{"id":85021,"date":"2018-08-16T10:00:27","date_gmt":"2018-08-16T17:00:27","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=85021"},"modified":"2024-03-05T11:04:53","modified_gmt":"2024-03-05T19:04:53","slug":"partnering-with-the-industry-to-minimize-false-positives","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/08\/16\/partnering-with-the-industry-to-minimize-false-positives\/","title":{"rendered":"Partnering with the industry to minimize false positives"},"content":{"rendered":"
Every day, antivirus capabilities<\/a> in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP<\/a>) protect millions of customers from threats. To effectively scale protection, Microsoft Defender ATP uses intelligent systems that combine multiple layers of machine learning models, behavior-based detection algorithms, generics, and heuristics that make a verdict on suspicious files, most of the time in a fraction of a second.<\/p>\n This multilayered approach<\/a> allows us to proactively protect customers in real-time, whether in the form of stopping massive malware outbreaks<\/a> or detecting limited sophisticated cyberattacks<\/a>. This quality of antivirus capabilities is reflected in the consistently high scores that Microsoft Defender ATP gets in independent tests<\/a> and the fact that our antivirus solution is the most deployed in the enterprise<\/a>.<\/p>\n The tradeoff of an intelligent, scalable approach is that some of our more aggressive classifiers from time to time misclassify normal files as malicious (false positives). While false positives are a very tiny occurrence compared to the large number of malware we correctly identify (true positives) and protect customers from, we are aware of the impact that misclassified files might have. Keeping false positives at a minimum is an equally important quality metric that we continually work to improve on.<\/p>\n Avoiding false positives is a two-way street between security vendors and developers. Publishing apps to the Microsoft Store is the best way for vendors and developers to ensure their programs are not misclassified. For customers, apps from the Microsoft Store are trusted and Microsoft-verified.<\/p>\n Here are other ways developers can raise the level of trust by both security vendors and customers and help make sure programs and files are not inadvertently detected as malware.<\/p>\n Digital signatures are an important way to ensure the integrity of software. By verifying the identity of the software publisher, a signature assures customers that they know who provided the software they\u2019re installing or running. Digital signatures also assure customers that the software they received is in the same condition as when the publisher signed it and the software has not been tampered with.<\/p>\n Code signing does not necessarily guarantee the quality or functionality of software. Digitally signed software can still contain flaws or security vulnerabilities. However, because software vendors\u2019 reputations are based on the quality of their code, there is an incentive to fix these issues.<\/p>\n We use the reputation of digital certificates to help determine the reputation of files signed by them. The reverse is also true: we use the reputation of digitally signed files to determine the reputation of the digital certificates they are signed with. One of the most effective ways for developers to reduce the chances of their software being detected as malware is it to digitally sign files with a reputable certificate.<\/p>\n The second part of reducing the risk of unintended detection is to build a good reputation on that certificate. Microsoft uses many factors to determine the reputation of a certificate, but the most important are the files that are signed by it. If all the files using a certificate have good reputation and the certificate is valid, then the certificate keeps a good reputation.<\/p>\n Extended validation (EV) code signing is a more advanced version of digital certificates and requires a more rigorous vetting and authentication process. This process requires a more comprehensive identity verification and authentication process for each developer. The EV code signing certificates require the use of hardware to sign applications. This hardware requirement is an additional protection against theft or unintended use of code signing certificates. At the time this post was written, programs signed by an EV code signing certificate could immediately establish reputation with Microsoft Defender SmartScreen<\/a> even if no prior reputation existed for that file or publisher. Starting in 2020, EV certificates were no longer treated specially, and will now develop reputation the same way as other Authenticode certificates.<\/p>\n To gain positive reputation on multiple programs and files, developers sign files with a digital certificate with positive reputation. However, if one of the files gains poor reputation (e.g., detected as malware) or if the certificate was stolen and used to sign malware, then all of the files that are signed with that certificate will inherit the poor reputation. This situation could lead to unintended detection. This framework is implemented this way to prevent the misuse of reputation sharing.<\/p>\n We thus advise developers to not share certificates between programs or other developers. This advice particularly holds true for programs that incorporate bundling or use advertising or freemium models of monetization. Reputation accrues\u2014if a software bundler includes components that have poor reputation, the certificate that bundler is signed with gets the poor reputation.<\/p>\n Malware threats use a variety of techniques to hide. Some of these techniques include file obfuscation, being installed in nontraditional install locations, and using names that don\u2019t reflect that purpose of the software.<\/p>\n Customers should have choice and control over what happens on their devices. Using nontraditional install locations or misleading software names reduce user choice and control.<\/p>\n Obfuscation has legitimate uses, and some forms of obfuscation are not considered malicious. However, many techniques are only employed to evade antivirus detection. Developers should refrain from using non-commercial packers and obfuscation software.<\/p>\n When programs employ malware-like techniques, they trigger flags in our detection algorithms and greatly increase the chances of false positives.<\/p>\n Another indicator that can influence the reputation of a file are the other programs the file is associated with. This association can come from what the program installs, what is installed at the same time as the program, or what is seen on the same machines as the file. Not all of these associations directly lead to detections, however, if a program installs other programs or files that have poor reputation, then by association that program gains poor reputation.<\/p>\n Microsoft\u2019s policy aims to protect customers against malicious software while minimizing the restrictions on developers. The diagram below demonstrates the high-level evaluation criteria<\/a> Microsoft uses for classifying files:<\/p>\n These evaluation criteria<\/a> describe the characteristics and behavior of malware and potentially unwanted applications and guide the proper identification of threats. Developers should make sure their programs and files don\u2019t demonstrate undesirable characteristics or behavior to minimize chances of their programs being misclassified.<\/p>\n If you follow these pieces of advice and we unintentionally detect your file, you can help us fix the issue by reporting it through the Microsoft Defender Security Intelligence<\/a> portal.<\/p>\n <\/p>\nDigitally sign files<\/h2>\n
Keep good reputation<\/h2>\n
Be transparent and respect users\u2019 ability to choose<\/h2>\n
Keep good company<\/h2>\n
Understand the detection criteria<\/h2>\n
\n
Challenging a detection decision<\/h2>\n