Blogger Widgets

Thursday, November 24, 2011

Microsoft Security Essentials


When you install MSE 2, it will automatically run a scan unless you opt out. Note that it will not consider your computer secure until that first quick scan has completed.
(Credit: Screenshot by Seth Rosenblatt/CNET)

Microsoft Security Essentials 2 uses both definition-file and real-time defenses against viruses and spyware, and also offers rootkit protection. Along with the quick scan and the full scan, there's a Custom scan option that lets users select specific folders or drives to scan. It doesn't allow for customizing the type of scan used. For example, you're not going to be able to choose to scan only for rootkits or heuristics, as you can with other security programs. However, you can set USB keys and other external devices to automatically get scanned. The program installs a context-menu option for on-the-fly scanning in Windows Explorer, too.

The Update pane manages the definition file updates, with a large action button, and History provides access to a spreadsheet-style list of All detection items, your Quarantine, and items you've Allowed to run. Although it's a basic layout, this no-frills approach to security has proven appealing to people who are overwhelmed by more detailed security choices.

New in version 2 is integration with Internet Explorer so that downloads get scanned, and Windows firewall hooks so that your personal security net is tighter. For Windows 7 and Vista users, the Windows Filtering Platform that those two operating systems come with gets a boost from a new network inspection feature.

The Settings window allows you to further customize the program by scheduling scans, toggling default actions to take against threats, adjusting real-time protection settings, creating whitelists of excluded files, file types, and processes, and choosing from the aforementioned SpyNet options. There's also an Advanced option that is still fairly basic: here you can set Security Essentials to scan archives and removable drives, create a system restore point, and expand user rights to allow all users to view the History tab.
CLICK HERE 2 DOWNLOAD
By Saqib Shakoor

No comments:

Post a Comment