Anti-Virus

Anti-virus software protects your computer from viruses, spyware, and other malicious software. It works by looking for patterns of known worms and viruses in files you download and programs that are running on your computer.

Since the virus writers are always creating new worms and viruses, your virus protection software needs to be regularly updated to recognize the latest threats.

Many computers come with anti-virus software pre-installed. When switching anti-virus programs begin by uninstalling other anti-virus programs that may be installed on your computer.

Purchase or Download

Purchase or Download

UMN Licenses

Availability Cost
Department For installation on a University-owned device Recommended free options
Employee For installation on an employee's personal device Recommended free options
Student For installation on a student's personal device Recommended free options

Recommendations for Departments

We recommend you install one of the following on University-owned devices.

Windows

Windows 10 includes built-in and ongoing security protections, including Windows Defender Antivirus, firewall, and more. See the Windows Comprehensive Security Web site (scroll down to Windows Defender Antivirus section). 

Macintosh

Jamf is a comprehensive management system for Apple macOS and iOS devices. Enrolled devices will automatically receive SentinelOne S1 Core Endpoint Protection. Verify and enroll your device in Jamf.

Recommendations for Employees and Students

We recommend you install one of the following on personally-owned devices.

Windows

See our instructions for Installing Microsoft Security Essentials on Windows 7.

Please be aware that it is not legal to use Microsoft Security Essentials on devices owned by government or academic institutions.

Macintosh

Download Sophos Anti-Virus for your Mac from the Sophos site.

Terms and Conditions

General Technology Products Terms & Conditions apply to this software license. If additional terms and conditions apply to this item, they will be listed below.

Restrictions

Also see University policies on Information Security and Acceptable Use of Information Technology Resources.

Resources

Campus Resources

Other Support

Additional Resources