Automatic checking and updating of programs. Selective download of updates

Included in the product Avast Antivirus , discovered the possibility of a DoublePulsar attack or your PC’s vulnerability to it. This attack is used various threats, including the WannaCry ransomware. This means that your computer is using an outdated version of the service. public access to files and printers (SMB) of Windows OS, which contains a vulnerability designated EternalBlue. The vulnerability can be addressed by installing a security update MS17-010.

Installing security update MS17-010

To install security update MS17-010, follow the instructions for your version of Windows.

Before installing security update MS17-010, disconnect from the network and restart your PC. Trying to follow these troubleshooting steps without unplugging and rebooting your computer may prevent your PC from starting if the Double Pulsar exploit is already present on the system.

    • Windows 10 Update | Windows 10 Update version 1511 | Update for Windows 10, version 1607
  1. Click the appropriate link below to download the Microsoft security update and save it to your computer.
    • Update for Windows 8 32-bit | Update for Windows 8 64-bit | Update for Windows 8.1
  2. Click the link below to download the Microsoft security update and save it to your computer.
  3. Click the link below to download the Microsoft security update and save it to your computer.
  4. Please note: disconnect the PC from the network by disconnecting network cable and turning off Wi-Fi, and then restart your PC.
  5. After restarting your PC, run the installer that you saved on your computer when you ran step 1.
  6. Reboot your PC again to complete the installation.
  7. Connect your PC to the network.
  8. Open the Avast interface and launch the " Wi-Fi check» ( ProtectionWi-Fi Inspector Network Scan) to make sure your computer is free of the vulnerability.

If following these steps does not resolve the issue, try one of the alternatives below.

  • Windows Update (Start menu ▸ Settings ▸ Update & Security ▸ Check for updates
  • Restart your computer and then open Windows Update(Charms menu ▸ Settings ▸ Change PC settings ▸ Windows Update ▸ Check for updates). Install any available updates, then run a Wi-Fi Checker scan to ensure your PC is free of the vulnerability.
  • Restart your computer and then open Windows Update (Start menu ▸ Control Panel ▸ System and Security ▸ Windows Update ▸ Search for updates). Install any available updates, then run a Wi-Fi Checker scan to ensure your PC is free of the vulnerability.
  • Restart your computer and then open Windows Update(Start menu ▸ Control Panel ▸ Security ▸ System and Security ▸ Windows Update ▸ Check for updates). Install any available updates, then run a Wi-Fi Checker scan to ensure your PC is free of the vulnerability.
  • If you are unable to install the update, the only alternative way to get rid of this vulnerability is to disable the Internet Sharing service. Windows files, namely version 1 of the SMB protocol. To disable the SMBv1 protocol, use the Microsoft guide.
  • If you are unable to install the update, the only alternative workaround for this vulnerability is to disable the Windows file sharing service, namely version 1 of the SMB protocol. To disable the SMBv1 protocol, use the Microsoft guide.
    • Enable or disable SMBv1, SMBv2, and SMBv3 protocols in Windows and Windows Server
  • Microsoft Windows 10 Home/Pro/Enterprise/Education - 32 or 64 bit
  • Microsoft Windows 8.1/Pro/Enterprise - 32 or 64 bit
  • Microsoft Windows 8/Pro/Enterprise - 32 or 64 bit
  • Microsoft Windows 7 Home Basic / Home Premium/ Professional / Enterprise / Ultimate - SP 1, 32-bit or 64-bit
  • Microsoft Windows Vista Home Basic / Home Premium / Business / Enterprise / Ultimate - SP 2, 32-bit or 64-bit
  • Microsoft Windows XP Home/Professional/ Media Center Edition - SP 3, 32-bit

Fixing vulnerabilities is the responsibility of the developers, but you are responsible for installing patches. This material entirely dedicated to one of the most important topics safe work on Windows - timely updating operating system and the applications that are installed in it.

This is the second article in the “Windows Security Without Effort” series. In this article, we figured out where Microsoft recommendations are hidden, talked about the role of the “Yes” button in ensuring system security, and identified the advantages of licensed software. This material is entirely devoted to one of the most important topics of safe work in Windows - timely updating of the operating system and applications that are installed on it.

Update third party programs

And I always canceled “java” when they offered to update. I thought it wasn't necessary...
Owner of a stylish Sony laptop

The epigraph contains the words of my good friend, which she said when she discovered what you see in the picture below. Her laptop is equipped with the latest Microsoft operating system, protective settings which are quite standard. But only the presence of an antivirus saved her from infection caused by last year's vulnerability in the popular Sun Java platform - it is installed by millions of users. The program tried to update several times, but was not allowed to do so because... it was not clear why this was needed.

