1 GUIDE TO INTEGRATION IMPLEMENTATION 4110 George Road, Tampa, FL 33634 | 813-463-4740 | [email protected]Contents Requirements ...................................................................................................................................................3 Installation Scenarios ........................................................................................................................................3 Malwarebytes 2.xx or 1.75 is already deployed. .................................................................................................3 Install / Update Malwarebytes Plugin ................................................................................................................4 Configuring Malwarebytes Plugin ......................................................................................................................6 About the Screens .............................................................................................................................................9 System Dashboard ............................................................................................................................................9 Settings Tab ................................................................................................................................................................9 Client Licenses Tab .................................................................................................................................................. 10 Global Ignore List Tab .............................................................................................................................................. 11 Policy Manager Tab ................................................................................................................................................. 12 Deployment History Tab.......................................................................................................................................... 13 Client Screen................................................................................................................................................... 14 Home Tab ................................................................................................................................................................ 14 Computers Tab – Anti-Malware .............................................................................................................................. 15 Computers Tab – Anti-Exploit.................................................................................................................................. 16 Deployment Tab ...................................................................................................................................................... 17 Quarantine Tab........................................................................................................................................................ 18 Ignored Items Tab.................................................................................................................................................... 18 Location Screen .............................................................................................................................................. 19 Deployment Tab ...................................................................................................................................................... 19 Computer Screen ............................................................................................................................................ 20 Status Tab ................................................................................................................................................................ 20 Scan History Tab ...................................................................................................................................................... 20 Threat History Tab ................................................................................................................................................... 21 Quarantine Tab........................................................................................................................................................ 21
28
Embed
GUIDE TO INTEGRATION IMPLEMENTATION · guide to integration implementation located in the Malwarebytes Anti-Malware folder; for installations performed using the Integration plugin
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
About the Screens .............................................................................................................................................9
System Dashboard ............................................................................................................................................9
Global Ignore List Tab .............................................................................................................................................. 11
Deployment History Tab .......................................................................................................................................... 13
Home Tab ................................................................................................................................................................ 14
Status Tab ................................................................................................................................................................ 20
Scan History Tab ...................................................................................................................................................... 20
Threat History Tab ................................................................................................................................................... 21
Ignore List Tab ......................................................................................................................................................... 22
Export to File ........................................................................................................................................................... 23
Known Issues .................................................................................................................................................. 28
System Dashboard ................................................................................................................................................... 28
Enable Password Protection DEFAULT: Disabled Specifies a password that is required to access certain functionality of the Malwarebytes Anti-Malware product.
Enable Auto Deployment DEFAULT: Disabled Enabling this Feature will enable the Malwarebytes Plugin to Automatically Deploy both Anti-Malware and Anti-Exploit products as configured by using the Configure button
Client Licenses Tab
The Client Licenses tab allows you to specify product registration information for Anti-Malware and Anti-Exploit
specific to a customer, values defined here will be used in place of the globally defined registration information.
You can remove a record by Right clicking on the record in the summary window and selecting
There is a pre-defined silent policy that comes pre-configured, it’s similar to the default policy that used as a default for deployment, however, it’s configured to use the Very Silent option which disables the System Tray Icon.
For the most part these options are default, but some of the highlights are below.
Protection Module
o File System Protection ENABLED
o Malicious Website Blocking ENABLED
o Protection Module is Started with Windows ENABLED
o Automatically quarantine file system threats ENABLED
o Show Tooltip Balloon when File System Threat is Blocked ENABLED
o Show Tooltip Balloon when Malicious Website is Blocked ENABLED
General Settings
o Terminate IE during Threat Removal DISABLED
o Anonymously report usage statistics ENABLED
o Right Click Context Menus ENABLED
o Warn User if Database is Outdated DISABLED
Scanner Settings
o Scan Memory Objects ENABLED
o Scan Start-up Objects ENABLED
o Scan Registry Objects ENABLED
o Scan File System Objects ENABLED
o Scan Additional Items against heuristics ENABLED
o Scan Inside Archives ENABLED
o Advanced Heuristics Engine ENABLED
o Action for Potentially Unwanted Programs (PUP): Show in results and do not remove
o Action for Potentially Unwanted Modifications (PUM): Show in results and remove
o Action for Peer-to-Peer software (P2P): Show in results and do not remove
Database / Definition Updates
o Automatic definition updates are scheduled to run every hour as required.
Scheduled Scans
o A Quick Scan is scheduled to run Each day at 9:00am
Scan Type: Quick
Scan is performed silently from the System Account
Automatically remove and quarantine all threats.
Saves to an XML Log
Computer will NOT restart if required for threat removal