Jump to content

gonzo

Honorary Members
  • Posts

    5,921
  • Joined

  • Last visited

  • Days Won

    31

Everything posted by gonzo

  1. I can't speak for future plans, unfortunately. But having worked in the past for a company that focused on DLP, much of what we did then had little to do with detection or remediation of malware. Obviously, any malware that can expose information on your computer/network is a risk which we do go after with all of our products. At the same time, much of DLP comes down to your apps, their storage methods, your ancillary storage methods and the method of transport between your storage or I/O devices and the apps which will use them. I was going to write something very profound and realized that I was making it too hard to understand, so thank Bubba for the delete key. Many users store confidential information out in the open, and if the computer CAN be breached, it eventually WILL be breached. Humans are always the weakest link in the chain. Malwarebytes can and will provide excellent protection for your systems, but its always a cat and mouse game. If you shift the responsibility to someone else to protect you 100% of the time, you will eventually pay for that choice. You can choose to be your best friend or your worst enemy. Having worked at that company taught me a lot about how I nonchalantly exposed things that could have cost me dearly. I didn't mean to climb on a soapbox here, but it actually could have been much longer. Going back to where I started, several people have requested Malwarebytes to create a product focused on DLP. As a rule, we do not speak of anything we are developing until it is at a place where we can feel comfortable about doing so, and that is usually nearing release of a product. It builds anticipation as well as expectations. That can be a good thing, and also a bad thing. I honestly don't know of anything DLP-related here, nor have I asked. I'm just trying to give you a thoughtful answer.
  2. I was typing as the previous response was entered. @exile360 is correct. The version you asked about is listed under MALWAREBYTES ANTI-MALWARE MOBILE. It is far beyond end-of-life, and is no longer supported. As the number of users dwindles so low that the extra efforts required to support those few along with the lion's share of the audience, support for much older versions of Android may be discontinued. I do not have any specifics on which ones or when, but it has happened in the past. It will likely continue to happen in the future.
  3. You can run them together, though you may need to set exclusions on each so that they do not interfere. They may also get along just fine. A virus is a type of malware, and is generally obsolete. Modern attacks rarely use them anymore. Instead they rely on exploits and people letting their guard down and not protecting themselves properly. Think of malware as the umbrella. A virus fits under the umbrella, as does an exploit. Anti-virus programs have always depended on signatures, which take more and more storage, and testing data against the signatures takes more and more of your computer's horsepower away from you. Malwarebytes' newer technologies rely more on detection of exploits and providing protection against them. There are an infinite number of things to protect against, but all of them need a way in to your computer for an attack to succeed. You block the pathways, and you block the attack. That is a strength of Malwarebytes.
  4. Malwarebytes approaches ransomware from several different angles at the same time. If you are seeing anything detected by Malwarebytes (which it sounds like you are from your description), its because we are not labeling detections generically as ransomware. That is the end result, but it relies on several different types of attacks to achieve its goal. If you block the other attacks, you also block the result from occurring.
  5. America eats its young, one byte at a time.
  6. Looks like he replied to your other topic on the same subject.
  7. I checked with our guy who wrote the code, and he said there is not a way to do what you requested. He also said he would respond to this thread himself tonight or tomorrow..
  8. Make a posting in The False Positives forum on this website, listing the URL(s) and IP. The researchers will check it out, and if they concur, you'll be removed from the list. They do their best, but there are so many that have become infected over time that removing them from the "bad guy list" ends up requiring a process like this. They're quick AND fair.
  9. I checked in with Support and was told someone has/is/will be reaching out to you shortly. Have you seen the following excerpt (from page 6 of the Best Practices Guide)? Managed Client Installation with WMI Depending on permissions settings on a target endpoint, you may encounter the following error message during a push install. RPC server is unavailable. Please allow WMI through Windows Firewall. If this occurs, open a command line window on the endpoint (as an administrator) and enter the following command: netsh firewall set service RemoteAdmin enable Installation should be able to continue as planned.
  10. Yep. That is what the FAQ calls "protection updates" and what I referred to as "database updates". They will keep you current against the latest threats.
  11. The link that @exile360 provided is for version 3.5.1.2522, which is the final version Malwarebytes made that supports Windows XP and Windows Vista. Database updates and maintenance upgrades that are provided now are still valid on that version of Malwarebytes as well, but there will be no further updates for the program as a whole as far as XP or Vista are concerned. The FAQ link that was also provided goes into that decision in more detail.
  12. I may be guilty of a few of those myself.
  13. So rare and so good, and its only 13.2%. Only one needed and I'm not going anywhere tonight!
  14. The knowledge base article that Jerome sent you may also help you. It is an abridged version of the guide but also includes other things. I just thought of something. Make sure that you have the required version(s) of .NET on the endpoint. The installer has dependencies on that.
  15. Here is a link to the guide... https://www.malwarebytes.com/pdf/guides/MBMCGuide.pdf?d=2018-12-20-14-18-38--0800 The first 6 pages (following the Table of Contents will get you started with the stuff I told you about. I don't know if you are aware, but all of our guides are publicly available. A link to the guides page on our website is: https://www.malwarebytes.com/support/guides/ As far as services go, fire up Task Manager on one of the endpoints and go to the SERVICES tab. Check out the status of all services that start with the letter R...you'll know the relevant ones when you see them. Start with the instructions in the Admin Guide though.
  16. Have you checked the Admin Guide yet? There are three ports that must be opened, one of which is the RPC Endpoint Mapper. A second one is for SMB file transfers that are tested during simulation and used during install. You also need to check LOCAL admin permissions on the endpoint to make sure you have authority to do what you need to do, Although you said you have installed on 20 other machine, you did not mention whether any/all were Windows 10 Professional endpoints. That info may help troubleshooting efforts. Also check your services on the affected endpoints to make sure that the RPC Service is running. I always have questions about the state of a machine after Windows updates, so I would check to see if that may come into play as well.
  17. Please submit logs. That is the starting point for any troubleshooting, and nothing can happen without them. Please provide logs using our Malwarebytes Support Tool. Download and launch the Malwarebytes Support Tool Click Advanced Click Gather Logs Upload the mbst-grab-results.zip file from your desktop
  18. I have had my headphones on all night, and something is telling me I should go home and sleep. There was SO MUCH good music back then.
  19. OH NO...he's back. He left Chicago and ended up in Statesboro, Georgia. Then, he found Dickey, Duane and Gregg and look what happened as a result,,,
  20. My last one, maybe. Here's some story that you can probably do without. I was going to college and working at a southside Phoenix liquor store. It was a real nice place, so we locked the front door at sunset. Drive-through windows on either side, but one was locked at sunset so you couldn't get broadsided. All business conducted in one window (thank God). I was running the show, when the show wasn't running me. Because the doors were locked, I could turn up the music. One night, this song came on, and.....screw the customers! Plywood up, and music louder. THIS WAS AWESOME! It was way too short, but I later found it. It turned out to be a bunch of kids from Ukiah CA (where the weed grows best) who had a blues band, played, split up, and were asked by a Berkeley record producer to come back together just once because their music was too good to be lost forever. This album was recorded, and two of the four participants (Mark Ford and Robben Ford) went on to become major artists in the music scene (in their own bands and as session musicians). To me, this is the best they had to offer (bias obviously taken into account), but I hope you like it.
  21. Almost back to where I started, with Stevie Ray. This may be the ultimate blues guitarist song, and it was captured for all to see and hear later. No single man could possibly be that good, so if I could just play that guitar once, could I be maybe half as good? A story, a fantasy, a dream....who knows! Enjoy. You MUST watch the last two minutes of the song. You will not believe what you see. P.S. One more to go, then I'll shut up ... maybe.
  22. Albert King had no tolerance for any man who he thought was mimicking his style, until he heard Stevie Ray Vaughan. Here is one of Albert's best, and one that was hard to come down from when experiencing it live. Thank you Albert! If you like this, and you like SRV, look for the IN SESSION show where they played together. The master and the student, with ultimate respect going both directions. I almost cried!
  23. Michael Bloomfield moves on to the Electric Flag. Many great songs, but this is a good one featuring Nick Gravnites on vocals (he's still around!!!)
  24. A study in deities. Paul Butterfield Blues Band, featuring Michael Bloomfield on guitar (1965)
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.