MALWAREBYTES PLUGIN DOCUMENTATION

Similar documents
Kaseya 2. User Guide. Version 1.1

Malwarebytes Anti-Malware 1.42

8x8 Virtual Office Telephony Interface for Salesforce

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command Document Revision History... 10

Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version September 2015

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

Upgrading MySQL from 32-bit to 64-bit

Malwarebytes Anti-Malware User Guide Version March 2016

LabTech Integration Instructions

8x8 Virtual Office Salesforce Call Center Interface. Administrator Guide. October Salesforce Call Center Interface

User Guide - escan for Linux File Server

escan SBS 2008 Installation Guide

Stellar Phoenix Exchange Server Backup

AV Management Dashboard

ESET Mobile Security Windows Mobile

Vodafone PC SMS (Software version 4.7.1) User Manual

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

BackupAgent LabTech Integration Installation and Usage

NMR HTTP/FTP Data Download Package

Net Protector Admin Console

webkpi SaaS ETL Connector Installation & Configuration Guide

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

Avalanche Site Edition

User Guide. SysMan Utilities. By Sysgem AG

QUANTIFY INSTALLATION GUIDE

EM Single Sign On 1.2 (1018)

Practice Fusion API Client Installation Guide for Windows

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

Receiver Updater for Windows 4.0 and 3.x

Pcounter Web Report 3.x Installation Guide - v Pcounter Web Report Installation Guide Version 3.4

ACTIVE DIRECTORY DEPLOYMENT

Tool for Automated Provisioning System (TAPS) Version 1.2 (1027)

Phone Inventory 1.0 (1000) Installation and Administration Guide

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

ecopy ShareScan 5.0 SQL installs guide

Active Directory Integration for Greentree

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Setup Instructions. For StatBroadcast s Broadcastr and StatCrew Legacy. Last Rev: July 17, 2015 StatBroadcast Systems

Sophos for Microsoft SharePoint startup guide

WhatsUp Gold v16.1 Database Migration and Management Guide Learn how to migrate a WhatsUp Gold database from Microsoft SQL Server 2008 R2 Express

There are numerous ways to access monitors:

WhatsUp Gold v16.3 Installation and Configuration Guide

Using an Edline Gradebook. EGP Teacher Guide

DocAve Upgrade Guide. From Version 4.1 to 4.5

Introduction to Google Apps for Business Integration

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

2X ApplicationServer & LoadBalancer Manual

FlexSim LAN License Server

WhatsUp Gold v16.2 Database Migration and Management Guide

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

Advanced Configuration Steps

Inventory Manager. Getting started Usage and general How-To

Administering Jive for Outlook

BaseManager & BACnet Manager VM Server Configuration Guide

Internet Explorer Settings for Optum CareTracker

Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

Installation Guide: Delta Module Manager Launcher

Notices. Copyright 2016 Malwarebytes. All rights reserved.

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

Deployment Guide: Transparent Mode

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Security Class Config. Work With Tickets. Shared Hyperlinks Manage Groups. Time and Timers. Timekeeping. Overview. Manager. Ticketing. Trending.

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Configuration Information

Exclaimer Mail Archiver User Manual

STEPfwd Quick Start Guide

Juniper Secure Analytics Release Notes

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Setting up a Scheduled task to upload pupil records to ParentPay

User Guide. Version R91. English

WordPress Security Scan Configuration

Contents Release Notes System Requirements Administering Jive for Office

Release 2.0. Cox Business Online Backup Quick Start Guide

2. Installation and System requirements

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Zanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1

System Administration Training Guide. S100 Installation and Site Management

Anti-Spyware Enterprise Module software

Common SofTest Troubleshooting Techniques

NetBrain Enterprise Edition 6.0a NetBrain Server Backup and Failover Setup

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Lenovo Online Data Backup User Guide Version

WebSphere Business Monitor V7.0 Business space dashboards

1 Intel Smart Connect Technology Installation Guide:

Configure Single Sign on Between Domino and WPS

SonicOS Enhanced Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007

GUARD1 PLUS SE Administrator's Manual

BIGPOND ONLINE STORAGE USER GUIDE Issue August 2005

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

Getting Started with Vision 6

Parental Control Setup Guide

PC Troubleshooting Steps

TANDBERG MANAGEMENT SUITE 10.0

Global VPN Client Getting Started Guide

Malwarebytes Endpoint Security Quick Start Guide Version September 2015

Video Administration Backup and Restore Procedures

SecuraLive ULTIMATE SECURITY

Transcription:

Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens... 8 System Dashboard... 8 Settings Tab... 8 Client Licenses Tab... 9 Global Ignore List Tab... 10 Policy Manager Tab... 10 Deployment History Tab... 12 Client Screen... 13 Home Tab... 13 Computers Tab Anti-Malware... 14 Computers Tab Anti-Exploit... 15 Deployment Tab... 16 Quarantine Tab... 17 Ignored Items Tab... 17 Location Screen... 18 Deployment Tab... 18 Computer Screen... 19 Status Tab... 19 Scan History Tab... 19 Threat History Tab... 20 Quarantine Tab... 20 Ignore List Tab... 21 Policy Management... 22 Custom Policies... 22 Default Policy... 23 Silent Policy... 24 Aggressive Policy... 25 Known Issues... 26

Requirements The Malwarebytes Plugin has been designed with the Following Assumptions and Minimum or Maximum requirements. The Plugin is designed for, and will only install on LabTech 10 Systems or ABOVE, the Installer will tell you if it is unable to proceed based on these requirements. Malwarebytes Anti-Malware version 1.8 (LabTech) is required for full compatibility with this plugin, any existing installations of Malwarebytes Anti-Malware 2.x or 1.75 will need to be manually removed. Malwarebytes Anti-Malware installation is to be handled by the plugin as certain settings are required for the Log and Scan history to be collected correctly. If you are using applications such as Ninite to maintain Third Party application s, you need to ensure that Malwarebytes is excluded from updates. Installation Scenarios Here are a couple of Scenarios for existing Malwarebytes Anti-Malware users that have current deployments of the software. Malwarebytes 2.xx or 1.75 is already deployed. Unfortunately, the plugin is designed for the sole use of Malwarebytes Anti-Malware 1.8. You will need to remove Malwarebytes Anti-Malware 2.x or 1.75 from the computer before information will be collected correctly. You can trigger the uninstall process using the Deployment tab on the Computer Screen. Note: Malwarebytes Anti-Malware 1.75 is similar to 1.8 and as a result the Plugin will still collect information however this is not supported by the plugin, there is a monitor that will alert you for computers that have 1.75 installed as 1.8 will need to be deployed.

Install / Update Malwarebytes Plugin WARNING: Installing or Updating the Malwarebytes Plugin will cause the LabTech Database Agent to immediately restart which will terminate any scripts that are currently running. Before Installing the Plugin ensure that all scripts have completed. For additional information, refer to View Running Scripts. 1. Perform a System Backup 2. Download the Malwarebytes Plugin Installation Utility from: http://download.labtechplugins.com/malwarebytes/malwarebytesplugininstaller.exe 3. Launch the Malwarebytes Plugin Installer - The Installer can be run from anywhere as long as it can connect to the LabTech Server over HTTP or HTTPS. 4. Enter your LabTech Credentials - Enable HTTP Tunnel must be enabled on the User Account that you are using to login - Super Admin permissions are required for Plugin Installation - Server Address must be either HTTP or HTTPS - Username and Password are Case Sensitive 5. Install the Plugin

6. The LabTech Database agent service will restart once the Installation is complete. 7. Exit the Installer 8. Restart the LabTech Control Center.

