Jump to content

Search the Community

Showing results for tags 'configuration'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes for Windows Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • Malwarebytes Privacy
    • Malwarebytes Browser Guard
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Endpoint Protection
    • Malwarebytes Incident Response (includes Breach Remediation)
    • Malwarebytes Endpoint Security
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 6 results

  1. Dear Forum, does Malwarebytes Premium 3.0 function as a firewall? For example, in the same way that Windows Defender is a firewall? Or do people suggest that I configure the Windows Defender Firewall, or will Windows Defender firewall conflict with Malwarebytes? Thanks!
  2. A Request for Wisdom ...... My "backup" phone is on the low end of the hardware capability spectrum for Android devices: 512MB RAM, 8GB ROM, 1GHz processor, etc.. If I set up MB to do "everything" - the way my primary phone is set up - the phone frequently spends much if not all of its time updating and running MB, and at times pretty much grinds to a halt for everything else. VERY safe. VERY un-usable. SO --- HOW BEST to configure MB so that it becomes a manually invoked, on-demand app rather than an always active automated background process. YES, I would prefer the latter, bu
  3. Hi, I've installed MBAM on a computer with numerous mapped drives, however, when I attempt to set up a custom scan, I see that MBAM apparently doesn't see any of the mapped drives. The drives appear, of course, when I display 'Computer' or run 'net use'. Any assistance greatly appreciated. Apologies if there is more data that I should be attaching here...
  4. Greetings, Please update your product to allow the secure functionality of Private Internet Access. While both applicatios have the same goal, to protect the user, you are both clashing with each other here. I know there are existing feature requests realted to this topic but this is really becoming an issue. Malwarebytes is an outstanding product and It has saved me a lot of time and provide peace of mind for some time now. I can not run your application and have Private Internet Access using Open VPN and their assoicated randomizing scripts becasue MalwareBytes wants to block every inst
  5. A team member recently tried to help me with a problem on my machine. This caused two problems in itself. First, the fix routines make MANY changes to a computer’s configuration, if only to establish a base starting point to work. However, users change their preferences over years of time, starting with the install process. There doesn’t seem to be a user-readable log of changes made – essentially an ‘I changed this setting from this to this’ and ‘I deleted this’ so that the user could restore individual settings if desired when done. I now have folders that I expect to show that aren’t sho
  6. related to http://forums.malwarebytes.org/index.php?showtopic=107845 , i ask how to configure mbam to ignore the incoming and outgoing messages of avast and uTorrent. relatedly(?), i came across what appeared to be a relevant configuration option: action for p2p software, under the Settings tab of the Scanner / Main Menu window; mbam offers three options: do not show in results list show in results list and check for removal show in results list and do not check for removal if this p2p-results list is relevant, then please define 'results list,' and what are the consequences (indeed, what is
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.