OK, I'll bite.. even though you have "disqualified" me from yourself. I'm only trying to help here. If there is an error in my logic I will gladly apologize and adjust my views on the subject. I am for finding facts, and that's all.
I hardly think that my previous post with in-depth research and links debunking your previous claims warrants such a rude response(and offers no rebuttal I might add). Look, I'm willing to accept MSE if/when it ever evolves into a viable security option. I am not loyal to ANY AV programs... as you seem to be loyal to MSE. Fine. So be it.
You said in your one of your previous posts:
Me shakes me head when I see AV-Comparatives mid-read...or mis-understood.
I think you should apply the head shaking to yourself, and not be so hasty. Proof in point below...
I'll remain of the angle that the Dynamics test method is more relevant. Lets look at the percentage of infected computers coming across our service benches at the shop, shall we? Mostly rogues/fake alerts...that come in via browsing and web players. This is the primary goal of the dynamics test...it is the reason AV-C came up with this test a couple of years ago. And MSE was tested back then when it came out, and will be added again.
OK, you go ahead and remain at that angle even though AV-Comparatives makes no such claim, and quite to the contrary of your view. Fine. Who is mis-reading/misunderstanding again?
MSE was tested back "then" which happens to be 2009!!!! The reason MSE was included was because it was able to throw up a "Are you sure you want to..." dialogue box in IE... but who cares about that now? Most attack vectors don't throw that flag up anyway, and if it does it is left to the USER to decide to run or cancel. There is no guiding info on these dialogues to make an educated decision as to what to do either. No thanks.
The reason MSE hasn't been included again for the past 3 tests(present) is because most of the other AV's provide URL blocking, web filtering, behavior blocking, instant messaging filters, etc. and MSE still does not, therefor it DOES NOT MEET the minimum requirements for the test.
In AV-Test.org’s 2010 Real-World Test of MSE could not achieve the minimum score to obtain certification, while vendors with alternative free antivirus products did. MSE was ranked as one of the worst three products.
You just disqualified yourself from any further discussion from me as it would be a waste of my time when you post such gibberish and unfounded nonsense. Here's an old list of features that were introduced in version 2...I'll post it...doubt you'll grasp it but I'll take 3 seconds of my time to post it..but it does clearly state such additional features such as inspection of network traffic, integration with internet explorer with features including script blocking,
http://www.thewindowsclub.com/what’s-new-in-microsoft-security-essentials-2-0
Uh, really? What a cheap shot that is. Did you even read the page you linked to? Do you understand that none of the "features" deal directly with "Web Browsing" security per say?
So let's look at that OLD post on thewindowsclub.com:
1. Firewall Integration - Can detect that Windows Firewall is disabled, and you can enable again from MSE.
Well whoopty doo! Windows already notified you of this problem before MSE, so who cares? Also, I get systems in routinely with MSE that are infected and the firewall will simply NOT engage as it has been disabled from the registry/files/etc by the malware/virus.
2. Enhanced protection for web-based threats. Microsoft Security Essentials now integrates itself with Internet Explorer to provide protection against web-based threats.
Like I already went over before, IE throws up a "Are you sure" dialogue. It should be noted that MSE DOES NOT integrate itself with any other browsers such as Firefox, Chrome, Opera, or Safari. Not to mention, if your customers don't use IE in the first place they would have a lot less risk.
3. Network Inspection System. This feature of MSE enhances real-time protection by inspecting network traffic to help proactively block exploitation of known network-based vulnerabilities.
This is for your LOCAL NETWORK to protect against worms like Conficker. This applies to one LOCAL machine attacking another LOCAL machine.
4. New and improved protection engine. The updated MSE engine includes a Heuristic Scanning Engine and offers enhanced detection and cleanup capabilities along with better performance.
Not really a feature... it's kind of what you expect from an AV program, correct? Oh, and.. regarding the MSE Heuristic Scanning Engine per AV-Comparatives -
an abysmal 92.3% like I stated in my previous post.
So, that link you provided doesn't say diddly squat about "Web Browsing" security such as URL blocking, web filtering, behavior blocking, instant messaging filters, etc. such as is required by the AV-Comparative.org's Full Dynamic Tests.
But wait, instead of linking to an old post on thewindowsclub.com let's take a look at Microsoft's site and their newest version here:
http://windows.microsoft.com/en-US/...ty-essentials/product-information?T1=features
Yep, it's still the same feature set; hasn't evolved. Oops, I do see it has Rootkit protection now! Yippee! Little late to the party, wouldn't you say?
I'll take my apology now. While your at it, YOU can stop spewing "gibberish and unfounded nonsense" from old sites, look up the source of MSE, and quote the newest stuff that STILL DOESN'T have or do what you claim.
Or, if you still don't like the fact your darling MSE feature set isn't there you can google:
"MSE url blocking" - Nope, can't seem to find it.
"MSE web filtering" - Nope, doesn't have it and many of the results are people complaining about MSE NOT having it.
"MSE behavior blocking" - Again, not there.
Gee, do you know something the rest of the world doesn't? You see? This is the reason MSE isn't included in the AV tests. Here's an idea, don't defend the AV product that isn't even tested.
Microsoft should leverage more manpower towards fixing security vulnerabilities in their OS instead of making a half-assed AV product to protect the security vulnerabilities!
Let me tell you a bit about myself. I am somewhat of a Whitehat (hacker) myself and am well versed in how to use Metasploit, deliver payloads and exploit security vulnerabilities. I can crack WEP in minutes, and under the right circumstances, WPA too (Takes much longer). Your fighting an uphill battle with a person who has
fun infecting machines in the lab and has formal education to do so. MSE IS NOT secure, is not effective, and is easily bypassed. I have done it myself, have you? On the contrary, other AV products are much harder, if not impossible unless using a Zero Day attack which I don't have access to.
On my desk, I get LOADS of MSE infected computers right along with Norton and McAfee. They are the big three that I always see infected here. Why is that do you think?
I'll tell you what, at my shop MSE will be removed when found and a real AV product will be installed in it's place based on current testing and analysis. You do whatever "you think" is best at your shop, even though all of the proof points the opposite direction.
I leave you with this Panda blog review blasting MSE from Nov 2010:
http://research.pandasecurity.com/microsoft-just-doesn’t-get-it…-security-is-about-diversity/