Username: Save?
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[February 14, 2024, 02:00:39 PM]

[February 14, 2024, 02:00:39 PM]

[February 14, 2024, 02:00:39 PM]

[February 14, 2024, 02:00:39 PM]

[February 08, 2024, 10:26:18 AM]

[February 08, 2024, 10:26:18 AM]

[February 08, 2024, 10:26:18 AM]

[February 08, 2024, 10:26:18 AM]

[November 27, 2023, 06:32:12 PM]

[November 27, 2023, 06:32:12 PM]

[November 27, 2023, 06:32:12 PM]

[November 27, 2023, 06:32:12 PM]

[October 09, 2023, 04:25:01 PM]
Get Latest Tech Updates For Free!
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Ethical Hacking / Security / Viruses
 The Antivirus Defense-in-Depth Guide
Pages: [1]   Go Down
Author Topic: The Antivirus Defense-in-Depth Guide  (Read 3088 times)
Mark David
Super Elite Member

Karma: 185
Offline Offline

Posts: 1624

!!!Techno King!!!

View Profile WWW
The Antivirus Defense-in-Depth Guide
« Posted: June 09, 2007, 01:57:55 PM »

The Antivirus Defense-in-Depth Guide


View all security guidance topics
Server Security
Desktop Security
On This Page
   Guide Chapter Summary
   Give Us Your Feedback


Although many organizations have deployed antivirus software, malicious software such as computer viruses, worms, and Trojan horses continue to infect computer systems around the world. There is no single reason for this apparent contradiction, but the current situation indicates that the standard approach of deploying antivirus software on each computer in your environment may not be sufficient.

The Antivirus Defense-in-Depth Guide provides an easy to understand overview of different types of malware, or malicious software, including information about the risks they pose, malware characteristics, means of replication, and payloads. The guide details considerations for planning and implementing a comprehensive antivirus defense for your organization, and provides information on defense-in-depth planning and related tools that you can use to help reduce your risk of infection. The final chapter of the guide provides a comprehensive methodology to help you quickly and effectively respond to and recover from malware outbreaks or incidents.
Top of page
Guide Chapter Summary

The Antivirus Defense-in-Depth Guide consists of four chapters:
Chapter 1: Introduction

This chapter presents a brief introduction to the guidance, an overview of each chapter, and the intended audience of the guide.
Chapter 2: Malware Threats

This chapter defines the primary types of malware and specifies what types of programs are included — and excluded — in this category. It also provides information about malware characteristics, attack vectors, means of propagation and payloads.
Chapter 3: Antivirus Defense-in-Depth

This chapter details considerations for establishing a comprehensive antivirus defense for your clients, servers, and network infrastructure. It also discusses user policies and general security measures that Microsoft recommends considering when forming your overall security plan.
Chapter 4: Outbreak Control and Recovery

This chapter provides a step-by-step approach to resolving and recovering from malware attacks, based on industry best practices and internal operations at Microsoft.
Top of page
Give Us Your Feedback

We would appreciate any feedback you might have on this guidance. In particular, we would be grateful for any feedback on the following topics:

How useful was the information provided?

Were the step-by-step procedures accurate?

Were the chapters readable and interesting?

Overall, how would you rate the guidance?

Send your feedback to [email protected]. We look forward to hearing from you.


Pages: [1]   Go Up
Jump to:  

Copyright 2006-2023 All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.152 seconds with 23 queries.