MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

How to Adjust Your Malwarebytes Anti-Malware Software Settings to Avoid Downtime

Posted August 12, 2015by Stephanie Moncayo

Have you adjusted your automated anti-malware scans to be scheduled according to your business cycle? Malwarebytes is not only the anti-malware software that we proudly package into our RMM platform, but is also a Gold sponsor at Navigate 2015. According to Digital Trends, Malwarebytes "continues to provide some of the best and most comprehensive virus-removal software available." The software also automatically sets up scans that could be interrupting work flows by slowing down computer processor speed. No matter - it's an easy fix. Scans can be manually programmed to avoid any downtime for you or your techs. 

This blog post uses Malwarebytes support documentation to explain how to adjust your settings to add, edit and remove tasks so that you don't have to wait for a scan or update to finish up at 7 pm or any other time when you need your computer to be responsive and fast. 

So let's get started!

 

When you first install Malwarebytes, you are prompted to set up one scan and one update. You are free to modify or delete them at any point after. Don't forget to replace any task that is deleted! This is important because if you don't, the program will not deliver the positive results you expect. 

Now click on the add button to add a new task! 

 

Here you can choose the specific task, in the Scheduled Task area on the left side of the screen. You can choose from the the following tasks: Threat scan, Custom scan, Hyper scan and Check for updates. You can also adjust the Frequency and Settings.


Types of Scans

Threat scan 

This method of scanning detects a large majority of threats that your computer may encounter. All of the following areas and methods are tested:

  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Registry Objects: Configuration changes which may have been made to the Windows registry.
  • File System Objects: Files stored on your computer's local disk drives which may contain malicious programs or code snippets.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects — as well as in other areas — which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats cannot reassemble themselves.


Custom Scan

This method allows you to scan according to your specifications at the time of the scan. This wouldn't be set up in settings but in the window which you can see in the screen shot below. The custom method is predominately used for a "one-off" scan. It's also important to note that there's a feature that gives you the ability to specify certain areas of your file system for scanning, using a Windows Explorer-like presentation model. So you wouldn't have to scan all of the C drive because it breaks down further and allows you to choose which files to scan within the C drive. 

Hyper Scan 

This method is limited to detection of immediate threats, but does take care of the following areas:

  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects — as well as in other areas — which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats cannot reassemble themselves.


Frequency and Settings

This section of the settings allow you to define the time frame (Schedule Frequency) that the task will be executed, and how often (Recurrence). 

  • Frequency = Hourly, recurrence in range of 1-48 hours
  • Frequency = Daily, recurrence in range of 1-60 days
  • Frequency = Weekly, recurrence in range of 1-8 weeks
  • Frequency = Monthly, fixed setting
  • Frequency = Once, fixed
  • Frequency = On Reboot, fixed

 

Quick Tip! 

It's strongly recommended that you always run a scan with the most current database. Malwarebytes has a research group that updates the Rules database anywhere between 8-15 times daily and finds that there is no reason to check for updates more often than once an hour based on this. 


Advanced Mode 

There are even more options available once you click on the Advanced button in the bottom left corner of the Edit Schedule window. 

For a list and description of the advanced scan schedule, recovery, and logging options, check out the Malwarebytes support documentation here! 

 

Downtime can be costly. Make sure that your anti-malware solution or any of the other business-enhancing tools you use don't keep you from maintaining uptime and efficiency! As you can see, it's an easy configuration, but one that could save you from frustration and lost productivity. 

RMM 101: Must-haves for Your IT Management Solution

 

See also:

 

Stephanie Moncayo is an Inbound Marketing Consultant at Continuum. Stephanie works with the programs team, assisting with content creation and strategy. A recent graduate of Northeastern University, Stephanie is passionate about dancing and traveling, as well as studying market trends and behavior.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus