Your OS already has antivirus built in. Most people have never opened it. Before spending money on third-party software, know what you already have and whether it’s configured.

Modern operating systems include built-in protection. Windows has Windows Security (formerly Windows Defender). macOS has XProtect. These provide baseline protection — but they have to be configured and kept current.


Windows — Windows Security

Path: Start > Windows Security

OR: Settings > Privacy & Security > Windows Security > Open Windows Security


Virus & Threat Protection

Path: Windows Security > Virus & Threat Protection


Ransomware Protection

Path: Windows Security > Virus & Threat Protection > Ransomware Protection > Manage Ransomware Protection

This is the most underused security feature on Windows. Most people have never touched it.

Enable Controlled Folder Access now. It protects your files even if malware gets past the scanner.


Firewall & Network Protection

Path: Windows Security > Firewall & Network Protection


App & Browser Control

Path: Windows Security > App & Browser Control


Second-Opinion Scanner

Windows Security handles real-time protection well. But a second-opinion scanner catches things it misses.


macOS — XProtect & Friends

macOS includes several layers of built-in protection. Unlike Windows, there’s no single security dashboard — these tools run silently in the background. That’s nice until you realize you’ve never verified they’re actually configured.


XProtect & Malware Removal Tool


Gatekeeper

Path: System Settings > Privacy & Security


FileVault

Path: System Settings > Privacy & Security > FileVault


Firewall

Path: System Settings > Network > Firewall


Keep macOS Updated

Path: System Settings > General > Software Update > Enable Automatic Updates

Every macOS security feature depends on updates. XProtect signatures, MRT definitions, Gatekeeper data — all delivered through system updates. If you’re behind on updates, your protection is stale.


Recommended On-Demand Scanner

Your defense on macOS is primarily: keep the OS updated, don’t install software from untrusted sources, and verify your built-in protections are actually turned on.


Linux

Linux is not immune to malware, but the threat model is different. Most malware targeting Linux goes after servers, not desktop users. The average Linux desktop user faces far less risk than Windows or even macOS users — but “less risk” is not “no risk.”

Most Linux users don’t need traditional antivirus. Your behavior is your antivirus. Instead, focus on fundamentals:


Firewall

Most distros include ufw (Uncomplicated Firewall) but don’t enable it by default.


If You Want a Scanner


For Power Users & Server Admins

Bottom line: on Linux, keep things updated, don’t run random scripts as root, use a firewall. That covers the vast majority of threats a desktop user will encounter.


ChromeOS

ChromeOS takes a fundamentally different approach to security. Traditional antivirus is unnecessary on Chromebooks.

Keep ChromeOS updated and don’t enable Developer Mode unless you know what you’re doing — it disables Verified Boot and weakens the security model significantly.


Third-Party Antivirus

Windows: Windows Security is sufficient for most people. Pair it with occasional Malwarebytes scans and you’re well covered. If you add a different third-party AV with real-time protection, disable Windows Defender’s real-time protection to avoid conflicts and performance issues.

macOS: Third-party AV is rarely necessary for typical folks. Malwarebytes (free) for occasional scans is a solid choice if you want peace of mind.

Linux: Traditional AV is rarely needed for desktop users. ClamAV is there if you want it.

Avoid free antivirus from unknown vendors — many free AV products collect and sell your data, making them a privacy risk themselves. You’d be trading one problem for another.


Signs of Infection

Watch for:

If you suspect infection:

  1. Run a full system scan immediately
  2. Disconnect from WiFi or network if you suspect active data exfiltration
  3. Do not enter passwords or payment information until the device is clean
  4. Consider professional assistance for ransomware incidents — do not pay the ransom without consulting an expert first

Open Windows Security and turn on Controlled Folder Access. Settings → Virus & Threat Protection → Ransomware Protection. That’s the single most impactful setting most Windows folks have never enabled.