mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-24 14:53:44 +00:00
Acrolinx score enhancement
This commit is contained in:
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Industry collaboration programs
|
||||
ms.reviewer:
|
||||
description: Microsoft industry-wide anti-malware collaboration programs - Virus Information Alliance (VIA), Microsoft Virus Initiative (MVI), and Coordinated Malware Eradication (CME)
|
||||
description: There are various collaborative programs regarding Microsoft industry-wide anti-malware - Virus Information Alliance (VIA), Microsoft Virus Initiative (MVI), and Coordinated Malware Eradication (CME)
|
||||
keywords: security, malware, antivirus industry, anti-malware Industry, collaboration programs, alliances, Virus Information Alliance, Microsoft Virus Initiative, Coordinated Malware Eradication, WDSI, MMPC, Microsoft Malware Protection Center, partnerships
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: secure
|
||||
@ -17,7 +17,7 @@ ms.technology: windows-sec
|
||||
---
|
||||
# Industry collaboration programs
|
||||
|
||||
Microsoft has several industry-wide collaboration programs with different objectives and requirements. Enrolling in the right program can help you protect your customers, gain more insight into the current threat landscape, or help disrupting the malware ecosystem.
|
||||
There are various industry-wide collaboration programs with different objectives and requirements, provided by Microsoft. Enrolling in the right program can help you protect your customers, gain more insight into the current threat landscape, or help disrupting the malware ecosystem.
|
||||
|
||||
## Virus Information Alliance (VIA)
|
||||
|
||||
|
@ -35,12 +35,12 @@ Describes what the malware does on your computer. Worms, viruses, trojans, backd
|
||||
* Constructor
|
||||
* DDoS
|
||||
* Exploit
|
||||
* Hacktool
|
||||
* HackTool
|
||||
* Joke
|
||||
* Misleading
|
||||
* MonitoringTool
|
||||
* Program
|
||||
* PWS
|
||||
* Personal Web Server (PWS)
|
||||
* Ransom
|
||||
* RemoteAccess
|
||||
* Rogue
|
||||
@ -62,7 +62,7 @@ Describes what the malware does on your computer. Worms, viruses, trojans, backd
|
||||
|
||||
## Platforms
|
||||
|
||||
Platforms indicate the operating system (such as Windows, masOS X, and Android) the malware is designed to work on. The platform is also used to indicate programming languages and file formats.
|
||||
Platforms guide the malware to its compatible operating system (such as Windows, masOS X, and Android). The platform's guidance is also used for programming languages and file formats.
|
||||
|
||||
### Operating systems
|
||||
|
||||
@ -144,7 +144,7 @@ Platforms indicate the operating system (such as Windows, masOS X, and Android)
|
||||
* MIME: MIME packets
|
||||
* Netware: Novell Netware files
|
||||
* QT: Quicktime files
|
||||
* SB: StarBasic (Staroffice XML) files
|
||||
* SB: StarBasic (StarOffice XML) files
|
||||
* SWF: Shockwave Flash files
|
||||
* TSQL: MS SQL server files
|
||||
* XML: XML files
|
||||
@ -159,7 +159,7 @@ Used sequentially for every distinct version of a malware family. For example, t
|
||||
|
||||
## Suffixes
|
||||
|
||||
Provides extra detail about the malware, including how it is used as part of a multicomponent threat. In the example above, "!lnk" indicates that the threat component is a shortcut file used by Trojan:Win32/Reveton.T.
|
||||
Provides extra detail about the malware, including how it's used as part of a multicomponent threat. In the preceding example, "!lnk" indicates that the threat component is a shortcut file used by Trojan:Win32/Reveton.T.
|
||||
|
||||
* .dam: damaged malware
|
||||
* .dll: Dynamic Link Library component of a malware
|
||||
|
Reference in New Issue
Block a user