Windows Defender is antispyware software that's included with Windows 10 and runs automatically when it's turned on is just as important as the SmartScreen in Win-10 .
The Windows 10 Defender alerts you when spyware attempts to install itself or to run on your computer. It also alerts you when programs attempt to change important Windows 10 settings.
The fastest way to start the Windows Defender in Windows-10 is via RUN command:
control.exe /name Microsoft.WindowsDefender. (... see Image-1 Arrow-1)
See also: Auto Update settings in Windows 10 || the Windows 10 Start Sound || enable guest account in Widows 10
When you use Windows Defender, it's important to have up-to-date definitions. Definitions are files that act like an ever-growing encyclopedia of potential software threats. Windows Defender uses definitions to alert you to potential risks if it determines that software detected is spyware or other potentially unwanted software. To help keep your definitions up to date, Windows Defender works with Windows Update to automatically install new definitions as they're released. You can also set Windows Defender to check online for updated definitions before scanning. For information about keeping your definitions up to date and how to manually download the latest definitions, see Keep Windows Defender definitions up to date.
Useful info from (c) Microsoft:
A virus is a program that replicates itself. It spreads by making copies of itself on a computer or by inserting computer code into program or operating system files. Viruses don't always damage files or computers, but they usually affect a computer's performance and stability. For a virus to infect a computer or to spread, you usually have to do something, such as open an infected e‑mail attachment.
A worm is computer code that spreads without user interaction. Most worms begin as e‑mail attachments that infect a computer when they're opened. The worm scans the infected computer for files, such as address books, or temporary webpages, that contain e‑mail addresses. The worm uses the addresses to send infected e‑mail, and often mimics (or spoofs) the "From" addresses in subsequent e‑mail messages so that those infected messages appear to be from someone you know. Worms then spread automatically through e‑mail, networks, or operating system vulnerabilities, often overwhelming those systems before the cause is known. Worms aren't always destructive to computers, but they usually cause computer and network performance and stability problems.
A Trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. It then puts code into the operating system, which enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves; they are spread by viruses, worms, or downloaded software.
FAQ 124: Updated on: October 4th 2015 21:32