Windows Defender Antivirus has the ability to quickly detect and delete malware

In the Windows 10 Creators Update update released last April, Microsoft provided the Windows Defender Antivirus update application - leveraging the cloud protection service. Whenever Windows Defender Antivirus detects suspicious files, the application will upload them to the cloud protection service for quick analysis. The service will respond to information whether those files are safe or malicious within a few milliseconds by using cloud-based computer models and Intelligent Security Graph (Microsoft security chart). In the statement yesterday. Microsoft has stressed that Windows Defender Antivirus can detect and remove malware that has never been seen before in a matter of seconds.

Windows Defender Antivirus has the ability to quickly detect and delete malware Picture 1

When a user clicks on a malicious program, Windows Defender AV scans files with rules and definitions in memory. If it is not already in memory, Windows Defender AV will temporarily force this file to stop. Then it will ask Windows Defender AV cloud protection service for more information about that file. If necessary, it will instruct AV to send the sample. During this time, the file will remain locked. By default, Windows Defender AV will wait about 10 seconds to retrieve information from the cloud protection service before allowing the file to continue running. By using multi-layer machine learning equipment, the cloud protection service will identify malicious files and return information to Windows Defender AV. Based on this information, Windows Defender AV will apply cloud signatures and quarantine of malware. All this process will be done within 8 seconds.

The best point of Windows Defender AV and cloud service is that it's completely free. Due to the importance of computer security today, Microsoft has enabled default cloud-based protection in Windows Defender AV. To confirm if the application is enabled on your computer, visit Windows Defender Security Center . Then, go to Settings> Virus & threat protection settings and confirm that Cloud-based protection and Automatic sample submission are turned on.

Take advantage of this feature in Windows 10 Creators Update for efficient computer security!

5 ★ | 1 Vote

May be interested

  • Instructions for USB encryption with VeraCryptPhoto of Instructions for USB encryption with VeraCrypt
    usb (removable drive) is a place to store your important files. what will happen if you lose it? the result will be extremely bad so it is better to encrypt your usb. in this article, tipsmake.com will guide you how to simple and effective usb encryption.
  • How to use 2 screens on a computerPhoto of How to use 2 screens on a computer
    if your computer and laptop have additional video ports, you can use two monitors on your computer, even using multiple monitors on the same computer. this is a connection guide, using 2, more screens on your computer, invite you to follow up.
  • Winja usage checks the safety of dataPhoto of Winja usage checks the safety of data
    winja is a free security software that checks any file, access path, or system to assess the security of files.
  • How to unlock your PC with a smartphonePhoto of How to unlock your PC with a smartphone
    how to unlock the computer with the help of smartphones? you will need a rohos logon key software installed on your smartphone and computer to access your computer.
  • 12 signs that your computer is hackedPhoto of 12 signs that your computer is hacked
    just relying on the strange signs that appear during the use of the computer, you can easily know whether your computer has been attacked or not to find a way to fix it. these are signs that your computer has been hacked.
  • How to check password strengthPhoto of How to check password strength
    as a citizen in the information technology era, everyone has one or more password keys to keep the safe as their precious accounts. do you think your key is complex enough to be safe from all intruders? how will they react to malicious attacks and how long will they be broken?