Join Martin Guidry for an in-depth discussion in this video Exploring anti-malware solutions, part of Securing Windows 10.
- View Offline
- [Voiceover] In this section, we're going to…talk about antivirus software.…Antivirus software is software designed…to detect and remove viruses from your computer.…Many of the products that are called antivirus…are actually anti-malware, because they will…remove types of malware other than just viruses.…They're usually pretty good at catching worms also,…and some of them do a decent job with Trojans and bots.…Most antivirus solutions will require definition files.…
Those definition files are a list of…all known malware programs,…so when your antivirus software runs,…it compares the programs on your computer…against this list of known malware,…and if it finds a match,…it knows the program to be malicious.…These definition files are provided by the vendors,…and they are updated often, sometimes updated daily,…sometimes updated more than once a day,…and it's very important for you to…download those updated definition files and use them.…
Out of date malware protection is a big problem.…There is a saying that out of date malware protection…
In this course, Martin Guidry helps you work through each essential security step. He takes you through familiar ground, standard account setup, covering accounts, passwords, users groups, and permissions. He also takes you through unfamiliar territory, enhanced features and new products, examining BitLocker, Wi-Fi Sense, Windows Defender, and Edge, the new web browser. This course provides instructional step-by-step walkthroughs in addition to best practice discussions. Learn how to protect your computer from a network attack, apply security policies in Group Policy, use remote desktop, and more.
- Setting up passwords, smart cards, and biometrics
- Creating groups and assigning permissions
- Assigning permissions
- Encrypting full discs, file transfers, and networks
- Using anti-virus and anti-malware solutions
- Configuring firewall settings
- Securing remote desktop connections