- Sep 5, 2017
- 1,173
- Content source
- https://youtu.be/N4Vex7l8jv4
i donot know why but i have the same opinionEven if the result is 101%, for some reason I can not trust to Windows Defender. Sign of paranoidness .
Yes, block at first sight and thousands of FPs.
Thankfully it wasn't 861 pieces of malware, would have been utter doom if it was.Only 860 malware?
So, we can thank the author for trying, even
I can support the author a little - many authors do not understand how WD works and this is not only their fault (greetings to Microsoft).... if he still doesn't understand how WD works or how to test it! Thank you, Leo. And remember "Stay informed. Stay secure!"
Windows Defender is the default most widely used, so it's the first antivirus that hackers try to bypass when creating new threats.Even if the result is 101%, for some reason I can not trust to Windows Defender. Sign of paranoidness .
The option to Join Microsoft MAPS (2:35 in the video) is what enables the cloud-delivered protection component of Windows Defender.I miss the part why he disable cloud scanning in defender settings (managed by administrator)
I know but he doesn't say why it was first disabled by him and he doesn't go back after the changes so nobody see the actually status.The option to Join Microsoft MAPS (2:35 in the video) is what enables the cloud-delivered protection component of Windows Defender.
Source: Enable cloud-delivered protection - Under the section labeled 'Use Group Policy to enable cloud-delivered protection'
This is one reason why people are uncertain/uncomfortable about using Defender, despite it being pretty capable. You don’t always know what’s going on if you don’t know where to look, or have a Home version. And they don’t do a good job disseminating the information (just like a lot of other windows features).I can support the author a little - many authors do not understand how WD works and this is not only their fault (greetings to Microsoft).
Sure, OpenSource fix everything...like 20 years old security holes in LinuxThis is Microsoft's epic fail and it will never change. Go to the open source community and there is documentation and help everywhere.
This reasoning would make useless Universities, NASA, etc. But, even if such reasoning is faulty in my opinion, you are right that security forums cannot help most people directly. Anyway, the help can be delivered indirectly, when MT reader wants to manage the friend's computer. Furthermore, MT is one of the many forums, so it is not hard to find valuable information about computer problems....
The debates on forums like this about tests and protections is of very little practical use. They are of no help to the general public or end users who never come to places like this.
That is normal. You have to read many posts, and usually, there will be some posts that can expand your knowledge. Of course, security forums like MT or Wilderssecurity are not focused on learning their readers. People here also like to discuss, share information, etc.These debates only serve the agenda of those who want to insist that their point of view is the only correct point of view and those that need to validate their choices at the expense of others who have different views.
It seems that the most valuable information for home users about WD you can find on MT forum.This is Microsoft's epic fail and it will never change. Go to the open source community and there is documentation and help everywhere.
That's why I prefer the approach followed, while a bit differently, by Norton, Kaspersky, and Eset. They use cloud and show you how many people use a file and when it was first seen and whatsoeverIt depends on the file. For very new files with very low prevalence, WD has a harder time when it comes to FPs. For well known and medium to high prevalence files, WD has no issues. The latter is the category most people will experience, so in the vast majority of cases WD will do fine with FPs. Interestingly enough WD fid really well with FPs in the latest AV comparatives test. Usually it struggles due to detecting the very low to low prevalence files.