{"id":76118,"date":"2014-09-22T15:34:14","date_gmt":"2014-09-22T22:34:14","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=76118"},"modified":"2023-05-15T23:05:21","modified_gmt":"2023-05-16T06:05:21","slug":"microsoft-cloud-protection","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2014\/09\/22\/microsoft-cloud-protection\/","title":{"rendered":"Microsoft cloud protection"},"content":{"rendered":"
(Note: Read about Windows Defender Antivirus cloud protection service in this blog entry: Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware<\/a><\/strong>.)<\/em><\/p>\n Microsoft is using cloud protection to help keep our customers safe. In fact, nearly any detection made by Microsoft security products could be the result of cloud protection. Software developers often ask us how this cloud protection works and how they can improve our cloud\u2019s impression of their software.<\/p>\n When our antimalware products encounter anything unusual, they can send a small packet of information about the event or file to our server. The server then sends back a reply telling the antimalware software whether to block it or not. It can also request a sample for further analysis. It\u2019s this third point that I would like to discuss further.<\/p>\n We are often asked by software vendors if we have a way for them to pre-allow-list their software. However, our backend processing actually works better if we see your software as it\u2019s naturally distributed. I will outline a few methods to improve our cloud\u2019s impression of your software below:<\/p>\n If you believe we have made an incorrect detection for your product you can submit a developer contact form<\/a>. Making a slight change and pushing it out to your software won\u2019t necessarily address any incorrect bad reputation applied to the code signing key you used for the file that was incorrectly detected. Our cloud protection might also note the similarity between the file that it still believes was correctly detected as malware, and the new version.<\/p>\n Questions, concerns, or insights on this story? Join discussions at the Microsoft community<\/a> and Windows Defender Security Intelligence<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" (Note: Read about Windows Defender Antivirus cloud protection service in this blog entry: Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware.) Microsoft is using cloud protection to help keep our customers safe. In fact, nearly any detection made by Microsoft security products could be the result of cloud protection. Software developers […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3687],"products":[],"threat-intelligence":[3732],"tags":[],"coauthors":[1968],"class_list":["post-76118","post","type-post","status-publish","format-standard","hentry","content-type-research","topic-threat-intelligence","threat-intelligence-influence-operations"],"yoast_head":"\nHow our cloud protection works<\/h2>\n
\nThere are three situations that highlight the benefits of cloud protection:<\/p>\n\n
Improving your software\u2019s cloud impression<\/h2>\n
\n
\n
\n
\n
\n
\nTalk to us<\/strong><\/h4>\n