Microsoft Security Essentials User Guide



Similar documents
Super Anti-spyware Free Edition User Guide

Microsoft Security Essentials Installation and Configuration Guide

Protecting Your Computer from Viruses and Spyware

How to easily clean an infected computer (Malware Removal Guide)

STEP 1: INSTALLING WINDOWS DEFENDER

How to Install Windows 7 software

ING USING HOTMAIL

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

ESET NOD32 Antivirus. Table of contents

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7

Setting up an account and logging in using Design & Print Online. Opening a saved project

Introduction to Computer Security Table of Contents

Welcome to the Brookdale Community College Online Employment System Applicant Tutorial

Housekeeping Your PC

Spam Management Service Users Guide

Get Started Guide - PC Tools Internet Security

System update procedure for Kurio 7 (For build number above 110)

Backing Up and Restoring FrontDesk Data Files

USB Driver Installation for Windows XP

Installing the Gerber P2C Plotter USB Driver

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Basic Computer Maintenance

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Guide to Installing BBL Crystal MIND on Windows 7

Click the Windows. Click the Office Trial icon to write letters or create a spreadsheet

Simple Computer Backup

McAfee Enterprise Edition v Installation & Configuration For Windows NT, 2000, and XP

Computer Security Maintenance Information and Self-Check Activities

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

Studio Visual Steps. Windows Defender. For Windows XP, Vista and 7

DEPLOYING A VISUAL BASIC.NET APPLICATION

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Driver Updater Manual

Working with your NTU off campus

Backups. Backup Plan. How to use the Backup utility to back up files and folders in Windows XP Home Edition

Bluetooth Pairing. User Guide

Cobian9 Backup Program - Amanita

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

Airtel PC Secure Trouble Shooting Guide

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

Preparing Your Personal Computer to Connect to the VPN

Contents. McAfee Internet Security 3

BitDefender Security for Exchange

GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

Installing SAS 9.2 for Windows 7/Vista/XP at The University of Iowa

How To Use Ticket Validation Software On A Pc Or Mac Or Macbook Or Ipad (For Acedo) On A Computer Or Ipa (For An Ipa) On An Ipad Or Macintosh (For Macintosh) On Pc

THE. solution. STORe it. SHARE it.

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

Software Installation and Creating a New Company

Using Gateway System Recovery

Back Up Your Data! - Part 1

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi

The Care and Feeding of Your Computer Troubleshooting and Maintenance

Avira Small Business Security Suite. HowTo

User Manual. HitmanPro.Kickstart User Manual Page 1

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy

Windows XP Managing Your Files

How Spyware and Anti-Spyware Work

Q N X S O F T W A R E D E V E L O P M E N T P L A T F O R M v Steps to Developing a QNX Program Quickstart Guide

Check current version of Remote Desktop Connection for Mac.. Page 2. Remove Old Version Remote Desktop Connection..Page 8

How To Use Ezcrt Computer Rental For A Rental

Create a Basic Skype* Account. Intel Easy Steps Intel Corporation All rights reserved.

Sophos Anti-Virus for NetApp Storage Systems startup guide

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

User Guide Online Backup

SystemTech AntiSpyware Manual

GERBER EDGE USB-to-Parallel Option Kit

P e r s o n a l E d i t i o n For Windows 95, 98, NT

Charter Business Desktop Security Administrator's Guide

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Avira Endpoint and Security. HowTo

HoneyBOT User Guide A Windows based honeypot solution

Computer Security, Maintenance and Backup

Fax and SMS Quickguide

F-Secure Online Backup Quick Installation Guide

Welcome! Want to find out more? Follow this tutorial, then launch Part 1 to get started.

Chapter 3 Software. Computer Concepts Chapter Contents. 3 Section A: Software Basics

AV Management Dashboard

Practical Application How to Use a Flash Drive

F-Secure and Server Security. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

Software Update, Backup, and Recovery

GATEWAY COMPUTER USERGUIDE

How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa (

Introduction to Computers

warpct.com Working with MS Excel 2003 Workbook courseware by WARP! Computer Training

Outlook . Step 1: Open and Configure Outlook

Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?

