Malwarebytes Anti-Malware Unmanaged Client Administrator Guide
Malwarebytes Anti-Malware Unmanaged Client Administrator Guide
CWB071800e
Table of Contents
What’s New
The following changes have been made in this version of Malwarebytes Anti-Malware.
Improvements:
• Added substantial improvements to core detection and removal technology
• Enhanced safeguards to prevent false positives on legitimate files
• Added support for Windows 10, Windows Server 2003 (32-bit), Windows Server 2008 and Windows Server 2012
operating systems
• Added capability to download incremental updates directly from the Internet
• Modified incremental database update process to allow 50 incremental updates before requiring a full database update
Issues Fixed:
• Fixed issue which caused BSOD when scanning a drive encrypted with BitLocker
• Resolved various issues that could result in crashes or system hangs
Key Features
Malwarebytes Anti-Malware is an anti-malware application with the following features:
• Real-time protection works together with leading anti-virus utilities to make your computer more secure.
• Real-time Protection detects and blocks threats whenever they try to execute.
• Malicious website blocking prevents access to malicious and infected websites.
• Scheduled updates to keep protection up-to-date automatically.
• Scheduled scans so you can set it and forget it, knowing that your system will get checked as regularly as you desire.
• Lightning fast Flash Scans to check for immediately active threats on your system.
• Password protect your settings to prevent unauthorized changes.
• Light speed quick scanning.
• Ability to perform full scans for all drives.
• Database updates released daily to protect against the newest malware in-the-wild.
• Intelligent heuristics detect even the most persistent malware while remaining light on system resources.
• Quarantine to hold threats and restore them at your convenience.
• Ignore List for both the scanner and Protection Module.
• A small list of extra utilities to help remove malware manually.
• Dynamic Malwarebytes Chameleon technologies to get Malwarebytes Anti-Malware running when blocked by
infection.
• Multi-lingual support.
• Context menu integration to scan files on demand.
Plus many more!
GUI-based Installation
Locate the icon/file for the Malwarebytes Anti-Malware, right click the file and select Run as Administrator. It is mandatory that
administrator privileges be used for this task. If you are installing Malwarebytes Anti-Malware on a Windows version newer than
Windows XP, a Windows dialog box will be presented in the middle of your screen, labeled User Account Control. Verify that the
publisher is listed as Malwarebytes Corporation and click Yes. This is a Windows security feature that originated with Windows
Vista, to assure that an application's capabilities are limited unless and until you authorize higher capabilities. Once approved,
installation will begin. The installation program will display several screens which guide you through the installation, and allow
you to provide alternate information if you do not wish to accept installation defaults. Each screen will also allow you to terminate
installation if you do not wish to continue. Screens are as follows:
• Select Setup Language: You may select from a number of languages to be used during the installation. The language
chosen for installation will also be used for program operation.
• Setup Preparation: This screen requests that you close all other applications, and temporarily disable both your anti-virus
program and firewall program before continuing.
• License Agreement: You must accept the terms of the license agreement if you wish to continue installation.
• Information Panel: A change log is presented in the form of an information panel.
• Select an Installation Directory: In most cases, you can simply click Next to accept the default location. Please note that
the amount of free disk space required for the program is listed at the bottom of this screen. You should assure that you
have sufficient disk space for the program as well as for program logs.
• Select a Start Menu Folder (optional): Links to start Malwarebytes Anti-Malware will be stored here.
• Additional Tasks: You may also create a desktop icon here if you choose.
• Ready to Install: A final confirmation is required from you to perform the installation.
• Installation Complete: You may now launch Malwarebytes Anti-Malware at this time!
At this point, program installation is complete. You will see the Malwarebytes Anti-Malware user interface as shown below. If you
have already purchased a Malwarebytes license, you may wish to activate your copy of Malwarebytes Anti-Malware at this time.
You can do that now (or at any time) by clicking the Activate link at the lower left of the Malwarebytes user interface.
Enter both the ID and Key in the spaces provided. You may also choose to enable the protection module, and to keep protection
up-to-date automatically – Malwarebytes recommends both! Then, click the Activate button. The Buy Now and Activate buttons
will both disappear once license information has been supplied and validated. A confirmation message will also be displayed at
this time.
Let's talk about the primary elements which make up our user interface.
Menu Bar
The Menu Bar consists of a row of tabs, each representing functional areas of the program. Each tab will be discussed here in detail,
but in order to provide a basic introduction to the interface, here is a list of the tabs.
• Scanner: Selects a scan type and executes it.
• Protection: Configures and controls real-time protection.
• Update: Provides status of signature database, and enables on-demand update.
• Quarantine: Management of quarantined threats.
• Logs: Access to logs for scanner and protection module.
• Ignore List: Management of items which will be ignored by both scanner and protection module.
• Settings: Detailed configuration of program, scanner, database updater and task scheduler.
• More Tools: Provides information about other Malwarebytes protection products.
• About: Program version, license, and link to on-line help.
As each tab is selected, its background color will change from gray to white. The remainder of the screen is used for functionality
associated with the tab.
Malwarebytes Anti-Malware offers three methods of scanning your computer. They are:
• Quick Scan: Scans all system locations where malware is known to install itself. This is the scan type recommended by
Malwarebytes.
• Full Scan: Scans all files on selected drive(s). The option to select drives becomes available once the Scan button has
been clicked. In most cases, a Quick Scan is recommended.
• Flash Scan: Scans memory and autorun objects only.
After selecting the type of scan – and drives for a Full Scan – click the Scan button to initiate the scan. While the scan is running,
the screen will show status of the scan in progress. A screenshot of this screen is shown below.
The first thing you notice on this screen is the status of the Protection module. It is designed to stand out, and to give the user an
immediate status. This is controlled by settings of the two checkboxes immediately above the status indicator. These checkboxes
are:
• Enable filesystem protection: Malicious file execution blocking is enabled. If the tray icon for the protection module is
not already running, it will start and will enable both protection components if they are both set to start when the
protection module starts. If the tray icon is already running, it will simply enable or disable Filesystem Protection.
• Enable malicious website blocking: Malicious website blocking is enabled. If the tray icon for the protection module is
not already running, it will start and will enable both protection components if they are both set to start when the
protection module starts. If the tray icon is already running, it will simply enable or disable Website Blocking.
There are a number of other configuration settings which may be specified here for the Protection Module. They are as follows:
• Start protection module with Windows: This option will start the Protection Module during system startup and place a
tray icon in the system tray.
• Start file execution blocking when protection module starts: This option will start the Protection Module during system
startup and place a tray icon in the system tray.
• Start malicious website blocking when protection module starts: This option blocks access to known malicious websites.
• Automatically quarantine filesystem threats detected by the protection module: This option automatically quarantines
infected files detected by the protection module. When this setting is disabled, the user is prompted to take an action.
The three available actions are:
o Quarantine: Blocks the threat from running and quarantines the file
o Allow Temporarily: Allow the threat to run once only, but block it if it attempts to run at a later time
o Allow Always: Add the threat to the Ignore List.
• Show tooltip balloon when filesystem threat is blocked: This option generates a tray icon notification whenever a
filesystem threat is quarantined. Automatically quarantine filesystem threats detected by the protection module must be
enabled for this option to function.
Following the configuration checkboxes, there is also a button which allows a direct link to Scheduler Settings, a subset of program
Settings. This will be discussed in complete detail beginning on page 20.
By clicking the Check for Updates button, Malwarebytes Anti-Malware will contact a Malwarebytes internet server and check for
available database updates. If an update is available, it will be downloaded and merged into the program’s signature database.
The Settings section of this guide (page 20) will provide information on how to configure Malwarebytes Anti-Malware to check for
database updates on a scheduled basis, freeing the user from the task, and also assuring that up to date signatures are available.
Updates are typically available 6-15 times daily. In most cases, updates are very small. If a computer has been unable to receive
Please note that database updates are shown using the format vyyyy.mm.dd.##, which specifies the year, month, day, and update
number released on the day listed. While the exact time of the update is not shown as part of the filename, dates shown are
referenced to Greenwich Mean Time. New York’s time zone is GMT-5 (summer GMT-4). San Francisco’s time zone is GMT-8
(summer GMT-7). Using those two cities as a reference point for this example, it is possible that updates issued in late afternoon
or evening (San Francisco time), or late evening (New York time) would show a date stamp that appears to be in the future. This
piece of knowledge may save some confusion.
In this screenshot, one file has been detected and isolated so that it cannot cause damage. As part of pertinent information about
the file, its location – prior to being quarantined – is shown. This is important to note, because the file may be legitimate. If the
user is unsure about the file’s legitimacy, it is up to them to research the internet or to visit the Malwarebytes public forums in an
attempt to learn more about the file before making a final decision. Below the file list, four buttons are available to allow the user
to act upon the potential threats. These are:
• Delete: Delete a file which has been selected by highlighting it.
• Delete All: Delete all files shown on the list
• Restore: Restore a file which has been selected by highlighting it.
• Restore All: Restore all files shown on the list
You may open any log by highlighting it and clicking the Open button. You may delete any log by highlighting it and clicking the
Delete button. You may delete all logs at once by clicking the Delete All button.
General Settings
This tab contains several settings which control basic behavior of Malwarebytes Anti-Malware. A screenshot of the General Settings
tab is shown below.
Scanner Settings
This tab controls settings which are specific to scanning functionality within the program. Settings configured here do not apply
to the Protection module. A screenshot of the Scanner Settings tab is shown below.
Updater Settings
This tab provides settings pertaining to program updates and communication settings required for all updates. A screenshot is
shown below.
All scheduled tasks will be displayed in the main body of the screen as shown here. You may edit an existing task by highlighting
the task and clicking Edit. You may delete an existing task by highlighting the task and clicking Delete. You may add a new task
by clicking the Add button.
Directly below the Malwarebytes logo, you will find the program version and build number. Below that are clickable links to access
the Malwarebytes web site as well as a compiled help system. Following the abbreviated End User Licensing Agreement (EULA) is
the ID associated with your license (masked in the above example). Your license key will be shown only by asterisks. Neither the
ID nor Key will be displayed for a non-licensed installation.
Installer
Usage:
mbam-setup <parameter_1> ... [parameter_n]
Purpose:
This command controls installation of Malwarebytes Anti-Malware on a computer, based on parameters passed
when the command is executed. The command line interface must be invoked as an Administrator to provide
proper authorization for the program to install and execute properly. Anti-virus and/or other security software
should be temporarily disabled prior to execution of this command. Failure to do so may result in that software
blocking successful installation of Malwarebytes.
Parameters:
/dir=<path> Specifies an alternate installation directory. If the directory does not exist, it will be
created here. Please note: The default installation directory is:
32-bit OS: C:\Program Files\Malwarebytes’ Anti-Malware\
64-bit OS: C:\Program Files (x86)\Malwarebytes’ Anti-Malware\
/log Causes setup to create a log file in the user’s temporary directory detailing file
installation and [Run] actions taken during the installation process.
/log="filename" Causes setup to create a log file in the specified location instead of the user’s
temporary folder, detailing file installation and [Run] actions taken during the
installation process. This should include complete path and file name. The folder
must already exist.
/nocancel Prevents the user from cancelling during installation process by disabling the Cancel
button and ignoring clicks on the Close button. Useful along with /silent or
/verysilent.
/noicons Instructs setup not to place shortcuts in the Windows Start Menu. Can be combined
with /tasks="".
Schedule a Scan
Usage:
mbamapi /schedule <type> <option_1> […option_n]
Purpose:
This command adds a scheduled scan to the task scheduler. Scan options are appended to the command to
tailor the scan to specific needs.
Parameters:
type Type of scan to be added to the scheduler. Values are:
-quick Add a quick scan to the task scheduler
-full Add a full scan to the task scheduler. This option will check the value
of selectedrives to determine which locations to scan. Please see Define
Configuration Settings for further specifications of this parameter.
-flash Add a flash scan to the task scheduler
-log Overrides the Save Log checkmark on the Settings tab. If Automatically Save Log After
Scan Completes is unchecked, a log file will still be saved when -log parameter is used.
/silent Hides the GUI while scanning; Does not need to be used with -terminate as the
program will always terminate after a silent scan completes.
-reboot Reboots the computer if necessary; Only valid if -remove is used
-remove Automatically removes threats and saves a log file. Unless /silent is specified, GUI
stays open.
/hourly Configures the scan to be performed hourly. Valid range for /every is 1-48.
/daily Configures the scan to be performed daily. Valid range for /every is 1-60.
/weekly Configures the scan to be performed weekly. Valid range for /every is 1-8.
/monthly Configures the scan to be performed monthly. The /every switch is invalid for monthly
scans.
/once Configures the scan to be performed only once and only at the time specified by
/starting.
/onreboot Configures the scan to be performed every time the computer boots.
Product Activation
Usage:
mbamapi /register <id> <key>
Purpose:
This command activates the Malwarebytes Anti-Malware client on a computer, without displaying the main
dialog box.
Parameters:
id License ID assigned by Malwarebytes for this specific computer.
key License key assigned by Malwarebytes for this specific computer.
Examples:
mbamapi /register 12345-67890 AAAA-BBBB-CCCC-DDDD
Remove Password
Usage:
mbamapi /clearpassword <password>
Purpose:
This command removes the password. User must specify the existing password as authorization to execute
the command. There is no command line function for removing or resetting a password if it has been lost,
forgotten or misplaced. In such scenarios, a clean reinstall is required.
Parameters:
password Existing password assigned by admin.
Examples:
mbamapi /clearpassword <password>
Proxy Configuration
Usage:
mbamapi.exe /proxy [server] [port] [username] [password]
Purpose:
This command allows Malwarebytes Anti-Malware to update through a proxy server. If the proxy server is
configured to require authentication, <username> and <password> must be supplied. To remove previously-
defined proxy settings, issue this command without any modifiers.
Parameters:
server IP address or fully-qualified domain name of a proxy server used in the corporate
network.
port Port number used by the proxy server for communications.
username Username which may be required to validate proxy server usage.
password Password associated with [username].
Examples:
mbamapi.exe /proxy Clears proxy settings
mbamapi.exe /proxy proxy.com 80 Defines proxy use without authentication
mbamapi.exe /proxy proxy.com 80 admin password Defines proxy use with authentication
Parameters:
class <type> Type of item to be added.
Specifications for <class> items:
file File “<drive>\<dir>\<file>”, where string is enclosed in double
quotes.
folder Folder “<drive>\<dir>”, where string is enclosed in double quotes.
key Registry entry “<hive>\<key>”, where string is enclosed in double
quotes.
value Registry value “<hive>\<key>|<value>”, where string is enclosed in
double quotes.
ip IP address, in format “nnn.nnn.nnn.nnn”, enclosed in double quotes.
Examples:
mbamapi /ignore -add file "C:\Windows\file.exe"
mbamapi /ignore -add folder "C:\Windows\folder"
mbamapi /ignore -add key "HKLM\Software\key"
mbamapi /ignore -add value "HKLM\Software\key|value"
mbamapi /ignore -add ip "111.222.33.444"