Figure 1 - Antivirus protected the Sun Java platform that had not been updated for a long time

Programs are updated from time to time, and this is not always related to security, but first of all it is for the sake of it that they need to be updated. The security of the Windows operating system can be compromised not only by its own vulnerabilities, but also by third-party programs, and it is no coincidence that I am starting with them. Attackers are increasingly attacking the systems of unsuspecting users through their browsers, but browser vulnerabilities are not always the reason for a successful attack. Often malware penetrate through holes in plugins and add-ons, such as players and third-party panels.

Microsoft provides some very interesting statistics in its latest security report (for the second half of 2009). According to the company, in the Windows Vista and Windows 7 operating systems, when attacked through the browser, 3/4 of the vulnerabilities occur in third-party programs (and the picture was spoiled by the vulnerability in Windows Vista, since in the first half of the year Microsoft accounted for only 15% of vulnerabilities) .

Figure 2 - Exploitation of vulnerabilities in browser-based attacks in Windows Vista and Windows 7 ( Microsoft data for the second half of 2009)

In the top ten most actively exploited vulnerabilities through the browser, three “holes” belong to Microsoft, and seven belong to third-party programs, but almost half of all attacks come from one flaw in Adobe Reader, which, in addition to it, placed two more vulnerabilities in the top ten. And the most remarkable thing is that there are four vulnerabilities in it from 2007, and one is actually from 2006. Of course, all of them have already been closed by the developers.

If Microsoft's data doesn't fill you with confidence, check out reports from other companies in the industry. information security. Thus, a Kaspersky Lab analyst in a report on information threats for the first quarter of 2010 also comes to the conclusion that users are in no hurry to update installed programs, despite the availability of fixes.

Figure 3 - An update for Adobe Flash Player is available, do not delay installing it

Programs that need to be updated promptly include:

  • Adobe Reader;
  • Adobe Flash Player;
  • Sun Java;
  • Apple QuickTime;
  • browser add-ons.

And, of course, you need to update the browsers themselves - they all have own capabilities updates except Internet Explorer, which is updated with using Windows Update.

Updating the Windows operating system and Microsoft programs

Those who do not think about distant difficulties will face near-term troubles.
Confucius

Updating the operating system is not only about installing patches and patches, but also about switching to new platform. Windows Vista and Windows 7 are better protected than Windows XP, which is confirmed by the numbers.

Switching to Windows 7

There are various arguments in favor of switching to a new operating system, but security is one of the most important. New versions of Windows take experience into account previous systems, so some attack possibilities are eliminated at the design level. Thus, they have drunk a lot of blood and are still drinking malicious programs that are transferred on a flash drive or memory card and, when connected, are secretly executed using the autorun.inf file, using the automatic start function in Windows.

It's finally disabled in Windows 7 automatic start from removable media, leaving only the option of automatic playback (AutoPlay), although in the Russian version of the operating system it is still called autorun.

Figure 4 - In Windows 7, when you connect a removable drive, you can select an action, but programs do not start automatically

Autorun in Windows 7 is preserved only for optical disks(CD/DVD) on which it is not economically profitable to distribute malware.

Microsoft calculates the infection rate of operating systems using the Malicious Software Removal Tool (MSRT), which is distributed through the Windows Update channel, taking into account the system's patch level and architecture.

Figure 5 - Number of computers cleaned by MSRT for every 1000 runs of the utility (Microsoft data, second half of 2009)

The way to understand these numbers is that MSRT detected and removed malware on 7 computers in 1000 runs on Windows XP SP3, while on Windows 7 RTM there were only 4.2 on average. But the architecture layout is also interesting.

If we compare the infection rate of 32-bit systems, in Windows XP SP3 it is twice as high as in Windows Vista SP2 and Windows 7 RTM. Also note that 64-bit systems are significantly less likely to become infected than 32-bit systems, and this can be attributed to better control over buffer overflow, as well as Kernel Patch Protection and DEP technologies. However, Microsoft analysts point to another factor - the higher level of technical literacy of people using 64-bit architecture. I assume that when desktop and mobile computers the lower price category will begin to be equipped with 4 GB of RAM, 64-bit systems will become widespread, and the gap between architectures in terms of infection rates will become less significant.

One way or another, to ensure maximum security for Windows OS with with minimal effort, you need to switch to the 64-bit version of Windows 7 and, of course, keep it up to date.

Installing updates using Windows Update and Microsoft Update

In Windows 7, Windows Update has improved in terms of usability and clarity, but its main purpose remains the same. It helps keep the system and drivers up to date ( Windows service Update) and Microsoft programs ( Microsoft service Update).

Purpose of updates

Windows updates and Microsoft programs can be divided into two categories.

