SlideShare una empresa de Scribd logo
1 de 15
OUTLINE

This presentation will give further
 information about Microsoft
 Security Essentials
   How to install
   How to make change on it
   How to run it
INSTALLATION

            Before installation make
             sure there is no other
             Antivirus or spyware
           application running on the
            machine. However, you
             don’t need to turn off
              Windows Defender,
           because MSE takes care
                  of it for you.
INSTALLATION




 You will have to
validate your copy
of Windows to be
able to install and
   use Security
    Essentials.
UPDATING

               The user interface is
           basic, simple, and easy to
              use. After installation it
               will update the virus
              definitions right away.
              After that it will update
            itself automatically in the
               background so once
           installed it truly is a “set it
              and forget it” process.
UPDATING

           After the database
              is updated the
             computer status
           turns green. There
             are 4 tabs at the
            top that allow you
           to control different
                 functions.
CHANGE SETTINGS

Under Settings you
 can choose what
 actions it should
take with malware
based on its threat
       level.
DEFAULT SETTINGS’ FEATURES

  By default Real-time
  protection is enabled
    but if you want to
disable it you want. The
Real-time protection is
     light on system
 resources and doesn’t
    slow down other
    processes at all.
GET PROTECTED


          It shows a green
              icon in the
          notification area
          letting you know
            your system is
              protected.
DISPLAY PROGRESS

          Progress is displayed while
          a manual scan takes place
          and tells you the amount of
           time it takes. Scan times
          will vary between systems
           based on amount of files
                 and hardware
                 performance.
SINGLE FILE


           It works like
            most other
          Antivirus apps
           and lets you
          scan a single
                file.
THREAT ALERT

      If a threat is detected a
      red attention screen pops
      up in the Notification Area
      and you can clean the
      threat right away based
      on your recommended
      actions or find out more
      detail about the threat.
THREAT ALERT
If you want more details,
  they actually provide a
     good amount of
 information on a threat.
    When in the details
 screen you can change
the recommend action if
   you want and clean it
        from there.
DOWNLOAD SECURELY
  During out tests we tried to
download an infected file, but
 MSE stopped it and wouldn’t
    allow the download to
  continue unless manually
 selecting to ignore it. This is
very nice so someone doesn’t
ignore the warnings, click out
   of the screens, and try to
 download and install the app
            anyway.
THANK YOU
      FOR
YOUR ATTENTION!

Más contenido relacionado

La actualidad más candente

What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)GABO
 
Publicidad de los programas
Publicidad de los programasPublicidad de los programas
Publicidad de los programasGABO
 
Fundamental elements of the computer software
Fundamental elements of the computer  softwareFundamental elements of the computer  software
Fundamental elements of the computer softwareJesus Obenita Jr.
 
An introduction to computer viruses
An introduction to computer virusesAn introduction to computer viruses
An introduction to computer virusesUltraUploader
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheetIS Decisions
 
Remove Coup alert
 Remove Coup alert Remove Coup alert
Remove Coup alertkingh05
 
RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec PresentationIS Decisions
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spywaredragaunus14
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Ayed Al Qartah
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat RansomwareIvanti
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 

La actualidad más candente (19)

What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)
 
Publicidad de los programas
Publicidad de los programasPublicidad de los programas
Publicidad de los programas
 
Anti virus
Anti virusAnti virus
Anti virus
 
Fundamental elements of the computer software
Fundamental elements of the computer  softwareFundamental elements of the computer  software
Fundamental elements of the computer software
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
An introduction to computer viruses
An introduction to computer virusesAn introduction to computer viruses
An introduction to computer viruses
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
Remove Coup alert
 Remove Coup alert Remove Coup alert
Remove Coup alert
 
RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec Presentation
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Adware
AdwareAdware
Adware
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 

Destacado

Rencana pelaksanaan pembelajaran pb 2
Rencana pelaksanaan pembelajaran pb 2Rencana pelaksanaan pembelajaran pb 2
Rencana pelaksanaan pembelajaran pb 2sinta triani
 
คำสั่งธุรการ 2557
คำสั่งธุรการ 2557คำสั่งธุรการ 2557
คำสั่งธุรการ 2557Phuengnoy Juntana
 
White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...Perforce
 
Teorias organizativas - Adriana Neira
Teorias organizativas - Adriana NeiraTeorias organizativas - Adriana Neira
Teorias organizativas - Adriana NeiraAdriana Neira
 
Edipo rey y la vida es sueño
Edipo rey y la vida es sueñoEdipo rey y la vida es sueño
Edipo rey y la vida es sueñoevausmile
 
Healthy Halloween Treats Presentation
Healthy Halloween Treats PresentationHealthy Halloween Treats Presentation
Healthy Halloween Treats PresentationAyla Choudhery
 
New study of gita nov 9 dr. shriniwas j. kashalikar
New study of gita nov 9  dr. shriniwas j. kashalikarNew study of gita nov 9  dr. shriniwas j. kashalikar
New study of gita nov 9 dr. shriniwas j. kashalikardphalgune
 
3. course expectations week 1
3. course expectations week 13. course expectations week 1
3. course expectations week 1educw200
 

Destacado (14)

Rencana pelaksanaan pembelajaran pb 2
Rencana pelaksanaan pembelajaran pb 2Rencana pelaksanaan pembelajaran pb 2
Rencana pelaksanaan pembelajaran pb 2
 
Lab portfolio
Lab portfolioLab portfolio
Lab portfolio
 
Rosario de la Misericordia!!!
Rosario de la Misericordia!!!Rosario de la Misericordia!!!
Rosario de la Misericordia!!!
 
