You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/criteria.md
+41-6Lines changed: 41 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: How Microsoft identifies malware and potentially unwanted applications
3
-
ms.reviewer:
3
+
ms.reviewer: andanut, elahehsamani
4
4
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
5
5
ms.service: defender-xdr
6
6
ms.localizationpriority: medium
@@ -12,14 +12,15 @@ ms.collection:
12
12
- m365-security
13
13
- tier2
14
14
ms.topic: conceptual
15
-
ms.date: 06/27/2024
15
+
ms.date: 10/30/2024
16
16
search.appverid: met150
17
17
---
18
18
19
19
# How Microsoft identifies malware and potentially unwanted applications
20
20
21
21
Microsoft aims to provide a delightful and productive Windows experience by working to ensure you're safe and in control of your devices. Microsoft helps protect you from potential threats by identifying and analyzing software and online content. When you download, install, and run software, we check the reputation of downloaded programs and ensure you're protected against known threats. You're also warned about software that is unknown to us.
22
22
23
+
23
24
You can assist Microsoft by [submitting unknown or suspicious software for analysis](https://www.microsoft.com/wdsi/filesubmission/). Submissions help ensure that unknown or suspicious software is scanned by our system to start establishing reputation. [Learn more about submitting files for analysis](submission-guide.md)
24
25
25
26
The next sections provide an overview of the classifications we use for applications and the types of behaviors that lead to that classification.
@@ -37,10 +38,11 @@ Once enough data is gathered, Microsoft's security solutions can make a determin
37
38
38
39
## Malware
39
40
40
-
Malware is the overarching name for applications and other code, like software, that Microsoft classifies more granularly as *malicious software*or *unwanted software*.
41
+
Malware is the overarching name for applications and other code, like software, that Microsoft classifies more granularly as *malicious software*, *unwanted software*, or *tampering software*.
41
42
42
43
### Malicious software
43
44
45
+
44
46
Malicious software is an application or code that compromises user security. Malicious software could steal your personal information, lock your device until you pay a ransom, use your device to send spam, or download other malicious software. In general, malicious software wants to trick, cheat, or defrauds users, placing them in vulnerable states.
45
47
46
48
Microsoft classifies most malicious software into one of the following categories:
@@ -121,7 +123,7 @@ Software that exhibits lack of control might:
121
123
122
124
- Modify or manipulate webpage content without your consent.
123
125
124
-
Software that changes your browsing experience must only use the browser's supported extensibility model for installation, execution, disabling, or removal. Browsers that don't provide supported extensibility models are considered non-extensible and shouldn't be modified.
126
+
Software that changes your browsing experience must only use the browser's supported extensibility model for installation, execution, disabling, or removal. Browsers that don't provide supported extensibility models are considered nonextensible and shouldn't be modified.
125
127
126
128
#### Installation and removal
127
129
@@ -163,11 +165,37 @@ Advertisements shown to you must:
163
165
164
166
Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps Microsoft identify new malware quickly. After analysis, Microsoft creates Security intelligence for software that meets the described criteria. This Security intelligence identifies the software as malware and are available to all users through Microsoft Defender Antivirus and other Microsoft antimalware solutions.
165
167
168
+
### Tampering software
169
+
170
+
Tampering software encompasses a broad spectrum of tools and threats that directly or indirectly lower the overall level of security of devices. Examples of common tampering actions include:
171
+
172
+
***Disabling or uninstalling security software**: Tools and threats that attempt to evade defense mechanisms by disabling or uninstalling security software, such as antivirus, EDR, or network protection systems. These actions leave the system vulnerable to further attacks.
173
+
174
+
***Abusing operating system features and settings**: Tools and threats that exploit features and settings within the operating system to compromise security. Examples include:
175
+
176
+
-**Firewall abuse**: Attackers using firewall components to indirectly tamper with security software or block legitimate network connections, potentially enabling unauthorized access or data exfiltration.
177
+
178
+
-**DNS manipulation**: Tampering with DNS settings to redirect traffic or block security updates, leaving the system exposed to malicious activities.
179
+
180
+
-**Safe mode exploitation**: Leveraging the legitimate Safe Mode setting to put the device in a state where security solutions might be bypassed, allowing for unauthorized access or malware execution.
181
+
182
+
***Manipulating system components**: Tools and threats that target critical system components, such as kernel drivers or system services, to compromise the overall security and stability of the device.
183
+
184
+
***Privilege escalation**: Techniques aimed at elevating user privileges to gain control over the system's resources and potentially manipulate security settings.
185
+
186
+
***Interfering with security updates**: Attempts to block or manipulate security updates, leaving the system vulnerable to known vulnerabilities.
187
+
188
+
***Disrupting critical services**: Actions that disrupt essential system services or processes, potentially causing system instability and opening the door for other attacks.
189
+
190
+
***Unauthorized registry changes**: Modifications to the Windows Registry or system settings that impact the security posture of the device.
191
+
192
+
***Tampering with boot processes**: Efforts to manipulate the boot process, which can result in the loading of malicious code during startup.
193
+
166
194
## Potentially unwanted application (PUA)
167
195
168
-
Our PUA protection aims to safeguard user productivity and ensure enjoyable Windows experiences. This protection helps deliver more productive, performant, and delightful Windows experiences. For instruction on how to enable PUA protection in Chromium-based Microsoft Edge and Microsoft Defender Antivirus, see [Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
196
+
Our PUA protection aims to safeguard user productivity and ensure enjoyable Windows experiences. This protection helps deliver more productive, performant, and delightful Windows experiences. For instruction on how to enable PUA protection in Chromium-based Microsoft Edge and Microsoft Defender Antivirus, see [Detect and block potentially unwanted applications](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
169
197
170
-
*PUAs are not considered malware.*
198
+
*PUAs aren't considered malware.*
171
199
172
200
Microsoft uses specific categories and the category definitions to classify software as a PUA.
173
201
@@ -185,3 +213,10 @@ Microsoft uses specific categories and the category definitions to classify soft
185
213
186
214
-**Poor industry reputation:** Software that trusted security providers detect with their security products. The security industry is dedicated to protecting customers and improving their experiences. Microsoft and other organizations in the security industry continuously exchange knowledge about files we have analyzed to provide users with the best possible protection.
187
215
216
+
## Vulnerable software
217
+
218
+
Vulnerable software is an application or code that has security flaws or weaknesses which can be exploited by attackers to perform various malicious and potentially destructive actions. These vulnerabilities may stem from unintentional coding errors or design flaws, and if exploited, can lead to harmful activities such as unauthorized access, privilege escalation, tampering, and more.
219
+
220
+
### Vulnerable drivers
221
+
222
+
Despite strict requirements and reviews imposed on code running in kernel, device drivers remain susceptible to various types of vulnerabilities and bugs. Examples include memory corruption and arbitrary read and write bugs, which can be exploited by attackers to execute more significant malicious and destructive actions -– actions typically restricted in user mode. Terminating critical processes on a device is an example of such malicious action.
0 commit comments