Collect Malwarebytes Endpoint Agent diagnostic logs 0 (0)

If a managed Windows or Mac endpoint encounters issues with the Malwarebytes Endpoint Agent, you may need to collect diagnostic logs for investigation, or to submit them to our Support team for troubleshooting the issue. This article explains how to generate diagnostic logs via the Malwarebytes Nebula console, and how to manually collect them from […]

Read More

Windows script to display Malwarebytes Endpoint Protection Agent Health and Service Status 0 (0)

To verify a Malwarebytes Endpoint Protection is running, you can download and run the ServiceStatus.cmd script on the endpoint. Download and run Service Status script Download the attached script zip file (see below) and extract ServiceStatus-x.xx.cmd.txt to the endpoint computer. Rename the file to be ServiceStatus-x.xx.cmd Administrator privileges are not required to run the script, as it uses only standard […]

Read More

Use the Endpoint Agent Command-line tool with Malwarebytes Nebula 0 (0)

Some Malwarebytes Nebula actions may be performed by command line to help with custom scripting or automation by software deployment and remote monitoring and management (RMM) tools. The Endpoint Agent Command-line tool, EACmd, is a Windows™ application created to communicate with the Endpoint Agent service. This article covers suggested methods of using EACmd in your scripts […]

Read More

Suspicious Activity Monitoring in Malwarebytes Endpoint Detection and Response 0 (0)

Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. Detections are highlighted for your review in the menu pane under Suspicious Activity. Not […]

Read More

Suspicious Activity Details in Malwarebytes Endpoint Detection and Response 0 (0)

Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. From the Suspicious Activity screen, you can click the Locations item or the number of rules triggered to view the Suspicious Activity Details screen. This screen […]

Read More

Perform actions to Suspicious Activity events in Malwarebytes Endpoint Detection and Response 0 (0)

Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. This article explains how to remediate Suspicious Activity or close the […]

Read More

Perform actions on endpoints in Malwarebytes Nebula 0 (0)

Use the Malwarebytes Nebula platform to quickly and easily perform actions across thousands of endpoints with just a few clicks. This article explains the actions available to you. Actions are performed from the Endpoints screen. Go to Endpoints. After choosing endpoints, select one of these actions from the Actions drop-down menu in the top right: Scan + Report: Tells the endpoint to check […]

Read More

Manage endpoints in Malwarebytes Nebula 0 (0)

The Malwarebytes Nebula platform offers detailed endpoint management through the Endpoints screen. You can select one or more endpoints and perform a variety of actions. For more on working with endpoints, see Perform actions on endpoints in Malwarebytes Nebula and Add endpoints in Malwarebytes Nebula. In the left navigation pane, click Endpoints to access your endpoints. At a glance, you […]

Read More

Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist 0 (0)

Below are comparison tables for Policy and Admin features found in Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection. Use these supplemental checklists to compare what features are offered in the Malwarebytes Endpoint Security on-premises Management Console, and what the equivalent feature is in the Malwarebytes Endpoint Protection cloud-based console, if applicable. This article acts as a companion document with Malwarebytes […]

Read More