Instalar Steam
iniciar sesión
|
idioma
简体中文 (chino simplificado)
繁體中文 (chino tradicional)
日本語 (japonés)
한국어 (coreano)
ไทย (tailandés)
Български (búlgaro)
Čeština (checo)
Dansk (danés)
Deutsch (alemán)
English (inglés)
Español de Hispanoamérica
Ελληνικά (griego)
Français (francés)
Italiano
Bahasa Indonesia (indonesio)
Magyar (húngaro)
Nederlands (holandés)
Norsk (noruego)
Polski (polaco)
Português (Portugués de Portugal)
Português-Brasil (portugués de Brasil)
Română (rumano)
Русский (ruso)
Suomi (finés)
Svenska (sueco)
Türkçe (turco)
Tiếng Việt (vietnamita)
Українська (ucraniano)
Comunicar un error de traducción
Windows Defender is generally good enough to protect your PC for basic security needs. However, it may not offer the same level of comprehensive protection and additional features as some third-party antivirus software.
But to answer: Windows defender should be more than enough. When in doubt you could use a 2nd scanner as a precaution or to double check for possible false positives.
I often say that the only reason you should subscribe to a dedicated anti-virus software is if you consciously, regularly spend time on shady websites downloading files in an irregular manner which you have no way of verifying as legit beforehand. In other words, not from the official source.
I think the more common option for extra security is to secure your browsing habits on the internet.
In other words, use an ad-blocker (like u-block origin) and/or a script-blocker and you can filter out a lot of fake or bogus downloads and frauds from appearing. That includes Google especially, which sponsors a lot of malicious websites.
https://youtu.be/c5fAiwVvr6s?si=C_jjT2fh_JVTMmZG
Windows Defender has been enabled and couldnt prevent nor to find it afterwards, not even by deep scanning his machine with Windows Defender.
A deep Scan of ESET found it.
It was a simple Browser-injection to spam Virus Notifications to download and to install the real malware . . .
Keep Windows Defender + a professional AntiVir Software as ESET (Smart Sec) installed
NEVER install Norton or McAfee . . .
That and sensible browsing habits.
Also, just use basic logic. If Windows Defender (which is free and pre-installed) was so great at stopping bad stuff, then 3rd-party AV programs wouldn't be a multi-billion dollar industry. Just one company, Gen Digital, in it's financial filings two months ago, reported $3.8 billion dollars in revenue over the last year. Some of the brands Gen Digital owns are Norton, Symantac, LifeLock, Avast, AVG, Avira, cCleaner, Blue Coat Systems, & VeriSign
It really depends on what you are looking for.
I still have the "Defender" active; however, aside from the occasional EICAR test, that doesn't do anything: I also have an up-to-date browser and a working brain.
And while my Windows account password is weak, the box itself isn't even accessible from the internet so that doesn't matter.
As a consumer without additional knowledge in the field you really do not need anything else for anti-malware as long as you do not frequent weird sites. As mentioned above a script-blocker, aka ad-blocker is more effective as measure if you do not frequent weird stuff. The truth is anti-malware only has 50% succes rates ever. It can stop a threat or it can't. Signature databases are shared between vendors thus a threat detected by one vendor will in hours or sometimes even minutes be known in the other.
An advanced protection suite is only really useful if you are the one that does the audit and not rely on the software itself. Never ever get a paid consumer product if you do want extra protection instead bump it up to small business. Why because you want access to actual malware-analyse experts if sht hits the fan and for reason two the signature update frequency is often higher.
For business the biggest reason to go for paid products is accountability and insurance requirements not because the products are necessarily better. It is not a question *if* your business get hit but when.
But again most consumer will never ever have any use of it.
In case you do suspect strange behavior never trust the installed product for a answer create a second opinion with a run only clean product and compare results. Something like MBAM. But never ever keep two anti-malware products running continuously unless you delegated specific tasks to them. And if you are unsure of your system either wipe it or go to a expert.
Now since you asked if any one uses anything differently here is my high secure business setup which is absolute overkill I want to stress and is not used for recreational systems (the one I am writing off) It is for isolated tasks like business financial transactions or emergency connections to our data-centers from a non secure location when not at the office that has traditional security.
It consists of a scan only anti-malware software with no ability to stop or modify changes just has a real time reporting of data access and on top of that a port blocker, logger where every single port request is blocked until I manually review the request. This includes all build in Windows actions from the build in system users.
You will get thousands of false positives when starting such a setup at first. However once you got your system completely audited you will know the second something deviates.
Than once you have your baseline deep freeze the system with a proprietary product or in case you have enterprise license unified write filter. (UWF)
https://learn.microsoft.com/en-us/windows/iot/iot-enterprise/customize/unified-write-filter
This puts any file changes not on the actual meant save location but a virtual overlay and a copy on a separate physical drive. Meaning any changes that are not going to pre-approved folders are gone the moment the system reboots on the actual system drive.