  • Eliminate vulnerabilities and improve security. First and foremost, Windows Update helps keep Windows, Internet Explorer, and Microsoft Office. Vulnerability fixes in the center Windows updates are marked as important. Microsoft releases them to the general public on the second Tuesday of each month for the convenience of organizations, but they are often offered earlier through the Update Center. Along with fixing vulnerabilities, Microsoft is distributing other updates that improve system security. For example, using Windows Update they update their databases Microsoft antivirus Security Essentials and Windows Defender, and Microsoft Outlook gets new filters junk mail. Malicious Software Removal Tool (MSRT) is also distributed through Windows Update and has successfully removed the most common spyware and Trojans from the computers of millions of users.
  • Improved stability and performance. The Windows Update channel delivers more than just security updates to your computer. Many device manufacturers work with Microsoft to develop drivers, and once verified, they are made available through Windows Update. Typically, these drivers do not have the advanced features that are available in packages offered by hardware manufacturers on their websites. But the compatibility of drivers with Windows has been tested in Microsoft laboratories (32- and 64-bit versions are required), so the stability of operation is very high. On the other hand, Microsoft distributes updates to the operating system and Microsoft Office that improve application compatibility, fix bugs, and improve performance.

Microsoft's recommendation for updating your operating system and programs is to install all suggested updates automatically. It is this method of downloading and installing updates that Windows 7 offers by default.

Figure 6 - Standard settings for installing important and recommended updates in Windows 7

Please note that you do not need to configure anything to ensure the proper level of security, i.e. no effort is required on your part. Using the support center, the system will only notify you that updates have been installed.

Selective download of updates

However, it is not always necessary to install absolutely all updates, and it is also possible that you want to control the process of downloading and installing them. In this case, Windows Update offers two options:

  • trust the system to download, but make the installation decision yourself;
  • configure the process so that the system will only notify you about the availability of updates, and leave the download decision to you.

For example, if from Microsoft package Office only has Word, Excel, and PowerPoint installed; it is not necessary to download Outlook spam filter updates or OneNote patches. This tactic may be justified for users with narrow Internet channels or limited tariff plans. In this case, you can be selective about downloading patches by hiding the ones you don't need in Windows Update. However, please note that if you install a previously unused Office application, you need to immediately download hidden updates, because the system will no longer remind you of them.

Based on my experience, I note that this approach ultimately leads to delays in installing updates. After all, at the moment when the system notifies us of their presence, we are always busy with something else (and, perhaps, we will also have to reboot).

Figure 7 - Center Windows support 7 reminds you that it's time to install updates

I don’t want to be distracted by such a trifle, so the installation is postponed “for later.” But during this time, the system and applications are not provided with the necessary level of security, so you need to be a very disciplined person in order to install the updates reported by Windows on time. Not to mention monthly visits to the Microsoft website to extract links to necessary updates from security bulletins. Therefore, the easiest way is to install updates automatically, especially since it does not require any effort.

For more information, see Windows 7 Update on OSZone.net.

System restore points

No matter how you update Windows 7, the system always creates a restore point before installing patches.

Figure 8 - Restore points are created automatically every time updates are installed

This is good insurance in case something goes wrong, and normal Windows work will be broken. In the worst case scenarios, the system may stop booting, and bringing it back to life without a restore point will be very difficult. If system protection is enabled, you can always boot into the Windows RE recovery environment and roll back to the point created before the problem occurred.

If you have Windows XP installed along with Windows 7, restore points new system will disappear every time you load the old one. The only way to get around this is to make the Windows 7 partition inaccessible from Windows XP. This is done by adding one parameter to the registry or by encryption Windows partition 7 using BitLocker, and detailed instructions you will find in Microsoft Knowledge Base article KB926185.

Conclusion

Migrating to the new Microsoft client platform means working in a more secure environment. In Windows 7, the infection rate is significantly lower than in Windows XP SP3, and the 64-bit architecture implements additional protective measures. To protect yourself from modern threats, you need to keep Windows 7 up to date, and for this, the system provides a fully automatic update mechanism. But it is difficult to use in an unlicensed system, so additional efforts must be made to ensure the proper level of security.

Whichever operating room Microsoft system you have not used, vulnerabilities in third-party programs carry no less risk than flaws in Windows protection, so don't put off updating your apps and browser add-ons. If you don’t do this, you won’t get far from the home page on the Internet, because... You can become infected by viewing a document in PDF format or flash video.

Most threats to home systems come from the Internet, and the browser is the window into it. IN lately Internet Explorer's popularity has been steadily declining, partly due to the perception that it is unsafe to use. In the next article we will see if this is indeed the case.

