Jump to content

Recommended Posts

Greetings,

Please refer to the Real-Time Protection section of this support article where it says Exploit Protection.  Once there within settings, locate the bullet point which says Exploit Protection, then in settings in the UI click the link Manage Protected Applications and use the Add button shown in the image in the Protected Applications list to add calc.exe as a shielded app so that Exploit Protection will monitor it since this is the process used by the test tool.  Once it has been added you should be able to run the test and see a detection.

Additionally, you may also test Web Protection by visiting iptest.malwarebytes.com which should result in a block along with a browser redirect to the Malwarebytes block information page indicating why the site was blocked.  You may also ping the site or its IP if you want to test non-browser processes; any connection to or from the site should be blocked system wide and this is true for any sites categorized as threats by Malwarebytes.

Testing the core Malware Protection component should be fairly straightforward; pretty much any common Potentially Unwanted Program such as a bundled installer, junk registry cleaner/system optimizer or similar apps (the scammy ones that show tons of "critical" issues but require payment to "fix" them for you) along with driver updaters and other snakeoil type apps.

I hope this helps.

Link to post
Share on other sites

On 7/17/2020 at 6:10 PM, exile360 said:

Greetings,

Please refer to the Real-Time Protection section of this support article where it says Exploit Protection.  Once there within settings, locate the bullet point which says Exploit Protection, then in settings in the UI click the link Manage Protected Applications and use the Add button shown in the image in the Protected Applications list to add calc.exe as a shielded app so that Exploit Protection will monitor it since this is the process used by the test tool.  Once it has been added you should be able to run the test and see a detection.

Additionally, you may also test Web Protection by visiting iptest.malwarebytes.com which should result in a block along with a browser redirect to the Malwarebytes block information page indicating why the site was blocked.  You may also ping the site or its IP if you want to test non-browser processes; any connection to or from the site should be blocked system wide and this is true for any sites categorized as threats by Malwarebytes.

Testing the core Malware Protection component should be fairly straightforward; pretty much any common Potentially Unwanted Program such as a bundled installer, junk registry cleaner/system optimizer or similar apps (the scammy ones that show tons of "critical" issues but require payment to "fix" them for you) along with driver updaters and other snakeoil type apps.

I hope this helps.

Perfect !

You have answered my question.

Thank you so much for the help.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.