Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Check out this short video for a quick introduction and overview: Welcome to
Malwarebytes Endpoint Protection
Our goal now is to get you set up and protected as quickly and efficiently as
possible. Advanced protection, endpoint remediation, and centralized
management are only a few steps away.
We’ve developed a Quick-Start Deployment Guide that walks you through the
product setup step-by-step. You can select the information you require and
manage your deployment at your own pace.
The Quick-Start Deployment Guide is packed with information that will enable
you to quickly realize the benefits of enterprise-class threat protection.
If you’d like access to the Quick-Start Deployment Guide, please click here:
If you have any questions, we encourage you to visit the following links for
more information:
Product Information
Malwarebytes Support
STEP 1: Quick Start Deployment Guide
If you were using the Trial Version before you bought the licenses, you already
have your My Account set up and you can skip Steps 1 and 2 and go straight to
Steps 3, 4, and 5.
2. After you’ve clicked ‘Verify’, the account verification process takes you to
the ‘Create Your Account’ page, shown here. You will need to fill in your
full name, create your password, and then accept the terms of the End
User License Agreement. Once you’ve completed the required
information, click ‘Submit’ to continue.
3. You’re now through to the login screen for the Malwarebytes Cloud
Console where you’ll enter your email address and the Password you just
created in Step 2. You’ll be taken to this page each time you log in to the
Cloud Console.
4. When you log in, you’re taken straight into your dashboard for the
Management Console. Your dashboard menu is in the blue bar on the left
side and you’ll notice that most of the information in the dashboard is
monitoring your endpoints. Your dashboard is empty at this point, but will
start showing data after you begin registering endpoints later in the setup.
In the main menu on the left, the Endpoints, Detections, Quarantine, Reports,
and Tasks options will show you information about your registered endpoints,
the threats that get detected, and reports based on the options you define.
Settings is at the bottom of the menu and contains a dropdown menu where
you can select Policies, Schedules, Exclusions, Groups, and Users.
If you have any questions, we encourage you to visit the following links for
more information:
Product Information
Malwarebytes Support
STEP 2: Quick Start Deployment Guide
CUSTOMIZING YOUR
NOTIFICATION SETTINGS
In Step 1 you set up your ‘My Account’ and accessed the Malwarebytes
Management Console where you can manage and monitor the endpoints in
your network.
In Step 2 we’ll take you back into ‘My Account’ and show you how to
customize your notification settings.
To access ‘My Account’ click your name from the top right-hand corner of the
Malwarebytes Endpoint Protection console and then click ‘My Account’. Then
log in with the email address and password you set up in Step 1.
The Profile section of Malwarebytes My Account enables you to view and edit
key information related to your company's account directly from within the
Cloud Console. If you ever need to change your Display Name or change your
password, you'll do it from My Account.
My Account enables you to customize which types of notifications you want
Malwarebytes Endpoint Protection to send you. These notifications are a
powerful tool for monitoring your endpoints, so it’s important that you define
the notifications you’ll find most useful.
License Information lets you see how many Malwarebytes Endpoint Protection
License Information lets you see how many Malwarebytes Endpoint Protection
licenses you bought, easily monitor how many of those licenses have been
deployed on your network, and you can check the expiration date for your
license subscription.
You should be getting more familiar with My Account and this step should help
you better understand the types of notifications you can set up to help you
manage your company’s threat protection with Malwarebytes Endpoint
Protection.
If you have any questions, we encourage you to visit the following links for
more information:
Product Information
Malwarebytes Support
STEP 3: Quick Start Deployment Guide
The hardware and operating system requirements for the agent installation of
Malwarebytes Endpoint Protection on your endpoint are in the Malwarebytes
Administrators Guide. To help expedite your deployment, we’ve included it in
this Quick-Start Deployment Plan here.
You’re now ready to move on to Step 4 and configure the Policy Settings that
will work best for you and your end users.
If you have any questions, we encourage you to visit the following links for
more information:
Product Information
Malwarebytes Support
STEP 4: Quick Start Deployment Guide
We are now ready to configure your policy settings. Policies are vitally
important because they allow the administrator to control individual layers of
protection based on operating system, as well as allowing you to restrict and
manage what end users are able to do themselves in terms of their threat
protection. Policies are also applied to specified endpoint groups, further
enhancing your ability to manage various groups according to their needs.
Endpoint Interface Options – These settings enable you to control the tray
icon and the tasks that your end users are able to perform.
You’re now ready to move on to the final step - Step 5 of the Quick Start
Deployment Guide and choose the deployment method that will work best for
you.
If you have any questions, we encourage you to visit the following links for more
information:
Product Information
Malwarebytes Support
STEP 5: Quick Start Deployment Guide
CHOOSING YOUR
DEPLOYMENT METHOD
We’re now on the final step to prepare you for deployment of Malwarebytes
Endpoint Protection for your company.
The preferred installation method for most of our customers is the Malwarebytes
Discovery and Deployment Tool. This handy utility automatically identifies
endpoints on your network and then distributes the Malwarebytes Endpoint
Protection agent out to those endpoints. The Discovery and Deployment Tool
can utilize either Active Directory or IP address. This deployment method is
useful when deploying a larger number of endpoints and when you want to
minimize any interaction required from the users on your endpoints.
The other option is to use our MSI installer. This deployment method is
used by larger companies who have a 3rd-party tool for deploying
licenses across their networks.
The last option is completely manual and requires the user of each
endpoint to first download the executable file directly on to the endpoint.
If you choose this option, we recommend putting the executable file on a
shared network where they can easily download it.
Once you decide on the deployment method that suits you best, you can go to
the Cloud Console menu and select Endpoints. You’ll then see the options for
deployment.
We hope this Quick-Start Deployment Guide has been helpful for getting your
Malwarebytyes Endpoint Protection set up and deployed. If you have any issues,
please don’t hesitate to contact our Support Team and we’ll work with you to
get you set up and protected.
If you have any questions, we encourage you to visit the following links for
more information:
Product Information
Malwarebytes Support