Consider the following scenario:
- You install Windows 8.
- You change the Hosts file by specifying custom IP-address-to-host-name mappings to prevent users from browsing to some websites.
- You run a scan in Microsoft Windows Defender.