Microsoft Security Essentials Reviewers Guide
Microsoft Security Essentials Reviewers Guide
Reviewers Guide
June 2009
Abstract
This reviewers guide provides a first look at the features of Microsoft Security Essentials and how
it benefits consumers. Available to users of genuine Windows at no additional cost, Microsoft
Security Essentials provides protection from spyware, viruses and other malicious software
including trojans and rootkits. In addition to providing high-quality security for consumers, this
new solution has a lightweight design and uses smart resource utilization techniques to minimize
the impact on the common computing tasks users do every day, such as launching browser
windows and opening and saving documents, even on older and less powerful PCs. With a no-
hassle, straightforward installation, automatic updates and simple user interface, this solution
helps make it easy to get and stay protected.
Information contained in this document represents the current view
of Microsoft Corp. on the issues discussed as of the date of
publication. Because Microsoft must respond to changing market
conditions, it should not be interpreted to be a commitment on the
part of Microsoft, and Microsoft cannot guarantee the accuracy of
any information presented after the date of publication.
This reviewers guide is for informational purposes only.
MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
IN THIS SUMMARY.
Complying with all applicable copyright laws is the responsibility of
the user. Without limiting the rights under copyright, no part of this
document may be reproduced, stored in, or introduced into a
retrieval system, or transmitted in any form, by any means
(electronic, mechanical, photocopying, recording or otherwise), or for
any purpose, without the express written permission of Microsoft.
Microsoft may have patents, patent applications, trademarks,
copyrights or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written
license agreement from Microsoft, the furnishing of this document
does not give you any license to these patents, trademarks,
copyrights or other intellectual property.
Unless otherwise noted, the example companies, organizations,
products, domain names, e-mail addresses, logos, people, places
and events depicted herein are fictitious, and no association with
any real company, organization, product, domain name, e-mail
address, logo, person, place or event is intended or should be
inferred.
© 2009 Microsoft Corp. All rights reserved.
CONTENTS INTRODUCTION ........................................................................................ 1
WORKS WITH WINDOWS .................................................................................. 2
GENUINE WINDOWS ................................................................................ 3
QUALITY PROTECTION ........................................................................... 4
ROOTKIT PROTECTION ..................................................................................... 4
DYNAMIC SIGNATURE SERVICE ....................................................................... 5
FALSE POSITIVES ............................................................................................. 5
REAL-TIME PROTECTION .................................................................................. 6
SYSTEM SCANNING AND CLEANING ................................................................. 6
EASY TO GET PRTOECTED AND STAY PROTECTED ........................ 9
SIMPLE AND QUICK INSTALLATION ................................................................... 9
PRECONFIGURED FOR OPTIMAL PROTECTION ................................................ 9
ALWAYS UP-TO-DATE .................................................................................... 10
SIMPLE TO UNDERSTAND AND EASY TO USE ................................. 11
One of the most significant trends of the second half of 2008 as outlined in
the latest version of the Microsoft Security Intelligence Report (SIR v6) is the
large increase in rogue security software detected in many countries
worldwide. Malware masquerading as security software is introduced to a
user’s system and, once installed, bombards the user with pop-up
advertisements and alerts claiming that the computer is infected. The only
way to remove the threats is to pay for the full version and even then,
malware is typically left behind.
With malware attacks increasing in both number and severity and the
increasing incidence of rogue security software, quality anti-malware
protection delivered from a trusted source is a must-have for today’s PC
users — yet a surprising number of consumer PCs remain unprotected.
There are a number of contributing factors to this:
Rootkit Protection
False Positives
Microsoft sets a very high industry-recognized bar for the quality of its
definition updates. The company maintains a significant database that is kept
up to date with the most popular Web sites and application downloads on the
Internet. All updates and engine releases are put through extensive incorrect
detection and application compatibility tests prior to release to help ensure
they do not mistakenly identify valid software as malicious.
Microsoft Security Essentials also uses the Microsoft SpyNet telemetry
system to monitor the quality of definition updates after release to customers.
Telemetry is sent to Microsoft on files being detected and removed by users
in real time and used to identify abnormal patterns and assess the potential
impact of an incorrect or misbehaving signature. In the rare event of an
incorrect detection being discovered on a user’s machine, the Dynamic
Signature Service fixes the signature in real time and helps prevent users
from being impacted.
Custom scan. A custom scan allows users to scan only the areas they
select.
Users can choose when they want a scheduled scan to run, view the scan
results before cleaning or, if they do not want to run scheduled scans, run a
scan on demand. If a PC is not “awake” when the scan is scheduled to run,
Microsoft Security Essentials will start the scan at the first opportunity when
the PC is awake and idle.
Microsoft Security Essentials runs a quick scan as part of the setup
experience to ensure the system is clean right from the start.
In addition to scheduled and on-demand system scanning, Microsoft Security
Essentials provides a Windows Shell extension that allows users to scan
individual files at any time by right-clicking on the file either in Explorer or on
the desktop.
Remove. This action permanently deletes the item from the system.
Allow. This action will stop Microsoft Security Essentials from detecting
the item in future scans by adding it to the Allowed Items list. Users can
remove items from the Allowed Items list at any time.
More experienced users can set a full range of configurable options, run
updates, view excluded file types, locations and processes, and view history
at any time.
Always Up to Date
When a yellow or red icon is present indicating action is required, users can
take the required action directly from Microsoft Security Essentials system
tray icon without ever having to enter the application.
Within the application, the user is provided with a clean, simple home page
that shows the security state of the PC. At the green steady-state, the user
can run a scan if desired but there are no specific recommended actions for
the user to take.
When the PC has an issue requiring user attention, the look of the home
page changes based on the issue. The status pane turns either yellow or red
depending on the situation and an action button appears in a prominent
location on page with the suggested action.
Fewer Interruptions
Availability
Microsoft Security Essentials will be available for limited public beta in early
summer in the following geographic regions and languages:
Geographic regions: Brazil, China, Israel, U.S.
Languages: Brazilian Portuguese, English, Simplified Chinese
The Microsoft Security Essentials global launch is slated for the second half
of 2009 in the following geographic regions and languages: