1.1.1593 (XP) 1.1.1600 (Vista) / September 16, 2008
| Most of this page uses content from Wikipedia. The original article was at Windows Defender.|
The list of authors can be seen in the page history. As with Computer Security Wiki, the text of Wikipedia is available under the GNU Free Documentation License.
Remove this template when most of the Wikipedia content has been removed or the Wikipedia information is outnumbered by non-Wikipedia information.
- Windows Defender features system scan capabilities similar to other free products on the market, and includes a number of real-time security agents that monitor several common areas of Windows for changes which may be caused by spyware.
- It also includes the ability to easily remove ActiveX applications that are installed.
- Also integrated is support for Microsoft's SpyNet network that allows users to report to Microsoft what they consider to be spyware, and what applications and device drivers they allow to be installed on their system.
4. There is integration with Internet Explorer which enables files to be scanned when they are downloaded to help ensure that one does not accidentally download malicious software.
5. This implementation is similar to the real-time scanners of many anti-virus products on the market. Although not combined with Firefox, Windows Defender still scans downloaded files for malicious code.
6. The Advanced Tools section allows users to discover potential vulnerabilities with a series of Software Explorers.
7. They provide views of startup programs, currently running software, network connected applications, and Winsock providers (Winsock LSPs).
8. In each Explorer, every element is rated as either "Known", "Unknown" or "Potentially Unwanted".
9. The first and last categories carry a link to learn more about the particular item, and the second category invites users to submit the program to SpyNet for analysis by experts.
10. Windows Defender in Windows Vista automatically blocks all startup items that require administrator privileges to run (this is considered suspicious behavior for a startup item).
11.This automatic blocking is related to the UAC (User Account Control) functionality in Windows Vista, and requires users to manually run each of these startup items each time they log in.