Jump to content


  • Posts

  • Joined

  • Last visited


0 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Ohh goodness, we have expended DAYS on this. Multiple users started reporting Outlook crashing. One of them was nearly all the time so we treated her as a new starter, backed up her data and re-created her M365 account - treated as a new starter. No difference. I was just updating the directors on the problem when MWB occurred to me. I forgot the basic IT mantra - when something weird is going on, blame the virus scanner... My client uses Nebula - is there a similar setting in there? Or should I raise a business support ticket? I am hoping and praying this is the problem in the business version as well...
  2. The software version number reported in the endpoint report for Office is incorrect. This is how it's reported in Malwarebytes: https://i.imgur.com/un4TqCN.png (build 11929.20562) but this is the actual version installed: https://i.imgur.com/Rv8NIxc.png I suspect the version reported is that when the software was installed. Not checked any of the other packages yet. Is this a problem with our set-up or a bug/deficiency in the software?
  3. Answering own question: I've just gone through the console and I've just found this setting in the default policy. I've just changed it to "Never register Malwarebytes in the Windows Action Center" assuming this is the same option as the standalone version of the program. Please to report that changing the policy was almost instant as I had the test VM open and spotted it reporting "No virus scanner" as soon as I saved the policy.
  4. Just install latest MWB MSI from our Nebular cloud and it's made itself the default virus scanner. We don't want this AT ALL! Why has it done it, how to we stop the MSI install doing this in future and how do we switch on systems where it's done it without our knowledge? Open app does nothing BTW. And on Manager Providers, there is no way to turn Microsoft Defender back on:
  5. Does Nebula have any kind of alert system, maybe receiving an email? I'm thinking for when remediation is required, computer not reported in for (say) >20 days, multiple/severe new detections on an end-point.
  6. Sorry Maurice - never got back to this topic to say "Thanks". The option you describe works a treat.
  7. My client would like to block wetransfer.com. Is this possible via the Nebular cloud console?
  8. It's a shame that MWB hasn't got this feature, esp. in the Nebular cloud version. My client wants to block wetransfer and centrally via the console would be the ideal place to do this. They are missing a trick there IMO as I have to justify MWB each renewal and starting to merge into blocking system like OpenDNS would seem to sit well with the product's aim.
  9. I've asked on StackOverflow if there is an alternative RegEx engine for use in Excel VBA.
  10. Thanks Maurice - I'll give this a go. Interestingly, this only occurs with the consumer version of Malwarebytes. My client, who uses this Excel app, has the commercial licensed version of Malwarebytes and they haven't had problems there.
  11. >I would definitely recommend blocking VBScript and switching over to PowerShell if possible This is Excel application written in VBA, not a script so switching to PowerShell isn't an option. I've never been a big fan of VBScript anyway - adopted PowerShell years ago. The problem here appears to be the use of the Microsoft VBScript Regular Expressions DLL from within VBA, not VBscript as such. Stored in C:\Windows\SysWOW64\vbscript.dll\3 It's this DLL that's being blocked, not VBScript itself. But maybe that's the only way Malwarebytes can block VBScript and has this as a side effect. We're only using this DLL in VBA for regular expressions. There might be another DLL/library for regular expressions that we could switch to with little effort.
  12. Attached is the log. And this is a view of the error message: https://i.imgur.com/RITu6Bl.png vbscript.txt
  13. I make heavy use of Excel macros - like all the time. Malwarebytes is blocking access to C:\Windows\SysWOW64\vbscript.dll from VBA which means the macros stop running. This is the specific bit of code which is pretty innocuous: Dim RegEx As New VBScript_RegExp_55.RegExp RegEx.IgnoreCase = True No problem I thought, I'll add an exception for this file but this doesn't allow the script to run: https://i.imgur.com/hZ0gmfl.png Any ideas? Can't even work out how to turn off application hardening?
  14. BTW - can you not edit posts on this forum? Just noticed I got the subject title wrong at the very start...
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.