Jump to content

djacobson

Staff
  • Content Count

    1,298
  • Joined

  • Last visited

Posts posted by djacobson


  1. Farflt.sys is the driver for the Anti-Ransomware / Behavior Protection engine. Restarting the endpoint will release any threads which may be stuck. Disabling the option can help avoid encountering these while the new cause for this is investigated.

     

    Consider as well, many server's need extra configuration of exclusions or what real-time protections are able to be used, this is based on what roles a server may provide.


  2. On 12/11/2018 at 11:16 AM, JPerez1969 said:

    when running an update or a fresh installation install [...] it returns [...] "Managed client software was already installed. The client has not been registered." for all clients that were upgraded or newly installed.

    Having it do that for fresh installs is pretty far outside of what I had been discussing, you said you have a ticket in right now?


  3. Resource usage issues have cropped up over the product's life a few times, but not all causes have been the same thing, despite similar symptoms. One person's solution in this long standing thread may not be applicable to someone else's issue. For those of you reading this in the future, please keep this in mind.

     

    @Kernel009, have a look at what starts on the machines. When a delay helps out with resource usage, it is most often due to competing protection software engines trying to load at similar times, or another program starting up that attracts the attention of one or more protection software real time engines into watching it. This sort of behavior can begin before log on, if that is the case, recording the event with a tool called Process Monitor, in a boot logging mode, can help provide visibility into what is happening at that time.


  4. Hey ML, are you intending to scan for infections or scan for endpoints to which you can deploy the protection portion of the software?

    Scanning for and deploying to clients directly - https://support.malwarebytes.com/docs/DOC-1021
    Video example - https://support.malwarebytes.com/videos/1033

    Alternative deployment, creating an offline client installer package to use with your preferred deployment tool - https://support.malwarebytes.com/docs/DOC-1098

    If the protection side of the software is already deployed, you can set a scanning schedule under Policy -> your policy -> Edit -> Scheduler. To perform an on-demand scan, go to Client -> highlight a chosen machine -> Right click "Run ____ Scan Now".


  5. Old clients should show that 'older version, you can upgrade' message. The other one, 'successful install but fail to register' is long standing, mostly meaningless message. The time-frame for an install to check back into the server is hardcoded, when that time passes, this status is saved and the message is presented, no matter if the check-in was ultimately successful. A re-scan of this same status will show you a different version of the same thing, the 'already installed, has not registered' message, despite a machine showing in the client view as online and communicating.


  6. Thanks! I'm happy you've seen a positive impact @RocksysIT, as an MBMC admin you also now have much more control over the failure action of the agent service, within the General tab option of the policy you can control the start type and recovery options. This had been something which I had personally helped many customers with by using scripts, so I am pretty excited to see that built in to the program now, so much easier!


  7. @RocksysIT The 1.9.0.3671 does install the 1.9 version of the Managed Client Communicator. The agent is separate from the protection. The Anti-Malware, Anti-Exploit and Anti-Ransomware pieces each have their own version numbers. There are plans in the works to bring the protection module pieces up to the version of the product that the Cloud version uses.

    The scope for MBMC 1.9 was meant to bring in the Anti-Ransomware module, allowing it to be centrally managed instead of standalone as it had been before. This was also an opportunity to add various product fixes. Please don't be discouraged, there are more versions to come!


  8. There's quite a few MBES versus MBEP posts in the business section, I'll skip this portion as it is extensive, and Kalrand hit the main point of it. Though I won't leave you empty handed, the most complete way to get an idea of differences would be the check out the admin guides:

    MBES Admin guide - https://support.malwarebytes.com/docs/DOC-1723
    MBEP Admin guide - https://support.malwarebytes.com/docs/DOC-1802

    The GDPR question, we are fully compliant. 

    In MBEP, no user identifying information is saved. The data collected from the machines is the program's operational state, an encrypted version of the file sample we detected if there is a hit, and if we removed it or not.

    MBES is on-premises and integrates with AD, it saves all client info to an SQL database, it is up to the admin to keep this database secure.

     

    @AndrewPP is there anything else you can think of regarding the GDPR question?


  9. Malwarebytes is scheduled to update our cloud platform on November 29, 2018 at 8:00PM EST / 5:00PM PST. We anticipate less than 3 hours of downtime to complete this update. As a customer of this platform, we want to take a moment to familiarize you with the changes that are about to become available.

    With this latest update, we’re continuing to improve our cloud platform for greater scalability and detection efficiency. These features also provide simplified management of common, everyday tasks to save time, while also providing granularity needed for businesses with complex security requirements.
     

    New Features

    • Malwarebytes cloud console now features new user experience improvements for the Exclusions page along with enhanced capabilities. This provides administrators with visibility into exclusion status and enables them to temporarily disable exclusions—saving the previous effort and time spent permanently deleting the exclusion for testing purposes.
      • In a single view, administrators can see whether an exclusion is enabled, the name, the exclusion type, the admin user who last updated it, when it was updated, and the protection technology layers applied to that exclusion:

    Picture1-1.png

    • Exclusions were globally applied across all of our layers of protection technology. Now, you can control which layers the exclusion will be applied to and visually see at a glance which layers have been affected via icons in the “Applied To” column on the Exclusions page. Additionally, you can add an optional comment or description for the exclusion:

    Exlusions-OZ.png

    • Added ability to automatically exclude commonly detected potentially unwanted modifications (PUMs). Malwarebytes detects Windows registry changes caused by common Group Policy Objects as PUMs. Enabling this feature automatically excludes 18 registry keys. This ensures our protection capabilities do not interfere with common business applications or operating practices:

    Picture3.png

     

    Picture4.png

    • Added an endpoint interface option that, when enabled, places shortcuts in the Start Menu and on the Windows desktop of the end-user’s computer. This empowers your users with additional methods to run Threat Scans on their Windows device:

    Picture5.png

    • [For Malwarebytes Endpoint Protection and Response only]: Added an aggressive detection mode policy option for Suspicious Activity. This setting is ideal for businesses with an extremely conservative security posture. We recommend administrators only enable this setting for their most sensitive endpoints:

    Picture6.png

     

    Improvements

    • [For Malwarebytes Endpoint Protection and Response only] Customers with Syslog Logging enabled, Suspicious Activity detections will now be included in your syslog messages
    • Changed our unmonitored email address from no-reply@cloud.malwarebytes.com to do_not_reply@cloud.malwarebytes.com to reduce the chance of Malwarebytes cloud console emails being flagged as spam
    • Fixed: [For Malwarebytes Endpoint Protection and Response only] – When a Remediation action succeeds but Rollback action fails, the Suspicious Activity status is stuck and displays “Pending Remediation”
    • Fixed: The Deployment and Discovery tool would throw a 504 error when importing Active Directory groups that contained a large number of endpoints
    • Fixed: Some temporary files were being left behind after installation or endpoint agent updates
    • Fixed: Customers with large number of endpoints were unable to sort by “Last Seen At” on the Manage Endpoints page
    • Fixed: In some cases, when a reboot prompt is shown, the reboot timer sometimes reset with a 1-minute countdown

     

    Known Issues

    • Exclusions that have been entered with short file name paths such as “c:\progra~2\” are not being applied
    • Modal windows are showing an unnecessary scroll bar
    • [For Malwarebytes Endpoint Protection for Mac only]: Scan History tab does not get information populated if Threat Scan does not detect any threats
    • [For Malwarebytes Endpoint Protection for Mac only]: Timestamps in Scan History tab for macOS endpoints are in GMT, and not the web browser’s locale
    • All Malwarebytes scans will inspect archived files regardless of the policy setting
    • When administrators reboot endpoints from the cloud console, if the initial reboot task has not completed subsequent reboot commands are queued rather than replacing the initial reboot command (this would result in multiple reboots executing)
    • When administrator chooses “Restart Immediately” option in the Restart Options dialog, end users are still allowed to postpone the reboot even though the “Allow user to postpone” option is grayed out. Current workaround involves selecting the “Restart in ___ minutes” radio button, unchecking the “Allow user to postpone” checkbox, then select the “Restart Immediately” radio button and click the blue Restart button
    • Clicking on the Remediate button causes the Remediation Required indicator to lose its badge on hover and on click behavior—nothing happens on click (should give you the option to view details) and nothing happens on hover (should show "Remediation Pending"). This issue is resolved by refreshing the browser
    • Memory and storage objects in endpoint properties are not visible until the page is refreshed
    • The Endpoint Agent can fail to initialize when using the GROUP ID parameter that has an incorrect format
    • [For Malwarebytes Endpoint Protection for Mac only]: Check for Protection Updates action does not update "Last Refreshed" on first run


    Our next cloud platform update is scheduled for January 2019.


  10. Hi everyone! 

    We are pleased to announce our latest update to Malwarebytes Endpoint Security, v1.9! 

    With this latest update we now provide customers with the option to install and uninstall our Anti-Ransomware agent directly from the Malwarebytes Management Console (v1.9) onto customers' Windows endpoints. They will be able to see Anti-Ransomware detections in dashboards, alerts, and syslog events; giving organizations greater visibility with less effort. The console enables administrators to add and remove Anti-Ransomware exclusions to Policies. Also, this new console update lets customers restore Anti-Ransomware quarantined items. Other changes and improvements for Malwarebytes Endpoint Security v1.9 include:

    • Added support for .NET Framework 4.0 and beyond to eliminate endpoint requirement for .NET 3.5
    • Added Breach Remediation for Windows, including Forensic Timeliner (unmanaged)
    • Updated the Anti-Exploit managed client to v1.12 to improve detection capabilities
    • Added real-time protection for Android and macOS endpoints (unmanaged)
    • Implemented several bugfixes (See below the complete list of new features, improvements, and bugfixes) 

     

    v1.9 [Nov 20, 2018]

    New Features

    • Added the option to manage Malwarebytes Anti-Ransomware endpoint agent from the Endpoint Security Management Console, including:
      • Install & uninstall Anti-Ransomware from the Management Console
      • Visualize ransomware detections on many areas of console, email alerts, and syslog
      • Add and remove Anti-Ransomware Exclusions to/from Policies
      • Restore Anti-Ransomware quarantine items 
    • Added unmanaged Breach Remediation, Mac Real-time protection, and Android clients 

    Improvements

    • Changed Sccomm logs for Adhelper to debug mode only

    Stability/Issues Fixed

    • Fixed: Sccomm service does not start on some clients running Windows 10
    • Fixed:  Issue creating temporary file when updating Policies in the Management Console 
    • Fixed: Issue with server memory spike in certain cases during login on Management Server 1.8.1 upgraded from 1.8 
    • Fixed issue with Client tab and Home dashboard showing different number of online clients

     

    How to upgrade

    Download and directions for upgrading can be found on this KB - https://support.malwarebytes.com/docs/DOC-1043

    Don't forget that your client will need to upgrade as well in order to take advantage of the new management features, follow the processes shown here on this KB for how you intend to deploy to your endpoints - https://support.malwarebytes.com/docs/DOC-1198

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.