windows security 101 - microsoft home page | devices and services

23
Windows Guides is a library of easy-to-use guides that show you how to get more from your Windows experience. Share the guides with your friends and family. WINDOWS ® GUIDE © 2008 Microsoft. All rights reserved. What You’ll Need IN THIS GUIDE Security 101 10 Things You Can Do to Protect Your Windows Vista PC Page 2 Protecting Your Home Network/ Wireless Network Page 16 What to Do if You Think You May Have Been Exposed to a Security Threat: OneCare Page 19 n Antivirus / antispyware program n A computer running Windows Vista ® n A connection to the Internet

Upload: others

Post on 12-Sep-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

Windows Guides is a library of easy-to-use guides that show you how to get more from your Windows experience. Share the guides with your friends and family.

WINDOWS ® GU IDE

© 2008 Microsoft. All rights reserved.

What You’ll Need

In ThIs GuIde

Security 101

10 Things You Can do to Protect Your Windows Vista PC Page 2

Protecting Your home network/ Wireless network Page 16

What to do if You Think You May have Been exposed to a security Threat: OneCare Page 19

n Antivirus / antispyware programn A computer running Windows Vista®

n A connection to the Internet

Page 2: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

2Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

If you surf the Internet, share your computer, or share files with others, there are some important steps you should take to protect your PC from harm. Why? Because there are computer criminals (sometimes called hackers or crackers) who attack other people’s computers. These criminals can attack directly, by breaking into your computer through the Internet, or indirectly, by creating malicious software (or malware) designed to harm your computer. Luckily Windows Vista and Windows Live™ OneCare™ have some simple, reliable solutions to keep your computer and personal information safe.

When it comes to safeguarding your computer, there are several proactive steps you can take, and the Windows Security Center and Windows Update make protection easy.

1. GeT seCurITY alerTs

Windows security Center is your headquarters for computer security. It shows your computer’s current security status and recommends additional steps for making your computer more secure. For example, if Windows detects that your computer needs enhanced security in a specific security area, a notification will appear every time you log on until the problem is fixed.

10 Things You Can Do to Protect Your Windows Vista PC

Figure 1—Security Center console

Page 3: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

3Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

1. Open Security Center by clicking the Windows logo, clicking Control Panel, clicking security, and then clicking security Center. Security Center checks your computer for these security essentials:

n Firewall. A firewall protects your computer by preventing hackers or malicious software from gaining access to it.

n automatic updating. Windows can routinely check for updates for your computer and install them automatically.

n Malware protection. Antivirus software can help protect your computer against viruses, worms, and other security threats. Antispyware software can help protect your computer from spyware and other potentially unwanted software.

n Other security settings. Security Center checks for proper Internet security settings and whether User Account Control is turned on.

If any of the security items have a red or yellow background, your computer might be vulnerable to security threats. To fix the problem, click an item to expand it, and then follow the instructions.

To turn off security notifications or hide the Security Center icon in the notification area, open Security Center, click Change the way Security Center alerts me, and then choose an option. Even if you turn off notifications, Security Center will

continue to check and display security status.

2. use VIrus PrOTeCTIOn

Viruses, worms, and Trojan horses are programs created by hackers that use the Internet to infect vulnerable computers. Viruses and worms can replicate themselves from computer to computer, while Trojan horses enter a computer by hiding inside an apparently legitimate program, such as a screen saver. These harmful programs can erase information from your hard disk or completely disable your computer. Others may not cause direct damage, but worsen your computer’s performance and stability.

Antivirus programs scan e-mail and other files on your computer for viruses, worms, and Trojan horses. If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files.

New viruses are identified every day, so it’s important to choose an antivirus program with automatic update capability. When the antivirus software is updated, it adds new viruses to its list of viruses to check for, helping to protect your computer from new attacks. Updates usually require an annual subscription fee. Keep the subscription current to receive regular updates.

Page 4: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

4Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

If you don’t use antivirus software, you expose your computer to damage from malicious software. You also run the risk of spreading viruses to other computers.

