Jump to content

djacobson

Staff
  • Content Count

    1,298
  • Joined

  • Last visited

Everything posted by djacobson

  1. Hi @BANGO, let's take a peek at that machine, that process involved is a hint that there may be an infection we will need to deal with. Frst Log Please follow the steps below to run frst. 1.) Download frst and frst64 from the link below and save it to your desktop: FRST 32-bit version: https://downloads.malwarebytes.com/file/FRST FRST 64-bit version: https://downloads.malwarebytes.com/file/FRST64 Note: You need to download the version compatible with your system. If you are not sure which version applies to your system, download both of them and try to run them. Only one of them will run on your computer; that will be the right version. Some traditional Anti-Viruses may false positive the download or running frst, I can assure you it is safe. If this happens, please temporarily disable the AV. 2.) Double-click the purple frst or frst64 icon to run the program. Click Yes when the disclaimer appears. 3.) Click the Scan button 4.) When the scan has finished, it will make 2 log files in the same directory the tool is located, frst.txt and Addition.txt. Please attach frst.txt and Addition.txt in your reply.
  2. @Kalrand are you on MBMC or MBEP (cloud)? If you are on cloud, there are concerns for Exchange:
  3. Yes, sort of. You cannot edit existing groups to be nested, you can only nest when making a new group, however you can nest the new group under already existing groups.
  4. That is one of the versions the install will now default to, the other is 3.1.8.1830. The 3.3.2.2243 is pulled.
  5. That's what this forum is for, not the documentation. The technical writing team is not going to add a note in the documentation for a bug in the product that wasn't intentional. This was discovered by an agent helping a customer during a call. A more graceful failure for incorrectly input exclusions is being worked on. The update was supposed to be part of the recent push, but as you guys may know, that update was pulled for the restart looping. You will not be able to tell what exclusions are failing with a normal log collection process, the application must be put into debug mode, create a support ticket for how to do that, the process is not shared publicly. If you already know how to do that feel free to let it rip, it will list the entry that is failing. Note that it can be pretty tedious to do this as you need to wait for the changes to get pulled down to the machine so you can see what the next failing entry is, keep this up until you have all of them. Some tips for exclusions on cases where we have seen this problem: Keep your exclusion entries case sensitive. Only use wildcards in the "Exclude a file by path (Windows & Mac)", "Exclude files or folders by wildcards (Windows)" and the "Exclude a registry key (Windows)" areas. Keep exclusions to one entry per exclusion, do not try to stack a bunch of entries on one line separated by commas. We see this most often with file extension exclusion attempts.
  6. Tony, have you added any new exclusions? EP will stop on incorrect exclusions and fail to continue to process the rest, if a new one is not processed right it could make the rest not be able to apply.
  7. Upgrade reboot loop The Malwarebytes Support team is aware of an issue that is currently impacting some of our customers. When upgrading from the earlier release to the December release, some customers are continuously receiving restart messages to complete the upgrade, even after restarting multiple times. Please be aware our engineering team is working on a resolution to this issue. If you have been impacted by this issue please follow the steps below to rectify: 1. Stop Malwarebytes Endpoint Agent Service 2. Uninstall Malwarebytes 3.3.2 from appwiz.cpl (add/remove programs) 3. Install Malwarebytes 3.1.8 using the installer in this box link: https://malwarebytes.box.com/s/21p0wuszmymn9vri8lkkxdz131zpwnwr 4. Start Malwarebytes Endpoint Agent Service We apologize for this inconvenience and thank you for your patience!
  8. Upgrade has been halted! Any machines in the restart loop, uninstall, restart and then reinstall, the machine will pull down the prior 3.1.8 version. 3.3.2 version upgrade is suspended until the issue can be fixed.
  9. Hi guys, the main cause of this is an older Malwarebytes install still on the machine when cloud was deployed. It is preventing the update, run the tool below and I can confirm. Malwarebytes Check Log Please download and save our diagnostic tool, mbam-check.exe, to your desktop from this link. Malwarebytes Check Tool Double-click mbam-check.exe to launch the tool. A black command prompt window will briefly appear, and then a log file will open. The log which opens will be saved to your desktop as CheckResults.txt. Attach this file.
