How To Use The Built-In Antivirus In Windows 10

How To Use The Built-In Antivirus In Windows 10

Spyware, worms and other computer viruses are the main danger for both beginners and experienced PC users. How to use the built-in antivirus in Windows 10 to protect information stored on a computer, and in some cases personal tools?

Standard antivirus on Windows

Microsoft quite a long time ago developed and launched on the market a free antivirus program Security Essentials. It is well known to users of Windows 7 and older.

Based on the same application, a built-in Windows antivirus was developed. From version 8 of the system, the program is included in the OS “out of the box” under the name Windows Defender (Defender).

The application provides tracking of potentially unsafe components in real time. Due to the fact that the antivirus is included in the delivery of the OS, the system no longer bothers users with persistent reminders of the need to install a program to combat malicious software.

Scan and update applications automatically

The principle of operation of the Defender is the same as that of most antiviruses. A program running in the background independently checks the launched files for potential threats. If everything goes well, the user does not even notice the antivirus. A person’s attention is required only if the Defender has detected a danger. then he will display a notification.

But even in this case, the program does not expect immediate action from the user. Suspicious and dangerous files are quarantined. The defender informs about the fact of detection of the threat. You can view the latest messages from the antivirus in the Notification Center.

Read more:  How To Install Windows On Imac

The anti-virus database is also updated without user intervention, in automatic mode. Defender downloads updates through the System Update Center. You can forget about manually updating the anti-virus database. the system is always up to date and protected.

Configure antivirus and create exceptions

You can configure the work of Defender through the Settings section. In order to go to it, expand the "Start" and click on the item "Options". In the "Update and Security" subsection, you will find a link to the Defender and its properties.

In the “out of the box” mode of operation, real-time protection, cloud protection and the ability to send samples of infected files are included. Providing real-time protection means that the program constantly scans the operating system and checks for malware. This mode of operation consumes part of the computer’s resources, which may affect performance. To improve performance, you can temporarily turn off real-time protection, but later it will be turned on again to ensure data integrity.

Sending samples and turning on cloud protection enable Microsoft to receive up-to-date information about threats and improve the quality of antivirus.

You can add exceptions to the Settings menu by clicking on the link of the same name in the section. You can add individual directories or files, system processes, or files of a certain type to the list. If the application is guaranteed not to be dangerous and does not threaten the system, but due to the constant calls of the antivirus, it runs slowly, the process can be added to the list of exceptions, which will solve the performance problems. Do not create an excessive number of exceptions: after adding an exception, the antivirus stops doing regular file checks, which may one day cause a virus to enter the system.

Read more:  How To Speed Up Windows 10. Improving Computer Performance

Run a test in manual mode

In the list of settings there is an item "Version Information". From it, by clicking on the "Use Defender" link, you can go to the window of the Defender program itself. The application interface is as close as possible to the Security Essentials window. Probably, in future versions, developers will transfer this functionality to the "Parameters" section, but so far the application has its own interface.

From the program window, you can run a quick system scan, a full scan, or scan individual directories for viruses. The last item is very useful when connecting external data sources. flash cards or hard drives.

When the real-time monitoring mode is on, it is not necessary to regularly check files. The application independently performs scanning, including according to the established schedule. You should start the scan in manual mode when switching to network folders or when connecting an external medium.

Quarantine check

If Defender displays an information message about sending files to quarantine, you can view the list of files through the desktop interface of the program. After switching to the program (using the “Use Defender” link in the “Parameters” section), you need to open the “Log” section. By clicking on the “View Details” button, the system will show a complete list of blocked programs with an indication of the detected threat, the date of detection and quarantine transfer.

From the same interface, you can completely remove the application from the system or unlock it. To unblock a program that the Defender considered potentially dangerous should only be done if you are 100% sure of its reliability. In any other case, running quarantined files is not recommended.

Read more:  How To Enable Maximum Performance Mode In Windows 10

Installation of additional antivirus

If an alternative antivirus is installed in the system, Windows automatically deactivates the Defender program. Real-time file scanning is no longer carried out, because a conflict between two antiviruses is impossible.

When you open the Defender interface with a third-party antivirus application installed, you will notice that all the functions of the standard program are inactive. By clicking on the “Use Defender” link, the system will display a notification that the program is turned off and does not scan software.

Defender is reactivated if an anti-virus program of another manufacturer is removed from the computer. Windows is thus always protected. an official or third-party application.

, ,