Flight Recorder in Malwarebytes Nebula 0 (0)

Malwarebytes Endpoint Detection and Response customers can use the Flight Recorder feature. This feature allows you to search event data captured from all of your Malwarebytes Endpoint Detection and Response managed endpoints to investigate and identify indicators of compromise. You can search data like files, registry, processes, and networking activity up to the past 30 […]

Read More

First login to Malwarebytes Nebula 0 (0)

When you subscribe to Malwarebytes Nebula, we email you an invitation with a link to log in. Once you accept the invitation, you can continue to create your account. This article explains how to log in and review some initial options. Log in to Malwarebytes At the Malwarebytes login screen, enter your email address. This […]

Read More

Events and Tasks in Malwarebytes Nebula 0 (0)

In Malwarebytes Nebula, an Event is a general term for a threat that has occurred, remediation or other action taken on a threat, and other endpoint-related activity. Similarly, queued or pending endpoint actions are referred to as Tasks. This article provides a brief overview of the Events and Tasks screens and how they are useful for endpoint […]

Read More

Configure reports in Malwarebytes Nebula 0 (0)

You can generate on-demand and scheduled reports on the Reports screen of Malwarebytes Nebula. Select a relative time period or specific dates for each report. Reports are saved locally as an CSV file. The following report types are available: Detections Summary: Displays information related to detections of malware, PUPs, PUMs, ransomware, and exploits. Endpoints Summary: Displays summary information […]

Read More

Configure Suspicious activity monitoring in Malwarebytes Nebula 0 (0)

Suspicious activity monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious activity monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. This article explains how to enable Suspicious […]

Read More

Edit or delete groups in Malwarebytes Nebula 0 (0)

A group is a collection of endpoints that share the same policy. You may choose which policy you assign to each group. Organize your endpoints by adding groups and moving endpoints to them. This article explains how to edit or delete groups. Edit a group You may rename a group or change which policy the […]

Read More

Detections page in Malwarebytes Nebula 0 (0)

The Detections section in Malwarebytes Nebula displays information on all threats, and potential threats, found on the endpoints in your environment. You can see the number of daily detections within the last 30 days, and a record of the total detections and their endpoint locations on this page. To view this section in the Nebula […]

Read More

Deploy Malwarebytes Firefox Extension using Group Policy 0 (0)

This article guides you through deploying the Malwarebytes Firefox browser extension to your endpoints using Group Policy in a business environment. You can add the extension to protect your Firefox browser by downloading from the Firefox Add-ons page. This works for individual users, but Group Policy is required to deploy an extension to a large number of users […]

Read More

Deploy Malwarebytes Chrome Extension using Group Policy 0 (0)

This article guides you through deploying Google Chrome extensions to your endpoints using Group Policy in a business environment. You need the Enterprise version of google chrome for this process: https://cloud.google.com/chrome-enterprise/browser/download/ You can add the Malwarebytes Browser Extension to protect your Chrome browser by downloading from the Chrome Web Store. This works for individual users, but Group Policy is […]

Read More