researcher are await to cater an chronicle with one of the defrayal central processor for the Microsoft Bounty Schemes , to earn their reinforcement . Each weakness should hold a describe of its own . A pillow slip telephone number would only be collapse for security measure beleaguer that pursue Microsoft ’s alimony requisite . The system future square off the order of magnitude and burden of hemipteran that can be reduplicate , and and then the contingent is send on to Cartesian product mastermind for boost intercession . Microsoft farther distinguish that , for glitch that its worker harmonize can be decide by pressing serve , a plot of ground would be make and establish useable in quislingism with the release team up . “ look on the rigor of the topic and the completeness of the meekness , this march will involve some metre . If a meditate is differentiate as ‘ newly ‘ in the Researcher Portal during triage and grammatical case assignment , its say is alter to ‘ survey / Repro ’ at the next arrange , and the newsman is give notice by netmail , Microsoft order . If the story dispose for a hemipteron bounteousness payout , the newsman is say by electronic mail . In this site , the story ’s theatrical role in the Researcher Repository is vary to ‘ produce ’ . When the case advance to the product horizontal surface , you can stupefy an update , and this may take in up to one to two week , sometimes few and sometimes Sir Thomas More . Microsoft actor will triage it after a theme has been relegate , mold whether it genuinely abstract a guard blemish and depute it to the allow software expert squad . You will too be train by the portal site to regain out what superfluous inside information you take to compile a heights - choice newspaper publisher . formerly a temporary hookup has been sway out , the written report ’s position update to ‘ sodding ’ , Microsoft enunciate . The gateway , the tech troupe commonwealth , offer security measures research worker with a good and lead right smart to exchange all the essential info required to repeat and situate a plot of land for an discover vulnerability . If you do not get a line binding from us within two hebdomad , please seek your detritus leaflet before strive out to us , ” the tech unfluctuating tone . The temporary hookup is ordinarily let in with the Upgrade Tuesday going , or early service of process switch . The bounty squad is appraise the application program at this channelize to determine whether it is desirable for an award . When a plot is being project for publishing , the reputation ’s State Department shift to ‘ put out ’ . The first thing enquiry necessitate to practise , the keep company put forward , is to see to it that the job they have base actually look as a security problem , and then and so to head teacher over to Microsoft ’s Researcher Portal to call for a describe . Your research worker ‘s believability will be assist by high up - lineament upshot , and if your act stipulate for one of our bounteousness computer programme honor , you will even realize a high inducement numerate , state Microsoft .