Malwarebytes Cloud Console Administrator Guide
Malwarebytes Cloud Console Administrator Guide
29 November 2018
Notices
Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by
law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or
display any part, in any form, or by any means. You may copy and use this document for your internal reference purposes only.
This document is provided “as-is.” The information contained in this document is subject to change without notice and is not
warranted to be error-free. If you find any errors, we would appreciate your comments; please report them to us in writing.
The Malwarebytes logo is a trademark of Malwarebytes. Windows is a registered trademark of Microsoft Corporation. All other
trademarks or registered trademarks listed belong to their respective owners.
Copyright © 2018 Malwarebytes. All rights reserved.
Settings............................................................................................................................. 37
Policies ...................................................................................................................................................... 37
Schedules ................................................................................................................................................. 37
Scan Type ..............................................................................................................................................................................37
Scan Targets .........................................................................................................................................................................38
Scan Schedule ......................................................................................................................................................................38
Exclusions ................................................................................................................................................. 39
Groups ...................................................................................................................................................... 40
Users .......................................................................................................................................................... 40
Syslog Logging .....................................................................................................................................................................40
Table of Contents (continued)
Single Sign-On ....................................................................................................................................... 42
System Status................................................................................................................. 44
Dashboard ............................................................................................................................................... 44
Detections ................................................................................................................................................ 45
Quarantine............................................................................................................................................... 45
Suspicious Activity ................................................................................................................................. 46
Reports ..................................................................................................................................................... 46
Events ........................................................................................................................................................ 46
Tasks .......................................................................................................................................................... 46
Appendices...................................................................................................................... 47
Appendix 1: Enable Debug Logging ................................................................................................ 47
Windows ................................................................................................................................................................................47
Mac ..........................................................................................................................................................................................47
Appendix 2: Example Syslog Entry ................................................................................................... 48
Appendix 3: Configuration Recovery Tool .................................................................................... 50
Usage ......................................................................................................................................................................................50
Appendix 4: Discovery and Deployment Command Line Reference .................................... 52
What’s New in Malwarebytes
This scheduled update to Malwarebytes contains many improvements and bug fixes. Following is a list of changes.
New Features
• Redesigned the Global exclusions page to improve usability and include advanced capability to specify technologies the
exclusion is applied to.
• Added ability to automatically exclude commonly detected Potentially Unwanted Modifications (PUMs) caused by Group
Policy Objects.
• Added an endpoint interface option to create Start Menu and Desktop shortcuts for end-users
• [Malwarebytes Endpoint Protection and Response only]: Added an aggressive detection mode policy option for
Suspicious Activity.
Improvements
• [Malwarebytes Endpoint Protection and Response only]: Suspicious Activity detections will now be included in Syslog
messages
• Changed our unmonitored email address to [email protected] to reduce the chance of cloud
console emails being flagged as spam
• Fixed: [Malwarebytes Endpoint Protection and Response only] – When a remediation action succeeds but rollback action
fails, the Suspicious Activity status is stuck and displays “Pending Remediation”
• Fixed: The Deployment and Discovery tool would generate a 504 error when importing Active Directory groups that
contained a large number of endpoints
• Fixed: Some temporary files were being left behind after installation or endpoint agent updates
• Fixed: Customers with a large number of endpoints were unable to sort by “Last Seen At” on the Manage Endpoints page
• Fixed: In some cases, when a reboot prompt is shown, the reboot timer resets with a 1-minute countdown
Known Issues
• Exclusions that have been entered with short file name paths such as “c:\progra~2\” are not being applied
• Modal windows are showing an unnecessary scroll bar
• All Malwarebytes scans will inspect archived files regardless of the policy setting
• When administrators reboot endpoints from the cloud console, if the initial reboot task has not completed, subsequent
reboot commands are queued rather than replacing the initial reboot command (this would result in execution of
multiple reboots)
• When administrator chooses “Restart Immediately” option in the Restart Options dialog, end users are still allowed to
postpone the reboot even though the “Allow user to postpone” option is grayed out. Current workaround involves
selecting the “Restart in ___ minutes” radio button, unchecking the “Allow user to postpone” checkbox, then select the
“Restart Immediately” radio button and click the blue Restart button
• Clicking on the Remediate button causes the Remediation Required indicator to lose its badge on hover and on click
behavior— nothing happens on click (should give you the option to view details) and nothing happens on hover (should
show "Remediation Pending"). This issue is resolved by refreshing the browser
• Memory and storage objects in endpoint properties are not visible until the page is refreshed
• The Endpoint Agent can fail to initialize when using the GROUP ID parameter with an incorrect format
• [Malwarebytes Endpoint Protection for Mac only]: Scan History tab does not get information populated if Threat Scan
does not detect any threats
• [Malwarebytes Endpoint Protection for Mac only]: Timestamps in Scan History tab for macOS endpoints are in GMT, and
not the web browser’s locale
• [Malwarebytes Endpoint Protection for Mac only]: Check for Protection Updates action does not update “Last Refreshed”
on first run
Introduction
The Malwarebytes platform consists of the following solutions which provide threat response against modern computing threats:
• Malwarebytes console – This web-based centralized management tool is in charge of discovery, deployment, management
and administration of Malwarebytes agents on your company’s endpoints. It eliminates the need to dedicate web servers
and database servers for management of your endpoint data integrity, and provides scalability for organizations of all sizes.
• Endpoint Agent – This intermediary software component is in charge of direct communication between the Malwarebytes
console and the endpoint. You may deploy the agent using the Malwarebytes platform, Malwarebytes Discovery and
Deployment Tool, Active Directory Group Policies, Microsoft SCCM, or a comparable tool of your choice.
• Endpoint Agent Plugins – These modular components are installed on your endpoints via the Endpoint Agent, and configured
using the Malwarebytes console. Plugins are deployed to your endpoints based on your policy settings. The specific
subscription you have purchased from Malwarebytes determines which plugins you may use.
• Browser
♦ Google Chrome
• Hardware (Windows)
♦ CPU: 1 GHz ♦ Disk space: 100 MB (program + logs)
♦ RAM: 1 GB (client); 2 GB (server) ♦ Active Internet connection
• Operating Systems
♦ Windows Server†: 2016, 2012, 2012 R2, SBS 2011, 2008 R2 SP1‡§, 2008 SP2 ‡§, 2008§
♦ Windows Client: 10, 8.1, 8, 7, Vista§, XP SP3§*
♦ Macintosh: macOS 10.10 or later
† Excludes Server Core installation option
‡ Microsoft patch KB4019276 must also be installed and enabled
§ As of July 2018, development has halted for Endpoint Clients using this operating system
* 32-bit only
.NET 4.5.2 or 4.6 must be installed and enabled on Windows systems
Please note:
• Anti-Ransomware features are supported only on endpoints using Windows 7 client operating systems and newer.
• Endpoint Protection and Response is supported only on endpoints using Windows 7 client operating systems and newer.
Transport Layer Security (TLS) 1.1/1.2 must be enabled.
• Endpoint Protection and Response endpoints using Server 2008 R2, Server 2012 R2, and Server 2016 support Isolation only.
• Mac Endpoints
/Library/Application Support/Malwarebytes/Malwarebytes Endpoint Agent
/Library/Application Support/Malwarebytes/Malwarebytes Endpoint Agent/UserAgent.app
/Library/LaunchDaemons/com.malwarebytes.EndpointAgent.plist
Screen Layout
A typical view of the platform screen is shown below. Depending on the product that you purchased, your view may be different.
The Options Menu ❶ is shown at the left side of the screen. Platform options and product options are both accessible on this
menu. In this screenshot, Settings is selected. Specific settings corresponding to that option are shown indented underneath the
Settings label. Selections shown here are all specific to the selected platform option (Settings), and may include selections related
to both platform and product options. The majority of the screen is assigned to the selected option ❷ itself.
To add a new user, go to the Settings tab and select Users. A list of users will be displayed (to the right of the checkboxes that are
the left border in this screenshot).
A New button (at the upper right of the screen) allows you to create a new user account. Enter the email address for the prospective
user. Next, select the User Role. The three roles are:
• Super Admin – The user will have unrestricted access to the Malwarebytes console.
• Administrator – The user will have full read/edit access to any groups they are assigned. They cannot edit global settings.
• Read Only – The user will have read access to any groups they are assigned. They can generate reports and receive
notifications but cannot make any changes.
Program Modes
The Discovery and Deployment Tool can perform its tasks in both interactive mode and command line mode. Please refer to the
end of this guide for command line operation. Parameters set in the command line mode do not carry over to the GUI mode.
► PLEASE NOTE: This program must be executed from a local drive. Attempting to run it from a network drive will fail. ◄
Login
A login is required to gain access to the Malwarebytes platform. This is unique to
your company and your identity. The default URL to access the Malwarebytes
platform is https://cloud.malwarebytes.com. Your URL may differ (if you have been
informed otherwise). Enter the URL, your email address and your password.
A Proxy Settings button is at the lower right corner of the login screen, needed when
you require use of a proxy server to access the Internet. Click Proxy Settings to enter
proxy specifications. No settings are enabled until Use Proxy is checked, and settings
are ignored if Use Proxy is unchecked.
PLEASE NOTE: Proxy specifications used here will be propagated to endpoints
deployed by this tool.
Discovery
For each endpoint that you wish to install, we determine if they are available for agent installation. Please note that the majority
of the tests listed here require ports to be accessible through the firewall. Here’s how we do it.
• Ping – This is a simple ICMP command which requests the target endpoint to respond. Endpoint configuration or
network topology may block pings, so alternative means would be needed to reach those endpoints.
• DNS – The IP address or hostname specified in discovery criteria will be searched in the A record of the DNS server used
by the host. The Time to Live (TTL) indicates an endpoint which is online or has been online recently.
• UDP Datagram – The program uses UDP to send a small datagram to the endpoint, and receive a response.
• TCP/IP Probe – Using the endpoint’s IP address, attempts to communicate with several ports associated with critical
services (NETBIOS, HTTP, SSH, Telnet, DNS, etc.). While some ports may not respond, it is likely that a machine which is
online will respond to some degree. A response to any attempt is considered a success.
• Nmap – A powerful multi-purpose open source tool used for network discovery and security auditing. Much information
about an endpoint can be found using this tool.
The tool will use the current logged in Windows account to query the Domain Controller. If you need to provide a different account,
click Change Active Directory Credentials at the bottom right of the tool. You can search for specific Organizational Units (OUs)
using the Search menu at the top right of the tool. The arrows next to the menu allow you to quickly browse the results. You can
also use F3 and Shift+F3 to browse search results.
Select all OUs you wish to import to Malwarebytes using the checkboxes to the left of the OU name. When you have selected the
OUs to import, click Preview to view a display showing how the selected OU(s) will appear in the console. These groups will appear
with a folder icon in the Discovery Tool, as well as in the console once they are imported. An example appears below.
Scan Network
If you do not have Active Directory, or wish to install the Endpoint Agent on specific Endpoints, click Scan Network from the Home
menu. Before you can deploy the Endpoint Agent, you need to identify the target endpoints. We provide three methods to discover
endpoints and validate our results. Only one method is required.
• Method 1 – Query Active Directory for a list of machines in your domain.
• Method 2 – A Network Scan allows you to provide search criteria for endpoints in your network. You can specify several
different criteria, and all will be tested. Criteria includes:
o IPv4 address
o IPv4 address range, with minimum and maximum values specified (e.g. 10.10.10.34-10.10.10.106)
o IPv4 address block, in CIDR format (e.g. 10.10.1.1/16)
o IPv4 address block, with mask (e.g. 10.1.1.1/255.255.255.0)
o Hostname
o FQDN
o IPv6 address
• Method 3 – A text file containing a list of endpoints (one entry per line), using criteria as listed for method 2.
After specifications have been provided by the user, the Discovery and Deployment Tool will go through the list of endpoints which
fit criteria, and using the discovery techniques listed above, determine which endpoints are online and which have an endpoint
agent already installed. All that is required of the user is a simple press of the Scan button. If network credentials are required to
scan the network, you may enter them here. The Scan screen looks like this:
Status is the status of each endpoint. Installed indicates whether a Malwarebytes agent has been installed. If Status is online and
Installed is unknown, that may indicate an endpoint which can be reached but software detection cannot be performed. It is also
possible that missing or incorrect credentials were specified by the user. Ports 135, 137, and 445 are required for software probing.
Finally, the Refresh button restarts the discovery process. There are no results saved from the previous discovery process. The
Cancel button terminates the discovery process. In a large network environment, this may take a few moments.
Please note: This method cannot discover Mac endpoints if they are not registered and/or managed by Active Directory. A
secondary method may be required.
Please note: Domain administrators can override User Account Control (UAC) settings on domain endpoints. If an endpoint is a
member of a workgroup, additional steps are required. Please read the following article for further information:
https://support.microsoft.com/en-us/help/951016/description-of-user-account-control-and-remote-restrictions-in-windows-
vista
Here are a few tips which will give you the best results.
• Administrator credentials are required to perform remote deployment. A domain account will suffice if the target
endpoint is part of the domain and the domain account used is part of the local administrators group. Credentials should
be in the form <IP>\username or <hostname>\username.
• Files will be copied to the Admin share on the destination Windows endpoint(s).
• Access on port 137 must be enabled on the destination Windows endpoint(s).
• Remote access (SSH) should be enabled on the destination Mac endpoint(s).
• The installer will not uninstall Malwarebytes for Mac, our home product. You should remove this from your Mac
endpoint(s) ahead of installation.
• The installer will not attempt to overwrite previous endpoint agent installations. You must un-install the program prior
to re-installing.
• The installer will download the latest Protection Updates prior to finishing.
• Endpoints whose Status is Offline or whose Installed state is Unknown may still be able to have software deployed via a
push install. Status will be reported whether deployment is successful or not.
Finally, the Discovery and Deployment Tool must connect with Malwarebytes infrastructure servers to download the most current
MSI install package and the account token which will be used as a unique identifier when software package updates are available.
Direct Deployment
If you are installing Malwarebytes by manually running the Endpoint Agent installer, you will see a prompt saying “System Extension
Blocked” when installation finishes. After you receive the prompt, an Allow button will appear in the General tab of the Security &
Privacy pane of System Preferences for half an hour. After half an hour, macOS will remove the button.
You must click this button in order to finish the installation and enable Real-time Protection. You may not click the button remotely
via screen sharing or scripted actions– you must physically click the button from the endpoint to finish installation. If you do not
click the button within half an hour, you may restart the endpoint to cause the button to reappear for another half an hour.
Take note of the key value, GVZRY6KDKR. This key is specific to the Real-Time Protection kernel extension. You may also add
additional keys for other applications you wish to install which require kernel extensions.
This will whitelist the Malwarebytes kernel extension on that machine. You can also utilize this technique with NetBoot, NetInstall,
and NetRestore images.
Additional Information
We have covered a lot of information to prepare how to deploy Real-Time Protection to your Mac environment. If you would like
additional information regarding these steps, please refer to Apple’s website.
Tasks
Once we have selected endpoints to install a Malwarebytes agent on, we can use the Tasks tab to look at status and progress of
the agent deployment. A screenshot is shown here to illustrate this tab in use.
Looking at this Status example, you can see that an install began at
11:00am and met with mixed results (exclamation mark denotes at least
one failure). Another 4-point endpoint install began at 11:01am. The red
X inside the circle indicates that all four installations failed.
Finally, a third installation began at 11:01am. This installation was for 255
machines, and completion status is shown at 0%. Completion status
would increment to 100% with final status showing a green checkmark
(complete success), exclamation mark (one or more failures), or red X
inside a circle (complete failure).
The screenshot below shows installation results for these same four endpoints. Status is shown with both words and symbols, and
Results shows relevant information as well as a link to view logs. Only an excerpt of the screen is shown here because the screen
required expansion to show Results detail, and that action would have caused display of the full screen to become illegible here.
Please note that when several endpoints are selected for installation, you may also see Status shown as Queued. Resources are
required for each installation, and when requirements exceed availability, installation will be Queued until resources are available.
In this screenshot, several groups have been added. The Status column shows icons to help quickly identify endpoints that need
attention. The table below shows the different status icons that you may see while using the console, along with a brief
description. In this example, some endpoints have unresolved suspicious activity, and some endpoints have been isolated. You
may read more about these statuses in the Endpoint Protection and Response section of this guide.
You can click any icon to see additional details, or to take action on the endpoint. If a restart is required, you will see a prompt to
enter additional parameters for the reboot. You can choose when the restart will occur, if the end user can postpone the reboot,
and what message (if any) the end user will see.
The selector bar (above the list of endpoints) shows the five options available to the user. They are:
Add
When this option is selected, a new screen opens with several options. You can also reach this screen by clicking Add Endpoints
from the Platform Menu. Here, you may choose the most appropriate agent installer for your needs, the standalone Breach
Remediation dissolvable client, or the Discovery and Deployment Tool. By providing installers in this manner, we enable you to use
the installation method which you prefer. Please note that endpoints added in this manner are assigned to the Default Group and
If you elect to silently install the Malwarebytes agent on a Windows endpoint, that can be performed using one of the following
commands shown below. Please note that the MSI command is shown on multiple lines due to the length of the command.
EXE: Setup.Full.MBEndpointAgent.exe /quiet
MSI: msiexec /quiet /i Setup.MBEndpointAgent.msi
NEBULA_PROXY_SERVER=http://<IP>
NEBULA_PROXY_PORT=<port>
GROUP=<group_ID>
Five variables may be used in conjunction with this command. They are:
GROUP
NEBULA_PROXY_SERVER
NEBULA_PROXY_PORT
NEBULA_PROXY_USER
NEBULA_PROXY_PWD
If you would like to install endpoints via command line and have them join a specific Group, you must use the GROUP variable and
provide the Group ID. To locate the Group ID, click the link titled How to Automatically Specify Group Assignment on the Add
Endpoints page. A new window will open, showing you all of the groups available in your console. Next to each group is a string
of characters, the Group ID. Click the button to the right to copy it to your clipboard. If the Group ID given in the command does
not match any groups, the installer will add the endpoint to the Default Group and Default Policy.
The other four variables for the installer are for you to specify information for a proxy server. If the proxy username or password
contains embedded spaces, the username/password should be enclosed in double quotes.
You will notice a reference in this screenshot to Malwarebytes Breach Remediation, our highly effective, dissolvable remediation
program for Windows and Mac endpoints. There may be instances when its usage is more appropriate for your needs. You can
download this application from this page by clicking Download. Documentation is included in the ZIP file.
Delete
This option removes endpoints from console control, and uninstalls Malwarebytes software from the endpoint itself. This includes
the endpoint applications as well as the agent which controls communications between the console and applications. To delete
one or more endpoints, select those endpoints and click Delete. All deletions in a single group should be performed at the same
time before acting on a different group, unless you are performing deletions from the All Groups list. Finally, groups whose entire
endpoint population have been removed from console management will remain intact.
Please note: When deleting endpoints which are offline, they will be removed from console control immediately, but uninstallation
of agents cannot occur until the endpoint returns to online status. If the endpoint comes back online within 90 days of the delete
request, uninstallation will occur at that time. If the endpoint comes back online more than 90 days after the delete request was
issued, the endpoint will again be shown as an active device in the console.
Move
By selecting one or more endpoints, you can move them from one group to another. The value of this will become apparent after
we discuss the relationship between endpoints, policies and groups.
Actions
After selecting one or more endpoints, you may perform one of the following actions:
• Scan + Report – Check for protection updates, run a threat scan and report the results. This scan method does not remove
any threats which were detected during the scan.
• Scan + Quarantine – Check for protection updates, run a threat scan, quarantine any threats which were detected, and
report scan results.
• Isolate Endpoint(s) – Isolate the endpoint(s) from your network environment to prevent an active threat from spreading.
The Malwarebytes Console will continue to communicate with the endpoint. This action is described further in the
Endpoint Protection and Response section of this guide.
• Remove Isolation – Restores access to the currently isolated endpoint(s). This action is described further in the Endpoint
Protection and Response section of this guide.