All links in this article

  • Microsoft Security Report for the second half of 2009
  • (English)
  • Development of information threats in the first quarter of 2010 (Kaspersky Security Network)
  • Malicious Software Removal Tool (MSRT)
  • Kernel Patch Protection
  • Data Execution Protection (DEP) (on the Microsoft Security Research & Defense blog)
  • Articles about Windows 7 Update on OSZone.net
  • System protection and recovery in Windows 7
  • Using Windows RE Recovery Environment in Windows 7
  • KB926185 (translated by Bing)

1.9. Search for vulnerabilities. Installing updates

Through vulnerabilities in computer protection, many malicious objects are recorded on the computer. Typically, an object is written to hard drive, and if a flash drive is connected, then onto it in order to try to infect another computer to which the flash drive will be connected. Malicious objects have appeared that are not written to magnetic media, but end up in the computer’s RAM, from which they scan magnetic media for the purpose of stealing confidential information. After turning off or rebooting, the RAM is cleared, but by that time the Trojan will have already done its job and will no longer be needed by the fraudster.

After another vulnerability is discovered, the program developer creates an update and offers it to program users for updating. Updates are additions to the software installed on your computer that are designed to prevent or correct detected problems and improve the performance of your computer. It is especially important to pay attention to the phrase: “Installed software,” since updates to uninstalled software are not needed. If you are installing any software, the first thing you need to do is check for updates for this software. In most programs, the View and Help menu sections offer commands for searching for updates. Some programs search for updates after downloading these programs. If the Internet is connected, it searches for updates. In addition, programs search for updates on a schedule. This schedule is usually created by the program developer, but the user can make changes to it or start searching for updates manually. For example, it is quite obvious that the search for updates for antivirus programs should be performed as often as possible, at least once an hour (if the Internet is connected).

Until updates are installed, your computer may be vulnerable. Many programs start searching for updates when connected to the Internet, but some programs need to be updated manually, since although they automatically search for updates, they schedule them to do so at long intervals.

The vulnerabilities also include some dangerous operations, for example, automatic launch of programs from disks, failure to scan disks with an antivirus program, disabling protective tools such as a firewall, proactive screen, etc.

In order to notify the user about existing vulnerabilities, special tools. There is some time between discovering a vulnerability and creating and receiving an update to fix that vulnerability. Therefore, the user can simply uninstall or disable the vulnerable program without waiting for an update.

The Kaspersky Crystal 12 antivirus program (like previous versions of this program) offers to scan your computer to detect vulnerabilities. In the example (Fig. 30), 1 vulnerability was found that does not need to be fixed, which is shown in black: gray Fixed vulnerabilities are shown (since the Show fixed vulnerabilities option is enabled). Please note the corrected vulnerability “Autorun from removable media is enabled”: this means that malware, if it suddenly ends up on removable media, for example, flash drives or portable hard drives with a USB connection, will not be able to start automatically and will not be able to infect the active OS, which means they will not be able to harm the operating system, programs and data on the desktop hard drive of the computer. This is a serious vulnerability, which in previous versions of the OS (before Windows 7) allowed malware or malware (in the terminology of E. Kaspersky) to infect other magnetic media and cause serious harm to users.

For each vulnerability, the severity level of this vulnerability and recommendations for fixing each vulnerability are shown, if a fix solution has already been found. For example, autorun from removable media is dangerous because a significant number of dangerous objects try to enter the computer from them, so this vulnerability must be fixed. To fix a vulnerability, you need to select it and click on the button To correct.

On the tab Vulnerable programs known vulnerable programs are listed and ways to solve them are suggested, for example, downloading an update or installing a new version of the program.


Rice. 30. Detected vulnerabilities

There are also other programs for searching for vulnerabilities, such as PC Security Test.

Microsoft scans for updates by default for everyone software products this company, that is, not only for Windows OS, but also for Microsoft Office, Microsoft SQL Server of all versions and modifications, tools for antivirus protection Microsoft Security Essentials (in previous versions of Windows), Windows Defender and Windows Smart Screen antivirus protection tools (for Windows 10 and Windows RT), etc., regardless of whether it is a commercial program or a free one.

Many developers take a different route to install updates: they do not apply “patches” to already installed programs, but offer to download and install the full next version of the program. When installing the next version, the previous version is first automatically uninstalled and only then is it also automatically installed new version this program. For example, this is how it is updated popular program to create e-books almost all formats caliber - E-book management. Windows OS cannot go this route fundamentally, since it is an environment in which other programs operate and therefore it can only use the update method. Other Microsoft programs use the update method because installation distribution Most programs are too large to be downloaded continuously.

If the user does not want to wait for a scheduled update search from Microsoft, he can start the update search manually. To search for updates, you must be connected to the Internet. To do this, run next steps: Run Start → Settings → Update & Security. In the window that opens Updates and Security go to the tab Update Center Windows. Click on the button Checking for updates.