Windows does not have a built-in antivirus program, but your computer manufacturer might have installed one. Check your security Center to find out if your computer has antivirus protection. If not, you can go the Windows Marketplace at http://www.windowsmarketplace.com/showcase.aspx?ctid=3 to find antivirus programs.

Using antivirus software that Windows doesn’t find

Windows regularly checks to see if an antivirus program is installed on your computer, that it’s running, and that it’s up to date. The status of your antivirus program is displayed in Windows Security Center. However, Windows does not detect all antivirus programs, and some antivirus programs don’t report their status to Windows.

If you receive security-related notifications about your virus protection software, but know that you have up-to-date antivirus software installed, you can follow the steps below to stop receiving these notifications. You should only do this if you’re sure that you have a full, up-to-date antivirus program installed on your computer, and that real-time scanning is turned on.

To specify that you are using an antivirus program that Windows doesn’t find

1. Open Security Center by clicking the Windows logo, clicking Control Panel, clicking security, and then clicking security Center.

2. Click Malware protection, and then, under Virus protection, click show me my available options.

3. In the Windows security Center dialog box, click I have an antivirus program that I’ll monitor myself. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Security Center will display your antivirus settings as not monitored, and you will no longer receive notifications about your virus protection software.

The Show me my available options link is not listed as an available option if your Virus protection setting is marked On.

Page 5: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

5Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

3. KeeP WIndOWs uP-TO-daTe

Microsoft® regularly offers important updates to Windows that can help protect your computer against new viruses and other security threats. To ensure that you receive these updates as quickly as possible, turn on automatic updating. Updates are downloaded behind the scenes when you connect to the Internet. If you need to turn off your computer before the updates run, you can install updates before shutting down, or install them the next time you start your computer.

To set automatic updates

To turn on automatic updating

1. Open Windows Update by clicking the Windows logo, clicking all Programs, and then clicking Windows update.

2. Click Change settings.

3. Make sure Install updates automatically (recommended) is selected. Windows will install important updates for your computer as they become available. These updates provide significant benefits, such as improved security and reliability.

Figure 2—Change settings in Windows Update

10 Things You Can Do to Protect Your Windows Vista PC (continued)

Page 6: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

6Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

4. Under recommended updates, make sure the Include recommended updates when downloading, installing, or notifying me about updates check box is selected, and then click OK. Recommended updates can address non-critical problems and help enhance your computing experience.

If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

4. KeeP YOur FIreWall On

A firewall is software or hardware that checks information coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings. In this way, a firewall helps prevent hackers and malicious software from gaining access to your computer. Windows Firewall is built into Windows and is turned on automatically.

If you run a program such as an instant messaging program or a multiplayer network game that needs to receive information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the connection. If you choose to unblock the connection, Windows Firewall creates an exception so that the firewall won’t interrupt you when using that program.

Figure 3–Windows Firewall console

Page 7: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

7Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

5. use a sTandard user aCCOunT

When you log on to your computer, Windows grants you a certain level of rights and privileges depending on what kind of user account you have. There are three different types of user accounts: standard, administrator, and guest.

Although an administrator account provides complete control over a computer, using a standard account can help make your computer more secure. That way, if other people (or hackers) gain access to your computer while you are logged on, they can’t tamper with the computer’s security settings or change other user accounts.

To check user account status

To determine your account type

1. Open User Accounts by clicking the Windows logo, clicking Control Panel, clicking user accounts and Family safety (or clicking user accounts, if you are connected to a network domain), and then clicking user accounts.

The account type appears under your name.

Figure 4—User Accounts

Page 8: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

8Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

6. use sPYWare PrOTeCTIOn

Spyware is software that can display advertisements, collect information about you, or change settings on your computer, generally without your consent. For example, spyware can install unwanted toolbars, links, or favorites in your Web browser, change your default home page, or display pop-up ads.

Some spyware can be difficult to detect, but secretly collects sensitive information, such as which Web sites you visit or text that you type. Most spyware is installed through free software that you download, but in some cases simply visiting a Web site can result in a spyware infection.