Cambridge
CambridgeCambridge
Cambridge
 
test RES
test REStest RES
test RES
 
คำสั่งธุรการ 2557
คำสั่งธุรการ 2557คำสั่งธุรการ 2557
คำสั่งธุรการ 2557
 
TRABAJO GRUPAL
TRABAJO GRUPALTRABAJO GRUPAL
TRABAJO GRUPAL
 
White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...
 
Teorias organizativas - Adriana Neira
Teorias organizativas - Adriana NeiraTeorias organizativas - Adriana Neira
Teorias organizativas - Adriana Neira
 
Formulario servicios
Formulario serviciosFormulario servicios
Formulario servicios
 
Edipo rey y la vida es sueño
Edipo rey y la vida es sueñoEdipo rey y la vida es sueño
Edipo rey y la vida es sueño
 
Healthy Halloween Treats Presentation
Healthy Halloween Treats PresentationHealthy Halloween Treats Presentation
Healthy Halloween Treats Presentation
 
New study of gita nov 9 dr. shriniwas j. kashalikar
New study of gita nov 9  dr. shriniwas j. kashalikarNew study of gita nov 9  dr. shriniwas j. kashalikar
New study of gita nov 9 dr. shriniwas j. kashalikar
 
3. course expectations week 1
3. course expectations week 13. course expectations week 1
3. course expectations week 1
 

Similar a Microsoft Security Essentials Outline

Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - whiteRozell Sneede
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Securityvenkasureantivirus
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Papertafinley
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
Screensaver security
Screensaver securityScreensaver security
Screensaver securityJei-san Gabo
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfEric Selje
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxGDhanushia
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptxdianemullin2
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1Vijay Kumar
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 

Similar a Microsoft Security Essentials Outline (20)

Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Venka sure Antivirus+Internet Security
Venka sure Antivirus+Internet SecurityVenka sure Antivirus+Internet Security
Venka sure Antivirus+Internet Security
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
RAJU BANKAR 01.pptx
RAJU BANKAR 01.pptxRAJU BANKAR 01.pptx
RAJU BANKAR 01.pptx
 
Screensaver security
Screensaver securityScreensaver security
Screensaver security
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
Mac review 2012_en
Mac review 2012_enMac review 2012_en
Mac review 2012_en
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 

Microsoft Security Essentials Outline

  • 1.
  • 2. OUTLINE This presentation will give further information about Microsoft Security Essentials How to install How to make change on it How to run it
  • 3. INSTALLATION Before installation make sure there is no other Antivirus or spyware application running on the machine. However, you don’t need to turn off Windows Defender, because MSE takes care of it for you.
  • 4. INSTALLATION You will have to validate your copy of Windows to be able to install and use Security Essentials.
  • 5. UPDATING The user interface is basic, simple, and easy to use. After installation it will update the virus definitions right away. After that it will update itself automatically in the background so once installed it truly is a “set it and forget it” process.
  • 6. UPDATING After the database is updated the computer status turns green. There are 4 tabs at the top that allow you to control different functions.
  • 7. CHANGE SETTINGS Under Settings you can choose what actions it should take with malware based on its threat level.
  • 8. DEFAULT SETTINGS’ FEATURES By default Real-time protection is enabled but if you want to disable it you want. The Real-time protection is light on system resources and doesn’t slow down other processes at all.
  • 9. GET PROTECTED It shows a green icon in the notification area letting you know your system is protected.
  • 10. DISPLAY PROGRESS Progress is displayed while a manual scan takes place and tells you the amount of time it takes. Scan times will vary between systems based on amount of files and hardware performance.
  • 11. SINGLE FILE It works like most other Antivirus apps and lets you scan a single file.
  • 12. THREAT ALERT If a threat is detected a red attention screen pops up in the Notification Area and you can clean the threat right away based on your recommended actions or find out more detail about the threat.
  • 13. THREAT ALERT If you want more details, they actually provide a good amount of information on a threat. When in the details screen you can change the recommend action if you want and clean it from there.
  • 14. DOWNLOAD SECURELY During out tests we tried to download an infected file, but MSE stopped it and wouldn’t allow the download to continue unless manually selecting to ignore it. This is very nice so someone doesn’t ignore the warnings, click out of the screens, and try to download and install the app anyway.
  • 15. THANK YOU FOR YOUR ATTENTION!