AppEsteem UwS Handling Certification 2022 (series)

Please note:
This compliance page covers multiple component tests, for details of products covered by each component please see the individual summary pages under “Additional links”.

Test Lab


Test Title

AppEsteem UwS Handling Certification 2022 (series)




Windows, MacOS


AVAST, AVG, Avira, Bitdefender, Comodo, Dr Web, Enigmasoft, ESET, G Data, K7 Computing, Kaspersky, MalwareBytes, McAfee, Microsoft, Panda Security, Qihoo, Quick Heal, Sophos, Symantec, Tencent, TG Soft, Trend Micro, VIPRE, Webroot

Publication date


Statement from Test Lab

“For over three years, AppEsteem has worked to establish a consensus among AVs about the behaviors that make an app Unwanted Software (UwS) or a Potentially Unwanted Application (PUA). We have codified these behaviors into “ACRs”, or Application Certification Requirements. We publish a freely-available Deceptor® feed, which contains software monetization apps we believe are Unwanted, and a freely-available Certified feed, which contains apps we have certified as clean, and that we believe should be considered neither UwS nor PUA. These feeds are widely used by many parties, including AVs. The objective of this UwS Handling Certification Test is to provide consumers with information on which AV products have effectively implemented our Deceptor and Certified feeds, so they can be assured of effective protection against over-aggressive software monetizers while not getting impeded from working with “clean” software monetizers. Because each AV has control of their own policies, this UwS Handling Certification Test lets AVs describe any deviations they have between their blocking policies and our ACRs. Each AV’s final score reflects their ability to block Deceptors, allow Certifieds, and explain their policy deviations.”

Tested products

VendorProductVendor status
AVASTPremium Securityparticipant
AVGInternet Securityparticipant
AviraInternet Securityparticipant
BitdefenderInternet Securityincluded
Dr WebSecurity Space for Windowsincluded
EnigmasoftSpyHunter 5included
ESETInternet Securityincluded
G DataInternet Securityincluded
K7 ComputingTotal Securityparticipant
KasperskyInternet Securityparticipant
MalwareBytesPremium included
McAfeeTotal Protectionincluded
MicrosoftWindows Defenderincluded
NortonLifeLockNorton Securityincluded
Panda SecurityDomeincluded
Qihoo360 Total Securityincluded
Quick HealInternet Securityincluded
SophosHome Premiumincluded
TencentPC Managerincluded
TG SoftVirIT eXplorer Proparticipant
Trend MicroInternet Securityincluded
VIPREAdvanced Securityincluded
WebrootInternet Securityincluded

Commencement date



These Vendors chose to adopt Participant status under the AMTSO Standard, gaining certain guaranteed rights in return for attestations.

“Included” Vendors


These Vendors did not chose to adopt Participant status under the AMTSO Standard, but may have engaged with the test lab in other ways.

Commentary dates
CommentaryStart dateEnd date
Phase 1 Commentary2021-11-292021-12-07
Phase 2 Commentary (Round 1 - Jan-Mar)2022-04-132022-04-19
Phase 2 Commentary (Round 2 - Apr-Jun)2022-07-182022-07-27
Phase 2 Commentary (Round 3 - Jul-Sep)2022-10-172022-10-25
Phase 2 Commentary (Round 4 - Oct-Dec)2023-01-162023-01-24

AMTSO Standard compliance status

Confirmed compliant with AMTSO Standard v1.3Round 1 (Jan-Mar)
Confirmed compliant with AMTSO Standard v1.3Round 2 (Apr-Jun)
Confirmed compliant with AMTSO Standard v1.3Round 3 (Jul-Sep)
Confirmed compliant with AMTSO Standard v1.3Round 4 (Oct-Dec)