Jump to content

WORKS2016

Members
  • Content Count

    17
  • Joined

  • Last visited

About WORKS2016

  • Rank
    New Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Spoke to soon, it's the in the previous document you shared. %PROGRAMDATA%\Malwarebytes Endpoint Agent\Plugins\EDRPlugin\Restored Files
  2. thank you dcollins, exactly what I needed. Any idea where I can get information on the cache folder? Where's it's located, what type of file or database file it is. I would like to change the setting between time and file size and see how much the folders grow in size. Thank you.
  3. Have allot of potential clients asking how rollback works. Can anyone shed light on this for me? Some questions are what technology does rollback use, does it take up drive space and CPU resources?
  4. Great, thank you I'll search the posts. Any other sites areas to search?
  5. There's a nasty email going around using a password they hacked from another company to attempt to extort money from me. For example, I got an email stating someone accessed my account using a password that shockingly is one I've used before. So, immediately they have my attention. I happen to use a password vault so it was easy to determine where I used it and narrow down what was really going on. Turns out the password was a basic password I used years ago on a site that was irrelevant, for example, I made a one-time payment and didn't have anything else on file. Even if someone got access there was nothing that would affect me. Didn't use the password anywhere else. This company got hacked and the keychain compromised, the hackers then took my email and password and attempted to trick me into thinking my computer was hacked, they have all my data, and they wanted me to pay a ramsome. Not sure how legit this site is https://haveibeenpwned.com/ which claims to check if your email address was involved in a data breach which companies are involved. What are others using to research this? My clients are now getting this same email and it's concerning for them, for obvious reasons, and I want to give them a well-rounded answer. Not just you're fine and this is spam. Of course, I want to know this information for my ongoing research involving cybersecurity. Thank you.
  6. Never installed Endpoint Protection on a VM, any objections? Running 2012 Server Standard with two VM's. One is the PDC the other is the Exchange server. I read installing on the PDC can create issues with DNS and DHCP and some configuration, mainly exclusions are recommended. Didn't matter if the PDC was a VM or not. How about a VM / Exchange server? Any issues that it's a VM and does it interfere with mail flow, the information store, etc? Thank you.
  7. Trying to add an additional user to the portal and get the following error "Refusing to fulfill request" any ideas? Note, I've used the email account in another portal and suspect this may be why it can't be used again. If this is the case managing multiple clients portals this will be disappointing. Hope it's not the case. Thank you.
  8. @CHMOD_777 my post is about clarification. I need to know 100% Malwarebytes on it's own rolls back encrypted data to a prior safe state and entirely independent of 3rd party backup solutions. It's hard to test this without getting an infection. Does Malwarebytes rollback the data or does it rely on a 3rd party backup solution? Thank you.
  9. WORKS2016

    Reporting Not Working

    The spam filter was the issue. How about setting up an alternative email address, is it possible? Thank you.
  10. Cloud portal, Reports On-Demand: Select generate report changed to "Request Submitted" but nothing never happens past this point. Scheduled: I have daily, weekly, and monthly reports selected but never receive any reports. Is there a way to change the email address or add another email address to send reporting to? I assume it goes to the email on file under profile settings. Thank you.
  11. WORKS2016

    Experiencing High Resource Usage

    Hi everyone, I just started rolling out Malwarebytes trials and this thread has me concerned for obvious reasons. I know you're busy finding a resolution and hope you don't mind me asking several questions? How long did Mbytes work prior? Does anyone feel installing MBytes on a server slows down network performance? Thank you in advance.
  12. By definition Ransomeware Rollback: Up to 72 hours of protection for files encrypted, deleted, or modified by a ransomware attack. Is this a built in feature of Malwarebytes entirely separate from our current backup solution? Or, does Malwarebytes create logs that allow me to determine what time in the last 72 hours the ransomeware attack happened. Then I would use my backup to restore to this point. Hard to test without an actual ransomware attack :-) Thank you.
×

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.