- Defender vs McAfee
- Replies (7)
- Миграция из McAfee — этап 3: на борту в Microsoft Defender для конечной точки Migrate from McAfee — Phase 3: Onboard to Microsoft Defender for Endpoint
- Подключение устройств к Microsoft Defender для конечной точки Onboard devices to Microsoft Defender for Endpoint
- Методы onboarding Onboarding methods
- Выполнить тест обнаружения Run a detection test
- Uninstall McAfee Uninstall McAfee
- Убедитесь, что Microsoft Defender для конечной точки находится в активном режиме Make sure Microsoft Defender for Endpoint is in active mode
Defender vs McAfee
When I bought my newest computer [Win 10], it came with McAfee installed and a recommendation to use it over any other.
It’s time to renew McAfee, if I choose to do so.
Internet searches respond with not-so-useful results.
Microsoft ways I don’t need any other malware/anti-virus than Defender.
[Is Microsoft Security Essentials the Same as Defender? I’m getting lost with the Microsoft options]
McAfee says it’s the best.
Malware Bytes is sure it’s the best option.
Norton comes free with my cable subscription.
Jimmy and Studs [on their computer advice site hosted at Godaddy so we know it’s good] says run Defender and Baidu Antivirus .
PC Magazine recommends the following as some cost-free options equal to purchased software:
I am but a stranger in a strange land. If one of the residents of this territory can offer a definitive recommendation, my bank account will thank you.
Was this discussion helpful?
Sorry this didn’t help.
Great! Thanks for your feedback.
How satisfied are you with this discussion?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this discussion?
Thanks for your feedback.
Replies (7)
Honestly, no antivirus is 100% effective. I’d choose one of the free options, Windows Defender or Norton (since you said your cable provider gives it to you). And of those two, I prefer Defender since it’s less of a resource hog, but it does have fewer features.
I would also use Malwarebytes’ free version as a second opinion. As I said, no antivirus is 100% effective. Install Malwarebytes Antimalware, but don’t activate the trial and disable the real time protection. Don’t have it load on startup. Run it to do an «on-demand» scan once every week or two — it’ll pick up what gets through Defender or Norton.
And no antivirus will take the place of being careful about what sites you visit and what downloads and email attachments you open. Treat any email attachment as suspect unless you were expecting it, even from someone you know.
45 people found this reply helpful
Was this reply helpful?
Sorry this didn’t help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Many OEM manufacturers provide trial versions of anti-virus programs preinstalled on computers as part of their software package. It is not uncommon for a computer manufacturer to partner or enter into an agreement with a well known anti-virus vendor (Norton, McAfee, etc) to include their product as part of a marketing strategy for generating revenue. Computer advertisements that say they include anti-virus protection is a selling point for many buyers. When the trial period expires, the user will have to either remove the software or purchase the full version in order to keep using the anti-virus software. Since most folks know very little about computer security and anti-virus software, many tend to keep whatever came with their system when they first purchased it. Thus, the anti-virus vendor recaps the cost of providing the trial version for free.
Although McAfee (now owned by Intel Security ) is as good as any other well known anti-virus program, it requires numerous services and running processes that consume a lot of system resources and often results in complaints of high CPU usage. Anti-virus software components insert themselves deep into the operating systems core install kernel mode drivers and resource heavy processes that load at boot-up. Installation also results in the creation of numerous files, folders, and registry entries in various locations making it more difficult to remove. Further, there have been numerous complaints about lack of sufficient support from the vendor.
Those issues plus the cost factor are the primary reason many folks look for an alternative anti-virus. IMO, McAfee is better utilized in an Enterprise system environment protecting many client computers. With that said, there are a lot of folks who prefer using this anti-virus solution (especially if it came preinstalled) and there is nothing wrong with staying with a product you are satisfied with and do not mind paying for.
Note: As a preinstalled product. this also means the anti-virus software most likely will be included on your factory recovery disks. If you ever reformat using the vendor’s recovery disks, the anti-virus will be reinstalled as part of the default software that came with your computer.
