Microsoft로 로그인
로그인하거나 계정을 만듭니다.
안녕하세요.
다른 계정을 선택합니다.
계정이 여러 개 있음
로그인할 계정을 선택합니다.
영어
죄송합니다. 이 문서는 귀하의 언어로 사용할 수 없습니다.

Symptoms

Consider the following scenario:

  • You install Windows 8.

  • You change the Hosts file by specifying custom IP-address-to-host-name mappings to prevent users from browsing to some websites.

  • You run a scan in Microsoft Windows Defender.

In this scenario, the Hosts file is detected as a SettingsModifier:Win32/PossibleHostsFileHijack malware threat by Windows Defender.

Cause

This issue occurs because Windows Defender may determine incorrectly that the Hosts file was changed by malware, such as adware or spyware. Typically, malware programs change the Hosts file to redirect users to malicious websites. Therefore, Windows Defender may detect the Hosts file as a security threat.

Resolution

To resolve this issue, exclude the Hosts file from scanning in Windows Defender. To do this, follow these steps:

  1. Open Windows Defender.

  2. On the Settings tab, click Excluded files and locations.

  3. Under File locations, click Browse.

  4. Locate and then click the Hosts file.

    Note By default, the Hosts file is located in the %systemroot%\system32\drivers\etc folder.

  5. Click Add, and then click Save changes.

  6. Exit Windows Defender.


References

For more information about the SettingsModifier:Win32/PossibleHostsFileHijack malware threat, go to the following Microsoft Malware Protection Center encyclopedia entry:

SettingsModifier:Win32/PossibleHostsFileHijack

For information about how to reset the Hosts file to the default settings, click the following article number to go to the article in the Microsoft Knowledge Base:

972034 How can I reset the Hosts file back to the default?

도움이 더 필요하세요?

더 많은 옵션을 원하세요?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

이 정보가 유용한가요?

사용 경험에 어떠한 영향을 주었나요?
제출을 누르면 피드백이 Microsoft 제품과 서비스를 개선하는 데 사용됩니다. IT 관리자는 이 데이터를 수집할 수 있습니다. 개인정보처리방침

의견 주셔서 감사합니다!

×