Nuta
Dostęp do tej strony wymaga autoryzacji. Możesz spróbować się zalogować lub zmienić katalog.
Dostęp do tej strony wymaga autoryzacji. Możesz spróbować zmienić katalogi.
Possible threat categories.
Syntax
typedef enum tagMPTHREAT_CATEGORY {
MP_THREAT_CATEGORY_INVALID = 0,
MP_THREAT_CATEGORY_ADWARE = 1,
MP_THREAT_CATEGORY_SPYWARE = 2,
MP_THREAT_CATEGORY_PASSWORDSTEALER = 3,
MP_THREAT_CATEGORY_TROJANDOWNLOADER = 4,
MP_THREAT_CATEGORY_WORM = 5,
MP_THREAT_CATEGORY_BACKDOOR = 6,
MP_THREAT_CATEGORY_REMOTEACCESSTROJAN = 7,
MP_THREAT_CATEGORY_TROJAN = 8,
MP_THREAT_CATEGORY_EMAILFLOODER = 9,
MP_THREAT_CATEGORY_KEYLOGGER = 10,
MP_THREAT_CATEGORY_DIALER = 11,
MP_THREAT_CATEGORY_MONITORINGSOFTWARE = 12,
MP_THREAT_CATEGORY_BROWSERMODIFIER = 13,
MP_THREAT_CATEGORY_COOKIE = 14,
MP_THREAT_CATEGORY_BROWSERPLUGIN = 15,
MP_THREAT_CATEGORY_AOLEXPLOIT = 16,
MP_THREAT_CATEGORY_NUKER = 17,
MP_THREAT_CATEGORY_SECURITYDISABLER = 18,
MP_THREAT_CATEGORY_JOKEPROGRAM = 19,
MP_THREAT_CATEGORY_HOSTILEACTIVEXCONTROL = 20,
MP_THREAT_CATEGORY_SOFTWAREBUNDLER = 21,
MP_THREAT_CATEGORY_STEALTHNOTIFIER = 22,
MP_THREAT_CATEGORY_SETTINGSMODIFIER = 23,
MP_THREAT_CATEGORY_TOOLBAR = 24,
MP_THREAT_CATEGORY_REMOTECONTROLSOFTWARE = 25,
MP_THREAT_CATEGORY_TROJANFTP = 26,
MP_THREAT_CATEGORY_POTENTIALUNWANTEDSOFTWARE = 27,
MP_THREAT_CATEGORY_ICQEXPLOIT = 28,
MP_THREAT_CATEGORY_TROJANTELNET = 29,
MP_THREAT_CATEGORY_EXPLOIT = 30,
MP_THREAT_CATEGORY_FILESHARINGPROGRAM = 31,
MP_THREAT_CATEGORY_MALWARE_CREATION_TOOL = 32,
MP_THREAT_CATEGORY_REMOTE_CONTROL_SOFTWARE = 33,
MP_THREAT_CATEGORY_TOOL = 34,
MP_THREAT_CATEGORY_TROJAN_DENIALOFSERVICE = 36,
MP_THREAT_CATEGORY_TROJAN_DROPPER = 37,
MP_THREAT_CATEGORY_TROJAN_MASSMAILER = 38,
MP_THREAT_CATEGORY_TROJAN_MONITORINGSOFTWARE = 39,
MP_THREAT_CATEGORY_TROJAN_PROXYSERVER = 40,
MP_THREAT_CATEGORY_VIRUS = 42,
MP_THREAT_CATEGORY_KNOWN = 43,
MP_THREAT_CATEGORY_UNKNOWN = 44,
MP_THREAT_CATEGORY_SPP = 45,
MP_THREAT_CATEGORY_BEHAVIOR = 46,
MP_THREAT_CATEGORY_VULNERABILTIY = 47,
MP_THREAT_CATEGORY_POLICY = 48
} MPTHREAT_CATEGORY, *PMPTHREAT_CATEGORY;
Constants
| Threat category | Description |
|---|---|
| MP_THREAT_CATEGORY_INVALID | The threat category doesn't exist, or has been misspelled. |
| MP_THREAT_CATEGORY_ADWARE | A potentially unwanted application that displays advertisements. |
| MP_THREAT_CATEGORY_SPYWARE | Malware that transmits information about the device or user, without the user's consent or knowledge. |
| MP_THREAT_CATEGORY_PASSWORDSTEALER | An application that collects and/or transmits a password to an attacker. |
| MP_THREAT_CATEGORY_TROJANDOWNLOADER | A trojan that downloads malware or potentially unwanted applications to an infected device. |
| MP_THREAT_CATEGORY_WORM | Self-propagating malicious software that can automatically distribute itself through network connections. |
| MP_THREAT_CATEGORY_BACKDOOR | Malware that provides a means of bypassing normal security and authentication protocols on a device. |
| MP_THREAT_CATEGORY_REMOTEACCESSTROJAN | A trojan that provides remote access to a computer. |
| MP_THREAT_CATEGORY_TROJAN | Malicious software that disguises itself as legitimate software. |
| MP_THREAT_CATEGORY_EMAILFLOODER | Malware the sends a large volume of email to a target. |
| MP_THREAT_CATEGORY_KEYLOGGER | Malware that records the user's keystrokes, potentially stealing passwords and other sensitive data. |
| MP_THREAT_CATEGORY_DIALER | Malware that makes unauthorized phone calls, often at premium rates. |
| MP_THREAT_CATEGORY_MONITORINGSOFTWARE | A potentially unwanted application that monitors user activity, such as what the user types on their keyboard or views on their screen. |
| MP_THREAT_CATEGORY_BROWSERMODIFIER | A potentially unwanted application that changes web browser settings without the user's consent. |
| MP_THREAT_CATEGORY_COOKIE | Data that a Web server sends to a browser, allowing it to save information about the user, such as web application settings, on repeated visits. |
| MP_THREAT_CATEGORY_BROWSERPLUGIN | Software that lets a standard web browser display and run specific types of content, such as media files, animated images, and interactive forms. |
| MP_THREAT_CATEGORY_AOLEXPLOIT | Malware that attacks users of the AOL Internet service, often by retrieving passwords or modifying settings. |
| MP_THREAT_CATEGORY_NUKER | Malware designed to crash a device or make it less stable. |
