Some Malwarebytes Nebula actions may be performed by command line to help with custom scripting or automation by software deployment and remote monitoring and management (RMM) tools. The Endpoint Agent Command-line tool, EACmd, is a Windows™ application created to communicate with the Endpoint Agent service. This article covers suggested methods of using EACmd in your scripts […]
Articles Tagged: malwarebytes for endpoint
Suspicious Activity Monitoring in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. Detections are highlighted for your review in the menu pane under Suspicious Activity. Not […]
Suspicious Activity Details in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. From the Suspicious Activity screen, you can click the Locations item or the number of rules triggered to view the Suspicious Activity Details screen. This screen […]
Restore Malwarebytes Endpoint Agent configuration from side-by-side configuration error
The Malwarebytes Endpoint Agent stores operational settings in a configuration file on the endpoint. This file is automatically backed up on a regular schedule and can be restored as needed. This article walks you through using the Configuration Recovery Tool to restore the configuration file. By default, the configuration file is stored on each endpoint […]
Perform actions to Suspicious Activity events in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. This article explains how to remediate Suspicious Activity or close the […]
Perform actions on endpoints in Malwarebytes Nebula
Use the Malwarebytes Nebula platform to quickly and easily perform actions across thousands of endpoints with just a few clicks. This article explains the actions available to you. Actions are performed from the Endpoints screen. Go to Endpoints. After choosing endpoints, select one of these actions from the Actions drop-down menu in the top right: Scan + Report: Tells the endpoint to check […]
Manage endpoints in Malwarebytes Nebula
The Malwarebytes Nebula platform offers detailed endpoint management through the Endpoints screen. You can select one or more endpoints and perform a variety of actions. For more on working with endpoints, see Perform actions on endpoints in Malwarebytes Nebula and Add endpoints in Malwarebytes Nebula. In the left navigation pane, click Endpoints to access your endpoints. At a glance, you […]
Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist
Below are comparison tables for Policy and Admin features found in Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection. Use these supplemental checklists to compare what features are offered in the Malwarebytes Endpoint Security on-premises Management Console, and what the equivalent feature is in the Malwarebytes Endpoint Protection cloud-based console, if applicable. This article acts as a companion document with Malwarebytes […]
Malwarebytes Endpoint Protection settings for Protection Updates
The Protection Updates policy setting determines how often the Malwarebytes client polls our infrastructure servers for updates. Protection Updates are database updates, sometimes called protection rules updates. Protection Updates are used by scans and Real-time Protection features. Update frequency Both Windows and Mac endpoint agents check for Protection Updates at the following intervals: System startup – […]
Endpoint Protection firewall prerequisites to deploy clients via Group Policy (Malwarebytes)
Before you can deploy clients from the Malwarebytes Nebula platform, you must configure your Group Policy’s (GPO) firewall. Here is a list of firewall prerequisites: Open ports 135, 137, and 445 Enable Windows Management Instrumentation (WMI) Enable Remote Procedure Call (RPC) Follow the steps in this article to configure Windows Firewall. Alternatively, use the Command Prompt […]