Microsoft Security Essentials Installation and Configuration Guide



Similar documents
Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

VirtualXP Users Guide

Installing FileMaker Pro 11 in Windows

Malwarebytes Anti-Malware 1.42

How to easily clean an infected computer (Malware Removal Guide)

Driver Updater Manual

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Pearl Echo Installation Checklist

How to Install Windows 7 software

Virtual Office Remote Installation Guide

Symantec Endpoint Protection End-User Guide For MacOS X

Basic Computer Maintenance

Outlook to Windows Live Mail

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

CISCO VPN CLIENT INSTALL AND UPDATE INSTRUCTIONS

PLEASE NOTE: The client data used in these manuals is purely fictional.

Installation Assistance Windows/Microsoft Updates Updating from Spectra or Upgrading from Spectra 6.x...

Table of Contents. 1. Overview Materials Required System Requirements User Mode Installation Instructions..

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Airtel PC Secure Trouble Shooting Guide

How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa (

VPN for the Norwegian School of Sport Sciences, Windows

Contents. McAfee Internet Security 3

Testing your Linux Virtual Box

How to Uninstall Manually and Upgrade the Cisco VPN Client 3.5 and Later for Windows 2000, Windows XP and Windows Vista

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

How to Use Windows Firewall With User Account Control (UAC)

Installing the Software... 1 Using the System Tray Icon... 5 Restoring the System Tray Icon... 6

BULLGUARD BAckUp GUIDE

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client

MyNetFone Virtual Fax. Virtual Fax Installation

Follow the instructions below for first-time users only

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

Setting up your new Live Server Account

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Configuring Windows & Installing the Melco Software

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?

Sophos Computer Security Scan startup guide

Magaya Software Installation Guide

Citrix Client Install Instructions

XConsole GUI setup communication manual September 2010.

Contents. VPN Instructions. VPN Instructions... 1

Microsoft Office 365 with MailDefender

ViRobot Desktop 5.5. User s Guide

STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System

Super Anti-spyware Free Edition User Guide

Citrix : Remediation - MAC

Important Notes for WinConnect Server VS Software Installation:

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Nortel VPN Client. Customer Care Center Office of Enterprise Technology (OET) for Windows Vista 64-bit Operating System

Windows XP with Symantec AntiVirus 10 Corporate Edition

Print Audit 6 Client Only Installation Guide

Guide to Installing BBL Crystal MIND on Windows 7

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Sophos Anti-Virus for NetApp Storage Systems startup guide

AVG File Server. User Manual. Document revision ( )

Quickstart Guide. First Edition, Published September Remote Administrator / NOD32 Antivirus 4 Business Edition

Housekeeping Your PC

Zinstall HDD User Guide

Vodafone Text Centre User Guide for Microsoft Outlook

Microsoft Access Calendar Scheduling Database/Template Installation Instructions

HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL)

Net Protector Admin Console

Print Audit 6 Network Installation Guide

Upgrading Your PhoneTree Software

Get Started Guide - PC Tools Internet Security

5.6.2 Optional Lab: Restore Points in Windows Vista

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

Installing SAS 9.2 for Windows 7/Vista/XP at The University of Iowa

How To Install Database Oasis On A Computer Or Computer (For Free)

Time Matters for Microsoft Outlook. Technology Preview User Guide

Outlook . Step 1: Open and Configure Outlook

SystemTech AntiSpyware Manual

Antivirus. Quick Start Guide. Antivirus

ilaw Installation Procedure

educ Office Remove & create new Outlook profile

HoneyBOT User Guide A Windows based honeypot solution

Install Guide for Windows Office Professional Plus 2010

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

Gladinet Cloud Backup V3.0 User Guide

F-Secure Anti-Virus for Mac 2015

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

Cyber Security: Software Security and Hard Drive Encryption

Primavera P6 Professional Windows 8 Installation Instructions. Primavera P6. Installation Instructions. For Windows 8 Users

Using the Remote Desktop Portal

WA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

Check current version of Remote Desktop Connection for Mac.. Page 2. Remove Old Version Remote Desktop Connection..Page 8

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

NTI Backup Now EZ v2 User s Guide

Deposit Direct. Getting Started Guide

Transcription:

Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on downloading it from Microsoft s site and are instead using the CD provided by ITS, please go back to http://www.goshen.edu/its/help_desk/faq/software/antivirus and use the instructions for installing the software with the CD. You can install Microsoft Security Essentials for free on any computer with a genuine installation of Windows Vista, or Windows 7. Please print these instructions before you get started. Getting Started Before installing Microsoft Security Essentials, you will need to uninstall the current antivirus program that is on your computer. Click on Start and go to the Control Panel. Choose Uninstall a Program (Add/Remove Program). Find your current antivirus program and click to uninstall it. After uninstalling your old antivirus software, restart your computer. Again, click on Start and go to the Control Panel. Choose Uninstall a Program (Add/Remove Program). Search through the list of programs and make sure there are no more program items listed for your antivirus program. You are now ready to start installing Microsoft Security Essentials. Installing Microsoft Security Essentials You will need to visit the Security Essentials website located at http://www.microsoft.com/security_essentials/ You should see a page similar to the one below. This screen allows you to read Help and How To Guides, as well as watch an installation video, which may be helpful if you would like an extra resource before installing. You ll want to click the blue Download Now button. o Windows Vista or Windows 7, 32 bit o Windows Vista or Windows 7, 64 bit If you have Windows Vista or Windows 7 and you are unsure of whether it is 32 bit or 64 bit, do the following to find that information: Windows Vista o Click the Start button o Click on Control Panel o Click on System and Maintenance o Click on System. You will see information that will tell you if you are running 32 bit or 64 bit. Windows 7 o Click the Start button o Click on Control Panel o Click on System and Security o Click on System. You will see information that will tell you if you are running 32 bit or 64 bit.

