IT tutorials
 
Technology
 

Windows Home Server 2011 : Securing Network Computers (part 1) - Thwarting Spyware with Windows Defender

9/18/2013 8:48:09 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Implementing security across a network is a “weakest link” proposition. That is, your network as a whole is only as secure as the most vulnerable of the clients. So although you may now have Windows Home Server locked down, you still have to get your security up to snuff on each computer. This section takes you through a few features and techniques that enhance the security of the rest of your network.

1. Monitoring Home Computer Security

Windows Home Server displays various network health notifications via the Windows Home Server Status icon, which appears in the notification area. If you have a Windows 7 or Vista PC, the Windows Home Server Status icon can check the current Security Center settings for the computer’s firewall, automatic updating, and antispyware and antivirus programs. If any of these is turned off or, in the case of antispyware and antivirus programs, out of date, the Windows Home Server Status icon displays a notification. Table 1 shows the four security-related notifications that you might see.

Table 1. Security-Related Network Health Notifications Displayed by the Windows Home Server Status Icon
NotificationDescription

Windows Firewall has been turned off on the specified computer.

Automatic updating has been turned off on the specified computer.

The antivirus program on the specified computer has either been turned off, or its virus definitions are out-of-date.

The antispyware program on the specified computer has either been turned off, or its spyware definitions are out-of-date.

2. Thwarting Spyware with Windows Defender

Malware is the generic term for malicious software such as viruses and Trojan horses. The worst malware offender by far these days is spyware. It’s generally defined as any program that surreptitiously monitors a user’s computer activities—particularly the typing of passwords, PINs, and credit card numbers—or harvests sensitive data on the user’s computer and then sends that information to an individual or a company via the user’s Internet connection (the so-called back channel) without the user’s consent.

You might think that having a robust firewall between you and the bad guys would make malware a problem of the past. Unfortunately, that’s not true. These programs piggyback on other legitimate programs that users actually want to download, such as file-sharing programs, download managers, and screensavers. A drive-by download is the download and installation of a program without a user’s knowledge or consent. This relates closely to a pop-up download—the download and installation of a program after the user clicks an option in a pop-up browser window, particularly when the option’s intent is vaguely or misleadingly worded.

To make matters even worse, most spyware embeds itself deep into a system, and removing it is a delicate and time-consuming operation beyond the abilities of even some experienced users. Some programs actually come with an Uninstall option, but it’s nothing but a ruse, of course. The program appears to remove itself from the system, but what it actually does is a covert reinstall—it surreptitiously reinstalls a fresh version of itself when the computer is idle.

All this means that you need to buttress your firewall with an antispyware program that can watch out for these unwanted programs and prevent them from getting their hooks into your system. In early versions of Windows, you needed to install a third-party program. However, Windows 7 and Vista come with an antispyware program named Windows Defender.

Tip

Many security experts recommend installing multiple antispyware programs on the premise that one program may miss one or two examples of spyware, but two or three programs are highly unlikely to miss any. So, in addition to Windows Defender, you might consider installing antispyware programs such as SuperAntiSpyware (www.superantispyware.com), Lavasoft Ad-Aware (www.lavasoft.com), and PC Tools Spyware Doctor (www.pctools.com).


To open Windows Defender, select Start, type defender, and then click Windows Defender in the search results. You end up at the Windows Defender Home screen, shown in Figure 1. This window shows you the date, time, and results of your last scan, as well as the current Windows Defender status.

Figure 1. Windows Defender removes spyware from your system and keeps your system safe by preventing spyware installations.

Spyware Scanning

Windows Defender protects your computer from spyware in two ways. It can scan your system for evidence of installed spyware programs (and remove or disable those programs, if necessary), and it can monitor your system in real time to watch for activities that indicate the presence of spyware (such as a drive-by download or data being sent via a back channel).

For the scanning portion of its defenses, Windows Defender supports three different scan types:

  • Quick Scan— This scan checks just those areas of your system where it is likely to find evidence of spyware. This scan usually takes just a couple of minutes. Quick Scan is the default, and you can initiate one at any time by clicking the Scan link.

  • Full Scan— This scan checks for evidence of spyware in system memory, all running processes, and the system drive (usually drive C:), and it performs a deep scan on all folders. This scan might take 30 minutes or more, depending on your system. To run this scan, pull down the Scan menu and click Full Scan.

  • Custom Scan— This scan checks just the drives and folders that you select. The length of the scan depends on the number of locations you select and the number of objects in those locations. To run this scan, pull down the Scan menu and click Custom Scan, which displays the Select Scan Options page shown in Figure 2. Click Select, activate the check boxes for the drives you want scanned, and then click OK. Click Scan Now to start the scan.

    Figure 2. In the Scan menu, select Custom Scan to see the Scan Options page.
Windows Defender Settings

By default, Windows Defender is set up to perform a Quick Scan of your system every morning at 2:00 a.m. To change this, click Tools, and then click Options to display the Options page shown in Figure 3. Use the controls in the Automatic Scanning section to specify the scan frequency time and type.

Figure 3. Use the Options page to set up a spyware scan schedule.

The rest of the Options page offers options for customizing Windows Defender. The remaining options include the following:

  • Default Actions— Set the action that Windows Defender should take if it finds alert items (potential spyware) in the High, Medium, and Low categories: Default Action (the action prescribed in the definition file for the detected spyware), Ignore, or Remove.

  • Real-Time Protection— Enables and disables real-time protection. You can also toggle security agents on and off. Security agents monitor Windows components that are frequent targets of spyware activity. For example, activating the Auto Start security agent tells Windows Defender to monitor the list of startup programs to ensure that spyware doesn’t add itself to this list and run automatically at startup.

    Tip

    Windows Defender often warns you that a program might be spyware and asks whether you want to allow the program to operate normally or to block it. If you accidentally allow an unsafe program, click Tools, Allowed Items; select the program in the Allowed Items list; and then click Remove from List. Similarly, if you accidentally blocked a safe program, click Tools, Quarantined Items; select the program in the Quarantined Items list; and then click Remove.


  • Advanced— Use these options to enable scanning inside compressed archives. In Windows 7, you can also elect to scan email and removable drives; in Windows Vista, you can prevent Windows Defender from scanning specific folders.

  • Administrator— This section has a check box that toggles Windows Defender on and off. In Windows 7, you can activate a check box that lets you see other users’ Windows Defender items; in Windows Vista, you see a check box that, when activated, allows all non-Administrators to use Windows Defender.

 
Others
 
- Windows 7 : Tweaking and Customizing Windows (part 6) - Miscellaneous GUI Tips, Configuring the Recycle Bin
- Windows 7 : Tweaking and Customizing Windows (part 5) - Display Properties - Setting Desktop Icons, Display Settings
- Windows 7 : Tweaking and Customizing Windows (part 4) - Display Properties - Sounds, Screen Savers
- Windows 7 : Tweaking and Customizing Windows (part 3) - Display Properties - Window Color and Appearance
- Windows 7 : Tweaking and Customizing Windows (part 2) - Display Properties - Themes, Desktop Background
- Windows 7 : Tweaking and Customizing Windows (part 1) - Tweaking the Start Menu
- Windows Small Business Server 2011 : An Active Directory Primer (part 3) - Using AD DS Tools - Using ADSI Edit , Using Group Policy Management
- Windows Small Business Server 2011 : An Active Directory Primer (part 2) - Using AD DS Tools - Using Active Directory Users and Computers
- Windows Small Business Server 2011 : An Active Directory Primer (part 1) - Objects and Attributes
- Sharepoint 2013 : Authentication and authorization infrastructure (part 4) - Authorization infrastructure
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us