{"id":79427,"date":"2015-12-21T14:45:14","date_gmt":"2015-12-21T22:45:14","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=79427"},"modified":"2023-05-15T23:04:28","modified_gmt":"2023-05-16T06:04:28","slug":"keeping-browsing-experience-in-users-hands","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2015\/12\/21\/keeping-browsing-experience-in-users-hands\/","title":{"rendered":"Keeping browsing experience in users’ hands"},"content":{"rendered":"\n\n\n
Protecting the modern workplace from a wide range of undesirable software<\/strong><\/a><\/p>\n

Our evaluation criteria describe the characteristics and behavior of malware and potentially unwanted applications and guide the proper identification of threats. Learn how we classify malicious software, unwanted software, and potentially unwanted applications. Read the blog post.<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

\n

\u200bIn April last year we announced some changes to our criteria around Adware designed to ensure that users maintain control of their experience. These changes are described in our blog, Adware: a New Approach<\/a>. Since then, we\u2019ve taken policy and enforcement measures to address unwanted behaviors exhibited by advertising programs that take choice and control away from users.<\/p>\n

Ad injection software has evolved, and is now using a variety of \u2018man-in-the-middle\u2019 (MiTM) techniques. Some of these techniques include injection by proxy, changing DNS settings, network layer manipulation and other methods. All of these techniques intercept communications between the Internet and the PC to inject advertisements and promotions into webpages from outside, without the control of the browser. Our intent is to keep the user in control of their browsing experience and these methods reduce that control.<\/p>\n

There are many additional concerns with these techniques, some of these include:<\/p>\n

\n