AppEsteem UwS Handling Certification 2022 (series)

Test Lab

AppEsteem

Test Title

AppEsteem UwS Handling Certification 2022 (series)

AMTSO Test ID

AMTSO-LS1-TP046

Platform

Windows, MacOS

Vendor

AVAST, AVG, Avira, Bitdefender, Comodo, Dr Web, Enigmasoft, ESET, G Data, K7 Computing, Kaspersky, MalwareBytes, McAfee, Microsoft, Panda Security, Qihoo, Quick Heal, Sophos, Symantec, Tencent, TG Soft, Trend Micro, VIPRE, Webroot

Publication date

2022-02-10

Statement from Test Lab

“For over three years, AppEsteem has worked to establish a consensus among AVs about the behaviors that make an app Unwanted Software (UwS) or a Potentially Unwanted Application (PUA). We have codified these behaviors into “ACRs”, or Application Certification Requirements. We publish a freely-available Deceptor® feed, which contains software monetization apps we believe are Unwanted, and a freely-available Certified feed, which contains apps we have certified as clean, and that we believe should be considered neither UwS nor PUA. These feeds are widely used by many parties, including AVs. The objective of this UwS Handling Certification Test is to provide consumers with information on which AV products have effectively implemented our Deceptor and Certified feeds, so they can be assured of effective protection against over-aggressive software monetizers while not getting impeded from working with “clean” software monetizers. Because each AV has control of their own policies, this UwS Handling Certification Test lets AVs describe any deviations they have between their blocking policies and our ACRs. Each AV’s final score reflects their ability to block Deceptors, allow Certifieds, and explain their policy deviations.”

Tested products

VendorProductVendor status
AVASTPremium Securityparticipant
AVGInternet Securityparticipant
AviraInternet Securityparticipant
BitdefenderInternet Securityincluded
ComodoAntivirusincluded
Dr WebSecurity Space for Windowsincluded
EnigmasoftSpyHunter 5included
ESETInternet Securityincluded
G DataInternet Securityincluded
K7 ComputingTotal Securityparticipant
KasperskyInternet Securityparticipant
MalwareBytesPremium included
McAfeeTotal Protectionincluded
MicrosoftWindows Defenderincluded
NortonLifeLockNorton Securityincluded
Panda SecurityDomeincluded
Qihoo360 Total Securityincluded
Quick HealInternet Securityincluded
SophosHome Premiumincluded
TencentPC Managerincluded
TG SoftVirIT eXplorer Proparticipant
Trend MicroInternet Securityincluded
VIPREAdvanced Securityincluded
WebrootInternet Securityincluded

AMTSO Standard compliance info

Notification issued

2021-11-22

Notification method

Publicly posted test plan, Contact list notification

Test plan

Commencement date

2022-01-03

Participants

6
These Vendors chose to adopt Participant status under the AMTSO Standard, gaining certain guaranteed rights in return for attestations.

“Included” Vendors

19

These Vendors did not chose to adopt Participant status under the AMTSO Standard, but may have engaged with the test lab in other ways.

Commentary dates
CommentaryStart dateEnd date
Phase 1 Commentary2021-11-292021-12-07
Phase 2 Commentary (Round 1 - Jan-Mar)2022-04-132022-04-19
Phase 2 Commentary (Round 2 - Apr-Jun)2022-07-182022-07-27

AMTSO Standard compliance status

Confirmed compliant with AMTSO Standard v1.3Round 1 (Jan-Mar)
Confirmed compliant with AMTSO Standard v1.3Round 2 (Apr-Jun)