Windows 10: Microsoft Security Essentials Scores Incredibly Well in New Antivirus

Discus and support Microsoft Security Essentials Scores Incredibly Well in New Antivirus in Windows 10 News to solve the problem; Yes, we who have been around for a while know not to open junkmail, however if you subscribe to something new for the first time it is likely to be... Discussion in 'Windows 10 News' started by Cluster Head, Nov 1, 2015.

  1. Microsoft Security Essentials Scores Incredibly Well in New Antivirus


    Does Outlook's preview pane not automatically open all emails in the inbox?
    Is it a risk factor?
     
    FrozenCursor, Nov 4, 2015
    #61
  2. CountMike New Member

    Problems are in attachments not in text or message itself.
     
    CountMike, Nov 4, 2015
    #62
  3. How do people here rate Microsoft's own Windows Defender Offline?
    It is supposed to scan for rootkits, too.
     
    FrozenCursor, Nov 4, 2015
    #63
  4. Snakeyes Win User

    Microsoft Security Essentials Scores Incredibly Well in New Antivirus

    With deference to the Count (since I haven't seen him being wrong in any post). I believe they are certain types of malware that can be triggered by the preview pane. Personally, I have disabled this feature in Outlook. Could be wrong, but was told this by a very highly placed specialist in government security of one alphabet agency. They however are very paranoid and it might not apply to the normal user. It was a passing comment and I might have read more into it.
     
    Snakeyes, Nov 4, 2015
    #64
  5. OldMike65 Win User
    Ok I got to ask, do you guys mean using outlook mail app on your desktop, OR logging in to outlook.com on the web??? I use outlook.com for most of my emails, it always finds 95% of my junk mail and moves it to the junk folder. I've used outlook.com from the web for years. Now I don't know if its protects you better or not, but I would think it just might. I know that the junk filter on the web works REAL Well. *Smile
     
    OldMike65, Nov 4, 2015
    #65
  6. Snakeyes Win User
    I use Microsoft Outlook 2010 . On the road I will go for the web version. Since my clients are the financial institutions, I tend to be a little paranoid myself.
     
    Snakeyes, Nov 4, 2015
    #66
  7. OldMike65 Win User
    Yeah ok, I understand....I got outlook 2013 on my desktop, but end up using outlook on the web a lot more.
     
    OldMike65, Nov 5, 2015
    #67
  8. Microsoft Security Essentials Scores Incredibly Well in New Antivirus

    I meant the Outlook desktop program which is part of the Microsoft Office suite.

    The preview pane is very convenient for me, and for short emails (which is maybe 90% of my emails) the preview pane is all I need to be productive, i.e. delete, reply, etc. all done from the preview pane. I would have thought that Microsoft (Windows Defender) and presumably other AV products would protect the very common Outlook preview pane from malware (?)

    What bad things could be attributed to the Outlook preview pane?
     
    FrozenCursor, Nov 5, 2015
    #68
  9. fredc Win User
    Windows Defender "offline" is very good and popular also , most AV manufacturers offer a "rescue disk" of some type and they have been around for years .

    I am one who would rather just format and re install if i knew there was a rootkit present because once a system has been compromised it's impossible to tell if it's truly trustworthy again .

    Rootkits download all types of other nasties including "backdoor" Trojans which can be a cause of re infection even after you think you have eliminated the rootkit .


    The below is a "must read" by Microsoft and anybody who is infected should take it very seriously :

    The below was written by one of Microsoft's chief security experts , forgive my not knowing his name .


