Solved

Optimal settings for our Vulnerabilities apps installed and should we include Windows Defender

Posted on 2016-10-13
3
38 Views
Last Modified: 2016-10-16
We have installed in our computer, a Windows 10 Pro OS, Spybot-Search & Destroy, Malwarebytes, Comodo Internet Security (which has Anti-Virus) and SUPERAntiSpyware.  Afer installing them, all are in memory at every startup.  We noticed that now the computer startup is bit slower, so started removing from memory both Malwarebytes and SUPERAntiSpyware leaving only Spybot & Comodo in memory on online protection.

2 questions:
  • What is EE opinion when multi  Vulnerabilities installed and is there recommendations on which to leave in memory?
  • Also we have Windows Defender in our Windows 10, but it is off.  What is EE opinion in also including in our apps of Vulnerabilities apps installed?
0
Comment
Question by:rayluvs
  • 2
3 Comments
 
LVL 87

Accepted Solution

by:
rindi earned 500 total points
ID: 41842083
Only malwarebytes and one antivirus software will coexist nicely with each other. I would remove spybot and super antispyware. Komodo as far as I know is an AV tool, so that can stay, although I'd rather recommend Panda AV as AV tool.
0
 

Author Comment

by:rayluvs
ID: 41842085
As of Windows Defender?  What should we do?
0
 
LVL 87

Expert Comment

by:rindi
ID: 41842105
Windows defender disables itself when you install another AV product. It still receives Windows updates (signatures) even when disabled, so that's fine.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
ACAS / Nessus 2 83
4 Android flaws that leave 900M devices at Risk 7 66
Yet another Ransome ware 13 149
antivirus on mac 8 65
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now