Skip navigation
All Places >

Cloud-managed solutions

Log in to follow, share, and participate in this community.

Recent Activity

jgolomb
Click to view contentThe Malwarebytes Cloud Remediation app integrates Splunk with Malwarebytes Cloud.   Requirements To run the Malwarebytes Cloud Remediation app, you need: An active Splunk instance. User login credentials for Splunk. An active subscription to Malwarebytes Cloud. Malwarebytes Cloud Console login credentials. Technical Add-on for Malwarebytes…
jgolomb
Click to view contentThe Malwarebytes app for ServiceNow offers data via Webhooks for real-time protection events, such as scan and detection reports. This guide describes: Security Incidents created automatically when Malwarebytes detects threats. How to manually create Security Incidents How to initiate a scan through an existing Security Incident How to…
bgoddard
Click to view contentPolicies define how Malwarebytes behaves when running a scheduled scan, using Real-Time Protection, or monitoring Suspicious Activity. Policies are applied at the group level; all endpoints in a group use the same policy. Unless you specify otherwise, endpoints belong to the Default Group, which uses the Default Policy.    Policies are…
bgoddard
Click to view contentPolicies define how Malwarebytes behaves when running a scheduled scan, using Real-Time Protection, or monitoring Suspicious Activity. Policies are applied at the group level; all endpoints in a group use the same policy. Unless you specify otherwise, endpoints belong to the Default Group, which uses the Default Policy.    Policies are…
bgoddard
Click to view contentPolicies define how Malwarebytes behaves when running a scheduled scan, using Real-Time Protection, or monitoring Suspicious Activity. Policies are applied at the group level; all endpoints in a group use the same policy. Unless you specify otherwise, endpoints belong to the Default Group, which uses the Default Policy.    Policies are…
bgoddard
Click to view contentExploit Protection guards against vulnerability exploits for applications installed on your endpoints. The default settings balance between endpoint performance and protection, but you have the option to customize Exploit Protection by using its Advanced Settings.   IMPORTANT: While this article serves as an Advanced Settings reference, we…
asmith
Click to view contentApple has made changes starting with macOS High Sierra 10.13. These changes affect the ability to deploy software using kernel extensions in the enterprise. Malwarebytes Endpoint Protection for Mac uses a kernel extension to deploy endpoints to Apple computers.   In macOS High Sierra and later, third-party kernel extensions can only be installed…
bgoddard
Click to view contentOne of the strengths of Malwarebytes endpoint management is that you can easily execute commands across thousands of endpoints with just a few clicks.   After selecting endpoints on the Manage Endpoints screen, you may perform one of the following actions: Scan + Report: This tells the endpoint to check for protection updates, run a threat scan,…
aprobert
Click to view contentTo verify a Malwarebytes Endpoint Protection is running, you can download and run the ServiceStatus.cmd script on the endpoint.   Download and run Service Status script Download the attached script zip file and extract ServiceStatus-x.xx.cmd.txt to the endpoint computer. Rename the file to be ServiceStatus-x.xx.cmd  Administrator privileges are…
bgoddard
Click to view contentA group is a collection of endpoints with an applied policy. You can choose which policy you want to protect each group. Create groups and move endpoints into them to organize your endpoints and protect them with group policies.    Here's how endpoints, groups, and policies work together: Endpoints must belong to a group. By default,…
Load more items