After clicking on the link for the proper version of your operating system, you should see a download prompt window appear. Once you see the file download screen, you will be prompted to Run, Save, or Cancel. For this installation, choose Save. After the installation file is saved to your computer, locate the installation file and double click to start the installation. If you are on Windows Vista or Windows 7, you may see a User Account Control (UAC) window pop up. If you are using Windows 7 (as shown below,) click Yes. If you are using Windows Vista, click Continue. In the next window you will see is the Installation Wizard s welcome message. This page outlines the applications features, provides a link to the Privacy Statement, and notes that it will need to check for updates after installed. You ll want to remember to keep your internet connection live, as you ll not only need to update the definitions database, but you will also need to validate your copy of Windows during the install. Click on the Next button.

The next window you will see is the Microsoft Security Essentials License Agreement. Read through this carefully as it outlines liabilities, responsibilities, and rights of both Microsoft and the end user. Once you have read through the license agreement, click on I accept to continue with the installation, or I decline if you do not want to continue. Next, you will need to validate your installation of Windows Vista, or 7. This is a required step, if you pass validation, you will be taken to the next step of the installation. If you do not pass the validation for some reason, you will be directed to a page with information on how to rectify this issue. Once you have passed validation, you can continue the installation. Click on the Validate button. Once you have passed the Validation Check (Windows Genuine Advantage,) you will see a blue check mark with the text This copy of Windows passed genuine validation and will be immediately redirected to the first step of the install process.

Congratulations! Now that you have downloaded, read over the license agreement and privacy policy, and validated your copy of Windows, you are ready to start the install process. The first page you will see is a warning to remove all anti virus and anti spyware applications from your computer system. Microsoft Security Essentials does not play well with other antivirus programs and can make your system extremely unstable. You would have already done this at the beginning of these instructions. Click Install to begin the installation process. Once you ve started the installation, you ll see a progress bar like the one below. Once the installation is complete a Microsoft Security Essentials icon will appear on your desktop and you will be presented with a final installation window with the option to scan your computer for potential threats after getting the latest update. Leave the Scan my computer for potential threats after getting the latest update box checked and click Finish.

Next, you should see the main page of Microsoft Security Essentials, which is now running on your system. You ll note the red bar set towards the top of the window which states that your computer is at risk, this is normal and is only there because the definitions file is not yet up to date. Once it has finished downloading, your computer will be fully protected. To have Microsoft Security Essentials manually check for the most recent virus definitions, click on the Update tab, and then click on the Update button.

Configuring Microsoft Security Essentials Now that Microsoft Security Essentials is installed and your computer is protected, go into the software s configuration settings to customize Microsoft Security Essentials to suite your specific needs. Click on the Settings tab towards the top right hand side of the window. You will see eight options along the left hand side, each allowing you to modify different settings within the application. o Scheduled scan allows you to set a day and time that you want Microsoft Security Essentials to scan your computer automatically. You can also choose what type of scan, whether or not to check for and download new virus and spyware definitions, and if you want to start the scan when the computer is in use or not. Default actions allows you to set what you want Microsoft Security Essentials to do when it encounters a certain type of threat. From Low to Severe, you can choose between removing the thread, quarantining the threat, or leaving it up to what Microsoft has recommended.

Real time protection allows you to choose if you want Microsoft Security Essentials to check for threats whenever you run or install an application, monitor file and program activity, and scan downloaded files and attachments. Excluded files, locations, file types, and processes are essentially all very similar. You choose where you want Microsoft Security Essentials to stay out of. If you know a certain program or file always comes up as a false positive and are sure it is safe, you can add that file, location, file type, or process to the excluded sections so it will no longer come up in your scan results.

The advanced tab offers some beneficial options. o It can scan archive files such as ZIP and CAB files automatically. This is checked by default. o The next option is to scan removable drives. This can be a good or bad thing, it s a good thing because it protects your computer from possible infections brought in from other machines, however, if other people use your computer, they may not want their drive to be scanned, and may have exception files they do not want repaired. It is recommended to leave this setting unchecked. o The next option is to allow Microsoft Security Essentials to create a restore point. This is up to you, but can be helpful if there was a malicious virus removed that ended up leaving your system unstable and in need of a restore. o The final option allows you to choose whether or not all users can view the full history of results. This is completely by preference, generally, the more sensitive information is on your computer and the more public your computer is, the less you ll want to keep this item checked. Finally, you can choose to be either a Basic Microsoft SpyNet user, or an Advanced Microsoft SpyNet user. There isn t too much of a difference besides a small amount of extra information being sent to Microsoft for their research purposes, however, you ll note the end of the description stating that Microsoft will not use the information to identify you or contact you in any way. Because of this, either option would be a safe choice.

Congratulations! You have successfully prepared, set up, validated, installed, and configured Microsoft Security Essentials! Be sure to look into the Help menu on the top right hand side of the application if you need a bit of extra assistance. Performing A Scan On Your Computer If you suspect that your computer is infected, you can perform three types of scans on your computer. Start up Microsoft Security Essentials and click on the Home tab. Choose one of the following scan options: o Quick Scan A quick scan checks the places, processes in the memory, and registry files on your computer's hard disk that malicious software is most likely to infect. o Full Scan A full scan checks all files on your hard disk and all currently running programs, but it might cause your computer to run slowly until the scan is complete. At any time, if you suspect that spyware has infected your computer, run a full scan. o Custom Scan If you suspect malicious software has infected a specific area of your computer, you can customize a scan by selecting only the drives and folders that you want to check. Click o n the Scan Now button to begin the scanning process.