Миграция из McAfee — этап 3: на борту в Microsoft Defender для конечной точки Migrate from McAfee — Phase 3: Onboard to Microsoft Defender for Endpoint
Область применения: Applies to:
- Microsoft Defender для конечной точки Microsoft Defender for Endpoint
- Microsoft 365 Defender Microsoft 365 Defender
Этап 1. Подготовка Phase 1: Prepare | Этап 2. Настройка Phase 2: Set up | Этап 3. Подключение Phase 3: Onboard |
---|---|---|
Вы здесь!You are here! |
Подключение устройств к Microsoft Defender для конечной точки Onboard devices to Microsoft Defender for Endpoint
Перейдите в Центр безопасности защитника Майкрософт https://aka.ms/MDATPportal () и войдите. Go to the Microsoft Defender Security Center (https://aka.ms/MDATPportal) and sign in.
Выбор > onboarding управления > устройствами параметров. Choose Settings > Device management > Onboarding.
В списке Выберите операционную систему для запуска списка процессов бортового управления выберите операционную систему. In the Select operating system to start onboarding process list, select an operating system.
В методе Развертывания выберите параметр. Under Deployment method, select an option. Следуйте ссылкам и подсказкам на устройствах организации. Follow the links and prompts to onboard your organization’s devices. Нужна помощь? Need help? См. методы onboarding (в этой статье). See Onboarding methods (in this article).
Методы onboarding Onboarding methods
Методы развертывания различаются в зависимости от выбранной операционной системы. Deployment methods vary, depending on which operating system is selected. Обратитесь к ресурсам, перечисленным в таблице ниже, чтобы получить помощь в включении. Refer to the resources listed in the table below to get help with onboarding.
Операционная система Operating system | Метод Method |
---|---|
Windows 10 Windows 10 | — Групповой политики — Group Policy — Диспетчер конфигурации — Configuration Manager — Управление мобильными устройствами (Intune) — Mobile Device Management (Intune) — Локальный скрипт — Local script ПРИМЕЧАНИЕ. Локальный сценарий подходит для доказательства концепции, но не должен использоваться для развертывания производства. NOTE: A local script is suitable for a proof of concept but should not be used for production deployment. Для развертывания производства рекомендуется использовать групповую политику, Microsoft Endpoint Configuration Manager или Intune. For a production deployment, we recommend using Group Policy, Microsoft Endpoint Configuration Manager, or Intune. |
— Windows 8.1 Корпоративная — Windows 8.1 Enterprise — Windows 8.1 Pro — Windows 8.1 Pro — Windows 7 SP1 Enterprise — Windows 7 SP1 Enterprise — Windows 7 SP1 Pro — Windows 7 SP1 Pro | Агент мониторинга Майкрософт Microsoft Monitoring Agent ПРИМЕЧАНИЕ. Агент мониторинга Майкрософт теперь является агентом Аналитики журналов Azure. NOTE: Microsoft Monitoring Agent is now Azure Log Analytics agent. Дополнительные сведения см. в обзоре агента log Analytics. To learn more, see Log Analytics agent overview. |
— Windows Server 2019 и более поздний — Windows Server 2019 and later — Основное издание Windows Server 2019 — Windows Server 2019 core edition — Windows Server версии 1803 и более поздней версии — Windows Server version 1803 and later | — Локальный скрипт — Local script — Групповой политики — Group Policy — Диспетчер конфигурации — Configuration Manager — Диспетчер конфигурации центра системы — System Center Configuration Manager — Скрипты на борту VDI для нестандартных устройств — VDI onboarding scripts for non-persistent devices ПРИМЕЧАНИЕ. Локальный сценарий подходит для доказательства концепции, но не должен использоваться для развертывания производства. NOTE: A local script is suitable for a proof of concept but should not be used for production deployment. Для развертывания производства рекомендуется использовать групповую политику, Microsoft Endpoint Configuration Manager или Intune. For a production deployment, we recommend using Group Policy, Microsoft Endpoint Configuration Manager, or Intune. |
— Windows Server 2016 — Windows Server 2016 — Windows Server 2012 R2 — Windows Server 2012 R2 — Windows Server 2008 R2 SP1 — Windows Server 2008 R2 SP1 | — Центр безопасности Защитника Майкрософт — Microsoft Defender Security Center — Центр безопасности Azure — Azure Security Center |
macOS macOS — 10.15 (Каталина) — 10.15 (Catalina) — 10.14 (Mojave) — 10.14 (Mojave) — 10.13 (Высокая сьерра) — 10.13 (High Sierra) Linux: Linux: | Подключение устройствах, отличных от Windows Onboard non-Windows devices |
Выполнить тест обнаружения Run a detection test
Чтобы убедиться, что бортовые устройства подключены должным образом к Microsoft Defender для конечной точки, можно выполнить тест обнаружения. To verify that your onboarded devices are properly connected to Microsoft Defender for Endpoint, you can run a detection test.
