Skip to content

Commit cf27ccb

Browse files
authored
Merge pull request #186 from MicrosoftDocs/defender-criteria
2 parents 17b6979 + 36ae768 commit cf27ccb

File tree

1 file changed

+41
-6
lines changed

1 file changed

+41
-6
lines changed

defender-xdr/criteria.md

Lines changed: 41 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: How Microsoft identifies malware and potentially unwanted applications
3-
ms.reviewer:
3+
ms.reviewer: andanut, elahehsamani
44
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
55
ms.service: defender-xdr
66
ms.localizationpriority: medium
@@ -12,14 +12,15 @@ ms.collection:
1212
- m365-security
1313
- tier2
1414
ms.topic: conceptual
15-
ms.date: 06/27/2024
15+
ms.date: 10/30/2024
1616
search.appverid: met150
1717
---
1818

1919
# How Microsoft identifies malware and potentially unwanted applications
2020

2121
Microsoft aims to provide a delightful and productive Windows experience by working to ensure you're safe and in control of your devices. Microsoft helps protect you from potential threats by identifying and analyzing software and online content. When you download, install, and run software, we check the reputation of downloaded programs and ensure you're protected against known threats. You're also warned about software that is unknown to us.
2222

23+
2324
You can assist Microsoft by [submitting unknown or suspicious software for analysis](https://www.microsoft.com/wdsi/filesubmission/). Submissions help ensure that unknown or suspicious software is scanned by our system to start establishing reputation. [Learn more about submitting files for analysis](submission-guide.md)
2425

2526
The next sections provide an overview of the classifications we use for applications and the types of behaviors that lead to that classification.
@@ -37,10 +38,11 @@ Once enough data is gathered, Microsoft's security solutions can make a determin
3738

3839
## Malware
3940

40-
Malware is the overarching name for applications and other code, like software, that Microsoft classifies more granularly as *malicious software* or *unwanted software*.
41+
Malware is the overarching name for applications and other code, like software, that Microsoft classifies more granularly as *malicious software*, *unwanted software*, or *tampering software*.
4142

4243
### Malicious software
4344

45+
4446
Malicious software is an application or code that compromises user security. Malicious software could steal your personal information, lock your device until you pay a ransom, use your device to send spam, or download other malicious software. In general, malicious software wants to trick, cheat, or defrauds users, placing them in vulnerable states.
4547

4648
Microsoft classifies most malicious software into one of the following categories:
@@ -121,7 +123,7 @@ Software that exhibits lack of control might:
121123

122124
- Modify or manipulate webpage content without your consent.
123125

124-
Software that changes your browsing experience must only use the browser's supported extensibility model for installation, execution, disabling, or removal. Browsers that don't provide supported extensibility models are considered non-extensible and shouldn't be modified.
126+
Software that changes your browsing experience must only use the browser's supported extensibility model for installation, execution, disabling, or removal. Browsers that don't provide supported extensibility models are considered nonextensible and shouldn't be modified.
125127

126128
#### Installation and removal
127129

@@ -163,11 +165,37 @@ Advertisements shown to you must:
163165

164166
Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps Microsoft identify new malware quickly. After analysis, Microsoft creates Security intelligence for software that meets the described criteria. This Security intelligence identifies the software as malware and are available to all users through Microsoft Defender Antivirus and other Microsoft antimalware solutions.
165167

168+
### Tampering software
169+
170+
Tampering software encompasses a broad spectrum of tools and threats that directly or indirectly lower the overall level of security of devices. Examples of common tampering actions include:
171+
172+
* **Disabling or uninstalling security software**: Tools and threats that attempt to evade defense mechanisms by disabling or uninstalling security software, such as antivirus, EDR, or network protection systems. These actions leave the system vulnerable to further attacks.
173+
174+
* **Abusing operating system features and settings**: Tools and threats that exploit features and settings within the operating system to compromise security. Examples include:
175+
176+
- **Firewall abuse**: Attackers using firewall components to indirectly tamper with security software or block legitimate network connections, potentially enabling unauthorized access or data exfiltration.
177+
178+
- **DNS manipulation**: Tampering with DNS settings to redirect traffic or block security updates, leaving the system exposed to malicious activities.
179+
180+
- **Safe mode exploitation**: Leveraging the legitimate Safe Mode setting to put the device in a state where security solutions might be bypassed, allowing for unauthorized access or malware execution.
181+
182+
* **Manipulating system components**: Tools and threats that target critical system components, such as kernel drivers or system services, to compromise the overall security and stability of the device.
183+
184+
* **Privilege escalation**: Techniques aimed at elevating user privileges to gain control over the system's resources and potentially manipulate security settings.
185+
186+
* **Interfering with security updates**: Attempts to block or manipulate security updates, leaving the system vulnerable to known vulnerabilities.
187+
188+
* **Disrupting critical services**: Actions that disrupt essential system services or processes, potentially causing system instability and opening the door for other attacks.
189+
190+
* **Unauthorized registry changes**: Modifications to the Windows Registry or system settings that impact the security posture of the device.
191+
192+
* **Tampering with boot processes**: Efforts to manipulate the boot process, which can result in the loading of malicious code during startup.
193+
166194
## Potentially unwanted application (PUA)
167195

168-
Our PUA protection aims to safeguard user productivity and ensure enjoyable Windows experiences. This protection helps deliver more productive, performant, and delightful Windows experiences. For instruction on how to enable PUA protection in Chromium-based Microsoft Edge and Microsoft Defender Antivirus, see [Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
196+
Our PUA protection aims to safeguard user productivity and ensure enjoyable Windows experiences. This protection helps deliver more productive, performant, and delightful Windows experiences. For instruction on how to enable PUA protection in Chromium-based Microsoft Edge and Microsoft Defender Antivirus, see [Detect and block potentially unwanted applications](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
169197

170-
*PUAs are not considered malware.*
198+
*PUAs aren't considered malware.*
171199

172200
Microsoft uses specific categories and the category definitions to classify software as a PUA.
173201

@@ -185,3 +213,10 @@ Microsoft uses specific categories and the category definitions to classify soft
185213

186214
- **Poor industry reputation:** Software that trusted security providers detect with their security products. The security industry is dedicated to protecting customers and improving their experiences. Microsoft and other organizations in the security industry continuously exchange knowledge about files we have analyzed to provide users with the best possible protection.
187215

216+
## Vulnerable software
217+
218+
Vulnerable software is an application or code that has security flaws or weaknesses which can be exploited by attackers to perform various malicious and potentially destructive actions. These vulnerabilities may stem from unintentional coding errors or design flaws, and if exploited, can lead to harmful activities such as unauthorized access, privilege escalation, tampering, and more.
219+
220+
### Vulnerable drivers
221+
222+
Despite strict requirements and reviews imposed on code running in kernel, device drivers remain susceptible to various types of vulnerabilities and bugs. Examples include memory corruption and arbitrary read and write bugs, which can be exploited by attackers to execute more significant malicious and destructive actions -– actions typically restricted in user mode. Terminating critical processes on a device is an example of such malicious action.

0 commit comments

Comments
 (0)