{"id":1178,"date":"2018-05-24T19:03:41","date_gmt":"2018-05-24T19:03:41","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=82872"},"modified":"2018-05-24T19:03:41","modified_gmt":"2018-05-24T19:03:41","slug":"adding-transparency-and-context-into-industry-av-test-results","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/","title":{"rendered":"Adding transparency and context into industry AV test results"},"content":{"rendered":"<p>Corporate Vice President Brad Anderson recently shared his insights on how Windows Defender Advanced Threat Protection (<a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Windows Defender ATP<\/a>) evolved to achieve <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/22\/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise\/\">important quality milestones<\/a>. Our Windows Defender ATP team is committed to delivering industry-leading protection, customer choice, and transparency on the quality of our solutions. In the continued spirit of these principles, we want to share the results of the January-February 2018 test conducted by independent antivirus tester <a href=\"https:\/\/www.av-test.org\/\">AV-TEST<\/a> and provide a transparency report that augments the test findings with contextual information to help our customers make informed decisions about Windows Defender ATP adoption.<\/p>\n<h3><a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE27O5A?ocid=cx-blog-mmpc\"><strong>Download the complete transparency report on January-February 2018 test results<\/strong><\/a><\/h3>\n<p>At a high-level, the transparency report shows:<\/p>\n<table>\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82875\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/05\/1.png\" alt=\"\" width=\"58\" height=\"58\"\/><\/td>\n<td><strong><span>Protection<\/span><\/strong>: Windows Defender Antivirus (<a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-defender?ocid=cx-blog-mmpc\">Windows Defender AV<\/a>) achieved a perfect score in Protection, maintaining consistently high scores in this category.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82878\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/05\/2.png\" alt=\"\" width=\"58\" height=\"58\"\/><\/td>\n<td><strong><span>Usability (false positives)<\/span><\/strong>: Windows Defender AV achieved an improved Usability score of 5.5\/6.0. Per our telemetry, samples that Windows Defender AV incorrectly classified (false positive) had very low prevalence and are not commonly used in business context.<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82881\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/05\/3.png\" alt=\"\" width=\"58\" height=\"58\"\/><\/td>\n<td>\u00a0\u00a0<strong><span>Performance<\/span><\/strong>: Windows Defender AV improved this cycle, achieving a 5.5\/6.0 Performance score and outperforming the industry in almost all areas. These results reflect the investments we put in optimizing Windows Defender AV performance for high-frequency actions (e.g., application run).<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-82890\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/05\/note.png\" alt=\"\" width=\"280\" height=\"298\"\/>While independent tests can help assess a security solution\u2019s capabilities and protections, it is important to understand that antivirus tests are only one part of a complete quality assessment. To truly understand the protection quality of an endpoint protection platform (EPP) and endpoint detection and response (EDR) solution like <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp\">Windows Defender ATP<\/a>, its entire set of capabilities must be evaluated.<\/p>\n<p>For instance, while Windows Defender ATP\u2019s antivirus capability achieved a perfect overall Protection score in the January-February 2018 tests and only missed two out of thousands of samples tested, it performed even better than the results suggest. The Windows Defender Security Intelligence team tested the two missed samples against the entire Windows Defender ATP stack to assess these samples\u2019 ability to infect machines in real-world enterprise environments. The team was able to confirm that the two missed samples were detected and mitigated by other components of the Windows Defender ATP stack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-82902\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/05\/graph.png\" alt=\"\" width=\"857\" height=\"420\"\/>As threats become more sophisticated, Microsoft and other security platform vendors continue evolving their product capabilities to detect threats across different attack stages. We hope to see independent testers evolve their methodologies as well. Our customers need greater transparency and optics into what an end-to-end solution can accomplish in terms of total preventive protection, including the quality of individual components like antivirus. Microsoft is highly engaged in working with several independent testers to evolve security testing to focus on end-to-end security stack testing.