Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

1 Follower

About AndrewPP

  • Rank
    Regular Member

Profile Information

  • Location

Recent Profile Visitors

2,035 profile views
  1. The tool discovers endpoint names and addresses by a number of methods. When you deploy is when it connects to the endpoint, initially for a file copy, run installer and trigger Management Agent service start. If ping is timing out, then resolve that and ability to file mount, then it should work. Check network settings, public/private to ensure File and Print Sharing is enabled. https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/bb727037(v=technet.10)?redirectedfrom=MSDN (If the endpoints are domain-joined to an ActiveDirectory then GPO/GPUPDATE is an alt
  2. Log shows endpoint is not reachable ErrorMessage:System.IO.IOException: The network path was not found. Domain name: *********.local; IP Address(es): IP Address: 192.168.1.xx, ; : Error: Bad Net Name The D&D Tool uses SMB (445) for file copy RPC (135) for kicking off process, or alternatively WMI. 1. Try running D&D Tool from a workstation on the same LAN segment, if you have a segmented/routed network 2. Ensure endpoint is PING-able 3. Recheck hostname and IP addresses match i.e. DHCP/DNS/AD all line up 3. Get the file share working with Windows basic comman
  3. Hi Alex, as you are a New Zealand partner, let's discuss directly. I will drop you an email. Andrew Probert Senior Sales Engineer, CISSP Australia and New Zealand Malwarebytes
  4. In future, this would be better forum topic to use for Malwarebytes Endpoint Security Console. Https//:forums.malwarebytes.com/forum/230-malwarebytes-management-console/ Use [Register] and re-input your license keys again to re-verify console. Support will get back to you.
  5. https://support.malwarebytes.com/docs/DOC-2672 Support This is a user community shared utility. Please post questions and comments on this Forum thread. You can also send requests to the author directly. Lee Wei (lwei@malwarebytes.com)
  6. Minor note - EMET is end-of-life - https://support.microsoft.com/en-au/help/2458544/the-enhanced-mitigation-experience-toolkit
  7. Lee Wei, the VP of Solution Engineering is the real MVP on this one. I'm just telling you about his work. LOL.
  8. Agent checkin time defaults to every hour (minimum) and it set by policy in the cloud console. Some additional filters are being added to the Cloud console, watch for monthly announcements.
  9. Refer to this support topic - https://support.malwarebytes.com/docs/DOC-2914
  10. Asset scans updates the lists of software, updates and startup programs. It picks up information from the endpoint's registry. It can be run on demand or scheduled. Endpoint activity of Last Seen/Last communication time relates to when the Malwarebytes Management Agent last checked in. When online via the Internet, the endpoints are checking in continuously. Endpoints are added to lists upon installation and initial registration. Thereafter, they are tracked until deleted by console our uninstalled triggered at the endpoint. Use the Excel plugin for more sophisticated reportin
  11. Malwarebytes traffic is TLS encrypted, always outbound to identified servers. There is nothing inspectable and we disallow interception. Malwarebytes runs as a 'SYSTEM' proxy. The resolution most customers use, is to configure to pass-through of the proxy to Malwarebytes' servers, only.
  12. There is a sophisticated Excel-based Reporting tool on the support site, as a plugin. It meets the requirements stated above. It has 'slicers' to drill in. It has scheduling. It has bulk editing and actions back into console. It logs in and 'pulls' the data. https://support.malwarebytes.com/docs/DOC-2672 Enjoy!
  13. I am on Malwarebytes' staff, in technical PreSales. I see this question asked often, so I am providing a comprehensive response, for you and reference by others too. Your question, in essence, is seeking peer advice about Malwarebytes from existing customers. There are already excellent sources of independent peer review from substantial customers, especially at Gartner PeerInsights (Gartner are a renowned authoritative source of information about the IT industry at-large). Malwarebytes independent reviews at Gartner PeerInsights(tm) https://www.gartner.com/reviews/market/endpoin
  14. Use the Malwarebytes Excel plugin. It can extract endpoint lists and do deletions. https://support.malwarebytes.com/docs/DOC-2672 Also, you can filter by last seen. It is safer to not delete, if still checking in.
  15. Information about the Endpoint Protection client and its check in frequency, plus a lot of other stuff is in this article on the support site, which describes a lot about its workings - Endpoint Protection - Windows client fundamentals
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.