SecurityResources.Org
One-stop resource for all types of security needs from data to bioterrorism

 
   


   

SecurityResources.Org
One-stop resource for all types of security needs from data to bioterrorism

 
   


   

SecurityResources.Org
One-stop resource for all types of security needs from data to bioterrorism

 
   


   

SecurityResources.Org
One-stop resource for all types of security needs from data to bioterrorism

 
   


   

SecurityResources.Org
One-stop resource for all types of security needs from data to bioterrorism

 
   


 

Anti-Virus Guide

This page offers important tips and links to how-to articles, important tips, comparative product reviews, recommended products, more retail products and reviews, free software and services, and links to testing organizations.

Do you need help right now?

Important Tips

  • Just One, Not Two -- Never use two anti-virus products at the same time. Completely uninstall one before installing another. Use the vendor's uninstall utility or if not available, use the Windows XP add/remove software tool in the control panel.
  • Patches & Updates -- Anti-virus software is only as effective as its most recent update because it is inherently reactive treating "known" threats. So when you install anti-virus software, go to the vendor's web site and update the program and virus definitions immediately and then turn on the auto update feature (if it has one). If you want to be ready for the next big bad thing before your anti-virus signatures can be updated, consider Zero-Day Protection.
  • Get Online Protection Too -- Consider using an Internet service provider or email service that includes server side anti-virus and spam email filtering as a second layer of defense. If possible, use different anti-virus software on your home computer than your ISP or service uses on their servers.
  • Spyware & Trojan Horses -- Some anti-virus products work on spyware, Trojans and other malware. If yours does not or has limited effectiveness (read reviews and test results), get a separate product, see our Anti-Spyware and Anti-Trojan pages.
  • Prices -- See our custom Anti-Virus Price List powered by Amazon.com

Comparative Reviews

Recommended Retail Anti-Virus Software

More Retail Anti-Virus Software Choices

Free Anti-Virus Software, Tools and Online Services

 

 

from MS

 

Virus Protection Strategies

 

Get best practices, resources, tools, and technical information for installing, configuring, and maintaining antivirus protection.
Critical Update You Can Apply to Protect Against Download.Ject Critical Update You Can Apply to Protect Against Download.Ject
 

Download the configuration change that protects against a recently reported vulnerability that can allow an Internet Web site to execute script from the Local Machine Zone (LMZ).

In-depth Guidance for Securing Computer Systems In-depth Guidance for Securing Computer Systems
 

The new Microsoft Security Guidance Center provides quick access to prescriptive guidance, tools, training, and updates for IT professionals and developers.


Best Practices

• Protect Your Network: Keep Unmanaged Systems, including Virtual PCs, Up to Date
 
• Antivirus Defense-in-Depth Guide
 
• Best Practices for Mitigating RPC and DCOM Vulnerabilities
 
• Best Practices for Preventing DoS/Denial of Service Attacks
 
• Defining Malware: FAQ
 
• Distributed Denial-of-Service Attacks and You
 
• How ISA Server Can Be Configured to Stop the Code Red Worm
 
• Managing Mobile Code with Microsoft Technologies
 
• Noticing and Responding to Network-Borne Attacks
 
• Danger: Remote Access Trojans
 

Virus Information

• Information Regarding Recently Announced RPC/DCOM Security Update: MS03-039/KB 824146 (On-Demand Webcast)
 
• What Network Administrators Should Know About The Blaster Worm (On-Demand Webcast)
 
• Information About "E-mail Wiretapping" Privacy Issue
 
• Frequently Asked Questions Regarding Blaster
 
• Technical Information About SoBig Worm
 
• Technical Information About Nachi, Welchia, and BlasterD Worm
 
• Technical Information About "Blaster" Worm
 
• Microsoft Response to Publication of Slammer Code
 
• Technical Detail About "Slammer" Virus
 
• Information on "Nimda" Worm
 
• Information About the "Code Blue" worm
 
• Information About the "Code Red" worm
 
• Information About the "Code Red" IIS worm
 
• Information About the new "Code Red II" worm
 
• Important Information for IIS 4.0 Server Administrators Regarding the "Code Red" Worm
 
• "VBS/Loveletter" Virus
 
• Information about Virus-Infected Hotfixes
 
• Information on the “WScript/Kak.worm” Virus
 

Tools

• Outlook E-Mail Security Update
 
• Microsoft Baseline Security Analyzer
 
• Windows Software Update Services (SUS)
 
• IIS Lockdown Tool
 
• URLScan Security Tool Version 2.5
 
• More Tools
 

Antivirus Resources

• Security Newsgroups
 
• Self-Service Support Options: Overview
 

How-to Resources

• Use IPSec Monitor
 
• Provide Internet Access Through a Firewall by Using ISA
 
• Safely Connect Your Company to the Internet
 
• Perform Security Planning for Internet Information Services
 
• More Security How-to Topics
 

Additional Security Resources

• Security Guidance Center
 
• Books
 
• Checklists
 
• How-to Resources
 
• IT Pro Security Zone Community
 
• Newsgroups
 
• Partners
 
• Tips
 
• Register for the Microsoft Security Newsletter
 
• Register for Security Notification Service
 
 
 
 

Related Sites

• Developer Security
 
• Microsoft Press Books
 
• Search the Knowledge Base
 
• Security Training
 
 
 
 
 
Copyright © 2005 Benivia, LLC Email: email us at Feedback at securityresources dot org Last modified: 04/28/06

Copyright © 2005 Benivia, LLC Email: email us at Feedback at securityresources dot org Last modified: 04/28/06

Copyright © 2005-2015 Benivia, LLC Email: email us at Feedback at securityresources dot org Last modified: 01/06/15

Copyright © 2005-2015 Benivia, LLC Email: email us at Feedback at securityresources dot org Last modified: 01/06/15

Copyright © 2005-2015 Benivia, LLC Email: email us at Feedback at securityresources dot org Last modified: 01/06/15