<\/p>\n<p>Meanwhile, we continue to focus on improving our <a href=\"https:\/\/youtu.be\/Xy3MOxkX_o4\">next-generation antivirus<\/a> solution while at the same time delivering new innovative capabilities like <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-exploit-guard\/windows-defender-exploit-guard\">attack surface reduction<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-application-guard\/wd-app-guard-overview\">hardware-based isolation<\/a>, just to name a few. In the Windows 10 April 2018 Update, you can experience these <a href=\"https:\/\/blogs.windows.com\/business\/2018\/04\/17\/new-capabilities-of-windows-defender-atp-further-maximizing-the-effectiveness-and-robustness-of-endpoint-security\/#ob0U3gg81BHJeUYP.97\">new and improved capabilities in Windows Defender ATP<\/a>, which provides a complete endpoint protection platform (EPP) and endpoint detection and response (EDR) solution. To see these capabilities for yourself <strong><a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">sign up for a 90-day trial of Windows Defender ATP<\/a><\/strong> today, or <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-atp\/preview-settings-windows-defender-advanced-threat-protection\">enable Preview features on existing tenants<\/a>.<\/p>\n<p><strong><em>Zaid Arafeh<\/em><\/strong><\/p>\n<p><em>Senior Program Manager, Windows Defender Research team<\/em><\/p>\n<hr\/>\n<h4><strong>Talk to us<\/strong><\/h4>\n<p>Questions, concerns, or insights on this story? Join discussions at the <a target=\"_blank\" href=\"https:\/\/answers.microsoft.com\/en-us\/protect\" rel=\"noopener\">Microsoft community<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>Follow us on Twitter <a target=\"_blank\" href=\"https:\/\/twitter.com\/WDSecurity\" rel=\"noopener\">@WDSecurity<\/a> and Facebook <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/MsftWDSI\/\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/05\/24\/adding-transparency-and-context-into-industry-av-test-results\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#160; Corporate Vice President Brad Anderson recently shared his insights on how Windows Defender Advanced Threat Protection (Windows Defender ATP) evolved to achieve important quality milestones. Our Windows Defender ATP team is committed to delivering industry-leading protection, customer choice, and transparency on the quality of our solutions. In the continued spirit of these principles, we Read more READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1179,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[715,347,716,357,232,717,718],"class_list":["post-1178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-av-test","tag-cybersecurity","tag-independent-test-results","tag-windows","tag-windows-10","tag-windows-defender-antivirus","tag-windows-defender-atp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adding transparency and context into industry AV test results 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adding transparency and context into industry AV test results 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-24T19:03:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png\" \/>\n\t<meta property=\"og:image:width\" content=\"58\" \/>\n\t<meta property=\"og:image:height\" content=\"58\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Adding transparency and context into industry AV test results\",\"datePublished\":\"2018-05-24T19:03:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/\"},\"wordCount\":581,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png\",\"keywords\":[\"AV-TEST\",\"Cybersecurity\",\"independent test results\",\"Windows\",\"Windows 10\",\"Windows Defender Antivirus\",\"Windows Defender ATP\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/\",\"name\":\"Adding transparency and context into industry AV test results 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png\",\"datePublished\":\"2018-05-24T19:03:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png\",\"width\":58,\"height\":58},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AV-TEST\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/av-test\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adding transparency and context into industry AV test results\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adding transparency and context into industry AV test results 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/","og_locale":"en_US","og_type":"article","og_title":"Adding transparency and context into industry AV test results 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-24T19:03:41+00:00","og_image":[{"width":58,"height":58,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Adding transparency and context into industry AV test results","datePublished":"2018-05-24T19:03:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/"},"wordCount":581,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png","keywords":["AV-TEST","Cybersecurity","independent test results","Windows","Windows 10","Windows Defender Antivirus","Windows Defender ATP"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/","url":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/","name":"Adding transparency and context into industry AV test results 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png","datePublished":"2018-05-24T19:03:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/adding-transparency-and-context-into-industry-av-test-results.png","width":58,"height":58},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/adding-transparency-and-context-into-industry-av-test-results\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AV-TEST","item":"https:\/\/www.threatshub.org\/blog\/tag\/av-test\/"},{"@type":"ListItem","position":3,"name":"Adding transparency and context into industry AV test results"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1178"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1179"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}