App Review Best Antivirus vs Windows Defender: What's the difference? (PC Security Channel)

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
PC Security Channel

bazang

Level 11
Jul 3, 2024
525
The detection of 40% to 60% of new malware used in the targeted attack on Enterprises is nothing new.
It is same range for new malware encountered by home users.

Some in government state that all AV is no better than 40% effective regardless of the attack types. The idea being that if one does enough large scale testing, eventually all results will converge on that 40% or lower value.

Given that I routinely deal with networks full of personnel-created holes that are under constant attack, my experience with AV is that they are ALL - every single brand and version - are unreliable. While some will catch attacks that others do not, in the end they are all far less effective than the AV lab test results lead people to believe.

The only effective solutions are system lockdown of all devices including network devices, user lockdown, and disabling of a lot of unneeded or rarely needed OS features. This is the golden rule of blue team operations whether it is Windows, Linux or some other OS.

Nobody is ever going to come up with anything more effective than this. And no, it does not make information systems unusable. They are usable but under tightly controlled policies, procedures and practices. This is how effective cybersecurity works. It is just that home users cannot handle it.
 

bazang

Level 11
Jul 3, 2024
525
Leo Mal X is much better then just dropping malware when maybe some will win based on intelligence of the common malware
So I hope he continues to develop it anyway you're totally correct and it's annoying that labs don't use enough apt tests and even when they do they are mediocre considering it's a research "lab" at least from what's available to the public


Anyway I really hope project zero will go back to doing research into sandboxes (emulation) ,the great research they did showing how the mini filters of avs can be easily waeponized by a talented researcher (worse of all they all run at trusted installer , system and they can be trigger to scan , emulate even by code inside html or scripts aka zero click )

Anyway really interesting what you personally use in the "civilian" life (not an endorsement or anything related to any agency , business rather personal preference)
Leo's presentation style reflects his disregard for what he thinks. He is no a video producer. He just wings it as he goes along.

I carefully listen to what he says and I read nothing into it. Watching Leo's videos, 90% of the people here at MT make assumptions or interpretations that Leo himself never states or utters.

That is the fundamental problem with digital communications and media.
 

bazang

Level 11
Jul 3, 2024
525
Not disputing you, but IIRC companies like AppGuard would advertise the gov't uses our software. Their ads sorta read like a gov't endorsement. :whistle: My wife was director of local federal gov't office about 15 years ago, but she (now retired) has no recollection of security software they used, although I do recall gov't flying in techs 2 techs to work on their computers, they seemed like serious people.
A software publisher can legitimately state that a government uses their software if that is indeed the case. At least in the EU and similar nations.

However, a government that does internal testing of the software is not ever going to publicly release the test results because poor test results will surely result in claims of poor testing by incompetent government personnel, if not also threats of lawsuits.

If the NSA had publicly released the results of the NSA's FinSpy testing against all the AVs about 10 years back, then all those AVs except Comodo and Emsisoft would have sued the U.S. NSA. But since it was Julian Assange and WikiLeaks that stole and released the infos, none of the AVs could do a thing about it.
 

bazang

Level 11
Jul 3, 2024
525
I'm reporting your right now, because you've made me emotionally and mentally upset. I don't know if I can handle the truth. Time for jisatsu. :LOL::LOL::LOL:
This brought on the hard chuckle.

Posting on forums or social media is like a box of chocolates. You never know what you're gonna get.

I truly, and honestly, am amazed that so many people get upset by things posted online. This is why professional trolls earn 100,000+ Euros per year. The troll is not the problem. The problem is the people who are so sensitive and offended over most anything.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,798
It is same range for new malware encountered by home users.

This is an interesting statement, but it is unsupported by available sources. One could suspect a global conspiracy to hide the truth.
We cannot discuss this on MT without some proof.
There is also a simple explanation that you might misinterpret the data. Some of the data you are referring to might be static detection or offline detection

Edit.
I assume that by detection we understand the detection with cloud backend support, code emulation, Machine (Deep) Learning, behavior-based detections, AMSI-based detections, post-launch (post-infection detections), etc.
 
Last edited:

bazang

Level 11
Jul 3, 2024
525
Edit.
I assume that by detection we understand the detection with cloud backend support, code emulation, Machine (Deep) Learning, behavior-based detections, AMSI-based detections, post-launch (post-infection detections), etc.
Yes. The detection range is consistent across versions of Microsoft Defender. Actually, you would think that the untweaked, limited feature home version would perform much worse. In reality it is only 5% to 10% less effective at the home user defaults and that is not always consistent.

