• Install & Activate
  • Troubleshooting
BEST Antivirus KBS : Largest Anti-Malware Knowlegde Base and Support
  • Install & Activate
  • Troubleshooting

Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist

/Download, Install & Active / Malwarebytes / Download, Install & Active / Malwarebytes / Malwarebytes Endpoint / Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist
  • August 30, 2021
  • BEST Antivirus Staff 2
  • Malwarebytes / Malwarebytes Endpoint

Contents

  1. Policy feature comparison
    1. General
    2. Protection
    3. Scanner
    4. Scheduler (Settings for each scan)
    5. Malwarebytes Anti-Malware Exclusions
    6. Updater
    7. Communication
    8. Anti-Exploit
    9. Anti-Exploit Exclusions
    10. Anti-Ransomware
  2. Admin feature comparison
    1. Overview
    2. Database Settings
    3. Signature
    4. Administrators
0
(0)

Below are comparison tables for Policy and Admin features found in Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection. Use these supplemental checklists to compare what features are offered in the Malwarebytes Endpoint Security on-premises Management Console, and what the equivalent feature is in the Malwarebytes Endpoint Protection cloud-based console, if applicable.

This article acts as a companion document with Malwarebytes Endpoint Security to Malwarebytes Endpoint Protection migration best practices. Organizations planning to migrate their managed endpoints from our on-premises solution to our cloud-managed solution may find this feature comparison useful during transition.

Policy feature comparison

The following tables highlight features/tabs found in the Malwarebytes Endpoint Security Policy pane. The Malwarebytes Endpoint Protection column shows if an equivalent feature exists, and its location in the Nebula console.

General

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Terminate Internet Explorer during threat removal Not available in Malwarebytes Endpoint Protection
Anonymously report usage statistics Not available in Malwarebytes Endpoint Protection
Create right click context menu Policy > Endpoint Interface Options > Context Menu Scans
Automatically save log file after scan completes Malwarebytes Endpoint Protection can generate a logfile anytime, but contains more than detections and quarantines. Right-click the Malwarebytes icon while holding the Ctrl key or via CLI Windows command line C:\Program Files\Malwarebytes Endpoint Agent\MBCloudEA.exe -diag
Open log file immediately after saving Not available in Malwarebytes Endpoint Protection
Warn if database is outdated by Not available in Malwarebytes Endpoint Protection
Language Not available in Malwarebytes Endpoint Protection
Start Up Type (Automatic, Manual, Disabled, Automatic (Delayed Start) Automatic = normal operation in Malwarebytes Endpoint Protection

Manual = not available in Malwarebytes Endpoint Protection

Disabled = Not available. Endpoint agent always starts on the endpoint unless uninstalled. Can move endpoint to group that doesn’t have any scheduled scans and turn off all 4 layers of protection in Policy > Windows > Settings > Real-Time Protection

Automatic (Delayed Start) = Policy > Windows > Settings > Startup options > Delayed Real-Time Protection

Enable Service Recovery Options Not available in Malwarebytes Endpoint Protection

Protection

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Enable Protection Module Windows > Settings > Malware Protection On
Start file execution blocking when protection module starts Windows > Settings > Malware Protection On
Start malicious website blocking when protection module starts Start Malicious Website Blocking = Windows > Settings > Web Protection On

Malwarebytes Endpoint Protection: Unlike Malwarebytes Endpoint Security, Website Blocking cannot be enabled/disabled by the end user, it must be done in the Malwarebytes Nebula platform by an Admin User

Show tooltip balloon when malicious website is blocked Endpoint Interface Options > Real-time Notifications On
Advanced Settings
      Silent mode Show Icon in Notification Area Off, but no option to still allow for right-click context menu on Windows endpoints.

Malwarebytes Endpoint Security: In Silent mode, the only indication that the managed client is present on their machine is the right-click context menu.

      Limited user mode Show Icon in Notification Area On, User Threat Scan On

Malwarebytes Endpoint Security: The managed client is visible as an icon in the system tray, but only with options to start a scan or to check for updates.

Malwarebytes Endpoint Protection: No option to check for updates (manually checking for updates is only available within the Nebula console), has option to show icon but not allow on demand threat scan.

      Auto quarantine No corresponding Malwarebytes Endpoint Protection setting. During an on-demand scan, threats are automatically quarantined.
      AQ Tool Tip when file system threat is blocked No corresponding Malwarebytes Endpoint Protection setting. Real-time Notifications On may show a tool tip when a manual scan is initiated. End-User Initiated scans will always show scan status window.
      Disable website blocking Windows > Settings > Malware Protection Off

Disable the feature completely, checking this box prevents website blocking from being started via the end-user interface.

      startup delay Windows > Settings > Startup Options > Delay Real-Time Protection On (then select the number of seconds to delay)

Scanner

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Scan memory objects Default behavior of Threat Scan.
Scan startup objects Default behavior of Threat Scan.
Scan registry objects Default behavior of Threat Scan.
Scan file system objects Not available in on-demand scan, only scheduled scan.
Scan additional items against heuristics Default behavior of Threat Scan.
Enable scanning inside archives Windows or Mac > Settings > Scan Options > Scan within Archives = On
Enable advanced heuristics engineer (Heuristics.Shuriken) Windows or Mac > Settings > Scan Options > Anomalous File Detection = On
Action for potentially unwanted programs (PUP) Windows or Mac > Settings > Scan Options > Select how to treat PUP detection

Malwarebytes Endpoint Security allows for 3 settings, Malwarebytes Endpoint Protection only allows 2 settings:

Do not show in results list = Ignore Detections

show in results list and check for removal = Treat Detections as Malware

show in results list and do not check for removal = Not available in Malwarebytes Endpoint Protection

Action for potentially unwanted registry modifications (PUM) Windows or Mac > Settings > Scan Options > Select how to treat PUM detection

Malwarebytes Endpoint Security allows for 3 settings, Malwarebytes Endpoint Protection only allows 2 settings:

Do not show in results list = Ignore Detections

show in results list and check for removal = Treat Detections as Malware

show in results list and do not check for removal = not available in Malwarebytes Endpoint Protection

Action for peer-to-peer software (P2P) Not available in Malwarebytes Endpoint Protection

Scheduler (Settings for each scan)

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Type (Scan) Malwarebytes Endpoint Protection Options: Scan, Asset Refresh
Frequency (Hourly, Daily, Weekly, Monthly, Once, On reboot) Malwarebytes Endpoint Protection Options: Hourly, Daily, Weekly
Recover if missed by: (0-23 hours) Not available in Malwarebytes Endpoint Protection
Starting on: (date) Settings > Schedules > Scan Schedule
repeating every (1-48 hours, 1-30 days, 1-8 Weeks) Hours 1-23, Daily 1, Weekly 1
Type (Quick scan, Full scan, Flash scan) Malwarebytes Endpoint Protection options: Threat Scan, Custom Scan, Hyper Scan
Wake computer from sleep to perform task Not available in Malwarebytes Endpoint Protection
Remove and quarantine all threats automatically Settings > Schedules > Scan Type > Quarantine threats automatically
Perform scheduled scan silently from system account Default behavior for Malwarebytes Endpoint Protection, cannot be changed
Save log file regardless of user settings Default behavior for Malwarebytes Endpoint Protection, cannot be changed
Terminate program when scan completes successfully Not available in Malwarebytes Endpoint Protection
Restart the computer if required for threat removal Settings > Policies > General > Reboot Options > Enable Restart On – can also specify postpone and time – This policy setting applies to all scheduled and on demand scans for endpoints that are part of a group using this policy.

Malwarebytes Anti-Malware Exclusions

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
List of exclusions for files, directories, registry keys, IP Addresses separated by new line Each entry (Drive, Folder/File, File Extension, MD5 Hash, Registry key, Website/IP address or exclude an application from Web Monitoring) is entered via web based dialog or in bulk via Excel Add-In, and can apply exclusions to one or more Protection areas (Exploit, Ransomware, malware, website or Suspicious Activity)

Updater

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Download Signature updates from the Internet every __ hour(s)

Download Signature updates from a custom path every __ hour(s)

Not available in Malwarebytes Endpoint Protection
Path
Download signature updates from Management Server

Download Signature from alternative source every __ hour(s) if Management server is not accessible for __ hour(s)

Download from custom path:

Download from the Internet if signature update from custom path fails.

Not available in Malwarebytes Endpoint Protection
Proxy Setting Set during initial installation of endpoint agent or via CLI.

Communication

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Communication automatically check policy update (every 5 seconds or 1-9999 minutes) All policy communication is done automatically as needed (policy changes, endpoint moved from one policy/group to another)
Proxy (Do not use, Use Windows Proxy setting) Uses the system wide proxy setting set at initial install or via CLI.

Anti-Exploit

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Enable Anti-Exploit Protection Windows > Settings > Exploit Protection On
Automatically upgrade Anti-Exploit on Clients Endpoint Agent is automatically updated, no option to change in Malwarebytes Endpoint Protection.
Do not show alert popup upon exploit detection Endpoint Interface Options > Real-time Notifications On
Show protection events in Anti-Exploit clients Endpoint Interface Options > Real-time Notifications On
Do not show Anti-Exploit traybar icon and program interface Policy > Endpoint Interface Options > Show Icon in Notification Area = On/Off
Show Anti-Exploit balloon notifications on clients Policy > Endpoint Interface Options > Real-time notifications = On/Off
Anti-Exploit shielded applications Policy > Windows > Settings > Real-Time Protection > Exploit Protection = On/Manage Protected Applications
Advanced Policy > Windows > Settings > Real-Time Protection > Exploit Protection = On/Advanced Settings

