You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/criteria.md
+48-15Lines changed: 48 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: How Microsoft identifies malware and potentially unwanted applications
3
-
ms.reviewer:
3
+
ms.reviewer: andanut, elahehsamani
4
4
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
5
5
ms.service: defender-xdr
6
6
ms.localizationpriority: medium
@@ -12,15 +12,15 @@ ms.collection:
12
12
- m365-security
13
13
- tier2
14
14
ms.topic: conceptual
15
-
ms.date: 12/13/2021
15
+
ms.date: 04/26/2024
16
16
search.appverid: met150
17
17
---
18
18
19
19
# How Microsoft identifies malware and potentially unwanted applications
20
20
21
-
Microsoft aims to provide a delightful and productive Windows experience by working to ensure you're safe and in control of your devices. Microsoft helps protect you from potential threats by identifying and analyzing software and online content. When you download, install, and run software, we check the reputation of downloaded programs and ensure you're protected against known threats. You are also warned about software that is unknown to us.
21
+
Microsoft aims to provide a delightful and productive Windows experience by working to ensure you're safe and in control of your devices. Microsoft helps protect you from potential threats by identifying and analyzing software and online content. When you download, install, and run software, we check the reputation of downloaded programs and ensure you're protected against known threats. You're also warned about software that is unknown to us.
22
22
23
-
You can assist Microsoft by [submitting unknown or suspicious software for analysis](https://www.microsoft.com/wdsi/filesubmission/). This will help ensure that unknown or suspicious software is scanned by our system to start establishing reputation. [Learn more about submitting files for analysis](submission-guide.md)
23
+
You can assist Microsoft by [submitting unknown or suspicious software for analysis](https://www.microsoft.com/wdsi/filesubmission/). Submitting files for analysis helps ensure that unknown or suspicious software is scanned by our system to start establishing reputation. [Learn more about submitting files for analysis](submission-guide.md)
24
24
25
25
The next sections provide an overview of the classifications we use for applications and the types of behaviors that lead to that classification.
26
26
@@ -37,11 +37,11 @@ Once enough data is gathered, Microsoft's security solutions can make a determin
37
37
38
38
## Malware
39
39
40
-
Malware is the overarching name for applications and other code, like software, that Microsoft classifies more granularly as *malicious software*or *unwanted software*.
40
+
Malware is the overarching name for applications and other code, like software, that Microsoft classifies more granularly as *malicious software*, *unwanted software*, or *tampering software*.
41
41
42
42
### Malicious software
43
43
44
-
Malicious software is an application or code that compromises user security. Malicious software may steal your personal information, lock your device until you pay a ransom, use your device to send spam, or download other malicious software. In general, malicious software wants to trick, cheat, or defrauds users, placing them in vulnerable states.
44
+
Malicious software is an application or code that compromises user security. Malicious software might steal your personal information, lock your device until you pay a ransom, use your device to send spam, or download other malicious software. In general, malicious software wants to trick, cheat, or defrauds users, placing them in vulnerable states.
45
45
46
46
Microsoft classifies most malicious software into one of the following categories:
47
47
@@ -61,15 +61,15 @@ Microsoft classifies most malicious software into one of the following categorie
61
61
62
62
***Obfuscator:** A type of malware that hides its code and purpose, making it more difficult for security software to detect or remove.
63
63
64
-
***Password stealer:** A type of malware that gathers your personal information, such as usernames and passwords. It often works along with a keylogger, which collects and sends information about the keys you press and websites you visit.
64
+
***Password stealer:** A type of malware that gathers your personal information, such as usernames and passwords. It often works along with a key logger, which collects and sends information about the keys you press and websites you visit.
65
65
66
-
***Ransomware:** A type of malware that encrypts your files or makes other modifications that can prevent you from using your device. It then displays a ransom note that states you must pay money or perform other actions before you can use your device again. [See more information about ransomware](/security/ransomware/human-operated-ransomware).
