The Tamper protection policy option in Malwarebytes Nebula protects endpoints by limiting end user ability to uninstall Malwarebytes. This also prevents malicious threats from stopping, modifying, or deleting Malwarebytes. To follow the steps in this article, enable the New policies experience switch in the Policies page. If you have the new policies experience disabled, locate these policy […]
Category: Malwarebytes Business
Malwarebytes for Android(90)
Malwarebytes for IOS(64)
Malwarebytes for MAC(94)
Malwarebytes for Windows(204)
Configure Syslog in Malwarebytes Nebula
In addition to the built-in reports available in Malwarebytes Nebula, you can send threat-related events to your SIEM solution for security insights, compliance, and visibility. This article provides the steps required to set up Syslog for Malwarebytes Nebula. Events flow The diagram below represents the Malwarebytes events flow. The flow follows this order: Endpoints report […]
Configure Software Updates options in Malwarebytes Nebula
The Software Updates policy option in Malwarebytes Nebula allows control over when endpoints receive Malwarebytes software updates. This option only applies to Protection Service updates, Component Package updates are always automatic. To find and toggle this option in the Nebula console, click Settings > Policies > select a policy. Automatic Updates (Windows only): Enable this feature to allow automatic download […]
Configure single sign-on with Malwarebytes Nebula
If your organization uses a single sign-on provider, you may connect it to Malwarebytes Nebula. This article provides an overview of Malwarebytes single sign-on configuration and basic setup steps. Go to Settings > Single Sign-On. Single-Sign On is turned off by default. Enable Single Sign-On to allow the Malwarebytes console to control logins through your identity provider. Link […]
Configure Scan settings options in Malwarebytes Nebula
Policies define how Malwarebytes behaves when running a scheduled scan. Policies are applied at the group level, and all endpoints in a group use the same policy. By default, endpoints added to the console belong to the Default Group, and the Default Policy. To follow the steps in this article, enable the New policies experience switch in […]
Configure session timeout settings in Malwarebytes Nebula
In your Malwarebytes Nebula console, you can configure the duration that inactivity causes a session timeout. This feature can allow you to stay logged in to your Nebula console without the need to sign in again after short, idle periods. You can extend your session for up to 12 hours. Configure your timeout settings These […]
Configure Protection settings in Malwarebytes Nebula
Policies define how Malwarebytes behaves when using Real-time protection. Policies are applied at the group level, and all endpoints in a group use the same policy. By default, endpoints added to the console belong to the Default Group, and the Default Policy. To follow the steps in this article, enable the New policies experience switch in the […]
Configure Brute Force Protection in Malwarebytes Nebula
Brute Force Protection is configured in the policy settings of your Malwarebytes Nebula console. Based on these configurations, the Malwarebytes Endpoint Agent monitors failed Windows™ protocol login attempts and creates a Windows Firewall rule to temporarily block the incoming IP address. For system requirements, see Brute Force Protection feature requirements. IMPORTANT: Enabling this feature may enable […]
Components of the Malwarebytes Nebula
Malwarebytes Nebula consists of a few components working together to protect your endpoints. This article explains each component. The Malwarebytes Console provides central endpoint management of endpoints through a web-based user interface. Use the console to configure policies, view quarantined items, and stay informed of your network status. The Malwarebytes Console provides downloadable endpoint installers and the […]
Command-line options in Malwarebytes Nebula
Certain functionality of Malwarebytes may be performed via command-line to facilitate custom scripting or automation. The Endpoint Agent Command-line tool, or EACmd, is a program developed to communicate with the Endpoint Agent service. It uses the same communication method as the Endpoint Agent Tray program. EACmd is located on each Windows endpoint at the following location: […]