To help protect your computer from spyware, use an antispyware program. Windows Vista has a built-in antispyware program called Windows defender, which is turned on by default. Windows Defender alerts you when spyware tries to install itself on your computer. It can also scan your computer for existing spyware and then remove it.

Because new spyware appears every day, Windows Defender must be regularly updated to detect and guard against the latest spyware threats. To help keep your definitions current, Windows Defender works with Windows Update to automatically install new definitions as they are released. You can also run Windows Defender manually.

Page 9: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

9Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

To scan the areas of your computer that spyware is most likely to infect (Quick scan)

1. Open Windows Defender by clicking on the Windows logo, clicking Control Panel, clicking security, and then clicking Windows defender.

2. Click scan. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

To scan all areas of your computer (Full scan)

1. Open Windows Defender by clicking on the Windows logo, clicking Control Panel, clicking security, and then clicking Windows defender.

2. Click the down arrow next to the scan button, and then click Full scan. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Figure 5—Windows Defender scan

Page 10: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

10Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

To scan specific areas of your computer only (Custom scan)

You can select specific locations on your computer for Windows Defender to scan. However, if potentially unwanted or malicious software is detected, Windows Defender will then run a quick scan so the detected items can be removed from other areas of your computer, if needed.

1. Open Windows Defender by clicking the Windows logo, clicking all Programs, and then clicking Windows defender.

2. Click the down arrow next to the scan button, and then click Custom scan.... If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Click scan selected drives and folders, and then click select....

4. Select the drives and folders that you want to scan, and then click OK. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

To choose advanced scanning options

When scanning your computer, you can choose from four additional options:

Scan the contents of archived files and folders for potential threats. Scanning these locations might increase the time required to complete a scan, but spyware and other potentially unwanted software can install themselves and attempt to “hide” in these locations.

use heuristics to detect potentially harmful or unwanted behavior by software that hasn’t been analyzed for risks. Windows Defender uses definition files to identify known threats, but it can also detect and alert you about potentially harmful or unwanted behavior by software that is not yet listed in a definition file.

Create a restore point before applying actions to detected items. Because you can set Windows Defender to automatically remove detected items, selecting this option allows you to restore system settings in case you want to use software that you didn’t intend to remove.

Do not scan these files or locations. Use this option to select any files and folders that you don’t want Windows Defender to scan.

1. Open Windows Defender by clicking the Windows logo, clicking all Programs, and then clicking Windows defender.

2. Click Tools, and then click Options.

Page 11: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

11Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

3. Under advanced options, select the check box next to each option that you want to use.

4. If you do not want Windows Defender to scan certain areas of your computer, under do not scan these files or locations, click add....

5. Browse to the files or folders that you do not want to scan, and then click OK. Repeat this step for each file or folder that you do not want to scan.

6. When you have finished selecting advanced options, click save. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

7. Be CareFul When usInG InTerneT and e-MaIl

use caution when opening e-mail attachments. E-mail attachments (files attached to e-mail messages) are a primary source of virus infection. Never open an attachment from someone you don’t know. If you know the sender but were not expecting an attachment, verify that the sender actually sent the attachment before you open it.

Be careful when clicking hyperlinks in e-mail messages. Hyperlinks (links that open Web sites when you click them) are often used as part of phishing and spyware scams, but they can also transmit viruses. Only click links in e-mail messages that you trust.

Only install add-ons from Web sites that you trust. Web browser add-ons, including ActiveX® controls, allow Web pages to display things like toolbars, stock tickers, video, and animation. However, add-ons can also install spyware or other malicious software. If a Web site asks you to install an add-on, make sure that you trust it before doing so.

8. use ParenTal COnTrOls

Use Parental Controls to set limits on the hours that children can use the computer, the types of games that they can play, the Web sites that they can visit, and the programs that they can run.

n Set specific time limits on your children’s computer use. You can set time limits to control when children are allowed to log on to the computer. Time limits prevent children from logging on during specified hours. You can set different logon hours for every day of the week. If they are logged on when their allotted time ends, they will be automatically logged off.