Configuring Malwarebytes Plugin Ensure that you have restarted the LabTech Control Center after installing or updating the Malwarebytes Plugin. 1. Navigate to the Malwarebytes Global Settings which is located under System Dashboard > Config > Integration > Malwarebytes. 2. Enter License Details for Malwarebytes Anti-Malware and Malwarebytes Anti-Exploit, into the appropriate section on the Settings tab. NOTE: Please take note of the following. I. License Keys entered on this screen will be used globally unless a Client License key is defined (on the Client Licenses tab) II. Once a License Key has been saved, it cannot be modified without being removed. III. Removing a License Key will trigger an Uninstall command to all Malwarebytes installations that are registered with the License Key that is being removed. 3. Enable Password Protection, if enabled specify a Password to be used. Enabling Password Protection is used to limit access to certain features of Malwarebytes Anti-Malware. This password will be required to access those features. NOTE: Please take note of the following. Passwords are for Malwarebytes Anti-Malware only. Passwords cannot contain Double Quotes ( ) Passwords are only configured during the installation of Malwarebytes Anti-Malware and will not be applied to pre-existing installations

4. Configure Installation Options, Malwarebytes has a few limited options that can help control the installation of Malwarebytes Anti-Malware, you are able to select the following to be applied for new installations of Malwarebytes Anti-Malware. Disable Desktop Icon Disable Start Menu Icons Enable Password Protection

5. Configure Auto Deployment, in the Malwarebytes Plugin to automatically deploy both Malwarebytes Anti-Malware and Malwarebytes Anti-Exploit. To do this you will need to enable the Auto Deployment option and then configure which clients will have auto deployment enabled. Once enabled, click on the Configure button to continue with the deployment setup; it s just a matter of checking the boxes to enable Auto Deployment. NOTE: Please take note of the following. Auto Deployment is handled automatically by the LabTech Server and will perform Auto Deployment functions once every 6 minutes. In the event of the installation process failing, the Auto Deployment will not reattempt the installation for 24 hours. Malwarebytes will not be Deployed to Any Device or Location that is Excluded from Auto Deployment (configurable on the Computer Screen or Location Screen). The Installation process will use the Product ID and License Key from the Client License section first, in the event that no specific Client License record exists, it will fall back to using the Global Values. In the event that these values have not been defined, Malwarebytes will NOT be installed. Malwarebytes Auto Deployment is for Windows computers only.

About the Screens The Malwarebytes Plugin will add some Tabs to your LabTech System. These tabs will allow you to configure settings, review collected information and interact directly with Malwarebytes, a brief overview of each tab. System Dashboard The System Dashboard Tab for Malwarebytes is primarily used for Configuring Settings such as Licensing, Auto-Deployment and Policy Management you will be also able to get an overview of the Auto-Deployment process from here. Settings Tab Option Anti-Malware Product ID and License Key Anti-Exploit Product ID and License Key Disable Desktop Icon Disable Start Menu Icons Enable Password Protection Enable Auto Deployment Description DEFAULT: Not Entered Registration details for Anti-Malware Deployment, can be overwritten by a Client Specific Key. DEFAULT: Not Entered Registration details for Anti-Exploit Deployment, can be overwritten by a Client Specific Key. DEFAULT: Disabled Prevents Malwarebytes Anti-Malware from creating a desktop icon on Installation. DEFAULT: Disabled Prevents Malwarebytes Anti-Malware from creating start menu icons on Installation. DEFAULT: Disabled Specifies a password that is required to access certain functionality of the Malwarebytes Anti-Malware product. DEFAULT: Disabled Enabling this Feature will enable the Malwarebytes Plugin to Automatically Deploy both Anti-Malware and Anti-Exploit products as configured by using the Configure button

Client Licenses Tab The Client Licenses tab allows you to specify product registration information for Anti-Malware and Anti-Exploit specific to a customer, values defined here will be used in place of the globally defined registration information. You can remove a record by Right clicking on the record in the summary window and selecting Remove License.