I will state it this way. Governments know the capabilities of Microsoft Defender (and all other AVs) very well and they do not view them as much of a deterrent. Given that organized crime now has the same level of budgets as governments, what is true of the government is true of organized crime. One has to also consider that governments contract or have off-contract agreements with criminal organizations to further their geopolitical agendas. The benefits to the criminal enterprises is not limited to revenue. They also get access to government-only technologies.

When I have time I can make an image of the government testing workflows that I know of from first-hand experience.

I am not interested in praising or bashing Microsoft Defender (or any other AV). I am only interested in reality. My own personal testing with various lab setups and personally coded malware is that the "You are protected" marketing slogan cannot be trusted absolutely. Default-Allow protections will fail a person or organization when they are needed most. They all are just software with backends. Most users who focus on protecting localhost are very well served by Microsoft's built-in security. There is a lot of it to be had by the user. My greatest wish is that users would be inclined to learn about and use as much of it as they can.

The single greatest threats are users downloading and executing medium-aged to old malware and then clicking on links or navigating to high-risk websites. In most such cases, all the top brand AVs will protect the user sufficiently well. Some might let through PUA/PUPs while others will not. But overall, we could agree that the "You are protected" marketing slogan is mostly accurate for all the leading brand AVs for the average world citizen that is on latest patched Windows Home and they do the typical online content, media & file consumption - Microsoft Defender being among the leaders.

What I think is far, far more important than test results are the little gems of knowledge that you have discovered along your - what? - 8+ year journey with Defender and native Windows security? Your notebook is thick.

Edit: FYI Andy, the old ways are dying. Intimate knowledge of OS security internals is dying and dying fast. Organizations are moving to 100% cloud native all run by AI and maintained by a few hoomans. It is happening so fast that SANS Institute just dropped multiple certifications such as PowerShell security, Exploit mitigation, etc. It is all - and I mean the ENTIRE security stack - is being moved to the cloud and automated & run by AI. I am not sure people understand the significance of SANS Insitute dropping courses, but it is huge. There are unseen SEISMIC shifts happening in the digital workforce. Expect hundreds of thousands to be permanently laid-off or terminated from their current jobs within a few years. This is the reality of the AI security revolution. That NOC or SOC that once had 10 or more people at a larger enterprise now only has 3 or less - or more likely - has been off-loaded/subcontracted to a MSP or MSSP that manages security for 100 or more businesses.
 
Last edited:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,798
When I have time I can make an image of the government testing workflows that I know of from first-hand experience.

It would be interesting to see and analyze them. From my experience, the detection range 40%-60% is rather expected for 0-hour malware.
The high protection rate in the Real-World tests made by AV-Comparatives, AV-Test, and SE Labs follows from the fact that most of the tested samples are probably one or more days old. The delay is related to gathering and analyzing the samples.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,798
Here is an old but still interesting article from the signature/heuristics era:

Since the year 2010, both malware and AVs developed much, but the words of David Harley (AMTSO board member and director of malware intelligence for NOD32 maker ESET) about 0-hour malware may still be valid:
I’m not quarreling with the proposition that the industry misses a lot of malware. That’s incontrovertible, when every day we’re dealing with close to 100,000 new malware samples. In fact, that sort of level of detection that NSS is talking about — 50 to 60 percent right out of the gate — sounds realistic to me.
 

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,924
Here is an old but still interesting article from the signature/heuristics era:

Since the year 2010, both malware and AVs developed much, but the words of David Harley (AMTSO board member and director of malware intelligence for NOD32 maker ESET) about 0-hour malware may still be valid:
I wonder if Microsoft getting top results in a recent test done here in the forum is mainly due to better intelligence
Although some were blocked based on behavioral monitoring and not just signatures
 

Sandbox Breaker - DFIR

Level 12
Verified
Top Poster
Well-known
Jan 6, 2022
558
It is same range for new malware encountered by home users.

Some in government state that all AV is no better than 40% effective regardless of the attack types. The idea being that if one does enough large scale testing, eventually all results will converge on that 40% or lower value.

Given that I routinely deal with networks full of personnel-created holes that are under constant attack, my experience with AV is that they are ALL - every single brand and version - are unreliable. While some will catch attacks that others do not, in the end they are all far less effective than the AV lab test results lead people to believe.

The only effective solutions are system lockdown of all devices including network devices, user lockdown, and disabling of a lot of unneeded or rarely needed OS features. This is the golden rule of blue team operations whether it is Windows, Linux or some other OS.