ESET NOD32 ANTIVIRUS 9

Some simple computer maintenance to keep your computer running well.

Transcription:

Microsoft Security Essentials User Guide Compiled and written by Le Roy Acres Web Services 2010 Foreward This is the first of numerous tutorials concerning some of the more basic maintenance routines that every personal computer owner should be acquainted with. Please follow along with the text and illustrations as we go along and for your own safety do not skip ahead until you are well familiarized with the routine methodology. The computer world is inhabited with malignant programs and routines that are commonly known as virus, Trojans, Root-kits, and other lesser known names. These programs can range from being mildly annoying all the way to being down rite destructive of your data and/or hardware (in some very rare cases). Because of these malignant programs it has become necessary for the average user to take precautionary steps to prevent infection of their systems by using programs such as Microsoft Security Essentials. In this tutorial we will attempt to teach you the very basic of steps necessary to help to ensure your data and your machine s safety in this ever more dangerous electronic world. Note: these are the most basic features, there are more advanced features that are beyond the scope of this document to inform you of at this time. Usage of the more advanced features are solely upon the user and may cause system disruption or may cause your system to become unstable or unresponsive. This tutorial may be printed out from this PDF document. This material may be freely given without the consent of it s author as long as the copyright is maintained. You may not claim this work as your own nor may you charge any amount of funds for this document except for the amount of publishing or the amount of the media upon which it is distributed (e.g. CD, DVD, 3.5 floppy disc).

Now on to the tutorial: Step One: Below is an image of the Microsoft Security Essentials (MSE) icon found on a Windows 7 machine in the lower right portion of the Toolbar. A similar image will be displayed on earlier versions of Windows Operating Systems. Please click on it and select Open.

Step Two: Below is an image showing the initial screen you will find upon opening MSE. You will note the areas circled and become familiar with them as they contain important information that determines what steps you need to take next. Let s take a quick moment to go over these features. The first item to look at is to see if the Real-time Protection is enabled (it should be). If this feature is not enabled you can enable it by going to the Settings tab at any time and enabling this feature. Now look at the Scan Options and ensure that the Quick feature is selected. You will also note the Change My Scan Schedule link at the bottom of the window. This feature will be used to setup your schedule for the program to automatically update your system definitions and run an automatic scan periodically. Now look at the Virus & spyware definitions line. If your system reports being up to date on the Virus & Spyware definitions you may skip to Step Five.

Step Three: If your system reports that it is not up to date then you will need to click on the Update tab at the top of the window as shown here: Step Four: Once you have done this you will get the following window. This window will tell you information concerning the virus definitions and will provide you with a button to Update your definitions now. In order to update the definitions you MUST be connected to the Internet or have a virus definition file on some type of removable media (such as CD, DVD, Flashdrive, 3.5 floppy disk). If you are not currently connected to the Internet at this time please stop and do so. Also be advised that some definition files can be quite large so if you are not on a broadband connection (such as Cable, DSL, or Sattelite) the download time will be significantly longer. Please click on the Update button now and allow the update to be downloaded and installed. You may watch the process on the progress bar shown in the second image but personally I would go get a drink and occupy yourself otherwise until the process is complete.

Step Five: Once the update is complete you will return to the Home tab to begin the scanning process. Ensure that the Scan Option is set to Quick and then click on Scan Now. Go get another drink and please do not use your computer while the scan is being conducted.

Step Six: Once the process is finished you will be able to see if your system has been infected or not. In the case of an infection, simply follow the advice of the program to get rid of the file(s) affected. The system may offer choices of quarantine, delete or ignore according to the severity of the risk. This program is quite intuitive and generally speaking it will choose the appropriate action for the type of infection detected. The final screen will be as below with information that you may find interesting to note. You are welcome to explore the other options of this program but please do so with a moderate amount of caution. Usually nothing bad will happen to your system but you may forget what options you changed and may end up with some features you do not necessarily wish to have turned on. We hope you have found this tutorial helpful.