{"id":44922,"date":"2026-05-07T03:01:09","date_gmt":"2026-05-06T17:01:09","guid":{"rendered":"http:\/\/www.rjmprogramming.com.au\/ITblog\/?p=44922"},"modified":"2026-05-06T20:11:49","modified_gmt":"2026-05-06T10:11:49","slug":"microsoft-defender-virus-protection-tutorial","status":"publish","type":"post","link":"https:\/\/www.rjmprogramming.com.au\/ITblog\/microsoft-defender-virus-protection-tutorial\/","title":{"rendered":"Microsoft Defender Virus Protection Tutorial"},"content":{"rendered":"<div style=\"width: 230px\" class=\"wp-caption alignnone\"><a target=\"_blank\" href=\"http:\/\/www.rjmprogramming.com.au\/Windows\/WindowsDefender.pdf\" rel=\"noopener\"><img decoding=\"async\" style=\"float:left; border: 15px solid pink;\" alt=\"Microsoft Defender Virus Protection Tutorial\" src=\"http:\/\/www.rjmprogramming.com.au\/Windows\/WindowsDefender.jpg\" title=\"Microsoft Defender Virus Protection Tutorial\"   \/><\/a><p class=\"wp-caption-text\">Microsoft Defender Virus Protection Tutorial<\/p><\/div>\n<p>The personal computer world has been fed the line for years that Apple Mac OS X (or macOS) is more secure than Microsoft Windows, but is this true?  Have a read of <a title='Interesting article' href='https:\/\/nakedsecurity.sophos.com\/2012\/04\/10\/macs-safer-than-pcs\/'>this interesting article<\/a> for more in this regard.<\/p>\n<p>Whether the sentiment is true or not, must say the simple <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Avast+Free+Antivirus+2016&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">Avast Security<\/a> virus protection arrangement I have for this MacBook Pro does not fill me with the anxiety the virus protection on Windows, so front and centre does.  But maybe that is just delusion on my part.  <a target=\"_blank\" title=\"?\" href='https:\/\/www.youtube.com\/watch?v=OngDbS0QOaw' rel=\"noopener\">Anyhow<\/a>, with Windows, though all this remains very front and centre stillwith Windows 10, it is far less disorganized feeling, where years ago third party software was the only place to go.  You can still &#8230;<\/p>\n<ul>\n<li>use third party software to manage virus control (as we show with the previous <a title='Windows Virus Protection Primer Tutorial' href='#wvppt'>Windows Virus Protection Primer Tutorial<\/a>) &#8230; but Microsoft&#8217;s Microsoft Defender application will tell you so and work with that &#8230; whereas you can &#8230;<\/li>\n<li>use Microsoft&#8217;s <a target=\"_blank\" title='Microsoft Defender information from Microsoft' href='https:\/\/www.microsoft.com\/security\/pc-security\/windows-defender.aspx' rel=\"noopener\">Microsoft Defender<\/a> application on its own to manage virus protection<\/li>\n<\/ul>\n<p> &#8230; meaning that there is a &#8220;one stop shop&#8221; for finding out about the security controls in place for a Windows 10 personal computer or laptop.  Much less &#8220;wild west&#8221; feeling.<\/p>\n<p>As such, today, we take a <a target=\"_blank\" href=\"http:\/\/www.rjmprogramming.com.au\/Windows\/WindowsDefender.pdf\" title=\"Click picture\" rel=\"noopener\">stream of consciousness tour<\/a> of Microsoft Defender to show you today, screenshotted on a Windows 10 personal computer.<\/p>\n<p>Hope you can see that &#8220;all in one place&#8221; can have its benefits.<\/p>\n<p><!--p>You can also see this play out at WordPress 4.1.1's <a target=\"_blank\" href='\/\/www.rjmprogramming.com.au\/ITblog\/microsoft-virus-protection-primer-tutorial\/' rel=\"noopener\">Microsoft Virus Protection Primer Tutorial<\/a>.<\/p-->\n<hr>\n<p id='wvppt'>Previous relevant <a target=\"_blank\" title='Windows Virus Protection Primer Tutorial' href='\/\/www.rjmprogramming.com.au\/ITblog\/windows-virus-protection-primer-tutorial\/' rel=\"noopener\">Windows Virus Protection Primer Tutorial<\/a> is shown below.<\/p>\n<div style=\"width: 230px\" class=\"wp-caption alignnone\"><a target=\"_blank\" href=\"http:\/\/www.rjmprogramming.com.au\/Windows\/norton.jpg\" rel=\"noopener\"><img decoding=\"async\" style=\"float:left; border: 15px solid pink;\" alt=\"Windows Virus Protection Primer Tutorial\" src=\"http:\/\/www.rjmprogramming.com.au\/Windows\/norton.jpg\" title=\"Windows Virus Protection Primer Tutorial\"   \/><\/a><p class=\"wp-caption-text\">Windows Virus Protection Primer Tutorial<\/p><\/div>\n<p>Windows users will almost always have considered the issue of Virus protection.  The term &#8220;Virus Protection&#8221; encompasses, for many of us, so much more these days.  Terminology that springs to mind with regards to that general concept of &#8220;protecting your computer from harmful software&#8221; could be &#8230;<\/p>\n<ul>\n<li><a target=\"_blank\" title='Virus protection information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/Antivirus_software' rel=\"noopener\">virus protection<\/a><\/li>\n<li><a target=\"_blank\" title='Internet security information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/Internet_security' rel=\"noopener\">internet security<\/a><\/li>\n<li><a target=\"_blank\" title='Malware information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/malware' rel=\"noopener\">malware<\/a><\/li>\n<li><a target=\"_blank\" title='Spyware information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/spyware' rel=\"noopener\">spyware<\/a><\/li>\n<li><a target=\"_blank\" title='Adware information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/adware' rel=\"noopener\">adware<\/a><\/li>\n<\/ul>\n<p> &#8230; and other concepts that swirl around this issue include &#8230;<\/p>\n<ul>\n<li><a target=\"_blank\" title='Firewall information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/firewall' rel=\"noopener\">firewall<\/a><\/li>\n<li><a target=\"_blank\" title='Signature information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/signature' rel=\"noopener\">signatures<\/a><\/li>\n<li><a target=\"_blank\" title='Live update information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/live-update' rel=\"noopener\">live update<\/a><\/li>\n<li><a target=\"_blank\" title='Scan information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/scan' rel=\"noopener\">scan<\/a><\/li>\n<li><a target=\"_blank\" title='Threat information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/threat' rel=\"noopener\">threat<\/a><\/li>\n<li><a target=\"_blank\" title='Quarantine information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/quarantine' rel=\"noopener\">quarantine<\/a><\/li>\n<li><a target=\"_blank\" title='Intrusion prevention information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/intrusion-prevention' rel=\"noopener\">intrusion prevention<\/a><\/li>\n<li><a target=\"_blank\" title='Safe surfing information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/safe-surfing' rel=\"noopener\">safe surfing<\/a><\/li>\n<li><a target=\"_blank\" title='Identity safe information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/identity-safe' rel=\"noopener\">identify safe<\/a><\/li>\n<li><a target=\"_blank\" title='Download intelligence information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/download-intelligence' rel=\"noopener\">download intelligence<\/a><\/li>\n<li><a target=\"_blank\" title='Backup information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/backup' rel=\"noopener\">backup<\/a><\/li>\n<li>computer\/network\/web\/insight\/email\/browser\/intrusion\/SONAR <a target=\"_blank\" title='Protection information from Wikipedia ... thanks' href='https:\/\/en.wikipedia.org\/wiki\/computer-protection' rel=\"noopener\">protection<\/a><\/li>\n<\/ul>\n<p>Of the software available we like &#8230;<\/p>\n<ul>\n<li><a target=\"_blank\" title='Norton by Symantec' href='http:\/\/www.norton.com\/Symantec\u200e' rel=\"noopener\">Norton<\/a> by Symantec &#8230; the most comprehensive and efficient we know<\/li>\n<li><a target=\"_blank\" title='AVG' href='http:\/\/www.avg.com' rel=\"noopener\">AVG<\/a> &#8230; freeware<\/li>\n<li><a target=\"_blank\" title='McAfee' href='http:\/\/www.mcafee.com' rel=\"noopener\">McAfee<\/a><\/li>\n<\/ul>\n<p> &#8230; and there is always <a target=\"_blank\" title='Microsoft Defender information from Microsoft' href='https:\/\/www.microsoft.com\/security\/pc-security\/windows-defender.aspx' rel=\"noopener\">Windows Defender<\/a> &#8230; as supplied with Windows.<\/p>\n<p>Here is the list tested by PC and Tech Authority (magazine, March 2016) with detailed tabular findings &#8230;<\/p>\n<ul>\n<li>Avast Free AntiVirus 2016 <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Avast+Free+Antivirus+2016&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>AVG AntiVirus Free <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=AVG+AntiVirus+Free&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>Bullguard Internet Security <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Bullguard+Internet+Security&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>Eset Smart Security <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Eset+Smart+Security&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>Kaspersky Total Security Multi-Device <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Kaspersky+Total+Security+Multi-Device&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>McAfee Internet Security <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=McAfee+Internet+Security&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>Microsoft Security Essentials <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Microsoft+Security+Essentials&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>Norton Internet Security Premium <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Norton+Internet+Security+Premium&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<li>Trend Micro Maximum Security 10 <a style='text-decoration:none;' target=\"_blank\" title='Google search' href='https:\/\/www.google.com.au\/search?q=Trend+Micro+Maximum+Security+10&#038;ie=utf-8&#038;oe=utf-8&#038;gws_rd=cr&#038;ei=PovBVs6nEMSo0ATGv4X4BQ' rel=\"noopener\">&#128279;<\/a><\/li>\n<\/ul>\n<p>One way or the other these Windows &#8220;defenders&#8221; are very important in today&#8217;s personal computing space.<\/p>\n<p>If this was interesting you may be interested in <a title='Click here to see topics in which you might be interested' href='#d16135' onclick='var dv=document.getElementById(\"d16135\"); dv.innerHTML = \"&lt;iframe width=670 height=600 src=\" + \"https:\/\/www.rjmprogramming.com.au\/ITblog\/?tag=windows\" + \"&gt;&lt;\/iframe&gt;\"; dv.style.display = \"block\";'>this<\/a> too.<\/p>\n<div id='d16135' style='display: none; border-left: 2px solid green; border-top: 2px solid green;'><\/div>\n<hr>\n<p>If this was interesting you may be interested in <a title='Click here to see topics in which you might be interested' href='#d16135' onclick='var dv=document.getElementById(\"d16135\"); dv.innerHTML = \"&lt;iframe width=670 height=600 src=\" + \"https:\/\/www.rjmprogramming.com.au\/ITblog\/?tag=windows\" + \"&gt;&lt;\/iframe&gt;\"; dv.style.display = \"block\";'>this<\/a> too.<\/p>\n<div id='d16135' style='display: none; border-left: 2px solid green; border-top: 2px solid green;'><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The personal computer world has been fed the line for years that Apple Mac OS X (or macOS) is more secure than Microsoft Windows, but is this true? Have a read of this interesting article for more in this regard. &hellip; <a href=\"https:\/\/www.rjmprogramming.com.au\/ITblog\/microsoft-defender-virus-protection-tutorial\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,29,37],"tags":[337,885,1096,1098,1319,1640,1583],"class_list":["post-44922","post","type-post","status-publish","format-standard","hentry","category-elearning","category-operating-system","category-tutorials","tag-disk","tag-operating-system-2","tag-scan","tag-scanning","tag-tutorial","tag-virus","tag-window"],"_links":{"self":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/44922"}],"collection":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/comments?post=44922"}],"version-history":[{"count":4,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/44922\/revisions"}],"predecessor-version":[{"id":72957,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/44922\/revisions\/72957"}],"wp:attachment":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/media?parent=44922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/categories?post=44922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/tags?post=44922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}