Malwarebytes Endpoint Detection and Response customers can use the Flight Recorder feature. This feature allows you to search event data captured from all of your Malwarebytes Endpoint Detection and Response managed endpoints to investigate and identify indicators of compromise. You can search data like files, registry, processes, and networking activity up to the past 30 […]
Articles Tagged: malwarebytes for business
First login to Malwarebytes Nebula
When you subscribe to Malwarebytes Nebula, we email you an invitation with a link to log in. Once you accept the invitation, you can continue to create your account. This article explains how to log in and review some initial options. Log in to Malwarebytes At the Malwarebytes login screen, enter your email address. This […]
Export data with the Malwarebytes Nebula Excel Addin with Reporting and Utilities
Download the latest Malwarebytes Excel Addin Installer Download sample PDF summary report Download sample HTML summary report What’s This? The Malwarebytes Nebula server collects a rich set of information from the endpoints and a common request we get is to turn this data into useful information. Malwarebytes provides a complete set of RESTful APIs for […]
Events and Tasks in Malwarebytes Nebula
In Malwarebytes Nebula, an Event is a general term for a threat that has occurred, remediation or other action taken on a threat, and other endpoint-related activity. Similarly, queued or pending endpoint actions are referred to as Tasks. This article provides a brief overview of the Events and Tasks screens and how they are useful for endpoint […]
Configure reports in Malwarebytes Nebula
You can generate on-demand and scheduled reports on the Reports screen of Malwarebytes Nebula. Select a relative time period or specific dates for each report. Reports are saved locally as an CSV file. The following report types are available: Detections Summary: Displays information related to detections of malware, PUPs, PUMs, ransomware, and exploits. Endpoints Summary: Displays summary information […]
Configure Suspicious activity monitoring in Malwarebytes Nebula
Suspicious activity monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious activity monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. This article explains how to enable Suspicious […]
Edit or delete groups in Malwarebytes Nebula
A group is a collection of endpoints that share the same policy. You may choose which policy you assign to each group. Organize your endpoints by adding groups and moving endpoints to them. This article explains how to edit or delete groups. Edit a group You may rename a group or change which policy the […]
Detections page in Malwarebytes Nebula
The Detections section in Malwarebytes Nebula displays information on all threats, and potential threats, found on the endpoints in your environment. You can see the number of daily detections within the last 30 days, and a record of the total detections and their endpoint locations on this page. To view this section in the Nebula […]
Deploy Malwarebytes Firefox Extension using Group Policy
This article guides you through deploying the Malwarebytes Firefox browser extension to your endpoints using Group Policy in a business environment. You can add the extension to protect your Firefox browser by downloading from the Firefox Add-ons page. This works for individual users, but Group Policy is required to deploy an extension to a large number of users […]
Deploy Malwarebytes Chrome Extension using Group Policy
This article guides you through deploying Google Chrome extensions to your endpoints using Group Policy in a business environment. You need the Enterprise version of google chrome for this process: https://cloud.google.com/chrome-enterprise/browser/download/ You can add the Malwarebytes Browser Extension to protect your Chrome browser by downloading from the Chrome Web Store. This works for individual users, but Group Policy is […]