That’s exactly why you tell Defender to keep their greedy fingers out of specific folders and install specific things to dedicated paths.
Let Defender do its thing protecting critical system paths and don’t run any executables you don’t trust. Defender never touches anything I don’t want it to touch and runs rampant on any anomalities. This unfortunately also results in things like Tor browser being flagged and removed randomly happening sometimes. Heuristic analysis is not perfect.
Then again, unless you’ve gone through hash checks, certificate verification for signed software and in the worst case decompiling your software to make sure it doesn’t do anything fishy, you’re always taking a risk.
The Linux ecosystem arguably has way better systems in place foe software distribution than “just run this .exe, trust me bro”. But common sense goes a long way within Windows.
That’s exactly why you tell Defender to keep their greedy fingers out of specific folders and install specific things to dedicated paths.
Let Defender do its thing protecting critical system paths and don’t run any executables you don’t trust. Defender never touches anything I don’t want it to touch and runs rampant on any anomalities. This unfortunately also results in things like Tor browser being flagged and removed randomly happening sometimes. Heuristic analysis is not perfect.
Then again, unless you’ve gone through hash checks, certificate verification for signed software and in the worst case decompiling your software to make sure it doesn’t do anything fishy, you’re always taking a risk.
The Linux ecosystem arguably has way better systems in place foe software distribution than “just run this .exe, trust me bro”. But common sense goes a long way within Windows.