Keyword and link updates

This commit is contained in:
Beth Levin
2018-10-03 14:37:11 -07:00
parent 99e9d8fb80
commit 3e2ee5ca2e
12 changed files with 24 additions and 30 deletions

View File

@ -26,18 +26,12 @@ Check out the following resources for information on how to submit and view subm
### Detection criteria
To objectively identify malware and unidentified software, Microsoft applies a set of criteria for evaluating malicious or potentially harmful code.
For more information, see
To objectively identify malware and unidentified software, Microsoft applies a [set of criteria](criteria.md) for evaluating malicious or potentially harmful code.
### Developer questions
Find more guidance about the file submission and detection dispute process in our FAQ for software developers.
For more information, see
Find more guidance about the file submission and detection dispute process in our [FAQ for software developers](developer-faq.md).
### Scan your software
Use Windows Defender Antivirus to check your software against the latest definitions and cloud protection from Microsoft.
For more information, see
Use [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10?ocid=cx-docs-avreports) to check your software against the latest definitions and cloud protection from Microsoft.

View File

@ -1,7 +1,7 @@
---
title: Exploits and exploit kits
description: Learn about exploits, how they can infect devices, and what you can do to protect yourself.
keywords: security, malware, exploits, exploit kits, prevention, vulnerabilities
description: Learn about how exploits use vulnerabilities in common software to give an attackers access to your computer and to install other malware.
keywords: security, malware, exploits, exploit kits, prevention, vulnerabilities, Microsoft, Exploit malware family, exploits, java, flash, adobe, update software, prevent exploits, exploit pack, vulnerability, 0-day, holes, weaknesses, attack, Flash, Adobe, out-of-date software, out of date software, update, update software, reinfection, Java cache, reinfected, won't remove, won't clean, still detects, full scan, MSE, Defender, WDSI, MMPC, Microsoft Malware Protection Center
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Macro malware
description: Learn about how macro malware works, how it can infect devices, and what you can do to protect yourself.
keywords: security, malware, macro, protection
description: Learn about macro viruses and malware, which are embedded in documents and are used to drop malicious payloads and distribute other threats.
keywords: security, malware, macro, protection, WDSI, MMPC, Microsoft Malware Protection Center, macro virus, macro malware, documents, viruses in Office, viruses in Word
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Malware names
description: Identifying malware vocabulary
keywords: security, malware, names
description: Understand the malware naming convention used by Windows Defender Antivirus and other Microsoft antimalware.
keywords: security, malware, names, Microsoft, MMPC, Microsoft Malware Protection Center, WDSI, malware name, malware prefix, malware type, virus name
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Prevent malware infection
description: Malware prevention best practices
keywords: security, malware, prevention, infection, tips
description: Learn steps you can take to help prevent a malware or potentially unwanted software from infecting your computer.
keywords: security, malware, prevention, infection, tips, Microsoft, MMPC, Microsoft Malware Protection Center, virus, trojan, worm, stop, prevent, full scan, infection, avoid malware, avoid trojan, avoid virus, infection, how, detection, security software, antivirus, updates, how malware works, how virus works, firewall, turn on, user privileges, limit, prevention, WDSI, MMPC, Microsoft Malware Protection Center
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Ransomware
description: Learn about ransomware, how it works, and what you can do to protect yourself.
keywords: security, malware, ransomware, encryption, extortion, money, key, infection, prevention, tips
description: Learn how to protect your computer and network from ransomware attacks, which can stop you from accessing your files.
keywords: security, malware, ransomware, encryption, extortion, money, key, infection, prevention, tips, WDSI, MMPC, Microsoft Malware Protection Center, ransomware-as-a-service, ransom, ransomware downloader, protection, prevention, solution, exploit kits, backup, Cerber, Locky, WannaCry, WannaCrypt, Petya, Spora
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Rootkits
description: Learn about rootkits, how they hide malware on your device, and what you can do to protect yourself.
keywords: security, malware, rootkit, hide, protection, hiding
description: Rootkits may be used by malware authors to hide malicious code on your computer and make malware or potentially unwanted software harder to remove.
keywords: security, malware, rootkit, hide, protection, hiding, WDSI, MMPC, Microsoft Malware Protection Center, rootkits, Sirefef, Rustock, Sinowal, Cutwail, malware, virus
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Tech Support Scams
description: Learn about how supply chain attacks work, deliver malware do your devices, and what you can do to protect yourself
keywords: security, malware, tech support, scam, protection, trick, spoof, fake, error messages, report
description: Microsoft security software can protect you from tech support scams that claims to scan for malware or viruses and then shows you fake detections and warnings.
keywords: security, malware, tech support, scam, protection, trick, spoof, fake, error messages, report, rogue security software, fake, antivirus, fake software, rogue, threats, fee, removal fee, upgrade, pay for removal, install full version, trial, lots of threats, scanner, scan, clean, computer, security, program, XP home security, fake microsoft, activate, activate scan, activate antivirus, warnings, pop-ups, security warnings, security pop-ups tech support scams, fake Microsoft error notification, fake virus alert, fake product expiration, fake Windows activation, scam web pages, scam phone numbers, telephone numbers, MMPC, WDSI, Microsoft Malware Protection Center, tech support scam numbers
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Trojan malware
description: Learn about how trojans work, deliver malware do your devices, and what you can do to protect yourself.
keywords: security, malware, protection, trojan, download, file, infection
description: Trojans are a type of threat that can infect your device. This page tells you what they are and how to remove them.
keywords: security, malware, protection, trojan, download, file, infection, trojans, virus, protection, cleanup, removal, antimalware, antivirus, WDSI, MMPC, Microsoft Malware Protection Center, malware types
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Understanding malware & other threats
description: Learn about the different types of malware, how they work, and what you can do to protect yourself.
keywords: security, malware
description: Learn about the world's most prevalent viruses, malware, and other threats. Understand how they arrive, their detailed behaviors, infection symptoms, and how to prevent & remove them.
keywords: security, malware, virus, malware, threat, analysis, research, encyclopedia, dictionary, glossary, ransomware, support scams, unwanted software, computer infection, virus infection, descriptions, remediation, latest threats, mmpc, microsoft malware protection center, wdsi
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Unwanted software
description: Learn about how unwanted software changes your default settings without your consent and what you can do to protect yourself.
keywords: security, malware, protection, unwanted, software, alter, infect
keywords: security, malware, protection, unwanted, software, alter, infect, unwanted software, software bundlers, browser modifiers, privacy, security, computing experience, prevent infection, solution, WDSI, MMPC, Microsoft Malware Protection Center, virus research threats, research malware, pc protection, computer infection, virus infection, descriptions, remediation, latest threats
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library

View File

@ -1,7 +1,7 @@
---
title: Worms
description: Learn about worms, how they infect devices, and what you can do to protect yourself.
keywords: security, malware, protection, worm, vulnerabilities, infect, steal, Jenxcus, Gamarue, Bondat, WannaCrypt
description: Learn about how worms replicate and spread to other computers or networks. Read about the most popular worms and steps you can take to stop them.
keywords: security, malware, protection, worm, vulnerabilities, infect, steal, Jenxcus, Gamarue, Bondat, WannaCrypt, WDSI, MMPC, Microsoft Malware Protection Center, worms, malware types, threat propagation, mass-mailing, IP scanning
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library