Global Ignore List Tab The global ignore list is used to define items for Malwarebytes Anti-Malware to ignore / exclude from scans, the ignore list is applied to agents when Malwarebytes Anti-Malware is installed. Additional details about Item Classes and required input formats Item Class File Folder Key IP Description Format: <Drive>\<Directory>\<File> Example: C:\Windows\file.exe Format: <Drive>\<Directory> Example: C:\Windows\LTSvc Format: <hive>\<key> Example: HKLM\Software\Key Format: xxx.xxx.xxx.xxx Example: 111.222.33.444

Policy Manager Tab The Policy Manager tab enables you to control which policy is configured the Default policy for new Installations of Malwarebytes Anti-Malware. In addition to this you are able to perform the following tasks through a right-click context menu. Add / Delete Policies Control which policy is default Deploy a selected policy through the Push Command

Deployment History Tab This tab is used to review Installation commands of Malwarebytes Anti-Malware and Anti-Exploit, this uses information from the LabTech Command history and will show you commands in one of three stats: Success, Failed and Executing.

Client Screen The Malwarebytes tab on the client screen is used to show collected information as well as allowing you to issue manual deployment commands such as Installs and Uninstalls as well as interact with Malwarebytes directly. Home Tab The home tab enables you to get a graphical overview of threat and exploit history of the particular client or location and contains a number of numerical widgets and graphs. Available on Client Screen > Malwarebytes Tab Location Screen > Malwarebytes Tab Gadget Name Current Threats Recent Exploits Quarantined Items Anti-Malware Threat Detection Anti-Exploit Threat Detection Gadget Description Number of threats detected by Malwarebytes Anti-Malware in the most recent scan results. Number of Exploits detected by Malwarebytes Anti-Exploit in the previous 24-hours Number of items that are currently in Malwarebytes Anti-Malware quarantine. Graph depicting the number of threats detected by Malwarebytes Anti-Malware over the previous 7. Graph depicting the number of exploits detected by Malwarebytes Anti-Exploit over the previous 7 days.

Computers Tab Anti-Malware Use the Computers tab to view all computers at the client that have Malwarebytes Anti-Malware installed selecting the computer in top part of the window will populate the Threat history for that specific computer below. You are able to right click on a threat in the threat history to add it to that individual computers ignore list. You can Select Individual or Multiple Computers to trigger an On-Demand Scan

Computers Tab Anti-Exploit Use the Computers tab to view all computers at the client that have Malwarebytes Anti-Exploit installed selecting the computer in top part of the window will populate the Threat history for that specific computer below.

Deployment Tab Use the Deployment tab to view all Windows Computers at the client, from this tab you will be able to trigger an Install or Uninstall action as well as control the Auto-Deployment status of Malwarebytes Products. Clicking on the Enabled / Disabled link in the upper right corner will toggle the Auto Deployment Status for the selected application. Auto Deployment must be enabled globally for this to work.

Quarantine Tab From this tab you will be able to directly interact with the Malwarebytes Quarantine, allowing you to see all quarantined items at that client as well as Delete or Restore items(s) as required. Ignored Items Tab From this tab you will be able to directly interact with the Malwarebytes Anti-Malware Ignore list allowing you to remove items(s) from the Ignore list.

Location Screen The Malwarebytes tab on the location screen is used to show collected information as well as allowing you to issue manual deployment commands such as Installs and Uninstalls as well as interact with Malwarebytes directly, All of the Screens on the Location Screen are very similar to those found on the Client Screen except for the data being displayed is only for the current location and not the entire client. Deployment Tab Use the Deployment tab to view all Windows Computers at the client, from this tab you will be able to trigger an Install or Uninstall action as well as control the Auto-Deployment exclusions for Malwarebytes Products. Selecting the Exclude Location Auto-Deployment checkbox s will exclude the location from having the selected product automatically deployed. These settings are saved on selection.

Computer Screen The Malwarebytes tab on the computer screen is used to show collected information as well as allowing you to issue manual deployment commands such as Installs and Uninstalls as well as interact with Malwarebytes directly. Status Tab From this tab you will be able to Exclude the Installation of Malwarebytes Anti-Malware or Anti- Exploit as well as see the current Installation status of both products with the ability to trigger both Install and Uninstalls. Scan History Tab From this tab you will be able to see all scan history collected by LabTech

Threat History Tab From this tab you will be able to see all of the threat history collected by LabTech. You are able to right on a threat in the threat history to add it to that individual computers ignore list. Quarantine Tab From this tab you will be able to directly interact with the Malwarebytes Quarantine, you will be able to see all quarantined items for this computer as well as Delete or Restore items(s) as required.

