Virus Scanner

Everyone knows them: antivirus programs. There are different ones: free, paid, manual scanners, real-time scanners, etc.
They are intended to protect us from viruses and the like. But what exactly does a virus scanner do and what does it protect the computer from?

Table of Contents

Protection against malware

An antivirus program can detect malicious software, quarantine or block it, and delete it from affected computers. What does malware include?

Virus Scanner

Some examples:

computer viruses Like real viruses, they need a host to infect. In this case, files are “infected” and the user then downloads this infected file.

worms However, they can also spread independently without a host.

Trojans are hidden in programs that the user can use, such as an add-on for the web browser. Trojans have the purpose of reloading further malicious programs.

This list could now be continued and divided into many more subcategories. However, these points have one thing in common: virus scanners recognize them based on the signature or heuristic features.

How virus scanners work

A virus scanner has a “scan engine”. This is essential and is used to detect suspicious programs and then, if necessary, quarantine them or even delete them directly. Just as a virus is constantly evolving, this scanning engine must also continually evolve.

Virus scanners work as follows: First, the scanner searches the database so that malware can be found using signature-based detection (similar to a fingerprint). An attempt is then made to identify the behavior of malware using heuristic detection.

You don't just want to examine individual computers?
We check your entire IT system with our penetration test.
For the penetration test

Advantages and disadvantages of virus scanners

Since modern Malware If you try to change your signature throughout, simple scanners may recognize it more slowly or not at all. Similar to a flu vaccination, these scanners can only help against viruses that are known in advance. Therefore, heuristic methodologies are more likely to detect more advanced malware. However, this also increases the rate of false alarms triggered.

Disadvantages: Frequent hitting leads to dullness of the user, and hitting lightly can also let too much through. A healthy balance is therefore important.

The differences between virus scanner providers are now only noticeable in the detection rate. The biggest difference actually only relates to the free or paid version. The rule of thumb is: If you get something for free, you pay with personal data and of course only receive a reduced amount.

Regular updating of the anti-virus scanner is essential so that the “signatures” database always remains up to date.

The more modern and paid versions have a sandbox function.

Sandbox solutions are recommended when opening external files if you cannot trust the source 100% in order to have a secure area so that you can run programs in advance and check for anything unusual.

Conclusion about the virus scanners

According to the motto “Small animals also make messes”, it makes sense to use a virus scanner. Nevertheless, it is not recommended to rely solely on your antivirus program, as it generally only detects known malware and less advanced malware. It also does not replace a functioning IT department, IDS/IPS solutions, or application firewalls, nor does it replace network segmentation or proper RBAC (roll-based account control management).

The human factor also plays a role here. Therefore, you should always treat supposedly known files and addressees with caution. The combination of proactive Uncovering your vulnerabilities, suitable endpoint protection as well user awareness, offers you comprehensive protection for your IT landscape.

Help implementing your malware protection measures?
Use our ITSC offer.
Contact us now
Newsletter Form

Become a Cyber ​​Security Insider

Get early access and exclusive content!


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!
OTHER CONTRIBUTIONS

Table of Contents

PSN_KU_Cover
NewsLetter Form Pop Up New

Become a Cyber ​​Security Insider

Subscribe to our knowledge base and get:

Early access to new blog posts
Exclusive content
Regular updates on industry trends and best practices


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!