet
community, click Microsoft SpyNet on the Tools menu, then choose either a
basic or advanced membership. The level of membership will specify how
much information is sent to Microsoft when potentially unwanted software
is found on your computer.
By default, I Do Not Want To
Join Microsoft SpyNet at this time is selected, but you can choose to
participate in SpyNet by selecting the appropriate radio button. If you
choose not to participate, no information will be sent to Microsoft and
Windows Defender will not alert you regarding unanalyzed software.
3.3. Quarantined Items
Software that has been
quarantined by Windows Defender is placed in Quarantined Items.
Quarantined software will remain here until you remove it. If you find
that a legitimate application is accidentally removed by Windows
Defender, you can restore the application from Quarantined Items.
3.4. Allowed Items
Software that has been
marked as allowed will be added to the Allowed Items list. Only trusted
software should be added to this list. Windows Defender will not alert
you regarding any software found on the Allowed Items list. If you find
that a potentially dangerous application has been added to the Allowed
Items list, you can remove it from the list so that Windows Defender can
detect it.
3.5. Windows Defender Website
Clicking Windows Defender
Website will open up Internet Explorer and take you to the Windows
Defender website. Here, you can find information on Windows Defender,
spy ware, and security.
3.6. Microsoft Malware Protection Center
Clicking Microsoft Malware
Protection Center will open up Internet Explorer and take you to the
Malware Protection Center website. Here, you can find information on
anti-malware research and responses.
3.7. History Menu Option
There is also a History menu
option next to the tools option. The History menu option is used to see
what actions have been taken by Windows Defender. Informarion is
included about each application, the alert level, the action taken, the
date, and the status. Information will be retained until you click the
Clear History button.