Malwarebytes Nebula next-gen software update FAQs 0 (0)

Learn answers to frequently asked questions about the Malwarebytes Nebula next-gen scanning engine. Will this update require a restart, and what can end-users expect? In most instances, endpoints will require a restart after the update is installed. Restarts are handled as configured via your policy configuration. We recommend reviewing your policy configuration found in the […]

Read More

Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist 0 (0)

Below are comparison tables for Policy and Admin features found in Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection. Use these supplemental checklists to compare what features are offered in the Malwarebytes Endpoint Security on-premises Management Console, and what the equivalent feature is in the Malwarebytes Endpoint Protection cloud-based console, if applicable. This article acts as a companion document with Malwarebytes […]

Read More

Malwarebytes Endpoint Protection settings for Protection Updates 0 (0)

The Protection Updates policy setting determines how often the Malwarebytes client polls our infrastructure servers for updates. Protection Updates are database updates, sometimes called protection rules updates. Protection Updates are used by scans and Real-time Protection features. Update frequency Both Windows and Mac endpoint agents check for Protection Updates at the following intervals: System startup – […]

Read More

List of protected applications in Malwarebytes Nebula 0 (0)

Malwarebytes Endpoint Protection and Malwarebytes Endpoint Detection and Response subscriptions include a comprehensive list of applications to protect. This list is the default set of applications protected by our Anti-Exploit technology. Anti-Exploit technology is a multi-layered protection module in Malwarebytes that prevents exploit attacks that target vulnerabilities found in these applications. To follow the steps […]

Read More

Inventory page in Malwarebytes Nebula 0 (0)

The Inventory page in the Malwarebytes Nebula console lists application information on your managed Windows™ and Mac™ endpoints. To view this page, log into Malwarebytes Nebula and select Inventory from the left navigation pane. This article explains how to sort listed information, and how to export selected data. Sort data in the results list You can customize […]

Read More

Flight Recorder in Malwarebytes Nebula 0 (0)

Malwarebytes Endpoint Detection and Response customers can use the Flight Recorder feature. This feature allows you to search event data captured from all of your Malwarebytes Endpoint Detection and Response managed endpoints to investigate and identify indicators of compromise. You can search data like files, registry, processes, and networking activity up to the past 30 […]

Read More

First login to Malwarebytes Nebula 0 (0)

When you subscribe to Malwarebytes Nebula, we email you an invitation with a link to log in. Once you accept the invitation, you can continue to create your account. This article explains how to log in and review some initial options. Log in to Malwarebytes At the Malwarebytes login screen, enter your email address. This […]

Read More

Events and Tasks in Malwarebytes Nebula 0 (0)

In Malwarebytes Nebula, an Event is a general term for a threat that has occurred, remediation or other action taken on a threat, and other endpoint-related activity. Similarly, queued or pending endpoint actions are referred to as Tasks. This article provides a brief overview of the Events and Tasks screens and how they are useful for endpoint […]

Read More

Endpoint Protection firewall prerequisites to deploy clients via Group Policy (Malwarebytes) 0 (0)

Before you can deploy clients from the Malwarebytes Nebula platform, you must configure your Group Policy’s (GPO) firewall. Here is a list of firewall prerequisites: Open ports 135, 137, and 445 Enable Windows Management Instrumentation (WMI) Enable Remote Procedure Call (RPC) Follow the steps in this article to configure Windows Firewall. Alternatively, use the Command Prompt […]

Read More