The Protection Updates policy setting determines how often the Malwarebytes client polls our infrastructure servers for updates. Protection Updates are database updates, sometimes called protection rules updates. Protection Updates are used by scans and Real-time Protection features. Update frequency Both Windows and Mac endpoint agents check for Protection Updates at the following intervals: System startup – […]
Category: Malwarebytes Endpoint
Endpoint Protection firewall prerequisites to deploy clients via Group Policy (Malwarebytes)
Before you can deploy clients from the Malwarebytes Nebula platform, you must configure your Group Policy’s (GPO) firewall. Here is a list of firewall prerequisites: Open ports 135, 137, and 445 Enable Windows Management Instrumentation (WMI) Enable Remote Procedure Call (RPC) Follow the steps in this article to configure Windows Firewall. Alternatively, use the Command Prompt […]
Configure Endpoint Isolation in Malwarebytes Nebula
Malwarebytes Endpoint Detection and Response includes Endpoint Isolation, which temporarily stops threats from spreading between endpoints by restricting their communication or access. An isolated endpoint can still communicate with the console and run Malwarebytes processes. Super Admins and Administrators can isolate endpoints protected by policies with the Endpoint Isolation feature enabled. For Endpoint Isolation usage […]
Delete endpoints in Malwarebytes Nebula
Administrators can delete endpoints using the console, which removes them from the Malwarebytes Nebula platform. After a period of time, the deleted endpoint is also removed from the Malwarebytes database. Malwarebytes then uninstalls the agent from from the endpoint. This article explains what happens when you mark endpoints for deletion, and how to perform this action. Alternatively, you can automate […]
Create an alias for Malwarebytes Nebula endpoints
Malwarebytes Nebula allows you to create a new name, or alias, for your managed endpoints. You may want to rename endpoints with complex device names to something easier to remember or identify. The new endpoint name is only visible in the Nebula console. Users at the endpoint do not see any changes. This article details […]
CPU Usage setting for Mac endpoints in Malwarebytes Nebula
Malwarebytes Nebula allows you to control the maximum amount of processing power used during a manual or scheduled system scan on Mac endpoints. To follow the steps in this article, enable the New policies experience switch in the Policies page. If you have the new policies experience disabled, locate these policy settings by referring to: Malwarebytes Nebula policy […]
Configure Inactive endpoint option in Malwarebytes Nebula
The Inactive endpoint option in Malwarebytes Nebula allows you to remove endpoints from your Nebula console that have been inactive for a set period of time. When enabled in a policy, endpoints that have not checked in with the console within the specified time frame are automatically removed. This feature is useful for automating the […]
Configure Endpoint agent settings in Malwarebytes Nebula
Policies define how Malwarebytes behaves when running a scheduled scan, using Real-Time Protection, or monitoring Suspicious Activity. Policies are applied at the group level, and all endpoints in a group use the same policy. By default, endpoints added to the console belong to the Default Group which uses the Default Policy. To follow the steps […]
Commands for Malwarebytes Nebula Linux endpoints
After installing the Linux Endpoint Agent, you can execute many operations by Command Line Interface (CLI), including start a scan, update databases, or configure exclusions. Some tasks are easier to use via the Malwarebytes Nebula console interface, like update database, create exclusions, or check quarantine. See this article for the available commands for Linux endpoints. […]
Configure Endpoint Detection and Response options in Malwarebytes Nebula
Policies define how Malwarebytes behaves when using Endpoint Detection and Response features. Policies are applied at the group level, and all endpoints in a group use the same policy. By default, endpoints added to the console belong to the Default Group, and the Default Policy. To follow the steps in this article, enable the New policies […]