The Malwarebytes Nebula platform consists of several components that enhance the security of your network, endpoints, and users. This guide helps you make the most of your Malwarebytes Nebula account. Click a link to view the topic.
Getting started
- Components
- Minimum requirements
- Network access requirements and firewall settings
- First login
- Add users
Profile settings
- Change General profile settings
- Set email notifications
- Enable Remote Assistance
- View license information
- Change your password
- Enable two-factor authentication
Endpoints
- Manage endpoints
- Overview of groups
- Manage groups
- Edit or delete groups
- Perform actions on endpoints
- Add Windows endpoints
- Add Mac endpoints
- Add Linux endpoints
- Delete endpoints
Policies
- Add a policy
- Delete a policy
- Clone a policy
- Configure endpoint interface options
- Configure Tamper Protection options
- Configure Software Updates options
- Configure Inactive Endpoint Removal options
- Configure General options
- Configure Settings options
Scans
Monitoring activity
- Dashboard
- Detections
- Quarantine
- Endpoint activity reports
- Events and Tasks
- Suspicious Activity Monitoring
- Ransomware Rollback
- Endpoint Isolation
Inventory
Active Block Rules
Flight Recorder
Exclusions
Advanced
- Advanced Settings for Exploit Protection
- List of protected applications
- Configure Syslog
- Enable debug logging
- Configure single sign-on
- Restore an Endpoint Agent configuration
- Use the Endpoint Agent Command-line tool