By default, updates are received in automatic mode. But if the user does not have time to install updates, then he can disable automatic update and search for updates manually. For example, the author goes online early in the morning to check mail and receive reports on the operation of sites; there is no time to update large packages, since he needs to go to work. Therefore, the author installs updates either on weekends or in the evening after classes. In this case it makes sense to disable automatic receipt updates or defer the update offer until the next session.

Updates are installed in strict order one after another. Some updates require you to restart your computer for the updates to take effect. If, when searching for updates, other updates were found, but they were not installed, this means that such updates cannot be installed along with others. To install these updates, restart your computer and scan for updates again. If after searching for updates many updates are found (more than 1), then remember the total number of updates found, and when installing them, compare the number of updates found with those installed. If the number of updates found is greater than the installed ones, this means that the updates cannot be installed in one session: after installing the updates, you usually need to restart the computer and only then continue installing the remaining updates. Typically, updates are installed in 1-2 sessions. But there are some updates that require a reboot after each batch of updates. The maximum sessions that the author encountered were 3, that is, 2 computer reboots were required.

The Microsoft Update program is available to search for and install updates. For added protection, we offer an automatic way to receive information about new updates and new free Microsoft software products that can enhance your computer and Internet experience. To do this in the window Windows Update click on the link Additional options. In the window that opens Additional options on the list Choose how to install updates by default option offered Automatic (recommended). This means that the search for updates can be performed automatically, although the user can manually search for updates. If updates are found, an update flag appears in the system tray. If the user notices this checkbox and in the window Windows Update presses the button Install updates, then the installation of updates will begin immediately. If the user does not notice the update flag, the download and installation of updates will begin automatically without user intervention after a certain time (approximately 1-2 minutes). After the installation of updates is completed, the update checkbox disappears from the system tray, and after a certain time, a message about installed updates pops up in the system tray area asking you to view installed updates. If the user decides to view installed updates, the message will be closed. If the user decides not to view updates, the message will be automatically closed after a specified time, or can be closed by the user himself if it bothers him. Because we're talking about about free software, this is the best way to receive updates from Microsoft. Click on the button OK to close the window Additional options.

Updates will be downloaded and installed only if the computer is connected to the Internet and the modem is compatible with Windows 10. The operating system analyzes the latest update search period and compares it with current date. If the user has not accessed the Internet for a long time, then there were no updates during this period either. The user will be warned about this: receiving updates for Windows 10 is the most important task and therefore a red slashing hazard cross appears on the notification icon on the taskbar. When you click on this icon, all available on this computer problems, but important ones, are displayed above all.

To view installed updates, open Control Panel. Download the component Programs and components. Follow the link View installed updates. After this, a window opens with all the updates installed on this computer (Fig. 31). The list of updates includes not only updates from Microsoft, but also from other companies, for example, from Adobe for Adobe Reader XI, which is installed on many computers for reading PDF documents. Another way to search for installed updates: in the window Windows Update Center click on the link Link View update history opens the window of the same name. Many people mistakenly consider these two windows (and View update history) show the same thing. In fact, this is not entirely true: the window shows all updates for all programs, that is, not only from Microsoft, but also from other software developers, for example, Adobe. In the window Viewing the update history shows updates from the corporation Microsoft.

After installing some updates, which usually happens when incorrect installation, a system or program failure may occur. In this case advanced user may remove an add-on that it believes is causing crashes. To do this you need to open the list installed add-ons, highlight the update that needs to be removed and click on the button Delete or click on the link Uninstalling a program. Confirm the removal of the update. Removing updates can adversely affect the protection of your computer and the entire system. You can then reinstall the removed update by running a search for updates.

If you can't uninstall an update, it may be because your computer is connected to a network that manages updates group policy. You cannot remove operating system security updates. If the problem is caused by an update that cannot be removed, you should contact system administrator, and if it is not there (for example, when home use), then to the group technical support Microsoft Corporation.

Reading the experience of mastering Windows 10 on the Internet, you can pay attention to some features when updating:

1) update processing reaches a certain value and stops. Many users get nervous asking other users what to do when doing this. You don’t need to do anything; updates are installed despite processing freezes. Often, stopping update processing simply means you need to restart your computer.

2) error messages are displayed when updating. Remember or copy the error number, search the Internet for what you need to do to resolve this update error. The first line, as a rule, displays a link to the Microsoft website, where you can read the procedure for resolving the error. Often on the Microsoft website it is suggested to run a special file to find and fix the error. If the error cannot be resolved immediately, Microsoft will usually continue to work on fixing the error.