Page 12: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

12Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

n Prevent your children from playing games you don’t want them to play. Control access to games, choose an age rating level, choose the types of content you want to block, and decide whether you want to allow or block specific games.

n set limits for how your children use the Web. You can restrict the Web sites that children visit, check an age rating, indicate whether you want to allow file downloads, and set up which content you want the content filters to block and allow. You can also block or allow specific Web sites.

n Keep your children from running specific programs. Prevent children from running programs that you don’t want them to run.

Once you’ve set up Parental Controls, you can set up activity reports to keep a record of your child’s computer activity. Reachable through user accounts and Family safety > Parental Controls.

Figure 6—Parental Controls settings

Page 13: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

13Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

9. Guard YOur PersOnal InFOrMaTIOn

Guard your personal information carefully. If a Web site asks for a credit card number, bank information, or other personal information, make sure that you trust the Web site and verify that its transaction system is secure.

use the Phishing Filter in Internet explorer®. Phishing is the practice of creating fraudulent e-mail messages and Web sites in order to trick computer users into revealing personal or financial information. The fraudulent e-mail message or Web site appears to be from a trusted source, such as a bank, credit card company, or reputable online merchant.

The Phishing Filter helps detect phishing Web sites to protect you from scams. You can access the Phishing Filter and adjust settings by clicking the Tools button in your Internet Explorer menu bar, pointing to Phishing Filter, and then selecting one of the options.

10 Things You Can Do to Protect Your Windows Vista PC (continued)

Figure 7—Internet Explorer Phishing Filter

Page 14: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

14Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10. CreaTe sTrOnG PassWOrds

Using a strong password is among the most important steps you can take to protect your computer from hackers and other unwelcome users. If you are logged on as an administrator, you can create a password for any account.

Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. Make sure you have strong passwords for all accounts on your computer.

10 Things You Can Do to Protect Your Windows Vista PC (continued)

Page 15: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

15Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

10 Things You Can Do to Protect Your Windows Vista PC (continued)

Troubleshooting

There’s a lot to know about computer and online security, and it can be challenging to find answers. To learn more about common security issues, check these resources.

Online Privacy

Frequently asked questions about online privacy can be found here at Windows Help and How To: http://windowshelp.microsoft.com/Windows/en-us/help/53f6882f-335b-45e8-9578-ce9264ec665c1033.mspx

Spyware

Frequently asked questions about spyware can be found here at Windows Help and How To: http://windowshelp.microsoft.com/Windows/en-us/help/84d299ce-216c-4473-aa62-374c524550071033.mspx

Firewall

Frequently asked questions about firewalls can be found here at Windows Help and How To: http://windowshelp.microsoft.com/Windows/en-us/help/2140d623-08b5-4356-bb9a-4438a04296ce1033.mspx

More information

n Windows Help and How To—Web browsing and security—recommended links: http://windowshelp.microsoft.com/Windows/en-us/help/22ee7c6c-41ff-4311-bedc-0b29f4a0e6b81033.mspx

n Windows Help and How To—Tips for creating a strong password: http://windowshelp.microsoft.com/Windows/en-us/help/37565844-50dc-47e7-9260-a5a0e903db571033.mspx

n Windows Help and How To—Scanning for spyware: http://windowshelp.microsoft.com/Windows/en-us/help/85aba529-d717-49e9-ba01-cf892cdfff2e1033.mspx

n Antivirus Software—Get help for Norton and Symantec security products: http://www.symantec.com/support/

Page 16: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

16Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

A home network is great for connecting computers, sharing files and even sharing hardware. The right security can play an important role in protecting home networks; especially if your network is connected to the Internet. If you don’t secure your network, people might be able to access the information stored on your network computers. With a wireless network, it’s even more important because your network’s signal could go beyond the boundaries of your home, allowing people to access and use your Internet connection to get onto the Web.

