Using Microsoft Security Essentials to Protect Against Viruses and Spyware

Microsoft Security Essentials provides protection against viruses, spyware, and other malicious software. Security Essentials scans your ...

Microsoft Security Essentials provides protection against viruses, spyware, and other malicious software. Security Essentials scans your computer for threats and keeps out new threats. Security Essentials does not come installed on the computer, but is available as a free download from Microsoft.



NOTE: If you have antivirus software installed, but want to install different antivirus software, remove the old antivirus software before installing new software. This might prevent software conflict  problems.


Downloading and installing Microsoft Security Essentials
Microsoft Security Essentials is available as a free download for all computers running a genuine version of Windows. Follow these steps to install Security Essentials:
  1. Click Free download .
  2. Microsoft detects your operating system and begins to download the options appropriate to your operating system.
  3. If a Security Warning window opens, click Run .
    Figure 1: Security Warning
     
    5.  If a second Security Warning window opens, click Run .
    Figure 2: Security Warning
     
    6.  On the welcome screen, click Next .
    Figure 3: Installation Wizard welcome screen
     
    7.  Proceed through the steps to install Microsoft Security Essentials
     
    8.  When the installation is complete, click Finish . 
    Figure 4: Installation is complete
    An Update screen displays, while Security Essentials scans the Microsoft site for the latest updates to virus and spyware definitions. Any necessary updates are installed on your computer. When the scan is complete, close the software.
    Figure 5: Update screen
    Scanning the computer for security threats
    Microsoft Security Essentials can perform a quick scan of the most common places threats are found, a full scan of the entire system, or a custom scan of the drives and folders you select. Follow these steps to scan the computer for security threats:
    1. To open Microsoft Security Essentials, click Start , All Programs , then click Microsoft Security Essentials .
    2. Open the Home tab.
    3. Select one of the scan options, and then click Scan now :
      • Quick - Scans the folders most likely to contain security threats.
      • Full - Scans the entire system.
      • Custom - Scans drives and folders that you choose.
      Figure 6: Scan options
       
      4.  Security Essentials scans the computer for security threats.
      Figure 7: Scanning
       
      When the scan is complete, a screen displays the scan results. If the scan finds threats, a list of those threats displays. If the scan does not find threats, a No threats were detected on your computer during this scan message displays.
      Figure 8: Scan results screen
       Scheduling scans
      Security Essentials can scan your computer automatically every week at the same time. Follow these steps to schedule a weekly scan:
      1. Open the Settings tab.
      2. Click Scheduled scan .
        Figure 9: Scheduled scan
      1. Check the box next to Run a scheduled scan on my computer (recommended) .
      2. Select the scan type (Quick or Full), the day, and the time. Then, click the check boxes for the other scheduling conditions you wish to apply.
      3. Click Save changes . Security Essentials scans the computer weekly on the day and time set.
      Microsoft Security Essentials overview
      Opening Microsoft Security Essentials
      To open Microsoft Security Essentials, click Start , All Programs , then click Microsoft Security Essentials .
      Home tab
      The Home tab displays the status of real-time protection as well as virus and spyware definitions. You can perform a quick, full, or custom scan from the Home tab.
      Figure 10: Home tab
       
      Update tab
      The Update tab displays the status of the virus and spyware definitions. Click Update to check for updates.
      Figure 11: Update tab
       
      History tab
      The History tab displays all the items that Security Essentials detects as potentially harmful and the action taken on each item.
      Figure 12: History tab
       
      Settings tab
      Use the Settings tab to schedule a scan, set default actions, turn on or off real-time protection, exclude files, folders or processes, and manage Microsoft SpyNet membership. 
      Figure 13: Settings tab
       Changing settings
      On the Settings tab, you can schedule a scan, set default actions, turn on or off real-time protection, exclude files, folders or processes, and manage Microsoft SpyNet membership. Use the following sections to change Security Essentials settings.
      Changing scheduled scans
      Security Essentials can run scheduled scans once a week. Follow these steps to change the scan type, day of week, or time of day:
      Click Scheduled scan .
      Figure 14: Scheduled scan
       
