What is Windows Defender?
Windows Defender, officially known as Microsoft Defender Antivirus, is the built-in security solution that comes pre-installed with Windows 10 and Windows 11. It provides real-time protection against viruses, malware, spyware, and other threats without requiring any additional software or subscriptions.
Unlike third-party antivirus programs, Defender is deeply integrated into the operating system. It receives updates through Windows Update, runs with minimal performance impact, and is maintained by Microsoft's dedicated security research team. For most users, it provides all the protection needed when properly configured.
Independent testing labs like AV-TEST and AV-Comparatives consistently rate Windows Defender alongside premium paid solutions. Unless you have specific enterprise requirements, Defender is a strong choice for personal and small office use.
Verifying Defender is Active
Before configuring anything, you should confirm that Windows Defender is actually running on your system. Third-party antivirus software can disable Defender automatically during installation, so it is important to verify.
Method 1: Windows Security App
Windows Security, then click the app from the search results.
Alternatively, click the shield icon in the system tray (bottom-right corner
of the taskbar).
Method 2: PowerShell Verification
For a quick command-line check, open PowerShell as Administrator and run:
Get-MpComputerStatus | Select-Object AntivirusEnabled, RealTimeProtectionEnabled, AMServiceEnabled
All three values should return True. If AntivirusEnabled shows
False, another antivirus product has taken over and Defender is in passive mode.
Running multiple real-time antivirus engines simultaneously causes performance degradation, false positives, and can actually reduce your security. If you install a third-party antivirus, let it disable Defender automatically. If you want to switch back to Defender, uninstall the third-party product first.
Running Scans
Windows Defender offers several scan types, each suited to different situations. Understanding when to use each type helps you maintain thorough protection without wasting time on unnecessary full system scans.
Quick Scan
A Quick Scan checks the areas where malware is most commonly found: running processes, the Windows registry, common startup folders, and the system directories. It typically completes in 5 to 15 minutes and is sufficient for routine daily checks.
From PowerShell (as Administrator):
Start-MpScan -ScanType QuickScan
Full Scan
A Full Scan examines every file on every drive connected to your computer. This includes external USB drives and mapped network shares. It can take anywhere from one to several hours depending on the amount of data on your system.
Use a Full Scan when:
- You suspect your computer is infected despite a clean Quick Scan result
- You have just removed malware and want to verify the system is clean
- You have not run a full scan in over a month
- You have connected an external drive from an untrusted source
To start a Full Scan, go to Virus & threat protection, click Scan options, select Full scan, and click Scan now.
Start-MpScan -ScanType FullScan
Custom Scan
A Custom Scan lets you target specific files or folders. This is useful when you want to scan a downloaded file, a USB drive, or a particular directory without scanning the entire system.
To run a Custom Scan from PowerShell on a specific path:
Start-MpScan -ScanType CustomScan -ScanPath "D:\Downloads"
Microsoft Defender Offline Scan
The Offline Scan restarts your computer into a minimal recovery environment and scans before Windows fully loads. This is effective against rootkits and other threats that can hide from scans while the operating system is running.
Your computer will restart immediately. The scan takes approximately 15 minutes, and the computer will restart again when finished. Make sure all unsaved work is saved and all important applications are closed.
Start-MpWDOScan
Updating Virus Definitions
Virus definitions (also called security intelligence) are the database that Defender uses to identify known threats. Microsoft releases definition updates multiple times per day. Keeping definitions current is one of the most important things you can do for your security.
Automatic Updates
By default, Windows Defender downloads definition updates automatically through Windows Update. As long as your computer is connected to the internet and Windows Update is not paused, definitions should stay current without any action on your part.
Manual Update
If you want to force an immediate update (for example, before running a scan), you can trigger it manually:
From PowerShell:
Update-MpSignature
To check when definitions were last updated:
Get-MpComputerStatus | Select-Object AntivirusSignatureLastUpdated, AntivirusSignatureVersion
If your definitions are more than two days old, your protection is significantly reduced. New malware variants are discovered constantly, and old definitions cannot detect them. If automatic updates are not working, investigate your Windows Update settings immediately.
Configuring Real-Time Protection
Real-time protection is the core feature of Windows Defender. It monitors file system activity, network connections, and process behavior continuously, intercepting threats as they appear rather than waiting for a scheduled scan to find them.
Verifying Real-Time Protection
Recommended Settings
If you temporarily disable it (for example, to install software that triggers a false positive), Windows will automatically re-enable it after a short period. If real-time protection stays off, your computer is exposed to every threat it encounters.
Managing Exclusions
Exclusions tell Defender to skip certain files, folders, file types, or processes during scans and real-time monitoring. This is useful for development environments, virtual machines, or applications that Defender incorrectly flags as threats.
Adding an Exclusion
Common exclusion scenarios:
- Development folders: Exclude project build directories (e.g.,
node_modules,target,.cargo) to improve build performance. - Virtual machines: Exclude VM disk files (
.vhd,.vhdx,.vmdk) to avoid scan overhead. - Trusted applications: Exclude processes for software you trust that triggers false positives.
To add an exclusion via PowerShell:
# Exclude a folder
Add-MpPreference -ExclusionPath "C:\Projects\my-app"
# Exclude a file type
Add-MpPreference -ExclusionExtension ".vmdk"
# Exclude a process
Add-MpPreference -ExclusionProcess "myapp.exe"
# View current exclusions
Get-MpPreference | Select-Object ExclusionPath, ExclusionExtension, ExclusionProcess
Every exclusion is a location or process that Defender will never inspect. Malware authors know this and may target common exclusion paths. Only exclude what is strictly necessary, and review your exclusions periodically to remove entries you no longer need.
Scheduling Scans
While real-time protection catches threats as they appear, periodic scheduled scans provide an additional layer of assurance by checking files that may have been missed or that existed before a definition update was applied.
Using Task Scheduler
Windows Defender uses Task Scheduler for its scan schedules. You can customize when and how scans run:
taskschd.msc, and
pressing Enter.
PowerShell Scan Scheduling
You can configure the scheduled scan type and day using PowerShell:
# Set scan to run every Sunday at 2:00 AM
Set-MpPreference -ScanScheduleQuickScanTime 02:00:00
# Set the scheduled scan day (0=Everyday, 1=Sunday, 2=Monday, ..., 7=Saturday)
Set-MpPreference -ScanScheduleDay 1
# Set scan type (1=Quick, 2=Full)
Set-MpPreference -ScanParameters 2
# Check current schedule
Get-MpPreference | Select-Object ScanScheduleDay, ScanScheduleQuickScanTime, ScanParameters
A weekly Quick Scan is sufficient for most users with real-time protection enabled. Schedule a Full Scan monthly. Set scans to run during off-hours (e.g., 2:00 AM or during lunch) to minimize performance impact during work.
Summary
In this tutorial, you learned how to:
- Verify that Windows Defender is active and running properly
- Run different scan types (Quick, Full, Custom, and Offline) for different situations
- Update virus definitions manually and verify they are current
- Configure real-time protection settings for optimal security
- Set up exclusions for development tools and virtual machines
- Schedule automatic scans using Task Scheduler and PowerShell
Your Windows Defender is now properly configured. In the next tutorial, you will learn about advanced Defender features including Controlled Folder Access, Exploit Protection, and Attack Surface Reduction rules that provide additional layers of defense.