General neTWOrK seCurITY GuIdelInes

Many of the security steps you’ve already learned apply to network safety as well, such as:

n Keep your computer up to date

n Use a firewall

n Run antivirus software on each computer

n Don’t stay logged on as an administrator

Another key to general network safety:

use a router to share an Internet connection. Consider using a router (also called a residential gateway device) to share an Internet connection. These devices usually have built-in firewalls and other features that can help keep your network better protected against hackers.

Protecting Your Home Network/Wireless Network

Page 17: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

17Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

Protecting Your Home Network/Wireless Network (continued)

WIreless neTWOrK seCurITY reCOMMendaTIOns

Use a network security key

If you have a wireless network, you should set up a network security key, which turns on encryption. With encryption, people can’t connect to your network without the security key. Also, any information that is sent across your network is encrypted so that only computers that have the key to decrypt the information can read it. This can help avert attempts to access your network and files without your permission. Common wireless network encryption methods are Wi-Fi Protected Access (WPA) and WPA2.

1. Open Network and Sharing Center by clicking the Windows logo, clicking Control Panel, clicking network and Internet, and then clicking network and sharing Center.

2. In the left pane, click set up a connection or network.

3. Click set up a wireless router or access point, and then click next.

Figure 8—Network and Sharing Center console

Page 18: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

18Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

Change the default administrator name and password on your router or access point

If you have a router or access point, you probably used a default name and password to set up the equipment. Most manufacturers use the same default name and password for all of their equipment, which someone could use to access your router or access point without you knowing it. To avoid that risk, change the default administrator user name and password for your router.

1. Check the information that came with your device for instructions about how to change the name and password.

Change the default SSID

Routers and access points use a wireless network name known as a service set identifier (SSID). Most manufacturers use the same SSID for all of their routers and access points. We recommend that you change the default SSID to keep your wireless network from overlapping with other wireless networks that might be using the default SSID. It makes it easier for you to identify which wireless network is yours, if there is more than one nearby, because the SSID is typically shown in the list of available networks.

1. Check the information that came with your device for instructions about how to change the default SSID.

Position your router or access point carefully

Wireless signals can transmit a few hundred feet, so the signal from your network could be broadcast outside of your home. You can help limit the area that your wireless signal reaches by positioning your router or access point close to the center of your home rather than near an outside wall or window.

More Information

n Windows Help and How to—Windows Security—Recommended Links: http://windowshelp. microsoft.com/Windows/en-us/help/d12ca5ea-b0af-438d-977e-7443c9a39c961033.mspx

n Microsoft Security Central: http://www.microsoft.com/security/default.mspx

Protecting Your Home Network/Wireless Network (continued)

Page 19: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

19Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

You can subscribe to Windows Live OneCare™, the always-on subscription PC-care service from Microsoft. OneCare helps you protect, maintain, and manage your computer, working quietly in the background to protect against viruses, spyware, hackers, and other unwanted intruders. If you have more than one computer, new features allow for multi-PC management to form a circle of protection, printer sharing support, and centralized backup of up to three PCs covered under the same OneCare subscription.

dOWnlOad

First, you need to get Windows Live OneCare. Go to the Windows Live OneCare Web site at http://onecare.live.com/standard/en-us/purchase/default.htm and then click download your 90-day free trial today. Once you’ve got Windows Live OneCare up and running, you can perform a full backup by following the below steps:

1. In Windows Live OneCare, click start a backup.

If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

2. Follow the instructions on your screen.

Figure 9—Windows Live One Care home page

What to Do If You Think You May Have Been Exposed to a Security Threat: OneCare

Page 20: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

20Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

When you start your first backup, Windows Live OneCare will give you the chance to specify whether you want to schedule an automatic backup. You can also choose to set how often you want the backup to happen—you can back up your files daily, weekly, every two weeks, or every four weeks.

If you’re using Windows Live OneCare’s Performance Plus features, you can have backups run along with your regular computer tune-up. Depending on whether you change your files often, you can select either daily backup or you can consider less frequent backups. At the very least, you should back your files up every 4 weeks.

