Malwarebytes Nebula allows you to create a new name, or alias, for your managed endpoints. You may want to rename endpoints with complex device names to something easier to remember or identify. The new endpoint name is only visible in the Nebula console. Users at the endpoint do not see any changes. This article details […]
Articles Tagged: malwarebytes
CPU Usage setting for Mac endpoints in Malwarebytes Nebula
Malwarebytes Nebula allows you to control the maximum amount of processing power used during a manual or scheduled system scan on Mac endpoints. To follow the steps in this article, enable the New policies experience switch in the Policies page. If you have the new policies experience disabled, locate these policy settings by referring to: Malwarebytes Nebula policy […]
Configure Windows server roles for Malwarebytes Nebula
Malwarebytes Nebula contains real-time protection modules which support stock Windows Server Operating Systems from 2008 through 2019, including variants. Server protection requires one of the following subscriptions: Malwarebytes Endpoint Protection for Servers Malwarebytes Endpoint Detection and Response for Servers The real-time protection modules are: Web Protection – Prevents connections to malicious or compromised websites Exploit Protection – Prevents […]
Configure Tamper protection options in Malwarebytes Nebula
The Tamper protection policy option in Malwarebytes Nebula protects endpoints by limiting end user ability to uninstall Malwarebytes. This also prevents malicious threats from stopping, modifying, or deleting Malwarebytes. To follow the steps in this article, enable the New policies experience switch in the Policies page. If you have the new policies experience disabled, locate these policy […]
Configure Syslog in Malwarebytes Nebula
In addition to the built-in reports available in Malwarebytes Nebula, you can send threat-related events to your SIEM solution for security insights, compliance, and visibility. This article provides the steps required to set up Syslog for Malwarebytes Nebula. Events flow The diagram below represents the Malwarebytes events flow. The flow follows this order: Endpoints report […]
Configure Software Updates options in Malwarebytes Nebula
The Software Updates policy option in Malwarebytes Nebula allows control over when endpoints receive Malwarebytes software updates. This option only applies to Protection Service updates, Component Package updates are always automatic. To find and toggle this option in the Nebula console, click Settings > Policies > select a policy. Automatic Updates (Windows only): Enable this feature to allow automatic download […]
Configure single sign-on with Malwarebytes Nebula
If your organization uses a single sign-on provider, you may connect it to Malwarebytes Nebula. This article provides an overview of Malwarebytes single sign-on configuration and basic setup steps. Go to Settings > Single Sign-On. Single-Sign On is turned off by default. Enable Single Sign-On to allow the Malwarebytes console to control logins through your identity provider. Link […]
Configure Scan settings options in Malwarebytes Nebula
Policies define how Malwarebytes behaves when running a scheduled scan. Policies are applied at the group level, and all endpoints in a group use the same policy. By default, endpoints added to the console belong to the Default Group, and the Default Policy. To follow the steps in this article, enable the New policies experience switch in […]
Configure session timeout settings in Malwarebytes Nebula
In your Malwarebytes Nebula console, you can configure the duration that inactivity causes a session timeout. This feature can allow you to stay logged in to your Nebula console without the need to sign in again after short, idle periods. You can extend your session for up to 12 hours. Configure your timeout settings These […]
Configure Inactive endpoint option in Malwarebytes Nebula
The Inactive endpoint option in Malwarebytes Nebula allows you to remove endpoints from your Nebula console that have been inactive for a set period of time. When enabled in a policy, endpoints that have not checked in with the console within the specified time frame are automatically removed. This feature is useful for automating the […]