Jump to content

Using as stand alone product


Recommended Posts

  • Staff

***This is an automated reply***

Hi,

Thanks for posting in the Malwarebytes 3 Help forum.

 

If you are having technical issues with our Windows product, please do the following: 

Spoiler

If you haven’t already done so, please run the Malwarebytes Support Tool and then attach the logs in your next reply:

NOTE: The tools and the information obtained is safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download Malwarebytes Support Tool
  • Once the file is downloaded, open your Downloads folder/location of the downloaded file
  • Double-click mb-support-X.X.X.XXXX.exe to run the program
    • You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent.
  • Place a checkmark next to Accept License Agreement and click Next
  • You will be presented with a page stating, "Welcome to the Malwarebytes Support Tool!"
  • Click the Advanced Options link
    welcome mbst.png
  • Click the Gather Logs button
    gatherlogs.png
  • A progress bar will appear and the program will proceed to gather troubleshooting information from your computer
  • Upon completion, click OK
  • A file named mbst-grab-results.zip will be saved to your Desktop
  • Please attach the file in your next reply. Before submitting your reply, be sure to enable "Notify me of replies" like so:
     notify me.jpeg  

    Click "Reveal Hidden Contents" below for details on how to attach a file:
    Spoiler

    To save attachments, please click the link as shown below. You can click and drag the files to this bar or you can click the choose files, then browse to where your files are located, select them and click the Open button.

    _mb_attach.jpg.a0465aaafd6cae688aa38ab16

One of our experts will be able to assist you shortly.

 

If you are having licensing issues, please do the following: 

Spoiler

For any of these issues:

  • Renewals
  • Refunds (including double billing)
  • Cancellations
  • Update Billing Info
  • Multiple Transactions
  • Consumer Purchases
  • Transaction Receipt

Please contact our support team at https://support.malwarebytes.com/community/consumer/pages/contact-us to get help

If you need help looking up your license details, please head here: https://support.malwarebytes.com/docs/DOC-1264 

 

Thanks in advance for your patience.

-The Malwarebytes Forum Team

Link to post
Share on other sites

Greetings,

You may use it either way.  Malwarebytes 3 Premium with all of its layers of protection should be sufficient on its own, however it has also been designed in such a way that if you do wish to continue to run a traditional AV alongside it like Windows Defender or Kaspersky you may.  Please refer to this FAQ entry for additional information.

Link to post
Share on other sites

That's correct, it is not an antivirus, however modern day threats aren't viruses either so an actual antivirus isn't the most effective means of protection.  The various layers in Malwarebytes 3 are designed to deal with today's threats, not only by targeting malware files, but also by utilizing several signature-less technologies to stop attacks throughout the various phases of the attack chain which is especially effective since virtually all modern threats are blended attacks using multi-stage attack vectors, with the vast majority utilizing exploits; something that Malwarebytes is extremely effective against thanks to its Anti-Exploit layer and system hardening layer which both deflect as well as detect and stop exploit based attacks including browser exploits as well as malicious script based attacks and maliciously coded documents and similar threats.  The other layers in Malwarebytes extend that protection even further by blocking the sources of malware via Web Protection to stop malvertisements used for exploits and drive-by downloads as well as the servers where malicious binaries are hosted and the command & control servers used by the bad guys for sending out commands to their botnets and Trojans and for retrieving data exfiltrated from systems of infected users (as with password stealers and keyloggers) and the more traditional Anti-Malware layer uses not only traditional threat signatures like an AV, but also includes more advanced heuristics signatures and threat pattern algorithms to identify both known and unknown threats and the recently activated signature-less anomaly detection engine which targets unknown and new malware using cloud based machine learning (what most AV vendors refer to these days as "AI", though technically speaking there is no such thing as true Artificial Intelligence in software at this time) which becomes smarter the more files it analyzes over time.  Lastly is the Anti-Ransomware layer which monitors all processes and threads in memory for ransomware behavior to detect and stop any ransomware attacks should they successfully get past the other more proactive defenses.

Then of course there is the scan engine which uses smart signatures, heuristics and many of the same techniques as the Anti-Malware real-time protection layer to detect any threats that might already be installed/active on the system and it also includes a special component called Linking which uses intelligent threat installation data to locate all the components of an installed threat using individual trace detections to expose an infection's entire installation.  Also, optionally (if activated in Malwarebytes' settings) there is the Anti-Rootkit engine which looks for active rootkits on the system during scans, checking the drivers, processes in memory, data on disk as well as the boot files/partitions to search for and detect active rootkit infections to remove them.  The remediation engine also uses DOR (Delete On Reboot) technology to ensure comprehensive and effective removal to rip malware out of the system early during the boot process when infections aren't able to protect themselves from being cleaned.  Malwarebytes also includes several automated repair routines so that when a rootkit is detected, if it is one of those known to do damage to any system components such as System Restore, the Windows Firewall, several network components used for getting the system online, and system services, they are repaired automatically during cleanup so that the system is back to running normally after an infection by any of these rootkits.

Additional information on the various layers in Malwarebytes 3 and how the work to effectively protect your system may be found on this page.

Edited by exile360
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.