Use the Endpoint Agent Command-line tool with Malwarebytes Nebula 0 (0)

Some Malwarebytes Nebula actions may be performed by command line to help with custom scripting or automation by software deployment and remote monitoring and management (RMM) tools. The Endpoint Agent Command-line tool, EACmd, is a Windows™ application created to communicate with the Endpoint Agent service. This article covers suggested methods of using EACmd in your scripts […]

Read More

Suspicious Activity Monitoring in Malwarebytes Endpoint Detection and Response 0 (0)

Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. Detections are highlighted for your review in the menu pane under Suspicious Activity. Not […]

Read More

Suspicious Activity Details in Malwarebytes Endpoint Detection and Response 0 (0)

Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. From the Suspicious Activity screen, you can click the Locations item or the number of rules triggered to view the Suspicious Activity Details screen. This screen […]

Read More

Perform actions to Suspicious Activity events in Malwarebytes Endpoint Detection and Response 0 (0)

Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. This article explains how to remediate Suspicious Activity or close the […]

Read More

Perform actions on endpoints in Malwarebytes Nebula 0 (0)

Use the Malwarebytes Nebula platform to quickly and easily perform actions across thousands of endpoints with just a few clicks. This article explains the actions available to you. Actions are performed from the Endpoints screen. Go to Endpoints. After choosing endpoints, select one of these actions from the Actions drop-down menu in the top right: Scan + Report: Tells the endpoint to check […]

Read More

Manage endpoints in Malwarebytes Nebula 0 (0)

The Malwarebytes Nebula platform offers detailed endpoint management through the Endpoints screen. You can select one or more endpoints and perform a variety of actions. For more on working with endpoints, see Perform actions on endpoints in Malwarebytes Nebula and Add endpoints in Malwarebytes Nebula. In the left navigation pane, click Endpoints to access your endpoints. At a glance, you […]

Read More

Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist 0 (0)

Below are comparison tables for Policy and Admin features found in Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection. Use these supplemental checklists to compare what features are offered in the Malwarebytes Endpoint Security on-premises Management Console, and what the equivalent feature is in the Malwarebytes Endpoint Protection cloud-based console, if applicable. This article acts as a companion document with Malwarebytes […]

Read More

Malwarebytes Endpoint Protection settings for Protection Updates 0 (0)

The Protection Updates policy setting determines how often the Malwarebytes client polls our infrastructure servers for updates. Protection Updates are database updates, sometimes called protection rules updates. Protection Updates are used by scans and Real-time Protection features. Update frequency Both Windows and Mac endpoint agents check for Protection Updates at the following intervals: System startup – […]

Read More

Endpoint Protection firewall prerequisites to deploy clients via Group Policy (Malwarebytes) 0 (0)

Before you can deploy clients from the Malwarebytes Nebula platform, you must configure your Group Policy’s (GPO) firewall. Here is a list of firewall prerequisites: Open ports 135, 137, and 445 Enable Windows Management Instrumentation (WMI) Enable Remote Procedure Call (RPC) Follow the steps in this article to configure Windows Firewall. Alternatively, use the Command Prompt […]

Read More