mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 06:13:41 +00:00
mega metadata update
This commit is contained in:
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Coin miners
|
||||
|
||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Coordinated Malware Eradication
|
||||
|
||||
|
@ -15,7 +15,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.date: 10/04/2021
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# How Microsoft identifies malware and potentially unwanted applications
|
||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Industry collaboration programs
|
||||
|
||||
|
@ -16,7 +16,7 @@ metadata:
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
|
||||
title: Software developer FAQ
|
||||
summary: This page provides answers to common questions we receive from software developers. For general guidance about submitting malware or incorrectly detected files, read the submission guide.
|
||||
|
@ -15,7 +15,7 @@ manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Software developer resources
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Exploits and exploit kits
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Fileless threats
|
||||
|
@ -12,7 +12,7 @@ manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Security intelligence
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Macro malware
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Malware names
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Phishing trends and techniques
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# How to protect against phishing attacks
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Troubleshooting malware submission errors caused by administrator block
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Prevent malware infection
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Rootkits
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Microsoft Safety Scanner
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Submit files for analysis
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Supply chain attacks
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Tech support scams
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Trojans
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Understanding malware & other threats
|
||||
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Unwanted software
|
||||
|
||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
# Virus Information Alliance
|
||||
|
||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Microsoft Virus Initiative
|
||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
search.appverid: met150
|
||||
ms.technology: mde
|
||||
ms.technology: windows-sec
|
||||
---
|
||||
|
||||
# Worms
|
||||
|
Reference in New Issue
Block a user