  10. Nebula downtime 12/20/17, 10pm ET Configuration changes to production planned for tonight at 10:00pm ET. This will require multiple backend services restarts, which will result in downtime. During this time you will see the maintenance page when navigating to cloud.malwarebytes.com. Protection functionality will still be active and scheduled scans will continue to run.
  11. The exclusions in the GPO look solid, the procmon confirms that as well since MBAM and Defender are not interacting with each other, but Defender is looking at the files that MBAM's realtime engine touches on during the user's interaction with those files. That is normal and to be expected with multiple security software program's in place. Pedro can stop harping on you about the Defender exclusions I'm hoping the CSC exclusions will work out, so I look forward to your feedback on that. If that doesn't work, a new procmon should be captured and we will escalate the case to our dev team to identify if the issue is any deeper, such as a new incompatibility with your redirected profile locations. The MBAM 1.80 and older engine is already known to have major issues with things running from and writing to non-local drive locations.
  12. Yes, I mean for those items to be ignored in your Anti-Malware by way of your MBMC console. From what I saw in the procmon, Anti-Malware is watching your profile caching very intently, the ignores should have it disregard the cache location and processes involved, except for svchost, it is not a good idea to ignore that one. Also ignoring the Windows Defender engine process, security software exclusions should be mutual. When adding the Malwarebytes processes to Defender, did it complain about any of the path names? I know it can fuss about the apostrophe in the name, did you use an 8.3 name to get around that?
  13. Add the following to Policy -> your policy -> Edit -> Ignore list C:\WINDOWS\system32\SearchProtocolHost.exe C:\WINDOWS\system32\SearchFilterHost.exe C:\WINDOWS\system32\ctfmon.exe C:\ProgramData\Microsoft\Windows Defender\platform\4.12.17007.17123-0\MsMpEng.exe C:\ProgramData\Microsoft\Windows Defender\platform\* C:\Windows\CSC\v2.0.6\namespace\vsi.local\private\users\*
  14. Are there any other roaming profiles on this machine? If so, how many?
  15. In having the other processes turned off, we can also determine if it is something else they are running that is part of it, because if it can't be replicated with the other software off, that's a big clue that the conflict lies elsewhere. I understand this is a business, that is what those of us in the B2B side are here to help with, but I don't expect the instructions to be blatantly disregarded. From your description of the issue, its widespread enough to choose another machine to test on if the process is going to interfere with that particular end users day.
  16. This machine has roaming profiles, is this an RDS client? \\vsi.local\private\users\hcopeland\Desktop and C:\Windows\CSC\v2.0.6\namespace\vsi.local\private\users\hcopeland
  17. I can see teamviewer (if you are using it to connect to it, that's fine) is still running, quickbooks, windows phone sync tool, something called meditech and eclinical works, flash player, onedrive, outlook, word, and adobe acrobat. I am serious that everything else must be turned off.
  18. @itlifesaver we'll need to record in a different type of way Procmon Log I’d like to have you run a tool called Process Monitor, ProcMon for short, that will capture all of the events that happens during the issue. Please follow these steps: Download ProcMon from this link: http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx Extract ProcMon to your desktop Turn off all other programs except Malwarebytes, leave it running in the tray - this part is important, do your best to end all other processes Double-click procmon to run it Once ProcMon begins running, reproduce your issue with the laggy mouse/keyboard action When you get the error, go to ProcMon and click File → Capture Events (this should be checked by default, we want to uncheck it to stop the capture) Afterwards, still in ProcMon, click File → Save, leave the “Events” as default but you can change where the log goes at the bottom. Save the ProcMon log in default or somewhere you are familiar with, like your desktop. Try to attach the ProcMon log
  19. Hi @BANGO, is there a website that was attempted to be visited? This IP points back to *daniel2you . com set of domains and is blocked for hosting Trojan.DarkComet malware. https://www.virustotal.com/#/domain/newdarkcomet.daniel2you.com
  20. Does it happen reliably enough to record? @itlifesaver
  21. I want to see if it is related to an older conflict with prefetch, while it is typical to disable prefetch for machines with SSD's, the conflict isn't related to SSD's, it is with prefetch functionality itself. Superfetch is not part of it.
  22. Roaming and remote clients are not supported by the Management Console. They need to be on the internal network to be seen by the utility, though you can create an offline install in Policy \ Installation Package to get it on the machine, however, the install will not be able to check-in until that machine comes back into the network.
  23. @itlifesaver, can I have you try disabling prefetch on one of the machines and see how it behaves?
  24. Malwarebytes cloud platform update - December 18, 2017 Malwarebytes updated our cloud platform on Dec 18, 2017 at 8:00PM EST / 5:00PM PST. As a customer of this platform, we want to take a moment to familiarize you with the changes that are about to become available. New Features: Added exclusion support for Exploit Protection in Malwarebytes Endpoint Protection: This enables administrators to enter the MD5 hash of a file they’d like excluded from protection. Click on the Settings tab in the cloud console, choose Exclusions, select New, then scroll down and click the circle for “Exclude a file from Exploit Protection (Windows)” and type in the desired MD5 hash: Added new on-demand reports for Quarantine and Endpoint summaries: Administrators can request a CSV format export of quarantined items and endpoint records for the previous 24 hours, 7 days, or 30 days. Click on the Reports tab in the cloud console, then click the “Generate Now” link for the desired report. The request is placed into a queue for processing. When the report is ready, an email with a link is sent to the requestor’s email address allowing them to download the desired report: Added support for nested Groups: This provides administrators the flexibility to create an organizational structure in the cloud console that reflects their real-world environment (e.g., different businesses, business units, departments, locations). Click on the Settings tab in the cloud console, choose Groups, then click on the Add button. Type in the new Group Name, select the security policy for this group, and select the box to nest this group within an existing group Added a scan progress dialogue window for Malwarebytes Endpoint Protection: When a user initiates a Threat Scan, they will see the details of all scan phases, files being scanned, number of items being scanned, elapsed time, and threats identified on their endpoint. They also have the option to cancel their Threat Scan in this dialog window Improvements:  Display selected Detection Details and Quarantine Details in their own modal dialog window  Added new detection data fields within Detection Details (where applicable) for the group name the endpoint belongs to, IP address, and port number  Enhanced cloud console Endpoint page by converting the list of Group names to a simple drop-down selector with filter capabilities:  Updated Malwarebytes Discovery and Deployment Tool to warn if disk space is unavailable for installation on remote endpoint (To be released on 12/20)  Updated Malwarebytes Discovery and Deployment Tool to display an error if download server cannot be reached (To be released on 12/20)  Reduced Endpoint Agent error logging to only log unrecoverable errors  Fixed: macOS tray icon tool tip doesn’t reflect policy setting  Fixed: Inconsistent verbiage when no threats or infections are found in the console  Fixed: Renamed “NebulaAgent” to “EndpointAgent” in macOS logs to maintain convention  Fixed: Incorrectly formed exclusions prevent subsequent exclusions from being applied  Fixed: Endpoint Agent Tray exceptions when switching between user accounts while an active scan is running  Fixed: User-initiated scan UI Time Elapsed field resets when logging into a different user account  Fixed: Visio 2010 uninstall string causes installed software list to not populate correctly  Fixed: Malwarebytes Discovery & Deployment Tool would show a failure even if the agent was successfully installed  Fixed: macOS handling of GMT (+0000) time  Fixed: Web Protection will prevent web traffic for some customers who connected to a VPN. If you experience issues, please contact Malwarebytes Customer Success team with your VPN details for assistance  Fixed: If an exclusion was entered incorrectly, the Endpoint Agent would ignore any subsequent exclusions Known Issues:  We are not currently listing the MD5 hash for processes that Exploit Protection detects. In order to add an Exploit Protection exclusion, administrators must calculate their own MD5 hashes. Our next cloud platform update is scheduled for January 2018.
  25. @Koushik we can answer here, and it likely has to do with part of your mbam's realtime not loading properly, but I would encourage you to use your pre-sales support options available to you while in a trial. Your sales agent can connect you with the needed SE (Sales Engineer) resource.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.