Question

Windows 7 comes with many different services included with it that do a very good job...

Windows 7 comes with many different services included with it that do a very good job of protecting your system and its users from many different malicious dangers.

These services include:

Windows Defender

Windows Firewall

EFS

Parental Controls

Malicious Software Removal Tool

Windows 7 Action Center

While they do very important tasks, all of this protection still leaves a user and system vulnerable. Using the Internet, go online and research different protection and malware software and recommend one to your peers. Provide a brief summary of the software and discuss its benefits. Provide a link to the page where you obtained your information.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The Microsoft Malicious Software Removal Tool is an antimalware utility that checks computers running Windows 10, Windows 8 and Windows 8.1, Windows 7, Windows Vista, Windows XP*, Windows Server 2012 R2 and Windows Server 2012, Windows Server 2008, and Windows Server 2003 for infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom—and helps remove malware and any other infections found.

When the detection and malware removal process is complete, the tool displays a report describing the outcome, including which, if any, malware was detected and removed.

Benefits:

In the normal stealth mode of operation, if MSRT finds an infection, it does not warn you immediately. Instead, it displays a warning the next time Windows starts up and an Administrator logs on. If the machine is reguarly used by a restricted user, this warning may not display for a long time.

Microsoft's Windows Malicious Software Removal Tool (MSRT) is a free program that removes a whole host of the most popular malicious software (malware). Many Windows users have it installed and run it monthly, yet are not aware of its existence. It's a stealth program, when things are functioning normally you don't see it. It is updated silently as part of Windows Update or Microsoft Update. It runs in what the company refers to as "quiet mode", which means it doesn't tell you anything - at least as long as it doesn't find any malware to remove.

This mode of operation is fine for many users, but you can get much more out of the program.

Perhaps the biggest drawback to the default stealth approach is that MSRT only rounds up the usual suspects. That is, it only looks in the usual places for malware. Like much anti-malware software, MSRT offers both a quick scan and a full scan. By default, it only runs a quick scan, below we'll see how to run a full scan. The once a month scanning is also limiting, but you can run it manually at any time.

If you already have anti-malware software and thus feel protected, everyone needs a second opinion. I recently wrote about an infected machine (Removing malware from an infected PC - battling antivirus programs) where the fourth antivirus program still found malware that the first three had missed.

The ultimate documentation from Microsoft about MSRT seems to be Article 890830, The Microsoft Windows Malicious Software Removal Tool, which says:

Microsoft released the Microsoft Windows Malicious Software Removal Tool to help remove specific prevalent malicious software ... After you download the Microsoft Malicious Software Removal Tool, it runs one time to check your computer for inflection by specific prevalent malicious software ... and helps remove any infection it finds. Microsoft releases a new version of the tool every month.

Microsoft is very clear that MSRT is not an antivirus program:

  • It offers no protection from infection. As Microsoft terms it, MSRT is a "post-infection removal tool".
  • It only targets malware that Microsoft has judged to be the most important. Full blown anti-malware software works against a much wider range of software.
  • It only gets updated once a month. Full blown anti-malware software is updated daily, at least.

The January 2009 revision of MSRT added removal capability for only two malicious programs. The good news though, is that it can remove the extremely popular Conficker worm (a.ka.a Downadup). You can see exactly what MSRT removes at Families Cleaned by the Malicious Software Removal Tool.The Malicious Software Removal Tool works with Windows XP, Vista and 2000, as well as Windows Server 2003 and 2008. It does not work with Windows 98, Millennium Edition or NT4. It is multi-lingual. Microsoft says "For all supported languages, the same tool will show the correct language depending on the language of the operating system."

links:1. http://www.computerworld.com/article/2481537/endpoint-security/what-you-don-t-know-about-the-windows-malicious-software-removal-tool.html

2.http://www.microsoft.com/security/pc-security/malware-removal.aspx

Add a comment
Know the answer?
Add Answer to:
Windows 7 comes with many different services included with it that do a very good job...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • E-commerce Web sites impact many different areas of an organization—from sales, through accounting and manufacturing, to...

    E-commerce Web sites impact many different areas of an organization—from sales, through accounting and manufacturing, to shipping. The requirements phase is extremely important for the e-commerce Web site. The requirements phase allows you to gather a list of requirements from the external and internal users. This document will be very helpful to the development and testing team. For this project, you will be adding the Requirements section to your E-Commerce Implementation Plan document. Complete the following tasks: Include the following...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Wanted by the Police: A Good Interface By KATIE HAFNER NOV. 11, 2004 From: The New...

    Wanted by the Police: A Good Interface By KATIE HAFNER NOV. 11, 2004 From: The New York Times, Technology section, not-for profit classroom used. SAN JOSE, Calif. - SAN JOSE has a reputation as one of the safest large cities in the nation, with the fewest police officers per capita. Yet a number of the 1,000 officers in this city of 925,000 in the heart of Silicon Valley have been worrying about their own safety of late. Since June, the...

  • 1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public...

    1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public interest? 2. Being locked in to a product or technology is only a problem if such a product can be clearly shown to be inferior to an alternative. What difficulties might there be in establishing such a case? etwork effects Microsoft is a vertically integrated firm (see page 87), with a dominant position in the operating system market (i.e. Windows) and in certain application...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • The administration of President Barack Obama has made Patient Protection and Affordable Care Act, often called...

    The administration of President Barack Obama has made Patient Protection and Affordable Care Act, often called “Obamacare”, its chief domestic accomplishment and the centerpiece of Obama’s legacy. Essential to Obama’s health care reform plan is Healthcare.gov, a health insurance exchange Web site that facilitates the sale of private health insurance plans to U.S. residents, assists people eligible to sign up for Medicaid, and has a separate marketplace for small businesses. The site allows users to compare prices on health insurance...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT