Events and Tasks in Malwarebytes Nebula 0 (0)

In Malwarebytes Nebula, an Event is a general term for a threat that has occurred, remediation or other action taken on a threat, and other endpoint-related activity. Similarly, queued or pending endpoint actions are referred to as Tasks. This article provides a brief overview of the Events and Tasks screens and how they are useful for endpoint […]

Read More

Configure reports in Malwarebytes Nebula 0 (0)

You can generate on-demand and scheduled reports on the Reports screen of Malwarebytes Nebula. Select a relative time period or specific dates for each report. Reports are saved locally as an CSV file. The following report types are available: Detections Summary: Displays information related to detections of malware, PUPs, PUMs, ransomware, and exploits. Endpoints Summary: Displays summary information […]

Read More

Configure Suspicious activity monitoring in Malwarebytes Nebula 0 (0)

Suspicious activity monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious activity monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. This article explains how to enable Suspicious […]

Read More

Edit or delete groups in Malwarebytes Nebula 0 (0)

A group is a collection of endpoints that share the same policy. You may choose which policy you assign to each group. Organize your endpoints by adding groups and moving endpoints to them. This article explains how to edit or delete groups. Edit a group You may rename a group or change which policy the […]

Read More

Detections page in Malwarebytes Nebula 0 (0)

The Detections section in Malwarebytes Nebula displays information on all threats, and potential threats, found on the endpoints in your environment. You can see the number of daily detections within the last 30 days, and a record of the total detections and their endpoint locations on this page. To view this section in the Nebula […]

Read More

Deploy Malwarebytes Firefox Extension using Group Policy 0 (0)

This article guides you through deploying the Malwarebytes Firefox browser extension to your endpoints using Group Policy in a business environment. You can add the extension to protect your Firefox browser by downloading from the Firefox Add-ons page. This works for individual users, but Group Policy is required to deploy an extension to a large number of users […]

Read More

Deploy Malwarebytes Chrome Extension using Group Policy 0 (0)

This article guides you through deploying Google Chrome extensions to your endpoints using Group Policy in a business environment. You need the Enterprise version of google chrome for this process: https://cloud.google.com/chrome-enterprise/browser/download/ You can add the Malwarebytes Browser Extension to protect your Chrome browser by downloading from the Chrome Web Store. This works for individual users, but Group Policy is […]

Read More

Malwarebytes Nebula policy with new experience disabled 0 (0)

Malwarebytes Nebula updated the policy page for a more intuitive customer experience. If the new policies experience toggle is disabled, see the policy guide below: Add, delete, clone a policy. Endpoint interface options. Tamper Protection options. General options. Settings options. Add, delete, or clone a policy You can add a new policy to protect your […]

Read More

Dashboard page in Malwarebytes Nebula 0 (0)

One of the primary functions of the Malwarebytes Nebula console is to keep you informed of malware-related activities on your endpoints. The Dashboard provides a high level view of this activity on your network. It presents a summarized view of the information displayed in more detail on sections of your Nebula console through widgets. In the top […]

Read More

Configure Windows server roles for Malwarebytes Nebula 0 (0)

Malwarebytes Nebula contains real-time protection modules which support stock Windows Server Operating Systems from 2008 through 2019, including variants. Server protection requires one of the following subscriptions: Malwarebytes Endpoint Protection for Servers Malwarebytes Endpoint Detection and Response for Servers The real-time protection modules are: Web Protection – Prevents connections to malicious or compromised websites Exploit Protection – Prevents […]

Read More