66
+
***Ransomware:** A type of malware that encrypts your files or makes other modifications that can prevent you from using your device. It then displays a ransom note that states you must pay money or perform other actions before you can use your device again. [Learn more about ransomware](/security/ransomware/).
67
67
68
68
***Rogue security software:** Malware that pretends to be security software but doesn't provide any protection. This type of malware usually displays alerts about nonexistent threats on your device. It also tries to convince you to pay for its services.
69
69
70
70
***Trojan:** A type of malware that attempts to appear harmless. Unlike a virus or a worm, a trojan doesn't spread by itself. Instead, it tries to look legitimate to tricks users into downloading and installing it. Once installed, trojans perform various malicious activities such as stealing personal information, downloading other malware, or giving attackers access to your device.
71
71
72
-
***Trojan clicker:** A type of trojan that automatically clicks buttons or similar controls on websites or applications. Attackers can use this trojan to click on online advertisements. These clicks can skew online polls or other tracking systems and can even install applications on your device.
72
+
***Trojan clicker:** A type of trojan that automatically selects buttons or similar controls on websites or applications. Attackers can use this trojan to click on online advertisements. These clicks can skew online polls or other tracking systems and can even install applications on your device.
73
73
74
74
***Worm:** A type of malware that spreads to other devices. Worms can spread through email, instant messaging, file sharing platforms, social networks, network shares, and removable drives. Sophisticated worms take advantage of software vulnerabilities to propagate.
75
75
@@ -95,7 +95,7 @@ Software that exhibits lack of choice might:
95
95
96
96
* Falsely claim to be software from Microsoft.
97
97
98
-
Software must not mislead or coerce you into making decisions about your device. It is considered behavior that limits your choices. In addition to the previous list, software that exhibits lack of choice might:
98
+
Software must not mislead or coerce you into making decisions about your device. It's considered behavior that limits your choices. In addition to the previous list, software that exhibits lack of choice might:
99
99
100
100
* Display exaggerated claims about your device's health.
101
101
@@ -121,7 +121,7 @@ Software that exhibits lack of control might:
121
121
122
122
* Modify or manipulate webpage content without your consent.
123
123
124
-
Software that changes your browsing experience must only use the browser's supported extensibility model for installation, execution, disabling, or removal. Browsers that don't provide supported extensibility models are considered non-extensible and shouldn't be modified.
124
+
Software that changes your browsing experience must only use the browser's supported extensibility model for installation, execution, disabling, or removal. Browsers that don't provide supported extensibility models are considered nonextensible and shouldn't be modified.
125
125
126
126
#### Installation and removal
127
127
@@ -163,25 +163,58 @@ Advertisements shown to you must:
163
163
164
164
Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps Microsoft identify new malware quickly. After analysis, Microsoft creates Security intelligence for software that meets the described criteria. This Security intelligence identifies the software as malware and are available to all users through Microsoft Defender Antivirus and other Microsoft antimalware solutions.
165
165
166
+
### Tampering software
167
+
168
+
Tampering software encompasses a broad spectrum of tools and threats that directly or indirectly lower the overall level of security of devices. Examples of common tampering actions include:
169
+
170
+
***Disabling or uninstalling security software**: Tools and threats that attempt to evade defense mechanisms by disabling or uninstalling security software, such as antivirus, EDR, or network protection systems. These actions leave the system vulnerable to further attacks.
171
+
172
+
***Abusing operating system features and settings**: Tools and threats that exploit features and settings within the operating system to compromise security. Examples include:
173
+
174
+
-**Firewall abuse**: Attackers using firewall components to indirectly tamper with security software or block legitimate network connections, potentially enabling unauthorized access or data exfiltration.
175
+
176
+
-**DNS manipulation**: Tampering with DNS settings to redirect traffic or block security updates, leaving the system exposed to malicious activities.
177
+
178
+
-**Safe mode exploitation**: Leveraging the legitimate Safe Mode setting to put the device in a state where security solutions might be bypassed, allowing for unauthorized access or malware execution.