• Refresh Assets – Update hardware/software assets for the endpoint. Unless the administrator has created scheduled
scans for this purpose, this may be the only method by which assets are checked.
• Check for Protection Updates – Perform an immediate check for protection updates. While scans also perform this task,
this assures that real-time protection uses the most recent updates.
To show how this works, an excerpt from the Endpoints screen is shown below. One endpoint has been selected. This enabled the
buttons in the gray bar (Delete, Move, Actions). From the Actions submenu, we have chosen to use the Scan + Quarantine option.
Search
It may be easier for you to search for a computer than to scroll through a list. Start typing the hostname of the endpoint, and the
list of endpoints will be continually updated until you locate the endpoint you were searching for.
Endpoint Details
Additional details for each endpoint can be viewed by clicking the name of an endpoint in the list. This will take you to a screen
where you can view detailed information for the endpoint selected, shown below:
Details for the selected endpoint are shown in the center of the screen. You may click items shown in the list to see further
information pertaining to the item. The tabs along the top of the screen can be used to view additional reports . You can move
the selected endpoint to a new group or run an on-demand scan from the upper right corner . Available actions for you to take
are shown as icons along the top . You may return to the list of endpoints at any time using your browser’s Back button.
Agent Information
This section of the endpoint details page contains valuable information about the version of Malwarebytes software on the
selected endpoint. Depending on your policy settings, you will see the following items:
• Engine Version: The primary endpoint agent that is responsible for communicating between the endpoint and the cloud.
• Asset Manager: The endpoint plugin that collects the information for the Overview tab of Endpoint details.
Groups
A group is a collection of endpoints. Initially there is a single group, called the Default Group. You cannot delete the Default Group.
You may add a new group at any time. When adding a new group, you may choose to create it as a subset of an existing group.
You can rename a group by first selecting the group, then overwriting its existing Group Name. Here, you will associate a group
with a policy. This defines protection characteristics for endpoints that are members of that group. You may create several groups
which are similar in nature. It is your best interest to use an easily discernable naming convention.
You can find this in Settings ►Groups.
You may also delete a group if no endpoints are associated with that group. If a group has subgroups associated with it, deleting
the top-level group will also delete the subgroups.
Policy Information
Each policy must have a unique name. You can rename a policy at any time by editing the Policy Name field.
Endpoint Interface Options allow you to customize how your endpoint users see and interact with the Malwarebytes interface.
• Show Malwarebytes icon in notification area – Allows the endpoint user to see a Malwarebytes icon in the taskbar.
Hovering over the icon also displays a very brief program status message.
• User Threat Scan – Allow endpoint users to run Threat Scans. No other scan types are available to the end user, and all
threats detected during the scan will be quarantined automatically. Endpoint users may cancel scans which they have
initiated, but have no control over scheduled scans or on-demand scans initiated by the administrator. User-initiated
scans will appear as “On demand” scans on the Console Events screen.
• Threat Scan Shortcuts – Creates Start Menu and desktop shortcuts for end-users on Windows endpoints. User Threat Scan
must be enabled to enable this setting.
• Show Malwarebytes option in context menus (Windows only) – Allow endpoint users to scan individual files by right
clicking them. Context menu scans share the same behavior as Threat Scans run by endpoint users.
• Display real-time protection notifications – Shows real-time notifications in the corner of your screen. These are only
available if you have enabled Real-Time Protection.
Both Windows and Mac endpoints can use one policy. You can configure both General options and specific Settings for each
Operating System independently.
General
These options are available to all endpoints. They will not change what threats Malwarebytes detects, but can improve your
experience using the application.
Reboot Options control how Malwarebytes will handle requests to restart your endpoints. Remediation does not end with
quarantine of the visible threat. Malware may leave behind remnants that can activate later, as well as copies of itself in memory.
For this reason, a reboot is sometimes required to complete removal. When needed, you can choose whether the endpoint restarts,
and when. Not restarting the endpoint may leave the user in jeopardy.
When you elect to allow a reboot, you may set a delay before this reboot occurs,
as well as a user-definable text message that displays to the endpoint user.
Users will receive a notification of the pending reboot. You may also allow
endpoint users to postpone the reboot by 10, 20 or 60 minutes. They will receive
a final notice one minute before the reboot occurs. If the postponement is
greater than 10 minutes, they will also receive a warning at the 10-minute point.
They can make that postponement indefinitely. All postponements generate an
Audit event that appears on the Events screen.
The screen shown here is from a Windows endpoint. The Mac version is slightly
different, while all functionality remains the same. Closing the dialog by clicking
X in the upper right corner behaves in the same manner as the Postpone button.
In addition to remediation-related reboots, reboots may trigger due to installations, uninstallation and updates. Your choice for
this setting applies to all of these processes.
Policy Settings
Here you can choose how to handle threats detected during scans to best suit your needs. You may also change specific behaviors
for Real-Time Protection if you are a Malwarebytes Endpoint Protection subscriber. Some features are not available for Mac
endpoints.
FEATURE WINDOWS MAC KEY TO SYMBOLS
Scheduled Scans Supported feature
Manual Scans Unsupported feature
Real-time Filesystem Protection
Malicious Website Blocking
Payload Analysis
Application Hardening
Application Behavior Protection
Exploit Mitigation
Anomaly Detection Machine Learning
Ransomware Mitigation
Suspicious Activity Monitoring
Endpoint Isolation
Rollback
Scan Options
There are a number of settings here which may be defined. These are a function of the scan method selected, as well as the
endpoint family being scanned. These settings apply to Threat scans only:
• Scan Rootkits: Scans will search for rootkits. This may increase scan duration. The default setting is off.
• Scan within Archives: Scans will examine the contents of compressed folders. The default setting is on.
• Anomalous File Detection: Scans will utilize a signature-less detection method to check for file anomalies. The default
setting is on.
These settings apply to Threat Scans, Hyper Scans, and Real-Time Protection events:
• Potentially Unwanted Programs (PUPs): Specifies whether PUPs will be treated as malware, or ignored.
• Potentially Unwanted Modifications (PUMs): Specifies whether PUMs will be treated as malware, or ignored. This is not
applicable to Mac endpoints.
Scan Priority
Most users schedule scans to occur during times when their computer is typically idle. Execution of a manual scan may be
performed as a matter of convenience, or while other tasks are being executed. Scans may impact the performance of lower-
powered computers. This setting you to determine the priority of the scan on the system. Lower priority scans will require more
time to execute while affecting other operations to a lesser degree. High priority allows the scan to be executed at the maximum
speed which the computer allows, but may affect other tasks. This option applies only to Windows endpoints.
Policy Settings
You can choose to enable some or all of the protection layers in your policy. We advise using each layer to help protect your
endpoints from threats at multiple points. However, your needs may vary and it is up to you to determine which layers are best
for your environment. A description of each layer, along with any additional settings that apply to that layer, follows.
Web Protection
This layer protects users by blocking access to/from Internet addresses which are known or suspected of engaging in malicious
activity. This feature does not treat different protocols differently. It does not distinguish between your favorite game being
served on one port and a potential malware source being served on another. Should you choose to disable this feature, you could
inadvertently compromise your computer's safety.
Exploit Protection
This layer uses multiple protection layers to guard against attempted exploits of vulnerabilities in legitimate applications. When
applications are launched by the user, exploit protection is also launched as a shield. This protection will often detect and
neutralize attacks that go undetected by other security applications. It is on by default.
Many popular applications have been pre-configured for shielding. A screenshot is shown above. You can change which
applications are protected by clicking Manage Protected Applications. To change the status of any application, either use the
Protection slider, or double click either the Application or File Name. You may add protection for other applications, and edit
specifications for any defined shield. The Edit screen is shown here.
Advanced Settings allows configuration or fine-tuning of some exploit mitigations. Please note that not all exploit mitigations can
be modified here. The pre-defined defaults strike the best possible balance between performance and protection. Those exploit
mitigations available for configuration have been deemed to be relevant to be tuned by users in scenarios where certain non-
standard or heavily customized computing environments result in unexpected behavior (e.g. false positives).
WARNING: Improper changes to these settings may result in improper performance and protection. Make changes only when
required to do so by a Malwarebytes Customer Success specialist.
Settings on the Application Hardening tab refer to exploit mitigation techniques whose objective is to make protected applications
more resilient against vulnerability exploit attacks, even if those applications have not been patched to the latest available fixes
by their respective vendors. A screenshot shows the organization of the tab.
• DEP Enforcement is tasked with activation of permanent Data Execution Prevention (DEP) in those applications that do
not do this by default.
• Anti-HeapSpraying Enforcement is designed to reserve certain memory ranges, to prevent them from being abused by
Heap-Spraying attack techniques.
• Dynamic Anti-HeapSpraying Enforcement analyzes the memory heap of a protected process in order to find evidence of
malicious shellcode on the heap using heap spraying techniques.
• Bottom-Up ASLR Enforcement is tasked with addition of randomization to the memory heap when the process starts.
• Malicious Return Address Detection – also called “Caller” mitigation – detects if the code is executed outside of any loaded
module.
• DEP Bypass Protection is tasked with detecting attempts to turn off Data Execution Prevention (DEP).
• Memory Patch Hijack Protection is designed to detect and prevent against attempts to use WriteProcessMemory to
bypass Data Execution Prevention (DEP).
• Stack Pivoting Protection is used to detect and prevent exploit code from creating and utilizing a fake memory stack.
• ROP Gadget detection is tasked with detection and prevention of Return Oriented Programming (ROP) gadgets when a
Windows API is called. Provisions are made for individualized protection of CALL and RETurn instructions.
Application Behavior Protection settings provide mitigation techniques designed to prevent the exploit payload from executing
and infecting the system. This represents the last line of defense if memory corruption exploit mitigations from previous layers
are bypassed. This layer is also tasked with detecting exploits that do not rely on memory corruption (e.g. Java sandbox escapes,
application design abuse exploits, etc.) and blocking their malicious actions.
Java Protection refers to mitigation techniques which are unique to exploits commonly used in Java programs.
Malware Protection
This feature protects against infected code/files that try to execute on your computer. These files may have been downloaded,
imported from a USB drive, or received as an email attachment. Malware Protection is on by default. While we do not recommend
disabling this protection mechanism, there may be times when it needs to be done to troubleshoot compatibility issues that arise
with anti-virus updates or computer startup problems. If either situation does occur, start your computer in Safe Mode, disable
Malware Protection, isolate and correct the issue, then turn Malware Protection back on. Malware Protection is always enabled on
Macs with Real-Time Protection enabled.
Behavior Protection
This layer provides protection against both known and unknown ransomware threats. This protection is not available for users of
Windows XP or Windows Vista. While all other protection features may provide some degree of protection against ransomware,
well-crafted ransomware may go undetected until it attempts to initiate its attack. As many computer users have found, there is
little or no remedy available after the fact. We strongly recommend that ransomware protection be turned on at all times. It is on
by default.
Startup Options
These settings define Real-Time Protection behavior when Malwarebytes starts.
• Delay Real-Time Protection when Malwarebytes starts: There may be times when Real-Time Protection services conflict
with services required by other applications. When this is the case, turn this setting on. You may also adjust delay timing.
You will need to experiment with the specific delay necessary to compensate for any conflicts that are noted. This must
be done on a case-by-case basis. The delay setting is adjustable from 15-180 seconds, in increments of 15 seconds.
• Enable Self-Protection Module: This setting controls whether Malwarebytes creates a safe zone to prevent malicious
manipulation of the program and its components. Checking this box introduces a one-time delay as the self-protection
module is enabled. While not a negative, the delay may be considered undesirable by some users. When unchecked,
the "early start" option which follows is disabled.
• Enable Self-Protection Module Early Start: When self-protection is enabled, you may choose to enable or disable this
option. When enabled, the self-protection module will become enabled earlier in the computer's boot process –
essentially changing the order of services and drivers associated with your computer's startup. This setting is disabled
unless Enable Self-Protection Module is turned on.
Policy Settings
Suspicious Activity Monitoring is turned off by default. To use this feature, you must enable it in a Policy, as described on page 21.
When you enable Suspicious Activity Monitoring, the Endpoint Agent will install the plugin for you. You do not need to redeploy
or reinstall any software on your endpoints. If you turn this feature on, Malwarebytes will begin to analyze behavior from your
endpoints to help detect potentially dangerous or anomalous files. You will have the option to roll back damage done by a threat,
as well as to isolate endpoints from the rest of your network to help keep threats from spreading. Let’s discuss these options now.
Please note. To facilitate this analysis, Malwarebytes will leverage machine learning models as well as analysis from cloud systems.
We recommend that you reserve 1.1Mbps (Megabits per second) of network traffic for every 100 endpoints you enable Suspicious
Activity Monitoring on. This will help ensure optimal performance of the feature.
Aggressive Mode
Malwarebytes uses an advanced machine learning model to detect anomalous files via Suspicious Activity Monitoring. As files and
processes run on your endpoints, any suspicious activity they perform is compared to a threshold. When a process performs
enough suspicious activity to cross the threshold, Malwarebytes will take action. If you enable Aggressive Mode, Malwarebytes will
adjust the model to lower the threshold for when a process is flagged as suspicious. Enabling this can help protect your systems
against additional unknown threats, but you may see an increase in False Positives with this mode enabled. We advise that you
only enable this setting for your most sensitive assets.
Rollback
This setting is available once you enable Suspicious Activity Monitoring. The Rollback feature is dependent on activity monitoring
– you must enable monitoring to allow for Rollback. Once Rollback is enabled, Malwarebytes will create a local cache on the
endpoint to store changes to files on the system. The application uses this cache to help revert changes caused by a threat.
Endpoints typically use 200MB – 500MB for the cache, depending on usage and how you configure Rollback. Two options exist to
customize Rollback in your environment. They are:
• Rolling time to store changes – This setting determines how long Malwarebytes will store information in the cache.
Increasing this time will increase the size of the cache on your endpoints, as they will store any changes to the endpoint
in the time window you specify. The default value is 48 hours.
• Maximum size for individual file backups – This setting controls which files are saved in cache based on size. The default
setting is 20MB – meaning that any file larger than 20MB will not be saved in cache. Increasing the maximum file size
will increase the size of the cache.
Endpoint Isolation
You can enable Endpoint Isolation independently from Suspicious Activity Monitoring and Rollback. Once enabled, Endpoint
Isolation allows you to temporarily prevent threats from spreading between network endpoints by restricting their communication
or access. An isolated endpoint will always be able to communicate to the Malwarebytes server, and will always allow Malwarebytes
processes to run. Details on how to perform isolation are in the following section of this guide.
The bar graph will display the number of activities detected, broken down by their severity. Malwarebytes automatically
categorizes and assigns severity based on the nature of the behavior detected. The console will display the highest severity of any
given process. If the endpoint plugin detects multiple behaviors from a process, you will need to open the activity details to see
each of them. Each severity has an associated visual cue: low severity behaviors are blue, medium severity behaviors are yellow,
and high severity behaviors are red. By default, the list of activities is sorted by Date. You can change the sort order by clicking
the column headers. Not all columns are available for sorting.
Activity Details
The page will show suspicious activities by their parent process . Next to each parent process is a radio button – click this to see
more information in the Process Graph, described on the following page. You can click the + to expand the parent process and
show any child processes created . Each child process will display the individual behaviors that Malwarebytes detected . You
can click any of these colored boxes to learn more about the behavior. If a process has a large number of behaviors associated with
it, you will need to click the ellipses () to the right of the screen . If you click on any individual behavior, you will see a screen
showing you more information. You can see what the endpoint detected and why it is suspicious. You also will see the specific
context of the behavior from the endpoint.
Process Graph
When we detect suspicious behavior, it is often not clear what happened based off log data. The Process Graph helps provide
additional context so you can understand what exactly a process did. This will help you better decide if the behavior is actually
malicious, or just unusual. To begin, select the parent process of the activity you want to investigate further using the radio button
to the left of the process name. The Process Graph will appear in the lower section of the screen.
The main display of the graph shows a visual representation of the process . Child processes or injected processes will appear
as new branches from the parent. Details on the parent process, including the process path, PID, and the total time the infection
was left unresolved on the system, are shown above the graph . If the graph has many processes, you can navigate with your
mouse, or you can use the controls along the right side of the screen . The controls allow you to zoom in/out, reposition the
graph, or expand/collapse additional context. If you want to view additional details on a process, click the node to select it.
Additional context and information will appear to the right . This pane will show you additional details such as the command
and switches used to launch the process. You can click the links under Activities to view specific file operation details.
Endpoint Isolation
Before you can isolate an endpoint, Malwarebytes must run a Threat Scan on the system. This is necessary to install all of the
plugins for the Endpoint Agent. We automatically run a Threat Scan on an endpoint when Malwarebytes is first installed, but you
may decide to run a scan ahead of this. Once the scan finishes, you will be able to isolate the endpoint.
If you select multiple endpoints to isolate, and some of those endpoints are already isolated, then the isolation modes you apply
will be cumulative. If for example you isolated an endpoint previously with Process Isolation, then later you attempt to isolate that
endpoint (along with others) with Process Isolation and Network Isolation, the initial endpoint would have both isolation types
active.
You cannot modify the isolation type of an individual endpoint. If you need to change the isolation type, you must either remove
isolation entirely, or apply the isolation update as part of a group as described earlier. You can remove an endpoint from isolation
using the Remove Isolation action from the Manage Endpoints page – this will require a reboot. You cannot remove individual
isolation types from endpoints.
If you have enabled Process Isolation, only Privileged Processes are allowed to launch on the endpoint. Privileged Processes belong
to one of the criteria below:
• Predefined (hardcoded) processes. Currently only two such processes are defined: CONSENT.exe, necessary to execute
UAC elevated processes, and CSRSS.EXE which is a critical system process.
• Processes digitally signed by Malwarebytes. All such processes are allowed to run on isolated endpoints unrestricted.
• Processes spawned by other Privileged Processes. Any process with a Privileged parent process becomes Privileged
itself. These processes can further create child processes which are privileged.
An example screenshot of what an end user will see on an endpoint with Desktop Isolation is shown on the following page.
This icon will take you to the list of Rules Triggered as described earlier.
This icon initiates remediation on the endpoint. Malwarebytes will analyze suspicious activity,
then combine our Malware Removal Engine and Rollback cache to remove remaining threats and
restore files which the threat removed or encrypted. If you have not enabled the Rollback cache
in your policy, you may not be able to restore all files. The endpoint will reboot automatically to
finish remediation, which could result in the loss of any unsaved work. You can perform
remediation on an isolated endpoint.
In some situations, Malwarebytes may not be able to restore all files. If this occurs, you can
manually attempt to restore files from the endpoint. Files will be stored in the folder:
%PROGRAMDATA%\Malwarebytes Endpoint Agent\Plugins\EDRPlugin
\Restored Files
Malwarebytes will create several folders inside this directory that are associated with the
attempted rollback. These folders will contain subfolders with the username of the Windows
account the files originated from, if the program was able to record it. There is no guarantee a
particular file will be recoverable using this method.
This icon allows you to mark the suspicious activity as closed if you elect not to perform
remediation. Most likely, you would use this in the case of a False Positive. As Malwarebytes
analyzes behavior of a process, a non-malicious file may appear to be suspicious. This is not an
indication that the file is harmful, but instead that it behaves in a suspicious manner. When you
mark an activity as closed, you will see a prompt asking if you want to add the process to your
Exclusions list. If you do this, Malwarebytes will not flag future behavior from this process. If you
choose not to add the process as an exclusion, the single activity will be marked as closed, but
you may see future events from the same process.
This icon will only appear for an activity previously marked as closed. Clicking on the icon will
allow you to re-open the activity, and remove the process from the Exclusions list. You can
choose to re-open an activity but to leave it in the Exclusions list.
Policies
Policies define the behavior of the Malwarebytes Endpoint Agent. For information on configuring and using policies, refer to the
Policies chapter, starting on page 21 of this guide.
Schedules
This ties the pieces together so that threat remediation can occur on a schedule you define, and according to your specifications.
The best way to understand this process is to do it. Go to Settings ►Schedules, and click New to create a new scan schedule. You
will see a screen that looks like this. Begin by giving the new scan a name. You may create several scans over time to serve your
needs, so choose a name that will stand out when the number of scans mounts.
Scan Type
You may choose a Scan or an Asset Inventory Scan, but not both at the same time. When running a Scan, there are individual
settings for Windows endpoints and for Mac endpoints. You may include both in the same scan. While a Mac is limited to a Threat
Scan, there are three types of scans available to a Windows endpoint.
You can also choose whether Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications (PUMs) will be
considered as malware or simply ignored. You can choose each separately. Finally, you can specify a Scan Path, which defines the
top level of a folder tree to be scanned.
Scan Targets
This is where you choose the group of endpoints that will be scanned. Earlier, we created the policy that defines the behavior of
the group, then we added endpoints as members of the group. Here is where it all comes together. Add or Remove groups from
the list of groups to be scanned, and finally set the Scan Schedule.
Scan Schedule
The last piece of the puzzle is to schedule the scan. You may not select a day that is in the past, and if you select today as a starting
day for the schedule, you may not schedule it at a time that has already passed.
Each exclusion can be toggled on or off, should you need to temporarily allow a previously excluded item. In the upper right, a
toggle is available to Automatically exclude registry keys detected as PUMs due to common Group Policy Objects. The list of which
registry keys are excluded is available by hovering on the help icon. There are several types of exclusions you can add to
Malwarebytes. These are listed below, along with examples. When you add an exclusion, we will automatically apply the exclusion
to protection layers based on the type of exclusion you choose. If you want to customize what layers the exclusion is for, click
Exclusion Applied To to expand the list. Note that not all exclusion types can be applied to all layers.
Groups
Groups are used to join several endpoints into one functional area, allowing you to apply manage them simultaneously with one
Policy. For information on Groups, refer to page 19 of this guide.
Users
For information on how to manage your existing users, or how to invite new users, refer to page 5 of this guide.
Syslog Logging
In addition to the reporting available in the application, you can export data from Malwarebytes to a Syslog server. To do so, you
must promote an existing endpoint to act as an intermediary between the Malwarebytes server and your Syslog server. We refer
to this endpoint as the Syslog Communication Endpoint. The first step in this process is to configure your Syslog server settings.
Go to Settings ► Syslog Logging and click Add to begin. You will see a screen that looks like this. You will need to provide the
information for your Syslog server. These settings will apply to your entire Malwarebytes account.
Once you have entered the information for your Syslog server, click Save. You will now choose an endpoint to promote as the
Communication Endpoint. You must choose a Windows endpoint that has the Malwarebytes agent installed. Mac endpoints are
not available to promote as the Communication Endpoint. You may scroll to find the endpoint, or search for it by name in the
upper right . Select the endpoint you want to promote , and then click Assign . A confirmation window will appear. Click
Yes to promote the endpoint and return to the settings page.
Single Sign-On
If your organization uses a Single Sign-On (SSO) provider, you can connect it to Malwarebytes from this menu option. The first time
you open this menu page, the feature is turned off. Click the On/Off toggle to begin. Now that you have enabled SSO, you will
need to connect Malwarebytes to your provider.
Your SSO tool should be able to generate an XML file to integrate with new platforms. If you are unsure of how to do this, you
should contact your SSO provider. Once you have the XML file from your SSO, you can drag it into the Malwarebytes console to
begin upload. If you need to change which SSO tool Malwarebytes connects to in the future, you can upload a new XML file at any
time.
Dashboard
When you first open the Malwarebytes console, the first screen that you will see is the Dashboard. It is designed to provide a high-
level view of malware-related activities on your network. Data shown is a cross-section of information which is displayed in detail
on the other Malwarebytes console status screens. The Dashboard view includes:
• Number of endpoints online, offline, and infected (both online and offline) over the most recent 72 hours
• Threats cleaned during the past 72 hours, broken down by Malware, PUP, PUM, Ransomware, Exploits, and Websites
• Tasks issued by the Malwarebytes console over the past 24 hours, broken down by status (success, failure or pending)
• Threats detected during the past 90 days, broken down by Malware, PUP, PUM, Ransomware, Exploits, and Websites
• A bar graph showing Malware, PUPs, PUMs, Ransomware, and Exploits by day, over the past 30 days
• Number of suspicious activities detected in the last 24 hours, categorized by severity
• List of Top 10 endpoints with the most detections over the past 90 days
• List of Top 10 suspicious activities detected in the last 24 hours
• List of Top 10 malware detections over the past 90 days
• List of Top 10 PUPs over the past 90 days
• List of Top 10 PUMs over the past 90 days
• List of Top 10 malicious/suspicious websites blocked in the last 24 hour
Information shown on the Dashboard is current as of the time you access the Dashboard. A screenshot of the Dashboard is shown
below.
You may also click on any specific detection to view more details about the detection. The main body of the screen is used to show
threat data, divided into pages. You may navigate between pages, or change how many items are shown on each page, using the
controls at the left center region of the screen. Please note the two pulldown menus at the right center region of the screen. They
are used to select what data is shown on the remainder of the screen.
Quarantine
A quarantined threat is one that Malwarebytes has detected, neutralized, and placed into a special container so that it cannot cause
any damage to your computer. This tab allows you to view those threats. You may filter your view by choosing a specific threat
category. This is a consolidated view, meaning that all quarantined threats on all managed endpoints are shown. In actuality,
quarantined threats are stored on the endpoints themselves in an encrypted format. Two entries exist for each threat, the threat
itself and proprietary information about the threat. Their location on each endpoint is:
C:\ProgramData\Malwarebytes\MBAMService\Quarantine
Suspicious Activity
This tab displays a report of all Suspicious Activity detected on your endpoints. Suspicious Activity Monitoring is only available if
you are a subscriber to Malwarebytes Endpoint Protection and Response. For more information on using this tab and feature, refer
to the Endpoint Protection and Response chapter, starting on page 29 of this guide.
Reports
This tab allows you to generate reports that summarize details covering the previous day, week or month. Reports are available
On-Demand or can be scheduled at regular intervals. The following report types are available:
• Detection Summary ● Endpoint Summary ● Events Summary
• Quarantine Summary ● Asset Summary ● Tasks Summary
These reports are provided in a Comma Separated Values (CSV) file format. Once an On-Demand report has been requested, the
request will be placed into a queue for processing. When the report is complete, an email will be sent to the email address
associated with your account so that you can download the report. All scheduled reports are generated at the times specified
below.
• Daily Reports – Every 24 hours at 05:00 UTC
• Weekly Reports – Every Saturday at 05:00 UTC
• Monthly Reports – The last day of every month at 05:00 UTC
Scheduled reports are delivered once they have finished generating. There may be a slight delay based on the size of the queue.
Please note that all times shown in reports uses Coordinated Universal Time (UTC).
Events
This tab displays a record of threats, remediation and other activities for installed endpoints. At the top of the screen is a bar graph
showing system activities over the past thirty days. Immediately following is a pulldown menu which allows you to select the
Severity of information being reported here. You may choose to display all activities, or narrow the view by selecting one of these
settings. There are several event types which can be shown. A representative sample for each severity is as follows:
• Severe – Threat has been found
• Warning – Threat has been cleaned
• Info – Completion of a scan
• Audit – Endpoint registered
Use of the pulldown menu is strongly recommended. A large number of items can be reported here over time.
Tasks
This tab is a record of all on-demand activities (asset management scans, malware scans, restore, delete) that have been requested
on endpoints. The top of the tab shows the number of activities in each status type, summarized over the past thirty days.
Information pertaining to the activity request (who, where, when) is logged, as is status of the activity. To focus on a single status,
click the bar underneath the 30-day total for that status.
Please note: Tasks have a finite lifespan. Any tasks which have not been acted upon by the affected endpoint within 90 days of
the task’s issuance will be removed from the task queue.
If you need to enable Debug Logging without having to be physically present at each endpoint, you can do so with the following
commands. These examples assume the default installation directory – you will need to modify the path if you have specified a
different installation folder.
Windows
MBCloudEA.exe -loglevel=debug Enable Debug Logging
MBCloudEA.exe -loglevel=info Disable Debug Logging
Mac
EndpointAgentDaemon -logging=debug Enable Debug Logging
EndpointAgentDaemon -logging=info Disable Debug Logging
CEF Header:
Version Version of the CEF format CEF:0
Device Vendor This will always be Malwarebytes Malwarebytes
Device Product Plugin installed on endpoint at time of event Malwarebytes Endpoint Protection
Malwarebytes Incident Response
Malwarebytes Endpoint Protection and Response
Device Version Plugin name and version Endpoint Protection 1.2.0.719
Device Event Class ID Type of event reported Detection
Name Category of event and action taken Website blocked
Severity Severity set in Syslong settings 1
Extension:
deviceExternalId Unique identifier of device generating event e150291a2b2513b9fd67941ab1135afa41111111
dvchost Device hostname MININT-16Tjdoe
deviceDnsDomain Device’s DNS domain name jdoeTest.local
dvcmac Device’s MAC address 00:0C:29:33:C6:6A
dvc Device’s IPv4 address 192.168.2.100
rt Date/Time when the event occurred Apr 13 2018 21:05:56 Z
filetype Type of file that caused event OutboundConnection
File
Module
Process
Registry Value
Exploit
Cat Category of the Event Malware
PUP
PUM
Ransomware
Exploit
Website
Occasionally the configuration file can become corrupted, for instance if a PC lost power while saving a setting to the file. The
Endpoint Agent service is unable to start if this happens. To combat this, Malwarebytes will automatically create backups of the
configuration file that you can restore using the Configuration Recovery Tool.
On initialization, the Endpoint agent creates up to five backups of the configuration file. The Configuration Recovery Tool will use
one of these backups to restore a corrupted MBCloudEA.exe.config file. The newest file will have the lowest number. These
files are stored in the same directory as the configuration file. An example is shown below.
The aptly named ConfigurationRecoveryTool.exe is located in the same directory as the configuration file and its backups.
You will need to run the Recovery Tool from an elevated Administrator level command prompt. The tool will try to load the current
configuration file – if it is successful, it will report that it does not need to replace the file. If the tool fails to load the configuration
file, it will attempt to restore and load the most recent backup. If the backup fails to load, the recovery tool will repeat the process
using the next oldest backup file. The recovery tool continues this process until it has either successfully restored a backup or has
failed to restore all existing backups. If the tool is unable to restore from any of the backups, it will display a message to inform
you that no valid backups were available. In this scenario, you will need to either restore the configuration manually or reinstall
the endpoint.
Two parameters are available to use with the Recovery Tool. If you do not enter any parameters, the tool will show examples of
their usage. The parameters are:
• [path to exe] is the name of the executable that the configuration file you are restoring was created for. For the
Malwarebytes Endpoint Agent, this will be MBCloudEA.exe.
• [Optional Path to backup folder] allows you to provide a specific directory containing backups. If you do not provide
this parameter, the tool will attempt to recovery the configuration file using the backups in the current directory.
After the Recovery tool finishes running, there are three possible outcomes.
• Configuration file loads successfully: If the tool successfully loaded the configuration file with no corruption. No
replacement occurred and the tool will automatically exit.
• Configuration file is corrupt and there is a valid backup: The configuration file was corrupted and the tool successfully
replaced it with an existing backup.
• Configuration file is corrupt and there is no valid backup: The configuration file was corrupted and the tool was unable
to restore an existing backup. You will need to either restore a backup from a different path, or reinstall the endpoint.
Use of the tool is best illustrated by an example, which follows. This is all one line, but is broken up here for easier reading.
EndpointAgentDeploymentTool
-Action=install
[email protected]
-Pwd=MyNebulaPassword
-targetUser=Corp\targetUserName
-targetPwd=MyPassword
-Results=c:\files\installresult.txt
-computers=Computer1;Computer2;10.1.1.2;
Here, a silent installation was performed on three endpoints, two identified by name and one by IP address. The results of the
installation process was saved to a file for later inspection. When using the command line mode, the following arguments may be
used. They are listed here in alphabetical order.
-action
Deployment action that the program will perform on the endpoint. Valid values are install and uninstall.
-computers
List of computers used in discovery. While discrete computer names or IP addresses may be specified here, IP
address ranges may also be used. Entries should be separated by semicolons (;).
-file
Location of a file which contains endpoint identity information used in discovery. Please refer to page 9 (“Scan
Network”) for a list of specifications which this information can take.
-nebulauri
URL of the Malwarebytes server. Default value is https://cloud.malwarebytes.com.
-proxybypass
Specifies whether the proxy can be bypassed on communications on the local network. Valid answers are
yes/no, true/false, or 1/0. Only valid if -proxyuse is set to {yes|true|1}, and is ignored if -proxyuse is {no|false|0}.
-proxypassword
Password associated with -proxyuser for Internet access through a proxy. Only valid if -proxyuse is set to
{yes|true|1}, and is ignored if -proxyuse is {no|false|0}.
-proxyport
If -proxyuse is set to {yes|true|1}, this is the port number associated with proxy server access to the Internet. It
is ignored if -proxyuse is {no|false|0}.
-proxyssl
Specifies whether SSL encryption should be used for Internet access through a proxy. Valid answers are yes/no,
true/false, or 1/0. Only valid if -proxyuse is set to {yes|true|1}, and is ignored if -proxyuse is {no|false|0}.
-proxyurl
If -proxyuse is set to {yes|true|1}, this is the FQDN or IP address of the proxy server to be used for Internet access.
It is ignored if -proxyuse is {no|false|0}.
-proxyuse