mega metadata update

This commit is contained in:
Daniel Simpson
2021-10-28 11:16:23 -07:00
parent 562754e609
commit c4e79e54fe
809 changed files with 809 additions and 809 deletions

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Coin miners

View File

@ -13,7 +13,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
ms.technology: mde
ms.technology: windows-sec
---
# Coordinated Malware Eradication

View File

@ -15,7 +15,7 @@ ms.collection: M365-security-compliance
ms.topic: article
ms.date: 10/04/2021
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# How Microsoft identifies malware and potentially unwanted applications

View File

@ -13,7 +13,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.technology: mde
ms.technology: windows-sec
---
# Industry collaboration programs

View File

@ -16,7 +16,7 @@ metadata:
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
ms.technology: mde
ms.technology: windows-sec
title: Software developer FAQ
summary: This page provides answers to common questions we receive from software developers. For general guidance about submitting malware or incorrectly detected files, read the submission guide.

View File

@ -15,7 +15,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
ms.technology: mde
ms.technology: windows-sec
---
# Software developer resources

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Exploits and exploit kits

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Fileless threats

View File

@ -12,7 +12,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.technology: mde
ms.technology: windows-sec
---
# Security intelligence

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Macro malware

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Malware names

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Phishing trends and techniques

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# How to protect against phishing attacks

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Troubleshooting malware submission errors caused by administrator block

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Prevent malware infection

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Rootkits

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Microsoft Safety Scanner

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Submit files for analysis

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Supply chain attacks

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Tech support scams

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Trojans

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Understanding malware & other threats

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Unwanted software

View File

@ -13,7 +13,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
ms.technology: mde
ms.technology: windows-sec
---
# Virus Information Alliance

View File

@ -13,7 +13,7 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
ms.technology: mde
ms.technology: windows-sec
---
# Microsoft Virus Initiative

View File

@ -14,7 +14,7 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
search.appverid: met150
ms.technology: mde
ms.technology: windows-sec
---
# Worms