179
+
180
+
***Manipulating system components**: Tools and threats that target critical system components, such as kernel drivers or system services, to compromise the overall security and stability of the device.
181
+
182
+
***Privilege escalation**: Techniques aimed at elevating user privileges to gain control over the system's resources and potentially manipulate security settings.
183
+
184
+
***Interfering with security updates**: Attempts to block or manipulate security updates, leaving the system vulnerable to known vulnerabilities.
185
+
186
+
***Disrupting critical services**: Actions that disrupt essential system services or processes, potentially causing system instability and opening the door for other attacks.
187
+
188
+
***Unauthorized registry changes**: Modifications to the Windows Registry or system settings that impact the security posture of the device.
189
+
190
+
***Tampering with boot processes**: Efforts to manipulate the boot process, which can result in the loading of malicious code during startup.
191
+
166
192
## Potentially unwanted application (PUA)
167
193
168
-
Our PUA protection aims to safeguard user productivity and ensure enjoyable Windows experiences. This protection helps deliver more productive, performant, and delightful Windows experiences. For instruction on how to enable PUA protection in Chromium-based Microsoft Edge and Microsoft Defender Antivirus, see [Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
194
+
Our PUA protection aims to safeguard user productivity and ensure enjoyable Windows experiences. This protection helps deliver more productive, performant, and delightful Windows experiences. For instruction on how to enable PUA protection in Chromium-based Microsoft Edge and Microsoft Defender Antivirus, see [Detect and block potentially unwanted applications](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
169
195
170
-
*PUAs are not considered malware.*
196
+
*PUAs aren't considered malware.*
171
197
172
198
Microsoft uses specific categories and the category definitions to classify software as a PUA.
173
199
174
-
***Advertising software:** Software that displays advertisements or promotions, or prompts you to complete surveys for other products or services in software other than itself. This includes software that inserts advertisements to webpages.
200
+
***Advertising software:** Software that displays advertisements or promotions, or prompts you to complete surveys for other products or services in software other than itself. Such software includes software that inserts advertisements to webpages.
175
201
176
202
***Torrent software (Enterprise only):** Software that is used to create or download torrents or other files specifically used with peer-to-peer file-sharing technologies.
177
203
178
204
***Cryptomining software (Enterprise only):** Software that uses your device resources to mine cryptocurrencies.
179
205
180
-
***Bundling software:** Software that offers to install other software that is not developed by the same entity or not required for the software to run. Also, software that offers to install other software that qualifies as PUA based on the criteria outlined in this document.
206
+
***Bundling software:** Software that offers to install other software that isn't developed by the same entity or not required for the software to run. Also, software that offers to install other software that qualifies as PUA based on the criteria outlined in this document.
181
207
182
208
***Marketing software:** Software that monitors and transmits the activities of users to applications or services other than itself for marketing research.
183
209
184
210
***Evasion software:** Software that actively tries to evade detection by security products, including software that behaves differently in the presence of security products.
185
211
186
212
***Poor industry reputation:** Software that trusted security providers detect with their security products. The security industry is dedicated to protecting customers and improving their experiences. Microsoft and other organizations in the security industry continuously exchange knowledge about files we have analyzed to provide users with the best possible protection.
187
213
214
+
## Vulnerable software
215
+
216
+
Vulnerable software is an application or code that has security flaws or weaknesses which can be exploited by attackers to perform various malicious and potentially destructive actions. These vulnerabilities may stem from unintentional coding errors or design flaws, and if exploited, can lead to harmful activities such as unauthorized access, privilege escalation, tampering, and more.
217
+
218
+
### Vulnerable drivers
219
+
220
+
Despite strict requirements and reviews imposed on code running in kernel, device drivers remain susceptible to various types of vulnerabilities and bugs. Examples include memory corruption and arbitrary read and write bugs, which can be exploited by attackers to execute more significant malicious and destructive actions -– actions typically restricted in user mode. Terminating critical processes on a device is an example of such malicious action.
0 commit comments