First Look: Microsoft Security Essentials beta offers free protection against malware
Microsoft's latest anti-malware application uses the same engine as OneCare but is smaller, faster and more efficient than its predecessor
Computerworld - The just-released beta of Microsoft Security Essentials is a solid, free tool that protects against malware while taking up few system resources and staying out of your way as much as possible.
This is set-it-and-forget-it software that handles the basic dangers but doesn't try to compete with big-boy security suites such as those built by Symantec, McAfee or Panda. So you won't find extras such as a firewall, identity protection, or antiphishing and antispam technology. Instead, Security Essentials focuses on protecting you against viruses, spyware, rootkits and similar dangers, and does a very good job of it.
Those who have wrestled unhappily with the software's predecessor, Microsoft Live OneCare, will be pleased to know that Security Essentials suffers from none of the software bloat and slow performance that bedeviled OneCare. Unlike OneCare, Security Essentials doesn't do performance tune-ups, back up your PC, take up too much of your system resources -- or cost a penny.
Installation and setup
Security Essentials comes in versions for XP and Vista (the Vista version will also work with Windows 7). Both are light downloads: The 32-bit Vista download weighs in at 4.8MB, the 64-bit Vista version at 3.8MB and the XP version (there's only a 32-bit version) comes in at 7.6MB.
Installation of the 32-bit Vista version on my machine took less than five minutes and was about as simple as an installation can be. There is one caveat, though: You need to have a validated copy of Windows. Not surprisingly, Microsoft's software won't work with pirated or nonvalidated versions.
Once installation is complete, the application downloads the latest anti-malware definitions. It then launches a quick system scan that took under 10 minutes on my system.
Security Essentials uses a new feature called the Dynamic Signature Service, which employs a variety of techniques to check for malware even before that malware's specific signature has been identified. Microsoft says Security Essentials emulates the behavior of programs before they run, and uses the signature created during the process to look for any suspicious behavior or patterns of suspicious behavior, such as starting an unexpected network connection or trying to modify certain protected sections of Windows. The Dynamic Signature Service then determines what action to take against the potential malware.
Once the software has scanned your system, you don't need to do anything else, unless it finds malware that it wants to kill or quarantine. New anti-malware signatures are automatically downloaded daily, using the Windows Update engine; you can also have the software check for the latest definitions manually. Security Essentials also provides real-time protection, so it watches your system as you use it and warns you if you're downloading malware or if your system has been infected. The software also scans your system once a week by default. You can manually override the defaults and set up specific days and times to perform the scans; more about this later.
Microsoft Security Essentials in action
Most of the time, you'll only know that Microsoft Security Essentials is running because you see its icon in the System Tray. Other than that, it leaves you alone unless it finds a problem. It uses very little RAM or system resources, and I noticed no performance hit on my machine, except when it performed a scan. When it started the scan, my PC slowed down for the first several minutes of the scan, but then it ran fine, with the scan working in the background.
Scans and updates are scheduled to run when your PC is idle, although you can run a scan manually. They are given a low priority by the operating system, further reducing their impact on your PC. In addition, CPU throttling is used to ensure that the software doesn't use more than 50% of your CPU.
When Security Essentials finds an infection on your system, you can have it immediately take action against the threat, or you can click Show Details, at which point you'll be shown as much information as the software has about the threat.
When you click on the Clean Computer option, Security Essentials will either delete the file or quarantine it, depending on the nature of the threat.
Microsoft Security Essentials
- 64-bit Windows safer, claims Microsoft
- Independent tester: Security Essentials 'very good'
- Microsoft blackballs pirates from getting free Security Essentials software
- Rivals mock Microsoft's free security software
- Microsoft confirms free security software ships Tuesday
- Microsoft to ship free security software soon
- Antivirus testing outfit: Microsoft Security Essentials makes the grade
- MS Security Essentials: Basic Protection
- First Look: Microsoft Security Essentials
- First Look: Microsoft Security Essentials beta offers free protection against malware
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts