A Big Security Hole in Microsoft Defender
In a recent update, Microsoft quietly addressed a significant vulnerability within Microsoft Defender Antivirus, as first reported by Neowin. The update, known as Security Intelligence Update version 1.413.494.0, tackles an issue that left Windows systems exposed for a brief period following installation.
According to Microsoft, newly installed Windows systems could be at risk of attack during the initial hours post-installation due to a protection gap in Microsoft Defender Antivirus. This vulnerability stemmed from installation images that may have included outdated antivirus software binaries. The latest Windows Security update not only rectifies this issue but also enhances detection capabilities against various threats, including Trojan, adware, and backdoor exploits.
Beyond bolstering security measures, users may notice improved system performance as a result of this update. It has been rolled out for several versions of Windows, including:
- Windows 11
- Windows 10 (Enterprise, Pro, and Home)
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
Check if the Update is Installed
For the majority of Windows users, the update has likely been installed automatically. However, to confirm its installation, you can navigate to Windows Security, select the
To ensure compatibility with this update, the following requirements must be met:
- Your system should be running a 64-bit operating environment on Windows 10 or later, equipped with PowerShell 5.1 or later.
- The Microsoft.Powershell.Security and DISM modules must be installed.
- You need to have the ability to launch PowerShell with administrator rights.
This article originally appeared on our sister publication PC-WELT and was translated and localized from German.