Get a Pentest and security assessment of your IT network.

Cyber Security

Beyond Microsoft Security Scanner: System Cleanliness Tools

TL;DR

Microsoft Security Scanner is a good starting point, but it’s not enough for high confidence in a clean system. Combining it with other tools and techniques – including bootable scanners, memory scanning, rootkit hunters, and regular updates – significantly improves your security posture.

Improving System Cleanliness Beyond Microsoft Security Scanner

  1. Understand the Limitations of Microsoft Security Scanner:
    • It’s an on-demand scanner; it doesn’t provide continuous protection.
    • Its detection rates, while good, aren’t perfect and can be bypassed by sophisticated malware.
    • It primarily focuses on known threats.
  2. Run a Bootable Scanner: This is the single biggest improvement you can make.
    • Bootable scanners run outside of your operating system, making it harder for malware to hide.
    • Popular options include:
      • Kaspersky Rescue Disk: Free and effective. Download from Kaspersky.
      • Bitdefender Rescue CD: Another excellent free option. Download from Bitdefender.
    • Create a bootable USB drive using the provided tools on their websites.
    • Boot your computer from the USB and follow the scanner’s instructions.
  3. Use a Second-Opinion Scanner: Run another scanner *after* Microsoft Security Scanner and the bootable scanner.
    • This can catch anything missed by the first two scans.
    • Consider:
      • Malwarebytes Anti-Malware (Free): Excellent at detecting and removing a wide range of threats. Download from Malwarebytes. Run a full scan.
      • HitmanPro: Cloud-based scanner that uses multiple engines. (Paid, but offers a free trial). Download from HitmanPro.
  4. Scan Memory: Malware often hides in RAM.
    • Process Explorer (Sysinternals): While not a dedicated memory scanner, it can help identify suspicious processes. Download from Microsoft.
    • Look for processes with unusual names or locations. Right-click on a process and select ‘Properties’ to view details.
  5. Run a Rootkit Hunter: Rootkits are designed to hide malware deeply within the system.
    • TDSSKiller (Kaspersky): Specifically targets rootkits. Download from Kaspersky.
    • Run a full scan and remove any detected threats.
  6. Check System Files: Verify the integrity of critical system files.
    • Open Command Prompt as an administrator (search for ‘cmd’, right-click, ‘Run as administrator’).
    • Run sfc /scannow. This will scan and repair corrupted Windows system files.
      sfc /scannow
  7. Update Everything: Outdated software is a major security risk.
    • Windows Updates: Ensure you have the latest updates installed.
    • Drivers: Update your device drivers through Device Manager or from the manufacturer’s website.
    • Applications: Use built-in update features or download the latest versions from official sources.
  8. Review Startup Programs: Prevent malware from automatically launching when you start your computer.
    • Press Win + R, type msconfig and press Enter.
    • Go to the ‘Services’ tab and disable any suspicious services. Be careful not to disable essential system services!
    • Go to the ‘Startup’ tab (or Task Manager -> Startup apps in Windows 10/11) and disable unnecessary programs.

Important Note: Always back up your important data before performing any major system changes or running security scans. While these tools are generally safe, there’s always a risk of unintended consequences.

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation