240 | ከማልዌር እና ሌላ ሊፈለግ ከማይችል ሶፍትዌር ተጠቃሚዎችን ለመጠበቅ ያግዛል |
Helps protect users from malware and other potentially unwanted software |
241 | Microsoft Antimalware Service |
Microsoft Antimalware Service |
242 | በአውታረ መረብ ፕሮቶኮሎች ውስጥ የሚታወቁ እና አዲስ የተገኙ ለጥቃት መጋለጦችን የሚያነጣጠሩ የጣልቃ ገብነት ሙከራዎችን ለመከላከል ያግዛል |
Helps guard against intrusion attempts targeting known and newly discovered vulnerabilities in network protocols |
243 | Microsoft Network Inspection |
Microsoft Network Inspection |
300 | Windows ተከላካይ ጸረቫይረስ |
Windows Defender Antivirus |
310 | Windows Defender Antivirus Service |
Windows Defender Antivirus Service |
320 | Windows Defender Antivirus Network Inspection Service |
Windows Defender Antivirus Network Inspection Service |
330 | Windows Defender Antivirus Mini-Filter Driver |
Windows Defender Antivirus Mini-Filter Driver |
340 | Windows ተከላካይ ጸረቫይረስ በመድረስ-ላይ ማልዌር ጥበቃ አነስተኛ-ነጂ |
Windows Defender Antivirus On-Access Malware Protection Mini-Filter Driver |
370 | Windows Defender Antivirus Network Inspection System Driver |
Windows Defender Antivirus Network Inspection System Driver |
380 | Windows ተከላካይ ጸረቫይረስ ጥቅም ላይ የሚውሉ ወሳኝነት የሌላቸው ፋይሎች |
Non critical files used by Windows Defender Antivirus |
390 | Windows Defender Antivirus Boot Driver |
Windows Defender Antivirus Boot Driver |
400 | Windows ተከላካይ ጸረቫይረስ ማስነሻ ነጂ |
Windows Defender Antivirus Boot Driver |
1000 | Unknown |
Unknown |
1001 | Adware |
Adware |
1002 | ስፓይዌር |
Spyware |
1003 | Password Stealer |
Password Stealer |
1004 | Trojan Downloader |
Trojan Downloader |
1005 | Worm |
Worm |
1006 | Backdoor |
Backdoor |
1008 | Trojan |
Trojan |
1009 | Email Flooder |
Email Flooder |
1011 | Dialer |
Dialer |
1012 | Monitoring Software |
Monitoring Software |
1013 | Browser Modifier |
Browser Modifier |
1019 | Joke Program |
Joke Program |
1021 | Software Bundler |
Software Bundler |
1022 | Trojan Notifier |
Trojan Notifier |
1023 | Settings Modifier |
Settings Modifier |
1027 | Potentially Unwanted Software |
Potentially Unwanted Software |
1030 | Exploit |
Exploit |
1031 | File Sharing Program |
File Sharing Program |
1032 | Malware Creation Tool |
Malware Creation Tool |
1033 | Remote Control Software |
Remote Control Software |
1034 | Tool |
Tool |
1036 | Trojan Denial of Service |
Trojan Denial of Service |
1037 | Trojan Dropper |
Trojan Dropper |
1038 | Trojan Mass Mailer |
Trojan Mass Mailer |
1039 | Trojan Monitoring Software |
Trojan Monitoring Software |
1040 | Trojan Proxy Server |
Trojan Proxy Server |
1042 | ቫይረስ |
Virus |
1043 | Permitted |
Permitted |
1044 | Not Yet Classified |
Not Yet Classified |
1046 | Suspicious Behavior |
Suspicious Behavior |
1047 | Vulnerability |
Vulnerability |
1048 | Policy |
Policy |
1049 | ኢንተርፕራይዝ ያልተፈለገ ሶፍትዌር |
Enterprise Unwanted Software |
1050 | ራንሰምዌር |
Ransomware |
2000 | A system change was detected. This generally occurs when software is installed. |
A system change was detected. This generally occurs when software is installed. |
2001 | A program that displays advertisements. While some adware can be beneficial by subsidizing a program or service, other adware programs may display advertisements without adequate consent. |
A program that displays advertisements. While some adware can be beneficial by subsidizing a program or service, other adware programs may display advertisements without adequate consent. |
2002 | A program that collects information, such as the websites a user visits, without adequate consent. Unauthorized actions may include installing without prominent notice or running without a clear method to disable the program. |
A program that collects information, such as the websites a user visits, without adequate consent. Unauthorized actions may include installing without prominent notice or running without a clear method to disable the program. |
2003 | A Trojan that captures or transmits passwords to an attacker. |
A Trojan that captures or transmits passwords to an attacker. |
2004 | A Trojan that silently installs other programs without consent. |
A Trojan that silently installs other programs without consent. |
2005 | Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. |
Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. |
2006 | A Trojan used to bypass security policies or gain access to a computer. |
A Trojan used to bypass security policies or gain access to a computer. |
2008 | A program that appears to be useful or harmless but contains hidden code designed to exploit or damage the system on which it is run. |
A program that appears to be useful or harmless but contains hidden code designed to exploit or damage the system on which it is run. |
2009 | A Trojan designed to overwhelm an e-mail user's inbox with messages. |
A Trojan designed to overwhelm an e-mail user's inbox with messages. |
2011 | A Trojan that uses the computer's modem to generate unauthorized telephone charges. |
A Trojan that uses the computer's modem to generate unauthorized telephone charges. |
2012 | A program that monitors activity, such as keystrokes or screen images. |
A program that monitors activity, such as keystrokes or screen images. |
2013 | A program that changes browser settings, such as the home page, without adequate consent. |
A program that changes browser settings, such as the home page, without adequate consent. |
2019 | A program designed to amuse or scare a user, such as imitating a virus without taking action. |
A program designed to amuse or scare a user, such as imitating a virus without taking action. |
2021 | A program that installs other potentially unwanted software, such as adware or spyware. The license agreement of the bundling program may require these other components in order to function. |
A program that installs other potentially unwanted software, such as adware or spyware. The license agreement of the bundling program may require these other components in order to function. |
2022 | A Trojan used to notify an attacker when the software has been installed. |
A Trojan used to notify an attacker when the software has been installed. |
2023 | A program that changes settings without adequate consent. |
A program that changes settings without adequate consent. |
2027 | A program with potentially unwanted behavior that is brought to the user's attention for review. This behavior may impact the user's privacy, security, or computing experience. |
A program with potentially unwanted behavior that is brought to the user's attention for review. This behavior may impact the user's privacy, security, or computing experience. |
2030 | A program that exploits a security vulnerability. |
A program that exploits a security vulnerability. |
2031 | A program used to distribute and download files, often as part of a peer-to-peer (P2P) network. |
A program used to distribute and download files, often as part of a peer-to-peer (P2P) network. |
2032 | A tool used to create viruses, worms and other malware. |
A tool used to create viruses, worms and other malware. |
2033 | A program that provides access to a computer from a remote location. These programs are often installed by the computer owner or administrator, and are only a risk if unexpected. |
A program that provides access to a computer from a remote location. These programs are often installed by the computer owner or administrator, and are only a risk if unexpected. |
2034 | A tool that can be abused by an attacker, and may be used to bypass or lower security. |
A tool that can be abused by an attacker, and may be used to bypass or lower security. |
2036 | A program that creates a Denial of Service attack. |
A program that creates a Denial of Service attack. |
2037 | A program that comes bundled with a Trojan. |
A program that comes bundled with a Trojan. |
2038 | A Trojan that sends large volumes of e-mail. |
A Trojan that sends large volumes of e-mail. |
2039 | A Trojan that records user activity, such as keystrokes. This information may be sent to an attacker using e-mail or other methods. |
A Trojan that records user activity, such as keystrokes. This information may be sent to an attacker using e-mail or other methods. |
2040 | A Trojan that installs a proxy server on a machine. |
A Trojan that installs a proxy server on a machine. |
2042 | Malicious code that attempts to spread from computer to computer by attaching itself to a host program. |
Malicious code that attempts to spread from computer to computer by attaching itself to a host program. |
2043 | A program that has been classified and permitted to run. |
A program that has been classified and permitted to run. |
2044 | A program that has not yet been classified. |
A program that has not yet been classified. |
3001 | This program delivers potentially unwanted advertisements to your computer. |
This program delivers potentially unwanted advertisements to your computer. |
3002 | This program appears to be a spyware removal software, but does not disclose advertising behavior. |
This program appears to be a spyware removal software, but does not disclose advertising behavior. |
3003 | This program displays advertisements separate from the parent program. |
This program displays advertisements separate from the parent program. |
3004 | This program displays pop-up advertisements. |
This program displays pop-up advertisements. |
3005 | This program displays advertisements based on Web browsing habits. |
This program displays advertisements based on Web browsing habits. |
3006 | This program displays advertisements with adult content. |
This program displays advertisements with adult content. |
3007 | This program displays advertisements and is often bundled with other programs. |
This program displays advertisements and is often bundled with other programs. |
3008 | This program displays advertisements and may be difficult to remove. |
This program displays advertisements and may be difficult to remove. |
3009 | This program displays advertisements based on Web search habits. |
This program displays advertisements based on Web search habits. |
3010 | This program delivers advertisements and tracks activity. |
This program delivers advertisements and tracks activity. |
3011 | This program displays advertisements and may be delivered through unsolicited installation. |
This program displays advertisements and may be delivered through unsolicited installation. |
3012 | This program displays advertisements and runs without a user interface. |
This program displays advertisements and runs without a user interface. |
3013 | This program displays advertisements inside other software. |
This program displays advertisements inside other software. |
3014 | This program displays deceptive product messages. |
This program displays deceptive product messages. |
3015 | This program displays advertisements and may install other software. |
This program displays advertisements and may install other software. |
3016 | This program is used to bypass security policies. |
This program is used to bypass security policies. |
3017 | This program changes various Web browser settings without adequate consent. |
This program changes various Web browser settings without adequate consent. |
3018 | This program changes the default home page. |
This program changes the default home page. |
3019 | This program changes the default search engine and the homepage. |
This program changes the default search engine and the homepage. |
3020 | This program changes the default search engine, the homepage, and other browser settings. |
This program changes the default search engine, the homepage, and other browser settings. |
3021 | This program redirects access to Web pages. |
This program redirects access to Web pages. |
3022 | This program changes browser settings and displays advertisements. |
This program changes browser settings and displays advertisements. |
3023 | This program modifies Web page content. |
This program modifies Web page content. |
3024 | This program changes Web page links. |
This program changes Web page links. |
3025 | This program adds links to adult content. |
This program adds links to adult content. |
3026 | This program adds a browser toolbar and may be delivered through unsolicited installation. |
This program adds a browser toolbar and may be delivered through unsolicited installation. |
3027 | This program adds a sidebar to the browser that displays advertisements. |
This program adds a sidebar to the browser that displays advertisements. |
3028 | This program displays adult content. |
This program displays adult content. |
3029 | This program changes the default search engine. |
This program changes the default search engine. |
3030 | This program changes browser settings and is often bundled with other programs. |
This program changes browser settings and is often bundled with other programs. |
3035 | This program dials toll numbers to create telephone charges. |
This program dials toll numbers to create telephone charges. |
3036 | This program dials toll numbers to gain access to adult content. |
This program dials toll numbers to gain access to adult content. |
3037 | This program dials toll numbers and delivers advertisements for adult content. |
This program dials toll numbers and delivers advertisements for adult content. |
3038 | This program can be used to perform a denial of service attack. |
This program can be used to perform a denial of service attack. |
3039 | This program overwhelms a user's inbox with email messages. |
This program overwhelms a user's inbox with email messages. |
3041 | This program takes advantage of a security vulnerability. |
This program takes advantage of a security vulnerability. |
3042 | This program allows users to download or share files. |
This program allows users to download or share files. |
3046 | This program is designed to amuse or scare the user. |
This program is designed to amuse or scare the user. |
3047 | This program monitors user activity, such as keystrokes typed. |
This program monitors user activity, such as keystrokes typed. |
3049 | This program is used to create viruses, worms or other malware. |
This program is used to create viruses, worms or other malware. |
3050 | This program monitors user information. |
This program monitors user information. |
3052 | This program is dangerous and captures user passwords. |
This program is dangerous and captures user passwords. |
3054 | This program is often installed a bundle with other programs. |
This program is often installed a bundle with other programs. |
3055 | This program may have been installed without adequate user consent. |
This program may have been installed without adequate user consent. |
3056 | This program runs automatically and without adequate user notification. |
This program runs automatically and without adequate user notification. |
3058 | This program may update without adequate user consent and may be delivered through unsolicited installation. |
This program may update without adequate user consent and may be delivered through unsolicited installation. |
3059 | This program updates automatically without adequate user consent. |
This program updates automatically without adequate user consent. |
3061 | This program does not adequately disclose potentially unwanted behavior. |
This program does not adequately disclose potentially unwanted behavior. |
3062 | This program is often distributed as a component of other potentially unwanted software. |
This program is often distributed as a component of other potentially unwanted software. |
3063 | ይሄ ፕሮግራም ያልተፈለገ ጠባይ አለው። |
This program has potentially unwanted behavior. |
3064 | This program disables other software as part of its installation. |
This program disables other software as part of its installation. |
3066 | This program provides remote access to the computer it is installed on. |
This program provides remote access to the computer it is installed on. |
3069 | This program changes various computer settings without adequate consent. |
This program changes various computer settings without adequate consent. |
3070 | This program installs other potentially unwanted software. |
This program installs other potentially unwanted software. |
3072 | This program may install other potentially unwanted software. |
This program may install other potentially unwanted software. |
3073 | This program installs adware. |
This program installs adware. |
3074 | This program installs spyware. |
This program installs spyware. |
3075 | This program installs browser modifiers. |
This program installs browser modifiers. |
3076 | This program installs software that displays adult content. |
This program installs software that displays adult content. |
3077 | This program sends unauthorized e-mail. |
This program sends unauthorized e-mail. |
3078 | This program collects user information. |
This program collects user information. |
3079 | This program tracks activity and delivers advertisements. |
This program tracks activity and delivers advertisements. |
3080 | This program tracks activity and may disable other programs. |
This program tracks activity and may disable other programs. |
3081 | This program tracks activity and is often bundled with other programs. |
This program tracks activity and is often bundled with other programs. |
3082 | This program tracks activity and may be difficult to remove. |
This program tracks activity and may be difficult to remove. |
3083 | This program tracks activity and all Web page content, including secure pages. |
This program tracks activity and all Web page content, including secure pages. |
3084 | This program connects to the Internet in the background. |
This program connects to the Internet in the background. |
3087 | This program can be used for malicious purposes if unauthorized. |
This program can be used for malicious purposes if unauthorized. |
3089 | This program is dangerous and exploits the computer on which it is run. |
This program is dangerous and exploits the computer on which it is run. |
3090 | This program is dangerous, exploits the computer, and provides access to user files. |
This program is dangerous, exploits the computer, and provides access to user files. |
3091 | This program is dangerous, exploits the computer, and shares user information. |
This program is dangerous, exploits the computer, and shares user information. |
3092 | This program is dangerous and downloads other programs. |
This program is dangerous and downloads other programs. |
3093 | This program is dangerous and installs other programs. |
This program is dangerous and installs other programs. |
3095 | This program is dangerous and records user activity. |
This program is dangerous and records user activity. |
3096 | This program silently informs a server when it has been installed. |
This program silently informs a server when it has been installed. |
3097 | This program is dangerous and acts as a proxy server. |
This program is dangerous and acts as a proxy server. |
3100 | This program is dangerous and self-propagates over a network connection. |
This program is dangerous and self-propagates over a network connection. |
3104 | This program monitors user information, such as Web browsing habits. |
This program monitors user information, such as Web browsing habits. |
3105 | This program changes various computer settings. |
This program changes various computer settings. |
3106 | This program changes the system hosts file. |
This program changes the system hosts file. |
3108 | This program monitors sensitive information, such as keystrokes typed. |
This program monitors sensitive information, such as keystrokes typed. |
3109 | This program is dangerous and monitors user information. |
This program is dangerous and monitors user information. |
3110 | ይሄ ፕሮግራም አደገኛ ነው እና ሌሎች ፋይሎችን በመበከል ይባዛል። |
This program is dangerous and replicates by infecting other files. |
3111 | This program is dangerous and can hide programs or bypass security. |
This program is dangerous and can hide programs or bypass security. |
3112 | This program is dangerous and executes commands from an attacker. |
This program is dangerous and executes commands from an attacker. |
3114 | ይህ መተግበሪያ በ Windows ተከላካይ የላቀ የስጋት መከላከል ፖሊሲ የታገደ በመሆኑ ተወግዷል። |
This application was removed because it is blocked according to the Windows Defender Advanced Threat Protection policy. |
4000 | ፕሮግራሙን ወይም የሶፍትዌር አታሚውን ካመኑ የተገኘውን ንጥል ነገር ይፈቅዳል። |
Permit this detected item only if you trust the program or the software publisher. |
4001 | This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you're not sure whether to permit it, review the alert details or check if you recognize and trust the publisher of the software. |
This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you're not sure whether to permit it, review the alert details or check if you recognize and trust the publisher of the software. |
4002 | Review the alert details to see why the software was detected. If you do not like how the software operates or if you do not recognize and trust the publisher, consider blocking or removing the software. |
Review the alert details to see why the software was detected. If you do not like how the software operates or if you do not recognize and trust the publisher, consider blocking or removing the software. |
4004 | ይሄንን ሶፍትዌር ወዲያውኑ አስወግድ። |
Remove this software immediately. |
4005 | Remove this software immediately. |
Remove this software immediately. |
5001 | Low |
Low |
5002 | Medium |
Medium |
5004 | High |
High |
5005 | Severe |
Severe |
6001 | Programs that are typically benign unless they are installed on your computer without your knowledge. |
Programs that are typically benign unless they are installed on your computer without your knowledge. |
6002 | Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, for example, by collecting personal information or changing settings. |
Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, for example, by collecting personal information or changing settings. |
6004 | Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, by collecting information or changing settings, typically without your knowledge or consent. |
Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, by collecting information or changing settings, typically without your knowledge or consent. |
6005 | Widespread or exceptionally harmful programs, similar to viruses or worms, that negatively affect your privacy and your computer's security, and that damage your computer. |
Widespread or exceptionally harmful programs, similar to viruses or worms, that negatively affect your privacy and your computer's security, and that damage your computer. |
7001 | Clean |
Clean |
7002 | Quarantine |
Quarantine |
7003 | Remove |
Remove |
7004 | Block |
Block |
7005 | Ignore |
Ignore |
7006 | Ignore Always |
Ignore Always |
7007 | Revert |
Revert |
7008 | Select Action |
Select Action |
41101 | Antimalware engine has stopped responding |
Antimalware engine has stopped responding |
41103 | Application Name |
Application Name |
41104 | Application Version |
Application Version |
41105 | Engine Version |
Engine Version |
41106 | Standalone System Sweeper scanning engine has stopped responding |
Standalone System Sweeper scanning engine has stopped responding |
41107 | Microsoft Antimalware scanning engine has stopped responding |
Microsoft Antimalware scanning engine has stopped responding |
41108 | Windows Defender scanning engine has stopped responding |
Windows Defender scanning engine has stopped responding |
41110 | Standalone System Sweeper |
Standalone System Sweeper |
41111 | Microsoft Antimalware |
Microsoft Antimalware |
41114 | Scan your system for malware, rootkits, and potentially unwanted software |
Scan your system for malware, rootkits, and potentially unwanted software |
41115 | Protection against malicious and unwanted software |
Protection against malicious and unwanted software |
41116 | Protection against spyware or other potentially unwanted software |
Protection against spyware or other potentially unwanted software |
41124 | በጊዜ ገደብ ውስጥ የማጽዳት ተግባር። |
Periodic cleanup task. |
41125 | በጊዜ ገደብ ውስጥ የማረጋገጥ ተግባር። |
Periodic verification task. |
41126 | በጊዜ ገደብ ውስጥ የጥገና ተግባር። |
Periodic maintenance task. |
41127 | በጊዜ ገደብ ውስጥ የቀረጻ ተግባር። |
Periodic scan task. |
41128 | Periodic signature update task. |
Periodic signature update task. |
41129 | A scan required to complete remediation. |
A scan required to complete remediation. |
41130 | Antimalware status change |
Antimalware status change |
41131 | Microsoft Antimalware has detected setting changes due to malware. |
Microsoft Antimalware has detected setting changes due to malware. |
41132 | Windows ተከላካይ ጸረቫይረስ በማልዌር ምክንያት የተከሰቱ የየክንዉን አዉድ ለዉጦችን አግኝቷል። |
Windows Defender Antivirus has detected setting changes due to malware. |
41133 | Standalone System Sweeper has detected setting changes due to malware. |
Standalone System Sweeper has detected setting changes due to malware. |
41134 | Threat ID |
Threat ID |
43132 | Microsoft ደህንነት ደንበኛ ስጋቶችን አግኝቷል እናም ከመሳሪያዎ ላይ እያስወገዳቸው ነው። |
Microsoft Security Client found threats and is removing them from your device. |
43133 | Microsoft ደህንነት ደንበኛ ስጋቶችን አግኝቷል። እባከዎ መሳሪያዎን እንደገና ያስጀምሩ። |
Microsoft Security Client found a threat. Please restart your device. |
43134 | Windows ተከላካይ ጸረቫይረስ ስጋቶች አግኝቷል። ዝርዝሮችን ያግኙ። |
Windows Defender Antivirus found threats. Get details. |
43135 | Windows ተከላካይ ጸረቫይረስ [%s] በ [%s] ውስጥ አግኝቷል። እባከዎ መሳሪያዎን እንደገና ያስጀምሩ። |
Windows Defender Antivirus found [%s] in [%s]. Please restart your device. |
43138 | እንደገና ጀምር |
Restart |
43139 | Windows ተከላካይ ጸረቫይረስ ስጋቶችን አግኝቷል። እባክዎ ከመስመር ዉጪ የሆነ ቅርጸት በመሳሪያዎ ላይ ያስሂዱ። |
Windows Defender Antivirus found Threats. Please run an offline scan of your device. |
43140 | በWindows ተከላካይ ዉስጥ እርምጃዎች ያስፈልጋሉ |
Actions needed in Windows Defender |
43141 | ቅረጽ |
Scan |
43143 | Windows ተከላካይ ጸረ ቫይረስ [%s] በ [%s] ውስጥ አገኝቷል። እባክዎ መሳሪያዎን እንደገና ያሰጀምሩ እና ይቃኙ። |
Windows Defender Antivirus found [%s] in [%s]. Please restart and scan your device. |
43144 | ዳግም አስጀምር እና ቃኝ |
Restart and scan |
43146 | Windows ተከላካይ ጸረቫይረስ [%s] በ [%s] ውስጥ አግኝቷል። እባክዎ ሙሉ ቅርጸት በመሳሪያዎ ላይ ያስሂዱ። |
Windows Defender Antivirus found [%s] in [%s]. Please run a full scan of your device. |
43148 | የእርስዎ የ Windows ስሪት ድጋፍ አያበቃ ነዉ |
Support for your version of Windows is ending |
43149 | ይህ ድጋፍ በሚያበቃበት ጊዜ፣ Windows ተከላካይ አይደገፍም እናየ መሳሪያዎ አደጋ ላይ ሊሆን ይችላል። |
When this support ends, Windows Defender won't be supported and your device might be at risk. |
43150 | የእርስዎ የ Windows ስሪት ድጋፍ አብቅቷል |
Support for your version of Windows has ended |
43151 | Windows ተከላካይ ከእንግዲህ እየተደገፈ አይደለም፣ እና የእርስዎ መሳሪያ አደጋ ላይ ሊሆን ይችላል። |
Windows Defender is no longer supported, and your device might be at risk. |
43158 | Windows ተከላካይ ወደ Microsoft የሚልካቸው የግምገማ ፋይሎች |
Review files that Windows Defender will send to Microsoft |
43159 | ይህን መረጃ ለእኛ በመላክዎ Windows ተከላካይ ጸረቫይረስ እንዴት የእርስዎን መሳሪያ እንደሚጠብቅ ለማሻሻል ሊያግዝ ይችላል። |
Sending us this information can improve how Windows Defender Antivirus helps protect your device. |
43160 | ግምገማ |
Review |
43161 | ፋይሎች ላክ |
Send files |
43162 | Microsoft ደህንነት ደንበኛ እርምጃ ወስዷል |
Microsoft Security Client took action |
43163 | Windows ተከላካይ ጸረቫይረስ እርምጃ ወስዷል |
Windows Defender Antivirus took action |
43165 | የእርስዎ የአይቲ የክንውን አውዶች በእርስዎ ኮምፒዩተር ላይ ያልተፈለጉ ድርጊቶችን ሊፈጽም የሚችልን ማናቸውም መተግበሪያን ፈልጎ ለማግኘት መንስኤ ሆኗል። |
Your IT settings cause the detection of any app that might perform unwanted actions on your computer. |
43166 | የWindows ተከላካይ ማጠቃለያ |
Windows Defender summary |
43167 | Windows ተከላካይ ጸረቫይረስ ከእርስዎ የመጨረሻው ማጠቃለያ ወዲህ ምንም ስጋቶች አላገኘም። |
Windows Defender Antivirus did not find any threats since your last summary. |
43168 | Windows ተከላካይ ጸረቫይረስ ከእርስዎ የመጨረሻው ማጠቃለያ ወዲህ በ %s ስጋትቶች ላይ በሚገባ እርምጃ ወስዷል። |
Windows Defender Antivirus successfully took action on %s threats since your last summary. |
43169 | Windows ተከላካይ ጸረ ቫይረስ ከመጨረሻው መግለጫዎ በኋላ ምንም ስጋቶች አላገኘም። መሳሪያዎ %s ጊዜ ተቅረጽቶ ነበር። |
Windows Defender Antivirus did not find any threats since your last summary. Your device was scanned %s times. |
43170 | Windows ተከላካይ ጸረ ቫይረስ ከመጨረሻው መግለጫዎ በፊት በ%s ስጋቶች ላይ በተገቢዉ ሁኔታ እርምጃዎችን ወስዷል። መሳሪያዎ %s ጊዜ ተቅረጽቶ ነበር። |
Windows Defender Antivirus successfully took action on %s threats since your last summary. Your device was scanned %s times. |
43171 | የWindows ተከላካይ ቅርጸት ውጤቶች |
Windows Defender scan results |
43172 | Windows ተከላካይ ጸረ ቫይረስ መሳሪያዎን %s ላይ በ%s ቅረጽቷል። ምንም ስጋቶ ቻ አልተገኙም። |
Windows Defender Antivirus scanned your device at %s on %s. No threats were found. |
43173 | Windows ተከላካይ ጸረ ቫይረስ መሳሪያዎን %s ላይ በ%s ቀርጽዋል፣ እናም ስጋቶች ላይ እርምጃ ወስዷል። |
Windows Defender Antivirus scanned your device at %s on %s, and took action against threats. |
43174 | የ Windows ተከላካይ በተወሰነ የጊዜ ልዩነት የሚደረግ ቀረጻ በርቷል |
Windows Defender periodic scanning on |
43175 | Windows ተከላካይ ጸረቫይረስ በየጊዜው መሳሪያዎን እየቃኘ ነው። በተጨማሪም ለነቃ ጥበቃ ሌላ ጸረቫይረስ እየተጠቀሙ ነው። |
Windows Defender Antivirus is periodically scanning your device. You’re also using another antivirus program for active protection. |
43176 | ኢንተርፕራይዝ ያልተፈለገ መተግበሪያ ተገኝቷል |
Enterprise Unwanted Application found |
43177 | ይህ መተግበሪያ በእርስዎ የIT ደህንነት ቅንብሮች የታገደ በመሆኑ ተወግዷል። |
This application was removed because it is blocked by your IT security settings. |
43178 | Windows ተከላካይ ጸረቫይረስ ይህን ፋይል እየቀረጸው ነው |
Windows Defender Antivirus is scanning this file |
43179 | የእርስዎ ፋይል ከትንሽ ጊዜ በኋላ የሚገኝ ይሆናል |
Your file will be available shortly |
43180 | የእርስዎ ድርጅት ይህን ቅኝት ይጠይቃል |
Your organization requires this scan |
43181 | ፋይሉ ከትንሽ ጊዜ በኋላ የሚገኝ ይሆናል |
The file will be available shortly |
43182 | Microsoft ደህንነት ደንበኛ እርምጃ እየወሰደ ነው። |