    QUOTE]Cleaning a Compromised System

    So, you didn’t patch the system and it got hacked. What to do? Well, let’s see:

    • You can’t clean a compromised system by patching it. Patching only removes the vulnerability. Upon getting into your system, the attacker probably ensured that there were several other ways to get back in.
    • You can’t clean a compromised system by removing the back doors. You can never guarantee that you found all the back doors the attacker put in. The fact that you can’t find any more may only mean you don’t know where to look, or that the system is so compromised that what you are seeing is not actually what is there.
    • You can’t clean a compromised system by using some “vulnerability remover.” Let’s say you had a system hit by Blaster. A number of vendors (including Microsoft) published vulnerability removers for Blaster. Can you trust a system that had Blaster after the tool is run? I wouldn’t. If the system was vulnerable to Blaster, it was also vulnerable to a number of other attacks. Can you guarantee that none of those have been run against it? I didn’t think so.
    • You can’t clean a compromised system by using a virus scanner. To tell you the truth, a fully compromised system can’t be trusted. Even virus scanners must at some level rely on the system to not lie to them.


      If they ask whether a particular file is present, the attacker may simply have a tool in place that lies about it. Note that if you can guarantee that the only thing that compromised the system was a particular virus or worm and you know that this virus has no back doors associated with it, and the vulnerability used by the virus was not available remotely, then a virus scanner can be used to clean the system. For example, the vast majority of e-mail worms rely on a user opening an attachment.

      In this particular case, it is possible that the only infection on the system is the one that came from the attachment containing the worm. However, if the vulnerability used by the worm was available remotely without user action, then you can’t guarantee that the worm was the only thing that used that vulnerability.
    • It is entirely possible that something else used the same vulnerability. In this case, you can’t just patch the system.
    • You can’t clean a compromised system by reinstalling the operating system over the existing installation. Again, the attacker may very well have tools in place that tell the installer lies. If that happens, the installer may not actually remove the compromised files. In addition, the attacker may also have put back doors in non-operating system components.
    • You can’t trust any data copied from a compromised system. Once an attacker gets into a system, all the data on it may be modified. In the best-case scenario, copying data off a compromised system and putting it on a clean system will give you potentially untrustworthy data. In the worst-case scenario, you may actually have copied a back door hidden in the data.
    • You can’t trust the event logs on a compromised system. Upon gaining full access to a system, it is simple for an attacker to modify the event logs on that system to cover any tracks. If you rely on the event logs to tell you what has been done to your system, you may just be reading what the attacker wants you to read.
    • You may not be able to trust your latest backup. How can you tell when the original attack took place? The event logs cannot be trusted to tell you. Without that knowledge, your latest backup is useless. It may be a backup that includes all the back doors currently on the system.



    • The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications). Alternatively, you could of course work on your resume instead, but I don’t want to see you doing that.


    This list makes patching look not so bad, yes? We may hate patches, but the alternative is decidedly worse.

    [/QUOTE]




    From


    The reason i included the above is because many users who get compromised even with the really nasty malware will much prefer to use all the scanners and rescue disks to get rid of it even when malware removal experts advise otherwise.

    If you end up with a rootkit just wipe and re install , it's a much more trustworthy solution in the long run.
     
    fredc, Nov 5, 2015
    #69
  10. Leopard Win User
    Are you saying that all your mail opens at the same time (both inbox and junkmail} in the preview pane - like all mixed in together? Also, my understanding is that onboard AVs don't check emails anymore (I could be wrong).
     
    Leopard, Nov 5, 2015
    #70
  11. CountMike New Member
    It's also a good form to change passwords for everything after real or suspected infestation if you are not doing it regularly.
     
    CountMike, Nov 5, 2015
    #71
  12. Just to be clear, I don't have a rootkit infection. I just happen to came across this thread and it scared the h... out of me.

    Anyway, if push comes to shove (God forbid) I don't see much of an issue with wiping the HDD and re-installing the programs. However, data loss is a huge problem, e.g. Outlook data files that may go back for many years and may be relevant for many years to come, think long-term programs/operations.

    What are the best practices to prevent data loss?
     
    FrozenCursor, Nov 5, 2015
    #72
  13. CountMike New Member

    Microsoft Security Essentials Scores Incredibly Well in New Antivirus

    Backup, backup, backup !!!!
     
    CountMike, Nov 5, 2015
    #73
  14. OldMike65 Win User
    Backup....backup......always back up!! Get Macrium Reflect then install on your hard drive, then make a bootable version, for your USB or DVD drive. Then make an image backup of your drive, stored on a different drive.
     
