The Software Update Available status in the Malwarebytes Nebula console gives you control over larger software updates that are typically released monthly for Windows endpoints. This status indicates when an endpoint has downloaded a software update and is ready for installation. This allows you to manually control when the update gets installed. Note: This feature does not […]
Articles Tagged: malwarebytes
Types of scans in the Malwarebytes Nebula
Malwarebytes Nebula provides a quick Hyper Scan, a more in-depth Threat Scan, and custom scans. The Asset Inventory Scan updates endpoint information in the console. This article explains the types of scans and the options available for each. Scans may be run manually across endpoints or scheduled at a time that works best for you. Options for scans are […]
Suspicious Activity Monitoring in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. Suspicious Activity Monitoring uses machine learning models and cloud-based analysis to detect when questionable activity occurs. Detections are highlighted for your review in the menu pane under Suspicious Activity. Not […]
Suspicious Activity Details in Malwarebytes Endpoint Detection and Response
Suspicious Activity Monitoring is a feature included in Malwarebytes Endpoint Detection and Response. It watches for potentially malicious behavior by monitoring the processes, registry, file system, and network activity on the endpoint. From the Suspicious Activity screen, you can click the Locations item or the number of rules triggered to view the Suspicious Activity Details screen. This screen […]
Supported features in Malwarebytes Nebula products
The Malwarebytes Nebula platform policies determine what settings are applied to managed endpoints. Configure policies to enable the features you need. This article details policy features available per product and supported operating systems. ✓ = Supported by this product or operating system Feature Windows Mac Linux Malwarebytes Incident Response Malwarebytes Endpoint Protection Malwarebytes Endpoint Detection […]
Set scheduled scans in Malwarebytes Nebula
Malwarebytes Nebula can run automated scans on your endpoints on a schedule that you choose. If you prefer, scheduled scans can quarantine threats and Potentially Unwanted Programs without manual action. This article shows how to create a scheduled scan and explains the related options. Scheduled scans are managed at the group level. A scheduled scan can run […]
Set email notifications in Malwarebytes Nebula
Malwarebytes Nebula can notify you when certain events occur, such as when scheduled scans detect threats, or if a new endpoint wp-signup.phps to your console. Use the Notifications settings to choose which notifications you want to receive. This article explains how to make changes to your email notifications under Profile. You can receive email notifications for one or […]
Security validation for Malwarebytes deployment
Malwarebytes ensures that all endpoint deployment steps are put through a strong validation procedure to maintain strict control over its application install process. To ensure the deployment was not tampered with, Malwarebytes performs a signature-based check similar to Windows operating systems to verify the files prior to installation. During the initial pre-installation process, our endpoint […]
Sandbox Analysis in Malwarebytes Nebula
Malwarebytes Endpoint Detection and Response customers can use the Sandbox Analysis feature. This feature allows you to upload a file within the Malwarebytes Nebula console and receive a comprehensive report on the item, indicating if the file is malicious or not. Reports display on the Sandbox Analysis page after a few minutes from the time […]
Restore Malwarebytes Endpoint Agent configuration from side-by-side configuration error
The Malwarebytes Endpoint Agent stores operational settings in a configuration file on the endpoint. This file is automatically backed up on a regular schedule and can be restored as needed. This article walks you through using the Configuration Recovery Tool to restore the configuration file. By default, the configuration file is stored on each endpoint […]