Anti-Exploit Exclusions

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
List of exclusions in MD5 signature format and an optional filename List of exclusions for files, directories, registry keys, IP Addresses separated by new line. Each entry (Drive, Folder/File, File Extension, MD5 Hash, Registry key, Website/IP address or exclude an application from Web Monitoring) is entered via web based dialog or in bulk via Excel Add-In, can apply exclusions to one of more Protection areas (Exploit, Ransomware, malware, website or Suspicious Activity)

Anti-Ransomware

Malwarebytes Endpoint Security Policy setting Malwarebytes Endpoint Protection Policy setting equivalent
Enable Anti-Ransomware Protection Windows > Settings > Behavior Protection On
Exclusion List List of exclusions for files, directories, registry keys, IP Addresses separated by new line. Each entry (Drive, Folder/File, File Extension, MD5 Hash, Registry key, Website/IP address or exclude an application from Web Monitoring) is entered via web based dialog or in bulk via Excel Add-In, can apply exclusions to one of more Protection areas (Exploit, Ransomware, malware, website or Suspicious Activity)

Admin feature comparison

The following tables highlight features/tabs found in the Malwarebytes Endpoint Security Admin pane. The Malwarebytes Endpoint Protection column shows if an equivalent feature exists, and its location in the Nebula console.

Overview

Malwarebytes Endpoint Security Admin setting Malwarebytes Endpoint Protection Admin setting equivalent
License for Anti-Malware Malwarebytes Endpoint Protection has single license for all features – User Name > Profile > License Information
License for Anti-Exploit Malwarebytes Endpoint Protection has single license for all features – User Name > Profile > License Information
License for Anti-Ransomware Malwarebytes Endpoint Protection has single license for all features – User Name > Profile > License Information
Set Address Settings No need to set server address

Database Settings

Malwarebytes Endpoint Security Admin setting Malwarebytes Endpoint Protection Admin setting equivalent
SQL, cleanup Settings Not applicable

Signature

Malwarebytes Endpoint Security Admin setting Malwarebytes Endpoint Protection Admin setting equivalent
Current Signature – shown for management server Shown per endpoint agent – Endpoints > select Endpoint > Overview > Agent Information
Update Frequency – Default every 10 minutes Per Policy – Settings > Policies > Policy Name > General > Protection Updates > Update Frequency – Default check is every hour

Administrators

Malwarebytes Endpoint Security Admin setting Malwarebytes Endpoint Protection Admin setting equivalent
Add New User Settings > Users > New
Remove Users Settings > Users > Delete
Import Domain User Not available in Malwarebytes Endpoint Protection
Synchronize User Not available in Malwarebytes Endpoint Protection
List of Users Settings > Users
Add New User
Username, Full Name, Password, Role, Email, Phone Email Address, User Role, Group Access
Role
Administrator Super Admin
User (Permission Settings, Client, Client Group, Policy Report, Admin, Push Install, System Setting) Administrator – Access to everything within the Nebula console except for editing global settings and can be restricted to certain endpoint groups. Read Only – View everything, but no changes, can be restricted to certain endpoint groups.
Source : Official Malwarebytes Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 31 times, 1 visits today)
Tagged: malwarebytesmalwarebytes for endpoint

Related Articles

  • All about Malwarebytes

  • Technical Add-on for Malwarebytes for Splunk

  • Malwarebytes Agentless Remediation app for Splunk

  • Relatórios de atividade de terminais na plataforma Nebula da Malwarebytes

  • Malwarebytes Endpoint Protection Product Lifecycle

  • Windows 2019-09 Security Update for Windows devices running Malwarebytes home products

ask or enter a search term

Top Rated Posts

5 (1)

Activate code Avast on Windows PC

5 (1)

[KB5699] Set the PIN in ESET Parental Control for Android

5 (2)

Getting started (app) (ESET)

5 (1)

[KB3239] How do I uninstall or reinstall ESET Cyber Security or ESET Cyber Security Pro?

5 (2)

[KB6842] Upgrade to ESET Cyber Security and ESET Cyber Security Pro version 6.6 fails on previous versions of macOS (10.6 – 10.8)

About

We are BEST Antivirus , Trusted Comparison and Cheap Antivirus Software 2020. KBS is Knowledge Base and Support : This page was created to guide customers through the installation and to resolve all the common errors of anti-virus software.

Partners

› Avast
› AVG
› BitDefender
› ESET
› Trend Micro
› All Partners

Resources

› Store
› Advertise
› Brand Reviews
› Review Platforms
› Contact Page
› Knowledge Base

  • Install & Activate
  • Troubleshooting
© Copyright by BEST Antivirus by SSG Limited