As Microsoft engineers prepare to deploy a Windows 10 upgrade to millions of customers this week, Microsoft is exploring the possibility of building a new kind of exploit database for its next major operating system release.
The idea is to allow Microsoft to quickly create a list of malicious files that it can deploy on a large scale, while protecting users by requiring them to manually click through them.
Microsoft’s solution could be as simple as adding an “exploit_db” folder to the .cab file.
While Microsoft has never made a big push for this sort of feature, the company is still exploring the idea in an effort to make it easier for customers to install new versions of Windows.
Microsoft’s latest Windows 10 release includes a number of new features, including the ability to run applications from a remote location.
In a blog post, Microsoft noted that the latest version of Windows 10 includes “the ability to connect to a remote machine via SSH or a VPN, to run apps from a local hard drive, to launch a local session to an external storage volume, to start a local user session and to launch an external session.”
It’s unclear how Microsoft intends to use the exploit database.
Microsoft has previously said that it is exploring several different ways to leverage exploit databases for Windows 10 upgrades, and the company has hinted at the possibility that exploits for new operating systems could be added to the database in the future.
As we reported earlier this month, Microsoft was looking into building a database of exploits and exploits that are used in Windows XP, Windows Vista, Windows 7, and Windows 8.1.
Windows 10 users can already opt out of this feature, though Microsoft is reportedly looking into other ways to allow users to opt out in the near future.