Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Optimal settings for our Vulnerabilities apps installed and should we include Windows Defender

Posted on 2016-10-13
3
Medium Priority
?
143 Views
Last Modified: 2016-10-16
We have installed in our computer, a Windows 10 Pro OS, Spybot-Search & Destroy, Malwarebytes, Comodo Internet Security (which has Anti-Virus) and SUPERAntiSpyware.  Afer installing them, all are in memory at every startup.  We noticed that now the computer startup is bit slower, so started removing from memory both Malwarebytes and SUPERAntiSpyware leaving only Spybot & Comodo in memory on online protection.

2 questions:
  • What is EE opinion when multi  Vulnerabilities installed and is there recommendations on which to leave in memory?
  • Also we have Windows Defender in our Windows 10, but it is off.  What is EE opinion in also including in our apps of Vulnerabilities apps installed?
0
Comment
Question by:rayluvs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 2000 total points
ID: 41842083
Only malwarebytes and one antivirus software will coexist nicely with each other. I would remove spybot and super antispyware. Komodo as far as I know is an AV tool, so that can stay, although I'd rather recommend Panda AV as AV tool.
0
 

Author Comment

by:rayluvs
ID: 41842085
As of Windows Defender?  What should we do?
0
 
LVL 88

Expert Comment

by:rindi
ID: 41842105
Windows defender disables itself when you install another AV product. It still receives Windows updates (signatures) even when disabled, so that's fine.
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question