Nobody is ever going to come up with anything more effective than this. And no, it does not make information systems unusable. They are usable but under tightly controlled policies, procedures and practices. This is how effective cybersecurity works. It is just that home users cannot handle it.
Amen
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,798
Machine learning and code emulation could significantly increase the detection of FUDs. For example:

1736455854945.png


The chart is from the year 2014. Currently most AVs can probably use code emulation for FUDs.
Unfortunately, the malware evolved to bypass code emulation so we still can see the cat-and-mouse game.
 

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,924
Machine learning and code emulation could significantly increase the detection of FUDs. For example:

View attachment 287054

The chart is from the year 2014. Currently most AVs can probably use code emulation for FUDs.
Unfortunately, the malware evolved to bypass code emulation so we still can see the cat-and-mouse game.
Now there is cloud emulation for different av software to increase it further but you it has its own limitation and there is no perfect solution in default allow so even with local , cloud emulation you can't stop everything
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,798
Interesting statistics:

(...)
4. 8.9% of free antivirus users were still affected by virus attacks in the past 12 months. A slightly lesser 7.4% of paid users suffered a similar fate in the same timeframe (2021-2022).
(...)
8. ESET blocked over 93% of targeted attacks in 2022. The antivirus software provider fended off 14 out of 15 targeted attacks to take the top spot.
It is closely followed by Bitdefender (13 of 15 attacks) and G Data/Kaspersky/Microsoft (12 out of 15 attacks).

The difference in protection between paid and free AVs was less than 2%.
In 2022, top AVs blocked more than 80% of targeted attacks.

Edit.
The difference between free and paid AVs includes also the events when the user is infected by ignoring the AV alerts. Furthermore, the difference is counted in relation to 8.9% of affected users.
 
Last edited:

Jonny Quest

Level 23
Verified
Top Poster
Well-known
Mar 2, 2023
1,237
Interesting statistics:



The difference in protection between paid and free AVs was less than 2%.
In 2022, top AVs blocked more than 80% of targeted attacks.

As you said, interesting article (statistics) indeed. And what I also liked, were the 18 references listed at the end of the article, that it just wasn't their research alone.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,798
Another one:

On a monthly basis, only 4% of Windows Defender users encounter a piece of malware.

(Microsoft)

The adoption rate of Windows 10 has helped the growth of Microsoft’s own antivirus program. The tech giant’s latest report shows that, on average, fewer and fewer users are encountering malware, including the infection attempts that Defender successfully blocks.

So, the average Defender user may expect 1 malware per 2 years. Assuming the 5% infection rate in the wild (10 times higher than in AV testing labs), the average user can be infected 1 time per 40 years. A happy-clicker can probably be infected a few times in a lifetime.

Edit.
Some information is outdated and can be misguiding, like the claim that AVs can detect only 25% of malware. In fact, this information is related to 0-hour malware in 2010 and was discussed in one of my previous posts.
 
Last edited:

Zero Knowledge

Level 20
Verified
Top Poster
Content Creator
Dec 2, 2016
908
Things have come a long way since XP days with no firewall and terrible security. Microsoft receives a lot of hate and they deserve it but implementing WD for free is one of their better decisions. Compare AV from 2001 to now and it's day and night how far protection has improved. AV was never meant to stop targeted attacks using zero day's, but it's getting better over the last 20 years and now campaigns last for hours not days or months (rare these days) before being uncovered.

The problem with WD is that once Microsoft has crushed all of the competition will they start charging for basic WD protection or new features. They have a history of abusing their power.
 

Abhishek Singha

Level 2
Verified
Jul 2, 2015
81
I will never understand how people can use Defender. Yes, as far as the protection goes, it is OK, but it is bad overall. But I guess it is like vegans vs meat eaters, you just love your stuff on principle.
From what I've seen, some people deliberately force themselves to praise defender just to hate on Norton & Mcafee.
In actuality Mcafee is 10 times better than Defender as well.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,798
From what I've seen, some people deliberately force themselves to praise defender just to hate on Norton & Mcafee.
In actuality Mcafee is 10 times better than Defender as well.
https://malwaretips.com/threads/the-best-home-av-protection-2021-2022.120387/

McAffee improves year by year. Last year it had better scorings than Defender.
However, current tests can measure mainly 1-day-old malware, and many malware nowadays are 0-day ones. The real difference between the AV protection comes from 0-day malware (which is not well tested).
Such AVs like Norton or Avast have the advantage of using file reputation (Download Insight) or cloud sandbox (CyberCapture). Such solutions are probably stronger against 0-day malware than code emulation in Microsoft Defender.
Microsoft Defender can compete with such solutions only with enabled SmartScreen.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top