How to temporarily disable Microsoft Security Essentials
Think your anti-virus program is causing a conflict with some other program? Here's how to switch it off for temporary troubleshooting.
PC World - When it comes to keeping my PC secure, I rely on a small handful of tools: Windows 7's built-in firewall, Gmail's spam filtering, Web of Trust's helpful browser plug-in, and Microsoft's free Security Essentials anti-virus utility.
At this risk of jinxing things, here's my score to date: My PC: 1. Malware of any variety: 0.
However, I recently needed to troubleshoot a program that wasn't working properly, and, as always, the tech support department's first suggestion was to "disable my antivirus program."
Normally I ignore this advice, but because the program in question involves a lot of file downloading from various protected servers, I thought it might actually be worth a try. Just one catch: How the heck do you disable Security Essentials?
When you open the tool, there's no immediately obvious way. But if you absolutely need to, here's how:
1. Find the Security Essentials icon in your System Tray (usually it's represented by a little green house with a flag on top). Right-click it and choose Open.
2. Click the Settings tab.
3. Click Real-time protection.
4. Uncheck the box next to Turn on real-time protection (recommended).
5. Click the Save changes button.
So that's the equivalent of switching Security Essentials to "off." Do that, then go back to whatever you're trying to troubleshoot and see if it solves the problem. (If it does, well, that's a whole other can of worms.)
When you're done troubleshooting, repeat steps 4 and 5 (this time checking the box, natch) to turn Security Essentials back on.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts