More Free Security Tools -- the Malicious Software Removal Tools

I've been hot on free security tools lately, as I've had the chance to work with a lot of small and midsized businesses . Non-enterprise businesses don't have the big budget for the expensive security tools that the big boys have. They're more cost sensitive but are still aware that security is a key factor in making IT part of the profit center and not a loss center. Any free or low cost security tools go a long way at securing these firms.

One such tool is the Microsoft Malicious Software Removal Tool or MSRT. The MSRT scans your computer for existing malware and removes that malware. The MSRT looks for the most common malware seen out in the wild, so it's not a comprehensive anti-malware solution. However, it is still very useful to run on machines on a regular basis. There are two ways to run the MSRT -- manually by downloading the tool, or automatically as its delivered to your computer through Windows Update each month. If you run it through Windows Update, you have to give it permission to run the first time, but it will run automatically on subsequent downloads.

When you download the tool and run it manually, the first page will show you a link that shows you a list of the malware that it detects. As seen in the figure below

You then can choose a scan type:

I'll choose a quick scan here, since I don't want to wait for hours for the full scan to complete. However, if you have a new system that hasn't been running any anti-malware software, you might want to consider a full scan.

The quick scan checks the most common places where malware hides, based on the malware that the MSRT is configured to find.

When the MSRT finishes, you hopefully will see what you see below. If it does find malware, it will let you know about it and remove it for you.

Learn more about the MSRT and download it at:



Thomas W Shinder, M.D.

MVP - Microsoft Firewalls (ISA)

Deb Shinder

Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.

Published by
Deb Shinder

Recent Posts

Phishing campaign spoofs domain, targets computer vendors

A convincing-looking phishing campaign purportedly from a Texas government agency is targeting computer vendors in…

3 hours ago

Top 5 cybersecurity innovations and why they’re drawing in the money

With attackers making use of every vulnerability, our sense of security has turned into insecurity.…

6 hours ago

Have you really tested your disaster recovery plan?

How do you simulate a disaster to see whether your disaster recovery plan is ready…

24 hours ago

Using conditions in ARM templates when deploying infrastructure-as-code

This Quick Tip shows you a neat little coding trick that will help you when…

1 day ago

Full circle: On-premises Exchange to Microsoft 365 — and back again

Migration from on-premises Exchange to Microsoft 365 may not be a one-way street. What about…

1 day ago

Mozi botnet behind massive spike in IoT device attacks

The Mozi botnet appears to be another unintended consequence of people spending more time at…

2 days ago