Hacker News new | past | comments | ask | show | jobs | submit login

Microsoft itself recommends developers use a "dev drive" where defender is partially disabled because of how bad it is.



Dev Drive isn't because Defender is so bad but because Dev behavior can look like malicious behavior. Creating a bunch of random executables, connecting to running processes, decompiling files. Stuff that would be malicious behavior from normal user but normal for a dev.


I could be wrong but I don’t believe that even these days anti viruses look at behavioral patterns to identify viruses. They look for signatures of running executables to match malicious patterns in their database. Instead dev drives recommendations are because of performance. There’s substantial overhead & dev patterns, particularly for native code like C/C++/Rust etc, create a lot of intermediary files as part of the build and AV can cause a slowdown. Traditionally the advice for Windows devs was to turn off Defender or exclude your project folders but maybe there was a reason dev drives were still beneficial (maybe it can avoid even more work by working at a drive level).


Anti-viruses do both signatures and behavior tracking; I believe for the Microsoft ones they're the ones with a !ml suffix.


Ok, and where exactly will malware place its artifacts when it comes to infect your company's developers?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: