If a managed Windows or Mac endpoint encounters issues with the Malwarebytes Endpoint Agent, you may need to collect diagnostic logs for investigation, or to submit them to our Support team for troubleshooting the issue. This article explains how to generate diagnostic logs via the Malwarebytes Nebula console, and how to manually collect them from […]
Category: Malwarebytes Endpoint
Windows script to display Malwarebytes Endpoint Protection Agent Health and Service Status
To verify a Malwarebytes Endpoint Protection is running, you can download and run the ServiceStatus.cmd script on the endpoint. Download and run Service Status script Download the attached script zip file (see below) and extract ServiceStatus-x.xx.cmd.txt to the endpoint computer. Rename the file to be ServiceStatus-x.xx.cmd Administrator privileges are not required to run the script, as it uses only standard […]
Use the Endpoint Agent Command-line tool with Malwarebytes Nebula
Some Malwarebytes Nebula actions may be performed by command line to help with custom scripting or automation by software deployment and remote monitoring and management (RMM) tools. The Endpoint Agent Command-line tool, EACmd, is a Windows™ application created to communicate with the Endpoint Agent service. This article covers suggested methods of using EACmd in your scripts […]
Suspicious Activity Monitoring in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. Detections are highlighted for your review in the menu pane under Suspicious Activity. Not […]
Suspicious Activity Details in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. From the Suspicious Activity screen, you can click the Locations item or the number of rules triggered to view the Suspicious Activity Details screen. This screen […]
Restore Malwarebytes Endpoint Agent configuration from side-by-side configuration error
The Malwarebytes Endpoint Agent stores operational settings in a configuration file on the endpoint. This file is automatically backed up on a regular schedule and can be restored as needed. This article walks you through using the Configuration Recovery Tool to restore the configuration file. By default, the configuration file is stored on each endpoint […]
Perform actions to Suspicious Activity events in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. This article explains how to remediate Suspicious Activity or close the […]
Perform actions on endpoints in Malwarebytes Nebula
Use the Malwarebytes Nebula platform to quickly and easily perform actions across thousands of endpoints with just a few clicks. This article explains the actions available to you. Actions are performed from the Endpoints screen. Go to Endpoints. After choosing endpoints, select one of these actions from the Actions drop-down menu in the top right: Scan + Report: Tells the endpoint to check […]
Manage endpoints in Malwarebytes Nebula
The Malwarebytes Nebula platform offers detailed endpoint management through the Endpoints screen. You can select one or more endpoints and perform a variety of actions. For more on working with endpoints, see Perform actions on endpoints in Malwarebytes Nebula and Add endpoints in Malwarebytes Nebula. In the left navigation pane, click Endpoints to access your endpoints. At a glance, you […]
Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist
Below are comparison tables for Policy and Admin features found in Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection. Use these supplemental checklists to compare what features are offered in the Malwarebytes Endpoint Security on-premises Management Console, and what the equivalent feature is in the Malwarebytes Endpoint Protection cloud-based console, if applicable. This article acts as a companion document with Malwarebytes […]