Page 697 - Windows 10 May 2019 Update The Missing Manual: The Book That Should Have Been in the Box
P. 697
back and let me run it”; of course, it’s usually a terrible idea to run
software that Windows has told you is malware.)
Allowed threats. If Defender announces that it’s found a potential
piece of malware, but you allow it to run anyway, it’s considered
an allowed item. From now on, Defender ignores it, meaning that
you trust that program completely. Allowed programs’ names
appear here.
If you highlight a program’s name and then click Remove From
List, it’s gone from the Allowed list, and therefore Defender
monitors it once again.
Account Protection
This screen offers links to your Microsoft account (“Local Accounts vs.
Microsoft Accounts”), Windows Hello setup (Figure 18-7), and Dynamic
Lock (“GEM IN THE ROUGH Dynamic Lock: The Invisible Phone
Leash”), all of which appear elsewhere in settings. Why are these controls
repeated here? Because, in Microsoft’s view, they have to do with
protection, so they kind of fit.
Firewall & Network Protection
If you have a broadband, always-on connection, you’re connected to the
internet 24 hours a day. It’s theoretically possible for some cretin to use
automated hacking software to flood you with files or to take control of
your machine. Fortunately, the Windows Defender Firewall feature puts up
a barrier to such mischief.
The firewall acts as a gatekeeper between you and the internet. It examines
all internet traffic and lets through only communications it knows are safe;
all others are turned away at the door.
Every kind of electronic message sent to or from your PC—instant
messaging, music sharing, file sharing, and so on—conducts its business on

