Skip to content

Commit 17e50f8

Browse files
Merge pull request #1009 from MicrosoftDocs/aljupudi-9194206-ms.subservice
ms.subservice update - 20 topics
2 parents f27d64d + 91ee36c commit 17e50f8

20 files changed

+20
-0
lines changed

defender-endpoint/api-microsoft-flow.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: How to use Power Automate Connector to set up a Flow for events
33
ms.reviewer:
44
description: Use Microsoft Defender for Endpoint Flow connector to create a flow that will be triggered anytime a new event occurs on your tenant.
55
ms.service: defender-endpoint
6+
ms.subservice: reference
67
ms.author: siosulli
78
author: siosulli
89
ms.localizationpriority: medium

defender-endpoint/malware/coinminer-malware.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Learn about coin miners, how they can infect devices, and what you can do to protect yourself.
55
keywords: security, malware, coin miners, protection, cryptocurrencies
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.mktglfcycl: secure
89
ms.localizationpriority: medium
910
ms.author: dansimp

defender-endpoint/malware/exploits-malware.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Exploits and exploit kits
33
ms.reviewer:
44
description: Learn about how exploits use vulnerabilities in common software to give attackers access to your computer and install other malware.
55
ms.service: defender-endpoint
6+
ms.subservice: reference
67
ms.localizationpriority: medium
78
ms.author: dansimp
89
author: dansimp

defender-endpoint/malware/fileless-threats.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Learn about the categories of fileless threats and malware that live off the land
55
keywords: fileless, fileless malware, living off the land, lolbins, amsi, behavior monitoring, memory scanning, boot sector protection, security, malware, Windows Defender ATP, antivirus, AV, Microsoft Defender ATP, next-generation protection
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.mktglfcycl: secure
89
ms.localizationpriority: medium
910
ms.author: dansimp

defender-endpoint/malware/macro-malware.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Learn about macro viruses and malware, which are embedded in documents and are used to drop malicious payloads and distribute other threats.
55
keywords: security, malware, macro, protection, WDSI, MMPC, Microsoft Malware Protection Center, macro virus, macro malware, documents, viruses in Office, viruses in Word
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.localizationpriority: medium
89
ms.author: dansimp
910
author: dansimp

defender-endpoint/malware/phishing-trends.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Learn about how to spot phishing techniques
55
keywords: security, malware, phishing, information, scam, social engineering, bait, lure, protection, trends, targeted attack, spear phishing, whaling
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.mktglfcycl: secure
89
ms.localizationpriority: medium
910
ms.author: dansimp

defender-endpoint/malware/phishing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Learn about how phishing work, deliver malware do your devices, and what you can do to protect yourself.
55
keywords: security, malware, phishing, information, scam, social engineering, bait, lure, protection, trends, targeted attack
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.mktglfcycl: secure
89
ms.localizationpriority: medium
910
ms.author: dansimp

defender-endpoint/malware/prevent-malware-infection.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Learn steps you can take to help prevent a malware or potentially unwanted software from infecting your computer.
55
keywords: security, malware, prevention, infection, tips, Microsoft, MMPC, Microsoft Malware Protection Center, virus, trojan, worm, stop, prevent, full scan, infection, avoid malware, avoid trojan, avoid virus, infection, how, detection, security software, antivirus, updates, how malware works, how virus works, firewall, turn on, user privileges, limit, prevention, WDSI, MMPC, Microsoft Malware Protection Center
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.mktglfcycl: secure
89
ms.localizationpriority: medium
910
ms.author: dansimp

defender-endpoint/malware/rootkits-malware.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Rootkits may be used by malware authors to hide malicious code on your computer and make malware or potentially unwanted software harder to remove.
55
keywords: security, malware, rootkit, hide, protection, hiding, WDSI, MMPC, Microsoft Malware Protection Center, rootkits, Sirefef, Rustock, Sinowal, Cutwail, malware, virus
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.mktglfcycl: secure
89
ms.localizationpriority: medium
910
ms.author: dansimp

defender-endpoint/malware/supply-chain-malware.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Learn about how supply chain attacks work, deliver malware do your devices, and what you can do to protect yourself
55
keywords: security, malware, protection, supply chain, hide, distribute, trust, compromised
66
ms.service: defender-endpoint
7+
ms.subservice: reference
78
ms.mktglfcycl: secure
89
ms.localizationpriority: medium
910
ms.author: dansimp

0 commit comments

Comments
 (0)