Jump to content

Rsullinger

Staff
  • Posts

    533
  • Joined

  • Last visited

Posts posted by Rsullinger

  1. Hello Flydonna,

    The anti-exploit test tool will work if you are using the free version of the program. So if the protection is not stopping that test tool, it may be best to do a clean re-install. Remove the program from programs and features and use our clean tool found here:

    https://forums.malwarebytes.org/topic/177164-how-to-remove-mbae-leftovers-after-uninstall/

    Once you do that, try to install the latest version from this link:

    https://downloads.malwarebytes.org/file/mbae

    Then, test it again. Let me know if it still does not work for you after that and we can look into it further. 

  2. Hello Utomo,

     

    To bounce off of what Dale mentioned, I want to let you know the reasoning as why we do not protect e-mail clients by default. Our developer has mentioned this in a prior thread about this:

     

    "Basically the list of applications shielded by default from factory is a direct relation with applications that we've seen targeted in the wild with exploits. In some rare cases we've added applications by popular demand (some weird browser vendors, LibreOffice, etc.) and not because we've seen exploits in the wild for them.

    We could add some email clients in the future, but that would require a lot of testing on our part from QA perspective and we've just simply been focused on other things (adding new techniques, fixing bugs, etc.). But for the future we could probably add some of the more popular ones."

     

    However, like Dale mentioned, since you are on the paid version of the product you can add a shield for these if you want to give them added protection. 

  3. Hello REGITDept,

     

    There was no bug fixes or features in the new build. The new build was created and released due to the new anniversary update from Microsoft which required the program to use counter-signed digital certificates from Microsoft. So that is all that is different from that build and the last. 

     

  4. Hello Diotallevi,

    Can you check to see if there is any background processes of Nitro running when you are testing this? This sounds like a common thing that normally users of google chrome runs into. Because it keeps a process of google chrome running in the background, we are still protecting it. So even though a new window is opened, it won't show the alert that it is being protected. 

  5. Hello Ky331,

    The double release on that date was because we re-created the build using counter-signed digital certificates from Microsoft in order to work with the new anniversary update they just put out.  That version of 1.08 has the same features and fixes as the prior build, but just with that counter-signed certificate.

    The 1.09 build will be going through more builds of public beta testing. So if you want to test the new builds and give any feedback you can download the latest versions from this area in the forum:

     

    https://forums.malwarebytes.org/topic/184939-mbae-109-preview/

  6. Hello Mknopsnider,

     

    There is a way to push this through the management console. If you go into the policy pane and open up the policy your clients are on, you should see the anti-exploit tab. The options will be there. I am also attaching a screenshot of the settings you would want to set to make it silent if you do not want them seeing anything. 

    anti-exploit_policy.JPG

  7. Hello Powella and welcome to the forums!

    Without getting to in-depth into it, when you launch a program that mbae protects, we inject into the program to protect them from exploit based attacks. While we are protecting it, we will only take action when something falls under one of our protection layers as being malicious. If it does, we will block it at that time. It is not like SEP's real-time protection from what I have seen. We also have customers running SEP and anti-exploit working side by side. So I would continue to test and if you run into any issues, please let us know!

     

  8. Hello BeachGuy and all,

     

    One thing to check if you have this issue as well is Trusteer rapport. It is part of our known conflicts. If you do have it and are running into this issue, you can use the instructions from our known conflicts:

     

    https://forums.malwarebytes.org/topic/135127-known-issues-conflicts/

     

    • Trusteer Rapport (maybe limited to older versions of Trusteeer) may conflict with MBAE. As a workaround simply disable the ROP and malicious return address protections in MBAE's advanced settings to make Trusteer work alongside MBAE.
  9. Hello Gaia Technologies!

     

    Do you mind sending me a PM with the e-mail you used for purchasing the product? I want to look it up on my side and see if I can get it activated. If I can, I can provide you with something to help activate that computer and the other 10. 

     

    Ron S

  10. Hello ludolf,

     

    You are correct. If you only have the anti-exploit purchased, then the anti-malware database definition update does not apply to you. In case anyone in the future has this issue as well, you can find the area to disable this in the e-mail alerts by opening up the management console and going to the  admin pane>Email notifications Tab> change button> notifications tab. 

    The option for it is 'signature database on server out dated'. Simply remove that checkbox and you won't be alerted by that in the future. 

  11. Hello Swood,

     

    Normally if you see an outgoing block in a browser it is usually 1 of 2 scenario. Either it is an infection or a blocked connection that the user is making (either ad or bad page). If you are noticing this happen all the time and your users are not reporting their sites are being blocked, then it may be an infection. I would like to have you grab me some logs to take a closer look at this. If you would like to this, send me a PM with your e-mail and I will create a support case to look into this further for you. 

     

    -Ron

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.