Microsoft Rebuts Antivirus Test Failure

Page 2 of 4 FirstFirst 1234 LastLast

  1. Posts : 53,365
    Windows 10 Home x64
    Thread Starter
       #10

    Sure there will always be new attacks, but don't you think that an AV programs previous track record is important as well? If an AV program has always done poorly, surely it is important info? Just as if an AV program is historically good, then at least in the present, that is indicative of what you can expect? I use Windows 7, not Windows 8, so I have my current OS to protect

    A Guy
      My Computer


  2. Posts : 5,941
    Linux CENTOS 7 / various Windows OS'es and servers
       #11

    A Guy said:
    Sure there will always be new attacks, but don't you think that an AV programs previous track record is important as well? If an AV program has always done poorly, surely it is important info? Just as if an AV program is historically good, then at least in the present, that is indicative of what you can expect? I use Windows 7, not Windows 8, so I have my current OS to protect

    A Guy
    Hi there
    this is one of those cases where PAST TRACK record is 100% irrelevant -- the New threat could be something that's never happened before or so works in a totally different way to previous attacks that the AV code needs to be re-written from SCRATCH. The writer of the OS in this case MS has a much better chance of finding a fix than a 3rd party supplier who by the nature of the exercise has to delve into and "reverse engineer" all sorts of Windows functions to

    a) see exactly how the threat behaves.
    b) find an effective cure.
    c) develop and test the code.
    e) ship it out of the door.

    Until relatively recently Viruses and Malware worked on fairly well understood principles - even things like rootkits. I'm not saying they were easy to prevent but the base principles were mainly technical and therefore could have "Algorithmic" solutions -- so a few geeks in a backroom somewhere could devise AV software and sell it.

    These days attacks include things like "drive by infections" and all sorts of things we probably don't know about. User behaviour is also a necessary component in providing satisfactory protection -- and this requires a completely different set of skills to analyse than the pure "technical solution" which can be managed by the geeks in the AV company.

    A big company like Ms can analyse 1000's of "bog standard users" etc, and probably has decent behavorial scientists at its disposal so is able to devise some sort of heuristic method for predicting a users pattern and dynamically providing a way of preventing infection.

    For example I'm sure you'll agree that a user who downloads 100's of files a week from torrent sites needs a different type of protection than someone who might only use the internet twice a week and logon to somewhere like the BBC's site.

    That's basically my reasons for saying in the case of AV software the previous track record of companies isn't relevant in this scenario -- these types of attacks are relatively recent and whichever way you cut it there isn't enough reliable data to use as decent statistics.

    If you really want to get SOME type of AV protection effectiveness in "The REAL World" you would need to get say at least 1000 random teenagers preferably -- give them laptops to use for say two weeks with no Internet access restrictions and all fitted with different AV software and then see which laptops succumbed to any viruses/malware / spyware etc.

    Getting a few scientists in a lab checking what could be possible might be fine for testing say aircraft components but you need to test HUMANS in an environment where they are actually working naturally -- and they all do it differently.

    The reason I mentioned W8 in this thread (it IS relevant to W7) is that W8 security will protect things like Mobile phones --these DO need massive protection --there's almost NO security on these at the moment and as the vehicle being used for this is essentially MSE then it's good news for MSE users in W7 as they will get the updates too where possible.

    MSE is being developed in W8 to be as secure as is humanely possible so of course advantages will accrue in W7 too -- the point being is that unlike some AV suppliers working on a diminishing market -- W7 while excellent has probably now (apart from corporates) hit it's maximum HOME user base won't have the incentive or resources to keep working on security solutions for W7 when MSE is improving all the time and there isn't a future market for them in W8.

    If they really want to do something good then these AV suppliers could make money by developing security for ANDROID smart phones --there's enough of them around.

    I say also that W7 has probably hit its maximum user base for HOME users (NOT COMPANIES please note) as :

    a) a lot of people are buying things like tablets and other mobile devices which need better touch type screens so are using Android or the new W8 tablets.

    b) most new PC's (which although a large market is a falling one) pre-installed with W8.

    Some (like they did with VISTA ==> XP) will downgrade (if "downgrade" is what it is) to W7 but the vast majority will just stick with whatever is on the computer when they bought it.

    Even people on this very Forum probably at times don't use a PC nearly as much as they used to when just casually surfing the net, reading emails, using things like face book or playing music. Smart phones / tablets work fine for this -- I'm not a tablet lover but I find at times using a smart phone enough for what I need and there are days (excluding work) where I don't use a PC at all -- I can even send stuff (short --not posts like these though) to these Forums from a phone too

    Please note - nothing on this thread means that I prefer W8 to W7 -- I'm just stating observed and technical facts here.

    Cheers
    jimbo
    Last edited by jimbo45; 20 Jan 2013 at 06:49.
      My Computer


  3. Posts : 10,485
    W7 Pro SP1 64bit
       #12

    marsmimar said:
    I'm the first to admit I'm not the sharpest knife in the drawer. So if anyone can enlighten, please do. Also from the article:

    The test gives equal weight to three elements of security: protection (keeping new malware from infesting a clean system), repair (clearing out malware that's already present), and usability (doing the job without slowing the system or falsely accusing valid programs). Microsoft did OK in the repair and usability areas but got just 1.5 of 6 possible points for repair.
    And from a Techspot article that gave a bit more info about repair and avoiding false detections:

    Security Essentials did fare well in removing infections from critical system areas (12 percent higher than the industry average) and received a perfect score for avoiding false detections. The software also placed third for overall usability and performance.
    Microsoft Security Essentials fails AV-Test certification... again - TechSpot

    Here's my confusion. How can MSE score 12% higher than industry average for removing infections if it can't detect them in the first place? And get only 1.5 out of 6 points in the AV-Testing?
    Layback Bear said:
    There you go again marsmimar thinking. You do that a lot. It's a very good question.
    How does it remove a infection it can't find. Doesn't add up with my 3 brain cell either.

    Maybe:

    "protection (keeping new malware from infesting a clean system)"
    This is done with newly discovered infections.
    MSE does a poor job of this.

    "repair (clearing out malware that's already present)"
    This is done using relatively old infections.
    All infections used for this test must be known to all AV tools being tested. The testing labs write their own scripts for this testing. A pre-infection script scans to ensure that certain settings and files are as they should be. Then the OS is infected/scanned/cleaned by the AV tool. A post-infection script scans to determine if any settings or files were missed during the repair. According to that article, MSE excels at putting things right again for known infections.

    "usability (doing the job without slowing the system or falsely accusing valid programs)"
    Very few false positives - partly because MSE has weak heuristics and they are slow to add stuff to their lists. Of course, what I call weak and slow, others can call conservative.


    To those of you that have heard my rant about MSE before - sorry, but here it goes again:
    I still install MSE on most every computer that I help out with because MSE plays nice with other programs. Weeks or months later, some of those systems get infected (sigh). And I end up cleaning up several things that MSE did not flag. If I have the time, I submit those infections to VirusTotal. Usually, many other AV tools have already flagged the infection that I'm dealing with and MSE takes weeks to start flagging it.

    If I'm really curious/furious about the infection, I install MSE into a VM and infect that VM with the item that I've cleaned from another computer. This is how I came to the conclusion that MSE's heuristics are weak.

    And then there were my horrible experiences with tech support for MSE (many wasted hours on the phone, remote control sessions and no resolution). Almost a year went by before I found the issue/solution on my own thru posts like this one here. It may still be an issue for XP users... I've not tested lately.

    BTW, parts of MSE's code honored the environment variables and parts did not.
      My Computer


  4. Posts : 10,994
    Win 7 Pro 64-bit
       #13

    @UsernameIssues

    I appreciate your input.

    Since AV-Test uses a scale of 0 - 6, the average is 3, is it not?. If MSE did 12% better than the industry average in the repair category, wouldn't their repair score be higher than a 3 and not 1.5 as given?

    AMTSO (the Anti-Malware Testing Standards Organization) says, in part, "Members of AMTSO have published guidelines that, for the first time, set recognized standards for testing security software. The standards have been developed and agreed to by more than 40 security experts, product testers and members of the media from around the world."

    In your post you said, "All infections used for this test must be known to all AV tools being tested. The testing labs write their own scripts for this testing." Are you really suggesting that Symantec (for example) will write a script that will be detected by its competitors? Especially by a competitor that offers a less expensive AV product? Sorry, and no disrespect intended, but that doesn't make any sense to me at all. Or are you saying that AV-Test writes a script and shares it with all the other testing organizations?

    I think the bottom line when it comes to AV products is real simple: using something is better than using nothing at all.
      My Computer


  5. Posts : 5,941
    Linux CENTOS 7 / various Windows OS'es and servers
       #14

    Hi all
    Why on earth would you want to cleanse a computer AFTER it's been infected -- any AV worth the name should not allow the AV in the first place (Real time protection).

    I'm amazed that people seem to have trouble getting these basic facts through their craniums (crania ??)

    1) If an AFTER the event / batch report flags your computer as having got an infection - pray tell me how do you know EXACTLY WHEN it became infected and WHAT HAS IT DONE TO YOUR COMPUTER SINCE so as I said only Real time protection is any good.

    2) If as obviously people believe in the statistics that some of these AV companies and their pet journalists put out it is as true as day follows night that there isn't yet ANY such thing as a 100% secure AV program.

    3) That being so why on earth would you trust a Virus removal program 100% either - particularly on a computer that's been infected for an unknown period.

    As I said - if you are unfortunate enough to get a computer infected you can only be 100% sure that it has been properly cleansed by a total re-install of the OS or a clean image recovery -- I certainly wouldn't trust a computer that had merely been "cleansed" by one of these AV software cleansers.

    Things like MSE will detect in real time any threat (within it's capability) and show up an immediate warning notice -- at this point cleansing is fine since the infection has been trapped.

    OK people still like to run reports in case stuff has got through - but if you DO get infected then I still would only trust a complete OS re-install or a recovery from a clean image - whatever security system I had on the PC.

    Cheers
    jimbo
      My Computer

  6.    #15

    Thanks, Bill. I think you put my blindered forums-view into much better perspective with the outside world.

    I have a default reaction to those who repeatedly get infected by adding Malwarebytes real-time protection in addition to MSE which has stopped many from further infection. Do others regard this as a patch or satisfactory setup for average user? It is hard to explain why they need both because MB is not an A/V, when it's catching viruses.

    I notice that the recommendations for MSE and Avast which reigned for years here tapered off to only MSE after Avast added in some crapware which required uninstall in Win7 Control Panel - more trouble than needed when you also consider they bug you for registration which MSE doesn't. After repeat calls from my friend wanting to know why they were being reminded to pay for it, I finally washed my hands of trying to dodge it's crapware and grubbing.
    Last edited by gregrocker; 20 Jan 2013 at 19:56.
      My Computer


  7. Posts : 9,600
    Win 7 Ultimate 64 bit
       #16

    jimbo45 said:
    Hi all
    Why on earth would you want to cleanse a computer AFTER it's been infected -- any AV worth the name should not allow the AV in the first place (Real time protection)...
    Because new viruses can get through before the AV (any AV, not just MSE) gets the definition (remember, all AVs are playing catch-up at best). An ability to use a newly received definition to detect and remove a virus that "snuck" through before the definition was received is vital.

    While a fresh install of an OS is an effective way to deal with an infected OS, not all viruses lurk in the OS. They often hide in otherwise innocent files, often having attached themselves to existing files on the computer. When I first set up this machine, I had a couple of trojans sneak in while downloading M$ updates, which I immediately caught with MBAM when the updates were finished, that had hidden themselves in a couple of Word docs. I had to copy the data from the docs and paste them into new docs so I could delete the infected docs (the only practical way to get rid of the infection) without losing the data. The new docs tested clean. An OS reinstall would not have gotten rid of those trojans.
      My Computer


  8. Posts : 431
    Windows 7 Home Premium x64 SP1
       #17

    If MSE customers have to be infected BEFORE Microsoft adds a signature to prevent it, we better put a horse shoe and four-leaf clover in our pockets.
      My Computer


  9. Posts : 9,600
    Win 7 Ultimate 64 bit
       #18

    DBone said:
    If MSE customers have to be infected BEFORE Microsoft adds a signature to prevent it, we better put a horse shoe and four-leaf clover in our pockets.
    Sad to say, that is how all AVs work. They have to be aware of the virus before a definition can be written for it.

    You forgot the rabbit's foot, btw. Might as well have full protection.
      My Computer


  10. Posts : 10,485
    W7 Pro SP1 64bit
       #19

    marsmimar said:
    ~~~
    In your post you said, "All infections used for this test must be known to all AV tools being tested. The testing labs write their own scripts for this testing." Are you really suggesting that Symantec (for example) will write a script that will be detected by its competitors? Especially by a competitor that offers a less expensive AV product? Sorry, and no disrespect intended, but that doesn't make any sense to me at all. Or are you saying that AV-Test writes a script and shares it with all the other testing organizations?
    ~~~
    Ain't English grand?
    "All infections used for this test must be known to all AV tools being tested."
    Was meant to convey that the testing lab picks the infections for this test based on what the testing lab knows is detected by all products being tested. They would not share which infections are used for the test.

    My comments were made without reading any of the articles quoted in this thread or researching how AV-Tests claims to do things. My comments reflect more how I would do such a test. That said, here is what AV-Tests claims about this part of the test: AV-TEST - The Independent IT-Security Institute: Repair



    marsmimar said:
    @UsernameIssues

    I appreciate your input.

    Since AV-Test uses a scale of 0 - 6, the average is 3, is it not?. If MSE did 12% better than the industry average in the repair category, wouldn't their repair score be higher than a 3 and not 1.5 as given?
    ~~~
    "Since AV-Test uses a scale of 0 - 6, the average is 3, is it not?."
    Their 0 to 6 scale is just another way of restating 0 to 100 percent. What if the industry average was to repair 0.2% of the millions of things being checked? What if MSE repaired 12.2% of the millions of things being checked? MSE would* get a 1-ish or 12.2%... [*there are 3 parts to the repair test, AV-Tests assigns a number from 0 to 6 based on the results of all 3 parts. MSE did not do better than the industry norm in all 3 areas of the repair test.]

    Edit: I meant to include a comment that "repaired" is extremely subjective. We have all seen the comments about registry cleaners and how performance is not harmed by having certain registry entries to point to stuff that is not there. I suspect that MSE does not bother to clean stuff it knows does not matter.


    BTW, MSE scored 1.5 for Protection and 3 on the Repair part:
    Microsoft Rebuts Antivirus Test Failure-mse1.png

    The paragraph that you quoted from TechSpot had a screenshot of the Protection score right above it... maybe that is what threw you.

    The 12% better at repairing claim probably came from here:
    Microsoft Rebuts Antivirus Test Failure-mse2.png
      My Computer


 
Page 2 of 4 FirstFirst 1234 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:16.
Find Us