So what this setup does is if any kind of intrusion does occur it will be instantly known no matter if it is a zero-day or a known signature and it can not receive further commands or relay back information to a bad actor without manual intervention. Because there are no programs that have actual admin rights including anti-malware they can not be piggybacked for lateral movement
The moment that detection happens I put my system of the grid remove the secondary drive and simply reboot to the previous state. Drive goes to our malware analysis team if deemed needed and if not than data sanitation is applied under nist-800-88 rev1 standard.
https://csrc.nist.gov/pubs/sp/800/88/r1/final from a designated of the grid office location.
It can also be injected into a system with a similar setup but as a monitored isolated honeypot for one of our partners to research unfamiliar behavior without necessarily alerting the bad actor of it immediately. This happens when we suspect we are dealing with a advanced persistent threat (APT)
If the day went by without any problems the system changes from the virtual overlay are written to a back-up location on a third drive for seven days and the oldest one gets overwritten. Any changes that do need to keep on the actual system need to be manually approved before the reboot or are again lost from the system drive.
Because this setup is meant for very specific small tasks very little data needs to be actual written back, thus making it manageable after the initial audit. It does come with a increased initial cost in hardware and software but again because it is a specialized system it does not need a large drives or high amount of CPU, RAM thus stays manageable.
If you would ever try this in a recreational system your in a for a absolute unmanageable audit hell. But this is the highest level of security feasible besides proprietary read-only hardware and Supervisory Control and Data Acquisition (SCADA) infrastructure I can think of with twenty plus years of professional experience and actual production knowledge.
The problem I have with this is there is no link to verify that information about Windows Defender. Personally I have heard differently about it and other internet protection. That was from multiple PC websites that I tend to trust. Besides, nothing is perfect. No internet security is 100% protection.
I tend to agree with those who say you are the biggest problem. As much as I hate to bring up this analogy internet security is like using a condom ... there is always the chance that they break or simply don't work. It is up to you to use it properly to make sure the chance of it breaking to a minimum.
At one point in time I was using both WIndows Defender and Bitdefender but stopped doing it. I don't click links I don't know where it will take me. I don't go to shady websites. I no longer use Google Chrome, either.
Using common sense is the best protection ever, period.
Yes, common sense goes a long way, but that's nowhere near being good enough. Not visiting shady sites is a great idea, but again not good enough. I was just sitting on Yahoo one day reading the news when something tried to download itself, and my AV stopped it. I believe the general term for it is a "drive-by virus".
I've used AVG for over 20 years, and only once has something bad gotten past it and caused damage. It happened while my 9-year old daughter was using the computer, so I don't know exactly what she was doing at the time. On the other hand, a good friend of mine uses absolutely no AV program at all, not even Defender. He doesn't believe AV programs are necessary as long as you don't visit porn sites. And he says he's never had anything happen to any of his computers over the years. Nothing. Nada. Zip. So everybody has their preference, and most people can justify their position.
If you believe the person who posted just above you, claiming to have over 20 years experience, they said Defender was "close to any paid low tier product on the market". That's not exactly a glowing recommendation. But at the same time, they said Defender should be okay for the OP as long as there's no visiting shady websites. In the end, the OP would be best served by doing their own online research into AV products, rather than listening to random strangers on Steam.
That by itself des nothing. Any outside access ends on the gateway, either because there's no port-forward to the desktop, or because whatever server is responding doesn't accept their credentials. My desktop is on the LAN, and connections go to the outside, but they can't come in.
Even ignoring VPN setups that might also be one-way, company VPNs are generally accessible from my LAN, but company networks cannot access anything on my end. It's the kind of one-way setup where "my home is my castle" and access from the outside is limited or generally just blocked because there is no reason to open it up.
Outside access to the gateway is currently possible for 3 services: OpenVPN, a webserver, and ssh. All three are closely monitored for bugs by their respective development teams, so "hackers" won't have anything to "hack". And keep in mind that I'm a private person, not a company -- attacks on me are generally scripted by probing ranges of IP addresses for vulnerable services, rather than some hacking team trying to work out a strategy to get into my infrastructure. To that end, none of the 3 services are operating on their respective standard ports -- which eliminates 99% of the script attacks before they are even rejected by the service, because they simply don't bother trying every port.
"Viruses" come from the inside -- like bad downloads, or websites exploiting known browser bugs. That's where brainware comes into play, and the fact that I generally have no business on obscure sites that might exploit newly discovered bugs in browsers. I even delete spam-mails right away, so anyone trying to mail me something fishy has zero chance of success. People needs recognizable senders and subjects for me to even look at mails. And even then, Amazon telling me about a delivery is obvious spam, because I usually don't have an ongoing delivery...
What's this strangeness you speak of? Tis magic!! BLACK magic!!
*motions at the townspeople gathered about*
He's trying to corrupt your minds with his evil mutterings!! Don't listen!! Move quickly now, before he vanishes!!
*points at Kargor*
Kill him!!!
Seriously, a that's pretty cool setup.
For example there used to be a fairly common Discord scam amongst gamedevs where someone would ask you to 'download their demo for feedback' and generally speaking indie gamedevs were more receptive to this as they're more wanting to help others for feedback. But again this is more a spear attack and you have to constantly rotate the malware because it'll get flagged quickly and become useless to the next victim who's anti-virus will flag it.