      1. Check the box next to Run a scheduled scan on my computer (recommended) .
      2. Select the day of the scan type (Quick or Full), week, and time of day.
      3. Click Save changes . Security Essentials scans the computer weekly on the day and time set.
      Setting default actions
      Security Essentials can automatically deal with security threats. Follow these steps to set the default actions that Security Essentials performs when it detects potential security threats:
      Click Default actions .
      Figure 15: Default actions
       
      1. For each alert level, select the action for Security Essentials to perform (Recommended action , Remove , or Quarantine ).
      2. Click Save changes .
      Changing real-time protection settings
      Real-time protection alerts you to potentially dangerous software as it attempts to install itself or run on your computer. Follow these steps to turn on or off real-time protection and change protection settings:
      Click Real-time protection .
      Figure 16: Real-time protection settings
       
      1. Turn on or off real-time protection and choose whether Security Essentials monitors file and program activity and scans downloads.
      2. Click Save changes .
      Excluding files and locations
      You can exclude certain files and locations to speed up security scans. However, doing so may leave your computer less protected against security threats. Follow these steps to exclude files and folders from scans:
      Click Excluded files and locations .
      Figure 17: Excluded files and locations
       
      1. Click Add .
      2. Browse to a drive, folder or file that you want to exclude from security scans, and then click OK .
      3. Repeat steps 2 and 3 for each drive, folder or file that you want to exclude.
      4. Click Save changes .
      Excluding file types
      You can exclude certain file types to speed up security scans. However, doing so may leave your computer less protected against security threats. Follow these steps to exclude certain file types from scans:
      Click Excluded file types .
      Figure 18: Excluded file types
       
      1. Enter a file type (for example, .jpeg ) into the open field.
      2. Click Add .
        Repeat steps 2 and 3 for each file type you want to exclude.
      3. Click Save changes .
      Excluding processes
      You can exclude certain processes (ending in .cmd, .bat, .pif, .scf, .exe, .com, or .scr) to speed up security scans. However, doing so may leave your computer less protected against security threats. Follow these steps to exclude certain processes from scans:
      Click Excluded processes .
      Figure 19: Excluded processes

      1. Click Add .
      2. Browse to a process (ending in .cmd, .bat, .pif, .scf, .exe, .com, or .scr) that you want to exclude from security scans, and then click OK .
      3. Repeat steps 2 and 3 for each process you want to exclude.
      4. Click Save changes .
      Changing advanced settings
      Security Essentials allows you to change advanced settings, such as whether to scan archives and removable drives, create system restore points before cleaning the computer, and allow users to view the history. Follow these steps to change advanced settings:
      Click Advanced .
      Figure 20: Advanced settings
       
      1. Make any desired changes to the advanced settings.
      2. Click Save changes .
      Setting the Microsoft SpyNet membership level
      SpyNet is a Microsoft online community that collects information about potential threats. With basic membership, the information can include where the software came from, actions taken, and whether the actions were successful. With advanced membership, Security Essentials sends all of the basic information plus the location of the software on the computer, the file names, how the software operates and the impact to the computer.
      Follow these steps to set the Microsoft SpyNet membership level:
      Click Microsoft SpyNet .
      Figure 21: Microsoft SpyNet settings
      1. Select Basic membership or Advanced membership .
      2. Click Save changes .
           
      AND ENJOY...