Microsoft Security Client is taking action. |
43183 | ስጋቶች ተገኝተዋል |
Threats found |
43184 | እርምጃዎች ያስፈልጋሉ |
Actions needed |
43186 | የ IT የክንዉን አዉድዎ Windows ተከላካይ ጸረቫይረስ ያልተፈለገ ድርጊቶችን በመሳሪያዎ ላይ ለማድረግ ብቃት ያለዉን መተግበሪያ አንዲያግድ አደርጎታል። |
Your IT settings caused Windows Defender Antivirus to block an app that may potentially perform unwanted actions on your device. |
43187 | የ IT የክንዉን አዉድዎ Microsoft ደህንነት ደንበኛ ያልተፈለገ ድርጊቶችን በመሳሪያዎ ላይ ለማድረግ ብቃት ያለዉን መተግበሪያ አንዲያግድ አደርጎታል። |
Your IT settings caused Microsoft Security Client to block an app that may potentially perform unwanted actions on your device. |
43188 | በቅርጸት ወቅት የተዘለሉ ንጥሎች |
Items skipped during scan |
43189 | የWindows ተከላካይ ጸረቫይረስ ቅርጸት በእርስዎ ያለማካተት የክንዉን አዉድ መሰረት ንጥሎችን ዘሏል። |
The Windows Defender Antivirus scan skipped items because of your exclusion settings. |
43190 | የስጋት ቅርጸት መረጃ |
Threat scan info |
43191 | Windows ተከላካይ ጸረቫይረስ ስጋት ሊሆን የሚችልን ነገር ሙሉ ለሙሉ መፍታት አልቻለም። |
Windows Defender Antivirus couldn't completely resolve a potential threat. |
43192 | Windows ተከላካይ ማሳወቂያ አማራጮች |
Windows Defender notification options |
43193 | የWindows ተከላካይ እንቅስቃሴ ወቅታዊ አጭር መግለጫዎችን መቀበል መቀጠል ይፈልጋሉ? |
Would you like to continue receiving periodic summaries of Windows Defender activity? |
43194 | አዎ |
Yes |
43195 | አይ |
No |
43196 | ዝርዝር የማሳወቂያ የክንውን አውዶች |
Detailed notification settings |
0x800106B5 | This program's service has stopped. You can start the service manually or restart your device, which will start the service. |
This program's service has stopped. You can start the service manually or restart your device, which will start the service. |
0x800700D8 | This version of the software is not compatible with the version of Windows you're running. Check your device's system information to see whether you need a x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher. |
This version of the software is not compatible with the version of Windows you're running. Check your device's system information to see whether you need a x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher. |
0x80070641 | The Windows Installer Service could not be accessed. Make sure that Windows Installer is installed and that you are not running Windows in safe mode, and then try again. |
The Windows Installer Service could not be accessed. Make sure that Windows Installer is installed and that you are not running Windows in safe mode, and then try again. |
0x80240000 | An unexpected problem occurred while checking for updates. For information on installing or troubleshooting updates, see Help and Support. |
An unexpected problem occurred while checking for updates. For information on installing or troubleshooting updates, see Help and Support. |
0x80240022 | The program can't check for definition updates. |
The program can't check for definition updates. |
0x80500000 | An unexpected problem occurred. Install any available updates, and then try to start the program again. For information on installing updates, see Help and Support. |
An unexpected problem occurred. Install any available updates, and then try to start the program again. For information on installing updates, see Help and Support. |
0x80501001 | One or more actions could not be completed successfully. For details, click on an individual item or go to History. |
One or more actions could not be completed successfully. For details, click on an individual item or go to History. |
0x80501002 | The program can't find definition files that help detect unwanted software. Check for updates to the definition files, and then try again. For information on installing updates, see Help and Support. |
The program can't find definition files that help detect unwanted software. Check for updates to the definition files, and then try again. For information on installing updates, see Help and Support. |
0x80508001 | A problem is preventing the program from starting. Install any available updates, and then try to start the program again. For information on installing updates, see Help and Support. |
A problem is preventing the program from starting. Install any available updates, and then try to start the program again. For information on installing updates, see Help and Support. |
0x80508007 | Your device is low on memory. Close some programs and try again, or search Help and Support for information about preventing low memory problems. |
Your device is low on memory. Close some programs and try again, or search Help and Support for information about preventing low memory problems. |
0x8050800D | Some history items could not be displayed. Please wait a few minutes and try again. If that doesn't work, clear the history and then try again. |
Some history items could not be displayed. Please wait a few minutes and try again. If that doesn't work, clear the history and then try again. |
0x8050800E | To use this program, you need to install the latest updates for your device. For information on installing updates, see Help and Support. |