| MP_THREAT_CATEGORY_SECURITYDISABLER | Malware that disables security settings or products. |
| MP_THREAT_CATEGORY_JOKEPROGRAM | An application designed to amuse or scare a user, without actually harming the device. |
| MP_THREAT_CATEGORY_HOSTILEACTIVEXCONTROL | An ActiveX control designed by an attacker to harm a device. An ActiveX control is a kind of browser add-on specific to Internet Explorer. |
| MP_THREAT_CATEGORY_SOFTWAREBUNDLER | Software that installs other potentially unwanted applications, such as adware or spyware. The license agreement of the bundling software may require these other components in order to function. |
| MP_THREAT_CATEGORY_STEALTHNOTIFIER | Malware that connects to a remote server through a stealth connection to notify an attacker that the malware has been installed. |
| MP_THREAT_CATEGORY_SETTINGSMODIFIER | A potentially unwanted application that changes a user's settings without the user's knowledge or consent. |
| MP_THREAT_CATEGORY_TOOLBAR | A potentially unwanted application (PUA) that installs a toolbar on the user's web browser; often bundled with additional PUA, such as adware. |
| MP_THREAT_CATEGORY_REMOTECONTROLSOFTWARE | A potentially unwanted application that provides remote access to a device. |
| MP_THREAT_CATEGORY_TROJANFTP | A trojan that uses an FTP server to allow an attacker to upload or download files from a device. |
| MP_THREAT_CATEGORY_POTENTIALUNWANTEDSOFTWARE | Also known as potentially unwanted application or PUA; software that may behave in an overly intrusive way, which the user may not have expected or fully consented to. |
| MP_THREAT_CATEGORY_ICQEXPLOIT | A trojan that attacks the ICQ messaging service, often by retrieving passwords or tampering with settings. |
| MP_THREAT_CATEGORY_TROJANTELNET | A trojan that installs a telnet server on a user's computer without the user's knowledge or consent. |
| MP_THREAT_CATEGORY_EXPLOIT | Malicious code that takes advantage of a vulnerability on a device or system. |
| MP_THREAT_CATEGORY_FILESHARINGPROGRAM | A potentially unwanted application that opens a device to peer-to-peer sharing of the device's files. |
| MP_THREAT_CATEGORY_MALWARE_CREATION_TOOL | An application that can automatically generate malicious files. |
| MP_THREAT_CATEGORY_REMOTE_CONTROL_SOFTWARE | A potentially unwanted application that allows for remote access to a device. |
| MP_THREAT_CATEGORY_TOOL | A utility that helps an attacker perform malicious actions on a device. |
| MP_THREAT_CATEGORY_TROJAN_DENIALOFSERVICE | A trojan that is designed to send a large volume of network requests to a target as part of a denial of service (DoS) attack. |
| MP_THREAT_CATEGORY_TROJAN_DROPPER | A trojan that downloads and installs malware or potentially unwanted applications on a target. |
| MP_THREAT_CATEGORY_TROJAN_MASSMAILER | A trojan that sends a large volume of email to a target, intended to overwhelm the target's inbox. |
| MP_THREAT_CATEGORY_TROJAN_MONITORINGSOFTWARE | A trojan that monitors user activity, such as what the user types on their keyboard or views on their screen. |
| MP_THREAT_CATEGORY_TROJAN_PROXYSERVER | A proxy server installed by a trojan, providing what appears to be an uninterrupted Internet connection while allowing unauthorized access to the infected device. |
| MP_THREAT_CATEGORY_VIRUS | Malware that replicates, commonly by infecting other files in the system, thus allowing the execution of the malware code and its propagation when those files are activated. |
| MP_THREAT_CATEGORY_KNOWN | An unspecified malware threat. |
| MP_THREAT_CATEGORY_UNKNOWN | An unspecified malware threat that has not yet been defined. |
| MP_THREAT_CATEGORY_SPP | Anti-piracy technology that requires each installation of a Windows product be activated with Microsoft. |
| MP_THREAT_CATEGORY_BEHAVIOR | A type of detection based on file actions that are often associated with malicious activity. |
| MP_THREAT_CATEGORY_VULNERABILTIY | Any weakness, administrative process, or activity that makes a device susceptible to exploit by a threat. |
| MP_THREAT_CATEGORY_POLICY | A set of rules defined by an administrator, that control features on desktop and mobile devices such as software updates. |
Requirements
| Requirement | Value |
|---|---|
| Minimum supported client | Windows 8 (desktop apps only) |
| Minimum supported server | Windows Server 2012 (desktop apps only) |
| Header | MpClient.h |