To resolve update errors, open Control Panel. Run the component Troubleshooting. Run the command Troubleshooting using Windows Update. If verification is required on behalf of the administrator, then agree. Very often, the update error appears due to the BITS service, which is responsible for downloading files in the background. If this is the case, troubleshooting will automatically stop and restart the service. Access it: Control PanelAdministrationServicesBackground Intelligent Transfer Service.

Analyzing the questions and answers from the troubleshooting service when Microsoft update, you can pay attention to the error when checking the activation key. Since upgrading from previous versions of Windows to 10 was performed for all users, including pirated versions, then this error usually occurs with a counterfeit version of Windows, and the user may not know about it.

Before installing updates from Microsoft, a restore point is created. If, after installing the update, force majeure circumstances arise, you can return to this point without deleting the installed updates and continue working further.

In addition to the concept of "Version" of Windows OS, there is also the concept of "Edition". For example, in previous versions of the OS, editions were “Home Edition”, “Home Advanced” (“Personal Edition”), “Professional” (“Professional”) or “Maximum” (“Ultimate”). In Windows 10, the number of editions has been significantly reduced compared to previous versions. So far, only three editions officially exist: Windows 10 (analogous to Windows Home Premium from previous versions), Windows 10 Pro (analogous to Windows Professional) and Windows 10 Corporate (Windows Enterprise). Each publication provides users with certain opportunities. For example, software programs from TITBIT, a developer of many programs for the tourism business, cannot be used in the “Home” or “Personal Edition” editions, but only in professional versions programs.

Therefore, if the user purchased an OS edition that does not meet necessary requirements to work with some programs, then he can, without buying a new edition, simply update the existing one. To do this, open Control Panel. Select component System. Select a team Change product key. Confirm the change. After this, the updater will offer other editions of this OS version. Select a payment method, indicate the email to which the update key will be sent after payment. At electronically payment update key arrives within a few minutes. With a bank payment method, the process will take several days (usually 3 to 5 days). After receiving the update key, the OS edition update process will continue automatically after entering the key in the same window.

A comparison of the capabilities of various editions of Windows 10 is shown in the table (Table 4).

Table 4. Windows 10 editions

Windows 10 Professional

Windows 10 Enterprise

Compatible with existing Windows applications

Availability

Retail sales and OEM licenses

Sales at retail and under OEM licenses, reduced price when upgrading from previous Windows. It is possible to purchase a key through the Microsoft online store using the operating system itself

Sold under corporate licenses only

Pre-installation on devices

BitLocker and BitLocker To Go

Exchange ActiveSync

Only 64-bit with SLAT

Microsoft Edge

Storage Spaces

Windows Defender

Windows Media Center

Purchased and activated separately

Windows Media Player

Windows To Go

Xbox Live (includes Xbox Live Arcade)

Architecture

IA-32 (32-bit) or x86-64 (64-bit)

IA-32 (32-bit) or x86-64 (64-bit)

RemoteFX virtualization capability

Ability to connect to a virtual private network

Graphic password

Group Policy

Standby mode with network connection

File history

Windows Application Store (Windows Store)

Updated Windows Explorer

Mounting (mounting) ISO and VHD images

Microsoft Office pre-installed

Joining a Windows Domain

Deploying Metro Applications

Advanced Task Manager

OS reset and update

Touch keyboard

Desktop environment

Partially

Standard Applications

Start Screen, Semantic Zoom, Live Tiles

Remote Desktop

client only

client and host

client and host

client only

Improved multi-monitor support

Microsoft account

Mobile broadband features

Windows Update

Device encryption

Encrypted file system

Electronic announcers

Language packs

how to find vulnerabilities on a computer in Kaspersky Internet Security

Search for vulnerabilities on your computer
in Kaspersky Internet Security

One of the computer checks in Kaspersky
Internet Security is a search for vulnerabilities.

How to do this check and what to do if
vulnerability detection is the topic of this page.

All topics on this page

How to scan for vulnerabilities in Kaspersky Internet Security

How to conduct a Vulnerability Search
in Kaspersky Internet Security

The search for vulnerabilities on a computer should start from the general
"Scan" tabs in Kaspersky Internet Security

To start searching for vulnerabilities on your computer, you need to click on the button
with a green triangle in the “Search for Vulnerabilities” section. The program has not yet estimated the time required to search for vulnerabilities - the entered time says “unknown”

Having estimated the time it needs, the program sets
time remaining until the end of the vulnerability scan.

The total time spent searching for vulnerabilities depends on the load on your computer. But in general it’s ±10 minutes. To monitor the process, you can open the “Task Manager”, in the upper right part of the open “Check” window.

(Click on the picture to enlarge)

Detected vulnerabilities on your computer

Detected vulnerabilities on your computer

About found vulnerabilities in the system - program
reports upon completion of the check.