To use this program, you need to install the latest updates for your device. For information on installing updates, see Help and Support. |
0x80508011 | An unexpected problem has prevented the program from scanning your device for unwanted software. Try to scan your device again. |
An unexpected problem has prevented the program from scanning your device for unwanted software. Try to scan your device again. |
0x80508013 | An unexpected problem has prevented the program from scanning your device for unwanted software. Try clearing the program history, and then scan your device again. |
An unexpected problem has prevented the program from scanning your device for unwanted software. Try clearing the program history, and then scan your device again. |
0x80508014 | The quarantined item cannot be restored. |
The quarantined item cannot be restored. |
0x80508017 | Some actions couldn't be applied to potentially harmful items. The items might be stored in a read-only location. Delete the files or folders that contains the items or, for information on removing read-only permissions from files and folders, see Help and Support. |
Some actions couldn't be applied to potentially harmful items. The items might be stored in a read-only location. Delete the files or folders that contains the items or, for information on removing read-only permissions from files and folders, see Help and Support. |
0x80508019 | The file or drive you are trying to scan does not exist on this device. Choose another file or drive, and then scan your device again. |
The file or drive you are trying to scan does not exist on this device. Choose another file or drive, and then scan your device again. |
0x80508022 | To finish removing malware and other potentially unwanted software, restart the device. |
To finish removing malware and other potentially unwanted software, restart the device. |
0x80508023 | The program could not find the malware and other potentially unwanted software on this device. |
The program could not find the malware and other potentially unwanted software on this device. |
0x80508024 | To finish removing malware and other potentially unwanted software, you need to run a full scan. For information about scanning options, see Help and Support. |
To finish removing malware and other potentially unwanted software, you need to run a full scan. For information about scanning options, see Help and Support. |
0x80508025 | To see how to finish removing malware and other potentially unwanted software, see the support article on the Microsoft Security website. |
To see how to finish removing malware and other potentially unwanted software, see the support article on the Microsoft Security website. |
0x80508026 | This program can't remove a potentially harmful item from the contents of an archived file. To remove the item, you need to delete the archive. For more information, search for removing malware in Help and Support. |
This program can't remove a potentially harmful item from the contents of an archived file. To remove the item, you need to delete the archive. For more information, search for removing malware in Help and Support. |
0x80508027 | This copy of Windows is not genuine. To receive the full protection of this program, you must verify that your copy of Windows is genuine. Until you successfully validate your copy of Windows, this program will only remove certain threats. Only users of genuine Microsoft software get access to the latest updates, features, and product support. |
This copy of Windows is not genuine. To receive the full protection of this program, you must verify that your copy of Windows is genuine. Until you successfully validate your copy of Windows, this program will only remove certain threats. Only users of genuine Microsoft software get access to the latest updates, features, and product support. |
0x80508028 | Some e-mail components are stored in a location we were unable to modify. A list of infected e-mail messages are displayed in the details pane. You should try to remove these e-mail messages using your mail client. |
Some e-mail components are stored in a location we were unable to modify. A list of infected e-mail messages are displayed in the details pane. You should try to remove these e-mail messages using your mail client. |
0x80508030 | To finish removing malware and other potentially unwanted software, you need to run an offline scan. For information about scanning options, see Help and Support. |
To finish removing malware and other potentially unwanted software, you need to run an offline scan. For information about scanning options, see Help and Support. |
0x8050A003 | This package does not contain up-to-date definition files for this program. For more information, see Help and Support. |
This package does not contain up-to-date definition files for this program. For more information, see Help and Support. |