       
       
     
 
 

COMMENTS

BLOGGER: 1
Loading...
Name

Acronyms,1,Ads Ready,1,Adsense,1,Adserver,1,airtel,2,android,22,Apps,4,Auto Loader,19,backup,1,Bank,1,BB10,1,better,1,bios,1,blackberry,24,Blogger,11,blogger jquery,12,Blogger Template,3,blogger tips,12,Blogger Widget/Gadget,13,Bluetooth,1,BOIS Update,1,browser,2,Bug,1,business,3,CAD,1,capability,1,Career Development,2,Celebrate,1,chat,1,cloud computing,1,code,1,comment,2,computer,13,crack,17,crash,1,css,3,cure,1,CV,18,data,2,delete,1,Diamond Bank,2,download,32,email,6,ESPN,1,etisalat,2,Facebook,2,Feedburner,1,Firmware,3,Flash File,27,Flash Games,3,Flashing,3,For Seniors,2,free-up space,1,Freebies and Giveaways,2,FTP,1,Galaxy,2,games,5,glo,2,good,1,Google,8,Google Affiliate,1,Google Drive,1,Google Photos,1,Google Play Store,3,Google+.,1,great,1,GTA,4,guide,3,hacks,7,handle,1,Hard drive,2,HDD,1,how to,10,HTC,2,html,1,Huawei,1,ict,4,India,1,INEC,1,Infinity Best,1,Innovation,1,Intel,1,internet,6,internet explorer,1,iOS,2,ipad,4,iphone,7,Itel,1,java script,6,Jetpack,1,keyboard,8,know,3,Label,3,Laptop,1,Learning,12,LG,2,Lollipop,2,Mac,2,Management,1,Marriage,1,Mediafire,1,meeting,1,message,12,Microsoft,5,Microsoft excel,2,mobile,7,Mobile Phones Specifications,1,mobility,2,money,1,Motorola,1,Movie,1,Mozilla Firerfox,1,MS Word,1,MTK,2,mtn,4,music,1,need,1,Networking,1,NOBLE NOKIA INFO,9,Nokia,4,notebook,1,passwords,1,PayDirect,1,PayPal,1,PC,7,PC Games,45,PC mgazine,6,PC Tricks,3,pc-crash,1,PDF,1,Personal Productivity,4,Phone,3,photo shop,1,Play Station,9,Plugin,1,post,2,Premium Blogger Template,1,protect,3,ProtectTool,1,Racing Game,2,reasons,1,Responsive,1,Root,2,sagem,1,samsung,11,save,1,secrets,1,secure,4,security,9,security Enhancements,5,Server,1,shell-coding,1,shortcut,21,Simple Server,1,SmartsmsSolutions,2,SMS,6,social community,3,Sony,2,Spreadtrum,1,SSD,1,steps,1,Stock Rom,2,Symbian,1,Sync,2,Tablet PC,3,Talent,1,TECH_WORLD,2,Techniques,3,technology,3,technology tips,26,Tecno,7,template hacks,1,Theme,1,tips,19,transmissions,1,Tutorial,3,tutorials,28,types,1,USB Driver,1,users,1,Video,1,Virus,1,Visa Card,1,Volcano Box,8,Vote,1,WAP WORLD,8,Whatsapp,1,windows,11,Windows 10,2,Windows 7,1,Windows 8,1,windows mobile,1,Windows Phone,2,Windows Phone Store,2,windows xp,5,word of life,11,Wordpress,3,work place skills,7,WPTouch Mobile Plugin,1,Xbox,2,zain,1,Zenith Bank,1,
ltr
item
NOBLE ICT EXPLOITS ZONE™: Using Microsoft Security Essentials to Protect Against Viruses and Spyware
Using Microsoft Security Essentials to Protect Against Viruses and Spyware
http://3.bp.blogspot.com/-u37-KkYiX6M/UFmvvyWeLwI/AAAAAAAAA2c/3FiGZqsOTqM/s1600/Microsoft+Security+Essentials.gif
http://3.bp.blogspot.com/-u37-KkYiX6M/UFmvvyWeLwI/AAAAAAAAA2c/3FiGZqsOTqM/s72-c/Microsoft+Security+Essentials.gif
NOBLE ICT EXPLOITS ZONE™
https://naijaexploits.blogspot.com/2012/09/using-microsoft-security-essentials-to.html
https://naijaexploits.blogspot.com/
https://naijaexploits.blogspot.com/
https://naijaexploits.blogspot.com/2012/09/using-microsoft-security-essentials-to.html
true
4058378300189517969
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy