Solved

Optimal settings for our Vulnerabilities apps installed and should we include Windows Defender

Posted on 2016-10-13
3
120 Views
Last Modified: 2016-10-16
We have installed in our computer, a Windows 10 Pro OS, Spybot-Search & Destroy, Malwarebytes, Comodo Internet Security (which has Anti-Virus) and SUPERAntiSpyware.  Afer installing them, all are in memory at every startup.  We noticed that now the computer startup is bit slower, so started removing from memory both Malwarebytes and SUPERAntiSpyware leaving only Spybot & Comodo in memory on online protection.

2 questions:
  • What is EE opinion when multi  Vulnerabilities installed and is there recommendations on which to leave in memory?
  • Also we have Windows Defender in our Windows 10, but it is off.  What is EE opinion in also including in our apps of Vulnerabilities apps installed?
0
Comment
Question by:rayluvs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 500 total points
ID: 41842083
Only malwarebytes and one antivirus software will coexist nicely with each other. I would remove spybot and super antispyware. Komodo as far as I know is an AV tool, so that can stay, although I'd rather recommend Panda AV as AV tool.
0
 

Author Comment

by:rayluvs
ID: 41842085
As of Windows Defender?  What should we do?
0
 
LVL 88

Expert Comment

by:rindi
ID: 41842105
Windows defender disables itself when you install another AV product. It still receives Windows updates (signatures) even when disabled, so that's fine.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question