WIndOWs lIVe OneCare FeaTures

Here is what’s new on Windows Live OneCare:

n Multi-PC and home network management

n Printer sharing support

n Start time optimizer

n Proactive fixes and recommendations

n WiFi Security

n Centralized backup

n Online photo backup

all-In-One PrOTeCTIOn and MaInTenanCe

Windows Live OneCare helps protect your computer, uses its optimization features to keep your PC running at its speediest, and even regularly backs up your important files:

n Protection Plus uses antivirus and antispyware scanners, a managed two-way firewall, and integrated anti-phishing technology to protect your computer from viruses, worms, Trojan horses, hackers, phishing, and other threats. It runs continuously, but you can scan individual files and folders for viruses on demand simply by right-clicking them. You can even scan attachments you receive via Windows Live Messenger or MSN® Messenger.

What to Do If You Think You May Have Been Exposed to a Security Threat: OneCare (continued)

Page 21: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

21Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

n Performance Plus regularly defragments your hard disk, removes any unnecessary files that may clog your computer, and helps ensure important security updates from Microsoft are installed efficiently and on time.

n Backup and restore regularly copies your important files and settings to CD, DVD, external hard disk, network drive, or other data-storage device.

n Instant help provides online help anytime you need it, 24 hours a day, 7 days a week.

Windows Live OneCare is always on, and constantly communicates the status of your PC’s health in the notification area of your Windows taskbar:

n A green icon means your status is Good. Protection Plus features like antivirus, antispyware, and anti-phishing are up to date, and your computer is not due for a tune-up or backup. Windows Live OneCare is running in the background, monitoring your system to prevent threats from viruses and spyware.

n A yellow icon means your status is Fair. Usually this means you have an action to take, such as sched-uling or running a tune-up or backup or downloading a noncritical update. A yellow icon means there is no immediate threat to your system, but you should take care of the action as soon as you can to return your system to green.

n A red icon means your computer is at risk. This can happen if, for example, Windows Live OneCare is unable to update antivirus with the latest virus definitions because of a lost Internet connection, or if the Windows Live OneCare Firewall is turned off.

What to Do If You Think You May Have Been Exposed to a Security Threat: OneCare (continued)

Page 22: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

22Learn more about how you can use Windows to simplify your life with Windows Guides

WINDOWS GU IDE Security 101

alWaYs On, auTOMaTed and uPdaTed

Continuously working against threats, Windows Live OneCare is always on, and works with Microsoft Update to help ensure your computer is up to date with the latest critical security releases from Microsoft. You can also use OneCare to simplify home network tasks such as printer sharing, and centralized backup, on up to three computers. Keep your PC safe, secure, and ‘green’ with Windows Live OneCare.

Windows Live OneCare provides automatic updates and service enhancements to subscribers the moment they’re released. All PCs (up to three) within the OneCare circle of protection are kept current under the same subscription, giving you the latest technologies to protect your home network against emerging threats without the hassle of tracking different antivirus software versions.

More Information:

n Windows Live OneCare: http://onecare.live.com/standard/en-us/default.htm

n Windows Vista Help & How to—Staying safer online: http://windowshelp.microsoft.com/Windows/en-us/help/7d12a6a7-4e55-4cc9-82c4-1e6ec777d12c1033.mspx

What to Do If You Think You May Have Been Exposed to a Security Threat: OneCare (continued)

Page 23: WINDOWS Security 101 - Microsoft Home Page | Devices and Services

© 2008 Microsoft. All rights reserved.

sITes MenTIOned In ThIs GuIde

Windows Live OneCare—Home: http://onecare.live.com/standard/en-us/default.htm

Microsoft Security Center—Home: http://www.microsoft.com/security/default.mspx

Windows Vista Help & How to: http://windowshelp.microsoft.com/Windows/en-us/default.mspx

Windows Marketplace—Security: http://www.windowsmarketplace.com/showcase.aspx?ctid=3

rel aTed GuIdes

Parental Controls

networking 101

using Windows Vista

Learn more about how you can use Windows to simplify your life with Windows Guides

To rate this guide, click here