Ignore List Tab From this tab you will be able to directly interact with the Malwarebytes Anti-Malware Ignore list allowing you to remove items(s) from the Ignore list.

Policy Management The Malwarebytes integration plugin has the ability to apply policies and settings to the Malwarebytes agent upon deployment. There are two in-built pre-configured policies that can be used as part of this solution, the policies and their related settings are listed below. In addition to using the two pre-configured policies you are able to import custom policy files on Policy Management Tab. Custom Policies Using the Malwarebytes Anti-Malware user interface you are able to configure settings related to the following modules or components which can then be exported to file to create a custom policy within LabTech Protection Module General Settings Scanner Settings Database & Definition Settings Schedules Export to File To export the settings to file you need to use the Malwarebytes Anti-Malware API utility. The MBAM API Utility is a command line tool that lets you control aspects of Malwarebytes Anti- Malware and is located in the Malwarebytes Anti-Malware folder; for installations performed using the Integration plugin this is typically: C:\Program Files (x86)\malwarebytes' Anti-Malware\mbamapi.exe Example: mbamapi.exe /export all c:\export\settings.dat Create Custom Policy Once you have exported your settings file you are able to create a new policy for use within LabTech, to do this navigate to the Policy Management Tab which is located on the System Dashboard under Config > Integration > Malwarebytes > Policy Manager. 1. Click on the Add Policy button. 2. Enter a descriptive name for the policy you wish to create. 3. Click on the Browse button and locate the export file previously created 4. Click the Save button to add the new policy

Default Policy There is a pre-defined Default policy that is deployed to new installations of Malwarebytes Anti- Malware when using the plugin installation options. For the most part these options are default, but some of the highlights are below. Protection Module o File System Protection ENABLED o Malicious Website Blocking ENABLED o Protection Module is Started with Windows ENABLED o Automatically quarantine file system threats ENABLED o Show Tooltip Balloon when File System Threat is Blocked ENABLED o Show Tooltip Balloon when Malicious Website is Blocked ENABLED General Settings o Terminate IE during Threat Removal DISABLED o Anonymously report usage statistics ENABLED o Right Click Context Menus ENABLED o Warn User if Database is Outdated DISABLED Scanner Settings o Scan Memory Objects ENABLED o Scan Start-up Objects ENABLED o Scan Registry Objects ENABLED o Scan File System Objects ENABLED o Scan Additional Items against heuristics ENABLED o Scan Inside Archives ENABLED o Advanced Heuristics Engine ENABLED o Action for Potentially Unwanted Programs (PUP): Show in results and do not remove o Action for Potentially Unwanted Modifications (PUM): Show in results and remove o Action for Peer-to-Peer software (P2P): Show in results and do not remove Database / Definition Updates o Automatic definition updates are scheduled to run every hour as required. Scheduled Scans o A Quick Scan is scheduled to run Each day at 9:00am Scan Type: Quick Scan is performed silently from the System Account Automatically remove and quarantine all threats. Saves to an XML Log Computer will NOT restart if required for threat removal Recovers if missed by 3 hours

Silent Policy There is a pre-defined silent policy that comes pre-configured, it s similar to the default policy that used as a default for deployment however it s configured to use the Very Silent option which disables the System Tray Icon. For the most part these options are default, but some of the highlights are below. Protection Module o File System Protection ENABLED o Malicious Website Blocking ENABLED o Protection Module is Started with Windows ENABLED o Automatically quarantine file system threats ENABLED o Show Tooltip Balloon when File System Threat is Blocked ENABLED o Show Tooltip Balloon when Malicious Website is Blocked ENABLED General Settings o Terminate IE during Threat Removal DISABLED o Anonymously report usage statistics ENABLED o Right Click Context Menus ENABLED o Warn User if Database is Outdated DISABLED Scanner Settings o Scan Memory Objects ENABLED o Scan Start-up Objects ENABLED o Scan Registry Objects ENABLED o Scan File System Objects ENABLED o Scan Additional Items against heuristics ENABLED o Scan Inside Archives ENABLED o Advanced Heuristics Engine ENABLED o Action for Potentially Unwanted Programs (PUP): Show in results and do not remove o Action for Potentially Unwanted Modifications (PUM): Show in results and remove o Action for Peer-to-Peer software (P2P): Show in results and do not remove Database / Definition Updates o Automatic definition updates are scheduled to run every hour as required. Scheduled Scans o A Quick Scan is scheduled to run Each day at 9:00am Scan Type: Quick Scan is performed silently from the System Account Automatically remove and quarantine all threats. Saves to an XML Log Computer will NOT restart if required for threat removal Recovers if missed by 3 hours

