From 0fb62d9eca68df7d173b3e085d1f36b929b9f5b7 Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Tue, 16 Jul 2019 16:18:58 -0400 Subject: [PATCH 1/3] resolves #4426 Issue #4426, Avoid malware > The Macro Malware page is very brief, I was thinking some more information would help. At the end you have For more general tips, see prevent malware infection. Since much macro malware is delivered as part of Phishing attempts, I was thinking if you added a link to the phishing page would help shorten the users search for specific information ie For more specific tips see https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/phishing I added the link to the phishing page. Although the general tips also include a link to the phishing page, a shorter path to what the reader needs couldn't hurt? --- .../security/threat-protection/intelligence/macro-malware.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/macro-malware.md b/windows/security/threat-protection/intelligence/macro-malware.md index 9bfd3d7244..0cb6feafb0 100644 --- a/windows/security/threat-protection/intelligence/macro-malware.md +++ b/windows/security/threat-protection/intelligence/macro-malware.md @@ -45,4 +45,6 @@ We've seen macro malware download threats from the following families: * Enterprises can prevent macro malware from running executable content using [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#enable-and-audit-attack-surface-reduction-rules) -For more general tips, see [prevent malware infection](prevent-malware-infection.md). +For more tips on protecting yourself from malicious emails, see [phishing](phishing.md). + +For more general tips, see [prevent malware infection](prevent-malware-infection.md). From a0c4273d9c73dfb32f9021e78ba68913491a5a1a Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Wed, 17 Jul 2019 10:43:49 -0400 Subject: [PATCH 2/3] word choice Matching previous language that uses "suspicious", to make it clear to the user what this sentence is referring to. --- .../security/threat-protection/intelligence/macro-malware.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/macro-malware.md b/windows/security/threat-protection/intelligence/macro-malware.md index 0cb6feafb0..31bcc70fc5 100644 --- a/windows/security/threat-protection/intelligence/macro-malware.md +++ b/windows/security/threat-protection/intelligence/macro-malware.md @@ -45,6 +45,6 @@ We've seen macro malware download threats from the following families: * Enterprises can prevent macro malware from running executable content using [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#enable-and-audit-attack-surface-reduction-rules) -For more tips on protecting yourself from malicious emails, see [phishing](phishing.md). +For more tips on protecting yourself from supicious emails, see [phishing](phishing.md). For more general tips, see [prevent malware infection](prevent-malware-infection.md). From 0eb42ccba71d7044dd58a619b6090c72f248db39 Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Fri, 19 Jul 2019 11:38:20 -0400 Subject: [PATCH 3/3] Update windows/security/threat-protection/intelligence/macro-malware.md Typo fix Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../security/threat-protection/intelligence/macro-malware.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/macro-malware.md b/windows/security/threat-protection/intelligence/macro-malware.md index 31bcc70fc5..f26e686027 100644 --- a/windows/security/threat-protection/intelligence/macro-malware.md +++ b/windows/security/threat-protection/intelligence/macro-malware.md @@ -45,6 +45,6 @@ We've seen macro malware download threats from the following families: * Enterprises can prevent macro malware from running executable content using [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#enable-and-audit-attack-surface-reduction-rules) -For more tips on protecting yourself from supicious emails, see [phishing](phishing.md). +For more tips on protecting yourself from suspicious emails, see [phishing](phishing.md). For more general tips, see [prevent malware infection](prevent-malware-infection.md).