Microsoft recommends disabling AV for rogue patch

In a follow up to our post here on troubles with Q811493 patch for Windows XP y_notm has submitted to the BPN section that MS have posted a workaround on the WUv4 beta newsgroup (Windows Update v4)

Hi Everyone!

You may or may not have seen an issue where after installing Q811493 the machine runs extremely slow. What we have determined so far is that it is an issue with the anti-virus on there machines. If the customer is running EZ Trust they will need to disable the file monitoring service and if they are running Norton they will need to disable the auto protect service and the installation of Q811493 and this will return to system functionality to normal. Other Anti-virus programs that seem to cause this issue that we have heard of so far:

  1. EZ Anti-virus Realtime

  2. MacAfee version 7

  3. Sophos
While an MS spokesperson was not immediately available for comment Neowin will attempt to confirm the above workaround, which appears to fix one security problem by compromising system security elsewhere (ie: no more auto-protect). People using the leaked SP2 update for Windows XP also reported problems after un-installing the patch which caused one of our members to re-install his system!

View: Neowin BPN submission

Report a problem with article
Previous Story

Is AMD being coy with its clockspeeds?

Next Story

Zoom Player 3.00

1 Comments

Commenting is disabled on this article.

I don't care what [B]Dessimat0r[/B] says, his ignorance is most annoying because as a webmaster with a very public email address I can tell you that email viruses stem from people who arent running AV software. I am not the cause for the emails that were being sent unknown to the user because my AV software prevented and documented the exploit from happening to my machine, but I do know a few people who sent these emails because they didnt have the tools to block them being sent.

I think its laughable that he thinks self discipline on files and software settings is enough doesnt he know that virus writers exploit software BUGS and holes that end-users can't block until a fix is released.