To look at the vulnerabilities found (if any are found on your computer), click on the “Detected vulnerabilities” button. Will open new tab"Search for vulnerabilities in the system and third party programs».

(Click on the picture to enlarge)

This tab has two sections “System vulnerabilities”
(which is open in the screenshot) and “Vulnerable programs”.

Detected computer system vulnerabilities

Detected “System Vulnerabilities” of the computer

All vulnerabilities in this section are divided into “Optional for patching” (marked with a blue circle on the left) and “Recommended for patching” (marked with yellow circle left). There are probably also marks with a red circle on the left - I have not encountered this. But I think that these vulnerabilities can be dealt with using the same methods as the yellow ones.

Using the example of vulnerabilities with blue circles- I will explain to you what needs to be done to correct it. Left-click on the vulnerability that needs to be fixed.

(Click on the picture to enlarge)

As you can see, of the three system vulnerabilities found by Kaspersky
on mine
computer - I chose only the one that I considered necessary to correct.
This is "clear home page" in Internet Explorer.

So, you see in the screenshot in the highlighted area two buttons -
"Fix" and "Details". If you click the “Details” button, your browser will open, with open page The Kaspersky Lab website, where they will explain to you in detail why this vulnerability needs to be fixed. In the case of “Optional correction”, this will also be written.

And if you click on the “Fix” button, Kaspersky will fix it
vulnerability and will remove the corrected one from the list of vulnerabilities.

(Click on the picture to enlarge)

Detected Vulnerable programs on the computer

Detected “Vulnerable Programs” on the computer

To view the vulnerable programs found, click on the “Vulnerable programs” tab in open window“Search for vulnerabilities in the system and third-party programs” and you will see these programs.

(Click on the picture to enlarge)

As you can see in my screenshot in the “Vulnerable Programs” tab, after checking, there are two vulnerable programs. Below each, it is written, “Recommended for correction.” Click on any of the vulnerabilities and two buttons will appear under it - “Details” and “Add to exceptions...”.

No fix for the vulnerability in the program, no removal - Kaspersky
doesn't offer. You must do this yourself. And you have to decide for yourself -
whether you want to “Add to Exceptions” the vulnerable program. Especially,
that the triangle on the left is colored yellow (as in the screenshot). And this
a fairly high level of threat to the computer. And maybe red
color, which is even worse.

To get started, click on the “Details” button - the support site will open in your browser. Where the degree of threat of the found vulnerability and solution options will be described. In my case, the solution options included updating the program and there were links where I needed to download this program.

Before you download new program(or application), instead
previous one - you must first delete the old one. Which is what I did.

If you don’t know how to remove programs, I’ll tell you.

Click the “Start” button → on the right side of the tab, select “Control Panel” → find “ Home page» section “Programs” “Uninstall a program”. Click on “Uninstall a program” and in the window that opens, find the vulnerable program. Select it by left-clicking once, and then either right-click and select “Delete”, or click the “Delete” button on the panel that appears after selecting the program. And the removal process began.

After removal, return to the support site and download a replacement for the removed program using the links. If, of course, you need this program and if this program is involved in the operation of the computer or applications..

You can add a program to the exceptions from the “Vulnerable Programs” tab, if on the website that opens, after clicking on the “Details” button, you see that the threat type is 0 (zero). To do this, click the “Add to exceptions...” button. The Exception Rule tab will open.

(Click on the picture to enlarge)

All you have to do is click “OK” in this tab. And this program will no longer appear in the “Vulnerable Programs” tab.

