Introduction
Windows Defender (WD) is a comprehensive security solution included in Windows that provides protection against malware, phishing, and other cyber security threats. Microsoft, the maker of Windows, regularly updates WD to provide new features and services to enhance its customers’ online safety and security.
Windows Defender is the first line of defense against malicious software, so it’s important to configure it to meet your needs. In this article, we will discuss how to configure Windows Defender to improve the security of your system, as well as how to configure it for special circumstances.
Configuring Windows Defender
The main way to configure Windows Defender is through the Windows Security application. To access this app, open the Start Menu, type “Windows Security” and select the app when it appears in the search results.
In the Windows Security app, there are a number of settings to configure Windows Defender. To adjust these settings, select the “Virus & threat protection” option.
Real-time Protection
Real-time protection scans your computer in real time, to detect any threats before they can do any harm. This setting should be on by default, but you can check by selecting the “Manage Settings” option under the “Virus & threat protection” list.
Make sure that real-time protection is turned on by sliding the switch to the “on” position. You can also adjust how often the scan runs and how long it takes to complete by using the corresponding settings.
Cloud-Delivered Protection
Cloud-delivered protection uses Microsoft’s cloud service to provide additional security by scanning for threats that your system may have missed. It is highly recommended that this setting be kept enabled, as it can help detect threats that may have otherwise gone unnoticed. To enable this setting, select the “Manage Settings” option under the “Virus & threat protection” list and make sure that the switch is set to the “on” position.
Exclusions
Exclusions are files or folders that you want to exempt from being scanned by Windows Defender. This is useful if you have a file or folder that contains legitimate software or data that WD might identify as a threat. To add an exclusion, select the “Exclusions” option in the “Virus & threat protection” list.
From here, you can add files, folders, file types, and processes to the exclusion list. Note that you should only add exclusions if you are certain that the file, folder, or process is safe.
Controlled Folder Access
Controlled Folder Access is a feature in Windows 10 that restricts which programs can modify certain folders. This can help protect important system and user data from malicious programs. To turn on Controlled Folder Access, select the “Manage Settings” option under the “Virus & threat protection” list and slide the switch to the “on” position.
You can also add specific folders to the protected list by selecting the “Protected Folders” option, and then adding the folder that you want to protect.
Device Performance and Health
Device Performance and Health is a feature in Windows 10 that provides recommendations on how to improve the performance and security of your device. You can view the recommendations by selecting the “Device performance & health” option in the Windows Security window.
Once you select this option, you will be presented with a list of recommendations, such as checking for updates, running a disk cleanup, and disabling unnecessary startup programs.
Scan Options
The scan options in Windows Defender let you specify the type of scan you want to perform and how often you want it to run. You can either choose a full scan, quick scan, or custom scan.
A full scan checks all files and folders on your computer, while a quick scan only checks the most commonly infected areas. A custom scan allows you to select specific folders and files to scan. You can also choose to have WD run a scan on a schedule or whenever a change is detected in the system.
Conclusion
Configuring Windows Defender is the best way to ensure that your system is secure and up-to-date. By utilizing the many options available, you can protect your system from malicious software, malware, and phishing attacks. This can help keep your system running smoothly and protect your data from being compromised.