    OldMike65, Nov 5, 2015
    #74
  15. Well, backup is not really the issue. The issue is - as insinuated further above - that the rootkit and its subsequent nasties may be hiding not only in your data, but also in your backup, thereby incurring loss of data and loss of backup as well.

    I read once about multiple and time-staggered backups, and if some pervasive malware hits, then you can recover from that one backup from just before the hit and hence, limit the loss of data. Not sure how practical this scheme is.
     
    FrozenCursor, Nov 5, 2015
    #75
Thema:

Microsoft Security Essentials Scores Incredibly Well in New Antivirus

Loading...
  1. Microsoft Security Essentials Scores Incredibly Well in New Antivirus - Similar Threads - Microsoft Security Essentials

  2. MICROSOFT SECURITY ESSENTIAL

    in AntiVirus, Firewalls and System Security
    MICROSOFT SECURITY ESSENTIAL: I'VE A PROBLEM WITH UPDATE DEFINITION VIRUS SECURITY ESSENTIL, 'CAUSE SYSTEM DOESN'T INSTALL THEM. PLEASE I'M ITALIAN AND IF IT POSSIBLE FOR YOUR ANSWER USE SIMPLE WORDS....
  3. microsoft security essentials

    in AntiVirus, Firewalls and System Security
    microsoft security essentials: How do i uninstall when it wont let me i get error code 0x80070643 https://answers.microsoft.com/en-us/protect/forum/all/microsoft-security-essentials/d810d3bf-9073-4ec7-a57a-4260a3b4f278
  4. Microsoft security essentials update.

    in AntiVirus, Firewalls and System Security
    Microsoft security essentials update.: I can't update Microsoft security essentials on windows 7. Help. Please... https://answers.microsoft.com/en-us/protect/forum/all/microsoft-security-essentials-update/ef47ad22-6c49-40f5-8b0d-9a41e41dc5b8
  5. microsoft security essentials

    in AntiVirus, Firewalls and System Security
    microsoft security essentials: I am seeing yellow for my "MSE" i am "trying to scan it so i clicked on a quick scan it still showing yellow so I take it that did not work. My question is in the settings where it says "run a scheduled scan" well the boxes are checked (i have no idea why or what anything I...
  6. microsoft security essentials

    in AntiVirus, Firewalls and System Security
    microsoft security essentials: microsoft security essentials error code0x8004FF71 https://answers.microsoft.com/en-us/protect/forum/all/microsoft-security-essentials/2a768835-d2a8-42ff-bf8f-a729032a2020
  7. Microsoft Security Essentials

    in AntiVirus, Firewalls and System Security
    Microsoft Security Essentials: Today I find that the Security Essentials program keeps shutting down. I have tried to restart it several times just to have it shut down moments later. What is the problem?...
  8. Microsoft Security Essentials

    in AntiVirus, Firewalls and System Security
    Microsoft Security Essentials: I started a full scan on Microsoft Security Essentials and it's been running for 20 hours and is only at 75% completed. What are possible problems? https://answers.microsoft.com/en-us/protect/forum/all/microsoft-security-essentials/1e8b663b-5259-4c45-8132-e230746423ed
  9. Microsoft essentials security

    in AntiVirus, Firewalls and System Security
    Microsoft essentials security: how come every time i ask to remove from my Quarantine box it ask"s me if Microsoft can make changes to my computer https://answers.microsoft.com/en-us/protect/forum/all/microsoft-essentials-security/4e51fbec-cffe-41e5-840b-1cb06da86724
  10. #MSIgnite 2018: New Microsoft Authenticator and Secure Score

    in Windows 10 News
    #MSIgnite 2018: New Microsoft Authenticator and Secure Score: Cybersecurity is the central challenge of our digital age. Without it, everything from our personal email accounts and privacy to the way we do business, and all types of critical infrastructure, are under threat. As attackers evolve, staying ahead of these threats is getting...