"Secunia Personal Software Inspector"- checking and updating software installed on your computer, free solution computer security, identification of vulnerabilities in non-Microsoft programs, as well as a free smartphone security solution, identifying vulnerabilities in non-Android (third-party) programs that could leave your phone open to attack. Secunia PSI- one of the best security programs, automatic check availability of updates for the software installed on your computer, as well as for greatest protection PC from possible vulnerabilities.
Secunia PSI is a free computer security solution that identifies vulnerabilities in applications on a personal PC. The program regularly scans and automatically updates vulnerable software to safe version.
Vulnerable programs can leave your computer open to attack.
Secunia PSI scans the software on your system and determines which programs need security updates to protect your computer from intruders. Then installs secure software on the computer with necessary updates security. Using the Secunia PSI scanner is an addition to antivirus programs, and given that it is free, it is of great use for a home computer.
Keep your computer safe.
The Secunia PSI program provides extensive information about the software installed on your computer, allows you to have the latest, most current versions of the programs you use on your PC, automatically updates the installed software, provides direct links to updates for old programs, helps eliminate problems in the vulnerabilities of software products, increases the level of security. Finding missing updates, vulnerabilities and improving security has never been easier or more accurate.
Secunia PSI is a free and reliable security tool for your PC against program vulnerabilities.
Secunia is a well-known Danish research company specializing in computer and network security, which has a high reputation in the field of IT security. Its services allow you to analyze programs for vulnerabilities, as well as exploits for them. Secunia's services are used by both software developers and large users. The Secunia website contains the results of test analysis of such developments as Microsoft GDI+, Microsoft Word, Microsoft Windows OLE automation, Samba, Adobe Flash ....
Therefore, the wide popularity and reputation of Secunia allows us to assert the high quality of the services offered. On the website "secunia.com" you will find the following suggestions for checking the programs installed on your PC:
  1. Secunia PSI - free program for private, home users to check for updates to programs installed on the computer and search for vulnerabilities in installed applications.
  2. Secunia VIM and CSI (Vulnerability Management, Security Patching) - free trial, paid versions.
Secunia Personal Software Inspector (Secunia PSI) is a free program that automatically scans and locates old and vulnerable programs, monitors potential problems, and eliminates potential security risks.
Software such as anti-viruses, firewalls, spuware (anti-virus, firewall, anti-spyware) and other good computer protection measures still cannot fully protect against threats that penetrate through vulnerabilities in software installed on a PC. products.
    The Secunia PSI program is an effective solution to these problems. Brief description:
  • scans the system for Windows based, searches for those applications that do not have the necessary patches or are outdated;
  • analyzes programs for vulnerabilities and exploits for them;
  • allows you to verify the safety of all existing software products, informs the user about the need to update the software to a new, safe version, monitors the installation of new programs and the deployment of updates;
  • provides detailed information about relevant updates detailed information regarding existing vulnerabilities and the lack of critical Windows updates about the location where applications are installed;
  • gives all the links necessary to install updates and the ability to have them on your computer current version programs;
  • supports Microsoft Windows 8, 7, Vista SP 1 or later, XP - SP 3, 32 and 64 bit;
  • has special functionality;
  • works automatically and in the background, has a simple interface;
  • The program is free, multilingual, and has a Russian interface.
    Personal Software Inspector for Android (PSI):
  • PSI Secunia for Android - scan your smartphone for weaknesses that make it open to hackers;
  • How does this work?
    Secunia PSI for Android scans third party applications, loaded, for example, from Google Play, as well as other external sources.
According to the developers themselves, potentially dangerous applications are found on 98% of personal computers, and 12 such programs are known on every average PC. Many of these products are not malicious in nature, but due to the presence of "bugs" in program code make the system vulnerable to hacker attacks, the spread of viruses, Trojans and other dangerous programs. And exploits based on application vulnerabilities are becoming more common.
Therefore, for a user who wants to maintain the security of his system, Secunia PSI is a must-have.
The program automatically checks for updates for programs installed on the computer once a week (an Internet connection is required). Finds vulnerabilities in installed applications. Allows users to install the necessary patches on their systems in a timely manner. If a vulnerability is detected in the security system of one of the applications under study, Secunia PSI will try to solve the problem independently by finding, downloading and installing the latest patch.
Secunia PSI scans the computer, more precisely, the executable EXE files located on it, as well as OCX and DLL libraries, and then compares the received data with own base signatures on the Internet. According to the creators of Secunia PSI, it does not collect any unnecessary information - only what is added by the developer himself and is intended for all users.
In the upper right corner of the program, modes are switched between standard (Simple) and advanced (Advanced). Simple markup displays basic information about the status of programs, a list of errors, and a graph showing the security level. If you click on the name of the error, the program will access the Easy-to-Patch tool, which will automatically update the application. There are more details on the Advanced mode tab. The utility checks Microsoft XML, Adobe Flash and other applications for spaces and updates them if necessary. Depending on the current state, programs are marked as Patched, End-of-life and Insecure, with an indication of the detected errors in the right column. There are buttons on the End-of-Life tab quick access to Installing and removing programs; folders where applications and links are located.
If during the scanning process Secunia PSI finds programs known to it with outdated versions, it will add them to the Insecure list, and those releases that are completely outdated will appear on the End-of-Life page. You can update both of them directly from the window of this utility by clicking on the button next to its name in the Direct section. For some programs you can also additional information obtain by clicking on it and then on the Solution Wizard icon. If necessary, use online help about a particular application (Online References).
The effectiveness of the program has already been appreciated by millions of users. A copy of the product with an interface in Russian can be downloaded from the developer’s website.
For personal use the program is free.

Chapter: necessary programs for PC / software update
Developer: Secunia ApS, website: secunia.com
Operating system: (32 and 64 bit): Microsoft Windows 8.1, 8, 7, Vista SP 1 (or later), XP SP-3
Interface: in 8 languages ​​Danish, English, French, Spanish, German, Norwegian, Dutch, Arabic
Status: free program