Операционная система Operating system | Рекомендации Guidance |
---|---|
— Windows 10 — Windows 10 — Windows Server 2019 — Windows Server 2019 — Windows Server, версия 1803 — Windows Server, version 1803 — Windows Server 2016 — Windows Server 2016 — Windows Server 2012 R2 — Windows Server 2012 R2 | См. тест run a detection. See Run a detection test. Посетите сайт демонстрационных сценариев Microsoft Defender for Endpoint () и попробуйте один или https://demo.wd.microsoft.com несколько сценариев. Visit the Microsoft Defender for Endpoint demo scenarios site (https://demo.wd.microsoft.com) and try one or more of the scenarios. Например, попробуйте демонстрационный сценарий облачной защиты. For example, try the Cloud-delivered protection demo scenario. |
macOS macOS — 10.15 (Каталина) — 10.15 (Catalina) — 10.14 (Mojave) — 10.14 (Mojave) — 10.13 (Высокая сьерра) — 10.13 (High Sierra) | Скачайте и используйте приложение DIY по https://aka.ms/mdatpmacosdiy ссылке . Download and use the DIY app at https://aka.ms/mdatpmacosdiy. Дополнительные сведения см. в веб-сайте Microsoft Defender для конечной точки для Mac. For more information, see Microsoft Defender for Endpoint for Mac. |
Linux: Linux: — RHEL 7.2+ — RHEL 7.2+ — CentOS Linux 7.2+ — CentOS Linux 7.2+ — Ubuntu 16 LTS или более высокий LTS — Ubuntu 16 LTS, or higher LTS — SLES 12+ — SLES 12+ — Debian 9+ — Debian 9+ — Oracle Linux 7.2 — Oracle Linux 7.2 | 1. Выполнить следующую команду и искать результат 1: 1. Run the following command, and look for a result of 1: mdatp health —field real_time_protection_enabled . mdatp health —field real_time_protection_enabled . 2. Откройте окно терминала и запустите следующую команду: 2. Open a Terminal window, and run the following command: /Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt . curl -o 3. Запустите следующую команду, чтобы перечислить все обнаруженные угрозы: 3. Run the following command to list any detected threats: Дополнительные сведения см. в веб-сайте Microsoft Defender для конечной точки для Linux. For more information, see Microsoft Defender for Endpoint for Linux. |
Uninstall McAfee Uninstall McAfee
Теперь, когда устройства организации перенастроили в Microsoft Defender для конечной точки, следующим шагом будет удалить McAfee. Now that you have onboarded your organization’s devices to Microsoft Defender for Endpoint, your next step is to uninstall McAfee.
Чтобы получить помощь на этом шаге, перейдите к вашему McAfee ServicePortal ( http://mysupport.mcafee.com ). To get help with this step, go to your McAfee ServicePortal (http://mysupport.mcafee.com).
Убедитесь, что Microsoft Defender для конечной точки находится в активном режиме Make sure Microsoft Defender for Endpoint is in active mode
Теперь, когда у вас есть uninstalled McAfee, следующим шагом будет убедиться, что антивирус Microsoft Defender и обнаружение конечных точек и ответ включены и в активном режиме. Now that you have uninstalled McAfee, your next step is to make sure that Microsoft Defender Antivirus and endpoint detection and response are enabled and in active mode.
Для этого посетите веб-сайт демонстрационных сценариев Microsoft Defender for Endpoint https://demo.wd.microsoft.com (). To do this, visit the Microsoft Defender for Endpoint demo scenarios site (https://demo.wd.microsoft.com). Попробуйте один или несколько демонстрационных сценариев на этой странице, включая по крайней мере следующие: Try one or more of the demo scenarios on that page, including at least the following:
- Облачная защита Cloud-delivered protection
- Потенциально нежелательные приложения (PUA) Potentially Unwanted Applications (PUA)
- Защита сети (NP) Network Protection (NP)