Aggressive Policy There is a pre-defined aggressive policy that comes pre-configured, it s similar to the default policy that used as a default for deployment however it will quarantine items a little more aggressively. For the most part these options are default, but some of the highlights are below. Protection Module o File System Protection ENABLED o Malicious Website Blocking ENABLED o Protection Module is Started with Windows ENABLED o Automatically quarantine file system threats ENABLED o Show Tooltip Balloon when File System Threat is Blocked ENABLED o Show Tooltip Balloon when Malicious Website is Blocked ENABLED General Settings o Terminate IE during Threat Removal DISABLED o Anonymously report usage statistics ENABLED o Right Click Context Menus ENABLED o Warn User if Database is Outdated DISABLED Scanner Settings o Scan Memory Objects ENABLED o Scan Start-up Objects ENABLED o Scan Registry Objects ENABLED o Scan File System Objects ENABLED o Scan Additional Items against heuristics ENABLED o Scan Inside Archives ENABLED o Advanced Heuristics Engine ENABLED o Action for Potentially Unwanted Programs (PUP): Show in results and remove o Action for Potentially Unwanted Modifications (PUM): Show in results and remove o Action for Peer-to-Peer software (P2P): Show in results and remove Database / Definition Updates o Automatic definition updates are scheduled to run every hour as required. Scheduled Scans o A Quick Scan is scheduled to run Each day at 9:00am Scan Type: Quick Scan is performed silently from the System Account Automatically remove and quarantine all threats. Saves to an XML Log Computer will NOT restart if required for threat removal Recovers if missed by 3 hours

Change Log MALWAREBYTES PLUGIN DOCUMENTATION Version: 1.0.0.18 February 14 th 2016 Ability to add Registry Values to the Global Ignore List Ability to Right click and add Data / Registry Values to the Ignore List on the Threat history on the Client, Location and Computer Screens Resolved a Date/Time issue for some time zones on the Threat history of the Computer Screen Version: 1.0.0.17 December 9 th 2015 Resolved an issue where Inventories were not being correctly written to the Database on LabTech 10.5 systems that had been Upgraded from 10.0 Version: 1.0.0.16 November 27 th 2015 Resolved an issue that was causing Scan History to show an incorrect Time/Date in some Time zones Resolved a Typo on the Uninstall Action Prompt Added the ability to add Registry Key s to the Global Ignore list. Version: 1.0.0.14 November 6 th 2015 Resolved issue with some processing on the LabTech server which was preventing Scan History and Installation status from correctly being displayed. Added the ability to trigger DB Definition updates from the Clients, Location & Computer screen Tabs. Version: 1.0.0.13 November 1 st 2015 Added the ability to disable Desktop Icon for new installations of Malwarebytes Anti- Malware Added the ability to disable Stat Menu Icons for new installations of Malwarebytes Anti- Malware New Policy of Silent has been added to the plugin, which controls whether protection module operates in Full Silent mode. This mode gives no visual indications when threats are blocked and/or quarantined, and there is no visible tray icon. Default value is off. System Dashboard > Config > Integration > Malwarebytes > Settings tab has had its layout adjusted to accommodate the new options available. Refined Malwarebytes Anti-Malware installation process to reduce change of failures. Known Issues System Dashboard Specifying or Changing Password on the System Dashboard will only apply to new Installations of Malwarebytes. All previously deployed versions will continue to use the password that was specified at the time of installation.