Learn answers to frequently asked questions about the Malwarebytes Nebula next-gen scanning engine. Will this update require a restart, and what can end-users expect? In most instances, endpoints will require a restart after the update is installed. Restarts are handled as configured via your policy configuration. We recommend reviewing your policy configuration found in the […]
Articles Tagged: malwarebytes
Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection feature comparison checklist
Below are comparison tables for Policy and Admin features found in Malwarebytes Endpoint Security and Malwarebytes Endpoint Protection. Use these supplemental checklists to compare what features are offered in the Malwarebytes Endpoint Security on-premises Management Console, and what the equivalent feature is in the Malwarebytes Endpoint Protection cloud-based console, if applicable. This article acts as a companion document with Malwarebytes […]
Malwarebytes Endpoint Protection settings for Protection Updates
The Protection Updates policy setting determines how often the Malwarebytes client polls our infrastructure servers for updates. Protection Updates are database updates, sometimes called protection rules updates. Protection Updates are used by scans and Real-time Protection features. Update frequency Both Windows and Mac endpoint agents check for Protection Updates at the following intervals: System startup – […]
List of protected applications in Malwarebytes Nebula
Malwarebytes Endpoint Protection and Malwarebytes Endpoint Detection and Response subscriptions include a comprehensive list of applications to protect. This list is the default set of applications protected by our Anti-Exploit technology. Anti-Exploit technology is a multi-layered protection module in Malwarebytes that prevents exploit attacks that target vulnerabilities found in these applications. To follow the steps […]
Inventory page in Malwarebytes Nebula
The Inventory page in the Malwarebytes Nebula console lists application information on your managed Windows™ and Mac™ endpoints. To view this page, log into Malwarebytes Nebula and select Inventory from the left navigation pane. This article explains how to sort listed information, and how to export selected data. Sort data in the results list You can customize […]
Flight Recorder in Malwarebytes Nebula
Malwarebytes Endpoint Detection and Response customers can use the Flight Recorder feature. This feature allows you to search event data captured from all of your Malwarebytes Endpoint Detection and Response managed endpoints to investigate and identify indicators of compromise. You can search data like files, registry, processes, and networking activity up to the past 30 […]
First login to Malwarebytes Nebula
When you subscribe to Malwarebytes Nebula, we email you an invitation with a link to log in. Once you accept the invitation, you can continue to create your account. This article explains how to log in and review some initial options. Log in to Malwarebytes At the Malwarebytes login screen, enter your email address. This […]
Export data with the Malwarebytes Nebula Excel Addin with Reporting and Utilities
Download the latest Malwarebytes Excel Addin Installer Download sample PDF summary report Download sample HTML summary report What’s This? The Malwarebytes Nebula server collects a rich set of information from the endpoints and a common request we get is to turn this data into useful information. Malwarebytes provides a complete set of RESTful APIs for […]
Events and Tasks in Malwarebytes Nebula
In Malwarebytes Nebula, an Event is a general term for a threat that has occurred, remediation or other action taken on a threat, and other endpoint-related activity. Similarly, queued or pending endpoint actions are referred to as Tasks. This article provides a brief overview of the Events and Tasks screens and how they are useful for endpoint […]
Endpoint Protection firewall prerequisites to deploy clients via Group Policy (Malwarebytes)
Before you can deploy clients from the Malwarebytes Nebula platform, you must configure your Group Policy’s (GPO) firewall. Here is a list of firewall prerequisites: Open ports 135, 137, and 445 Enable Windows Management Instrumentation (WMI) Enable Remote Procedure Call (RPC) Follow the steps in this article to configure Windows Firewall. Alternatively, use the Command Prompt […]