Topics

sticky Using Malware Bytes with Jaws

Sherri
 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

Mike B. <mike9902@...>
 

Hi Sherri,
 
Below is a brief tutorial I wrote awhile back on navigating MWB:
Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.
 
Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.
 
Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 
 
Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.
 
If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....
 
It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.
 
I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

Mike B. <mike9902@...>
 


Hi Again Sherri,
 
Below is the user guide from Malwarebytes.  It's for a slightly older version but, it works the same way as the latest version.
 
            Malwarebytes for Windows User Guide
 
                                      Version 3.4.5
 
                                      29 March 2018 
 
 
 
 
 
 
 
 
 
 

 Notices
 
Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws.  Except as expressly permitted in your license agreement or allowed by
law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or
display any part, in any form, or by any means.  You may copy and use this document for your internal reference purposes only.
 
This document is provided “as-is.”  The information contained in this document is subject to change without notice and is not
warranted to be error-free.  If you find any errors, we would appreciate your comments; please report them to us in writing.
 
The Malwarebytes logo is a trademark of Malwarebytes.  Windows is a registered trademark of Microsoft Corporation.  All other
trademarks or registered trademarks listed belong to their respective owners.
 
Copyright © 2018 Malwarebytes.  All rights reserved.
 

Third Party Project Usage
 
Malwarebytes software is made possible thanks in part to many open source and third party projects.  A requirement of many of
these projects is that credit is given where credit is due.  Information about each third party/open source project used in
Malwarebytes software – as well as licenses for each – are available on the following page.
 
 

Sample Code in Documentation
 
The sample code described herein is provided on an “as is” basis, without warranty of any kind, to the fullest extent permitted by
law. Malwarebytes does not warrant or guarantee the individual success developers may have in implementing the sample code
on their development platforms. You are solely responsible for testing and maintaining all scripts.
 
Malwarebytes does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or
completeness of any data or information relating to the sample code. Malwarebytes disclaims all warranties, express or implied,
and in particular, disclaims all warranties of merchantability, fitness for a particular purpose, and warranties related to the code, or
any service or software related there to.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

CWC04-3045a                                   Table of Contents
 

Introduction ............................................................................................................................ 1
 
What’s New in Malwarebytes for Windows ................................................................. 2
 
System Requirements ......................................................................................................... 3
 
Installation .............................................................................................................................. 4
 
  Free, Premium Trial or Premium? ........................................................................................................ 4
 
  Activation .................................................................................................................................................... 5
 
  A Final Word about Administrative Rights ....................................................................................... 6
 
Screen Layout ....................................................................................................................... 7
 
  Menu Bar ..................................................................................................................................................... 7
      My Account ........................................................................................................................................................................ 7
      Notification Center .................................................................................................................................. 7
 
  Menu Pane ................................................................................................................................................. 8
 
    Status/Option Pane ................................................................................................................................. 8
 
  Detail Pane ................................................................................................................................................. 9
 
Dashboard ............................................................................................................................ 10
 
  Status Pane ............................................................................................................................................... 10
 
  Real-Time Protection.............................................................................................................................. 11
      Settings .............................................................................................................................................................................. 11
 
  Scan Status ................................................................................................................................................ 11
      View Scan Reports .......................................................................................................................................................... 11
      Schedule a Scan............................................................................................................................................................... 11
      Check for Updates .......................................................................................................................................................... 11
      Help ..................................................................................................................................................................................... 11
 
  Protection History ................................................................................................................................... 11
 
Scan ........................................................................................................................................ 12
 
  Threat Scan ............................................................................................................................................... 12
 
  Custom Scan ............................................................................................................................................ 13
      Custom Scanning Options............................................................................................................................................ 13
      Potentially Unwanted Programs/Modifications ..................................................................................................... 13
      Folders to be Scanned ................................................................................................................................................... 13
 
  Hyper Scan ............................................................................................................................................... 14
 
  Scan Schedules ....................................................................................................................................... 14
      Basic Mode ........................................................................................................................................................................ 15
      Advanced Mode .............................................................................................................................................................. 15
      Advanced Scan Options ................................................................................................................................................ 16
 
  Watching Scan Progress ...................................................................................................................... 16
 
  Scan Results ............................................................................................................................................. 17
 
  Scan Summary ......................................................................................................................................... 18
 
Quarantine ............................................................................................................................ 21 Reports .................................................................................................................................. 22
 
  Viewing or Deleting Logs .................................................................................................................... 24
 
Settings ................................................................................................................................. 25
 
  Application Settings .............................................................................................................................. 25
      Application Updates ...................................................................................................................................................... 26
      Notifications ..................................................................................................................................................................... 26
      Impact of Scans on System ......................................................................................................................................... 26
      Windows Context Menus ............................................................................................................................................. 26
      Display Language ........................................................................................................................................................... 26
      Event Log Data................................................................................................................................................................ 26
      Proxy Server ..................................................................................................................................................................... 26
      User Access ...................................................................................................................................................................... 27
      Windows Action Center ............................................................................................................................................... 28
      Beta Application Updates ............................................................................................................................................ 28
      Usage and Threat Statistics ......................................................................................................................................... 28
 
  Protection ................................................................................................................................................ 29
      Real-Time Protection .................................................................................................................................................... 29
      Scan Options .................................................................................................................................................................... 31
      Potential Threats ............................................................................................................................................................ 32
      Updates ............................................................................................................................................................................. 32
      Startup Options .............................................................................................................................................................. 33
      Automatic Quarantine .................................................................................................................................................. 33
 
  Scan Schedule ........................................................................................................................................ 33
 
  Exclusions ................................................................................................................................................. 34
      Add Exclusion .................................................................................................................................................................. 34
 
  My Account ............................................................................................................................................. 35
 
  About ........................................................................................................................................................ 36
 
Appendix A: Notification Window Examples ............................................................. 37
 
  Introduction
 
Malwarebytes for Windows (“Malwarebytes”) is an "AV replacement."  It is not an AV.  It does not incorporate the same old engine
for file-infectors and other malware that you find in a typical AV or Internet security suite, the large and inefficient library of
signatures, or the bloatware features which are becoming more prevalent.
 
You don't need to pay for a traditional AV anymore!  At Malwarebytes, we have always approached things differently and, as many
people know based on their own positive experience with Malwarebytes finding and remediating malware that gets past AVs, we
know a thing or two about zero-day malware and their infection tactics.  We have always believed that no one product can do it
all, and the free AV that comes with modern operating systems, in conjunction with Malwarebytes is all you will ever need.
 
In today's modern threat world, bad guys have learned how to evade AV protection, making it more important than ever before
to be able to disrupt attacks in as many different stages of the attack chain as possible.  Malwarebytes, layered with the AV (which
is the default mode) or as your stand-alone defense, is the most effective approach against modern threats.  And if all else fails,
you need the best remediation technology available.
 
Malwarebytes has been engineered to provide the most effective layered approach of prevention, detection and remediation
technologies:
 
  1. Application hardening, to make them more resilient against attacks.
  2. Anti-exploit technology, to shield applications from vulnerability exploits (currently one of the top infection vectors).
  3. Application Behavior Enforcement, an advanced and signature-less technology which prevents common infection
      vectors (e.g. web & email based social engineering).
  4. Anti-ransomware, a signature-less technology designed to behaviorally detect ransomware.
  5. Revamped Anti-Malware and Web Blocking engines, offering more aggressive detection techniques.
  6. Hardened and modular architecture design, allowing seamless integration of new detection and protection technologies
    in the future.
  7. Highly effective as always in malware remediation, an often overlooked part of the protection stack.
  8. Ability to run as primary protection (no AV) or secondary protection (alongside existing AV).
  9. Engineered to be our next corporate endpoint client, providing major improvements to our endpoint management
      capabilities and new enterprise-focused offerings
  10. Last but not least, our Research Team has been growing and adapting lately, with notable additions to the lineup from
      JRT and AdwCleaner, our new aggressive stance against PUPs, as well as new R&D technologies which we will be
      unveiling shortly.
 
Welcome to the Malwarebytes User Guide! 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 1 What’s New in Malwarebytes for Windows
 
This version of Malwarebytes contains many improvements and bug fixes.  Following is a list of changes.
 
Performance/protective capability
 
  • Improved remediation for hijacked shortcuts
  • Continued improvements to overall protection, detection and remediation
 
 Usability
 
  • Device Name now syncs to the Malwarebytes My Account portal for users on the paid version
  • Improved accessibility features for the Notification Center
  • Added custom messages designed to highlight the value of Malwarebytes protection and help it remain free
 
 Stability/issues fixed
 
  • Fixed problem when cutting / pasting files with anti-ransomware enabled
  • Fixed problem where USB stick would not eject properly with anti-ransomware enabled
  • Fixed a service crash related to self-protection
  • Fixed a blue screen crash related to Web Protection
  • Addressed other miscellaneous defects
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 2 System Requirements
 
Following are minimum requirements for a computer system on which Malwarebytes may be installed.  Please note that these
requirements do not include any other functionality that the computer is responsible for.
 
  • Operating System: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista (Service Pack 1 or later), Windows
    XP (Service Pack 3 or later, 32-bit only)
 
      PLEASE NOTE: Anti-ransomware protection is not supported for Windows XP or Windows Vista, due to architectural
      constraints.
 
  • CPU:  800 MHz or faster, with SSE2 technology.  This includes most modern Intel x86 processors as well as AMD’s Athlon
    64, Sempron 64, Turion 64 and Phenom CPU families.  Please refer to the following page for further information:
 
 https://en.wikipedia.org/wiki/SSE2
 
  • RAM:  2048 MB (64-bit OS), 1024 MB (32-bit OS, except 256 MB for Windows XP)
 
  • Free Disk Space:  250 MB
 
  • Recommended Screen Resolution: 1024x768 or higher
 
  • Active Internet Connection
 
WARNING: If you are upgrading from Malwarebytes Anti-Malware version 2.x and have enabled Malwarebytes’ self-protection
feature, please disable it prior to initiating the upgrade.  It prevents the Malwarebytes installation program from doing its job.
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 3 Installation
 
To begin the installation, double-click on the Malwarebytes installation file which you downloaded.  If you are installing
Malwarebytes on a Windows version newer than Windows XP, a Windows dialog box will be presented in the middle of your screen,
labeled User Account Control.  Verify that the publisher is listed as Malwarebytes Corporation and click Yes.  This Windows security
feature assures limited application capabilities unless and until you authorize higher capabilities.  Installation will begin once this
has been approved.  The installation program guides you and allows you to provide alternate information if you do not wish to
accept defaults.  Each screen also allows you to terminate installation if you do not wish to continue.  
 

Free, Premium Trial or Premium?
 
Before you begin, we want to let you know that throughout this guide, you will see references to the Free, Premium Trial, and
Premium versions of Malwarebytes.  This is likely unfamiliar territory for new Malwarebytes users.  The following link provides a
basic rundown on the differences between the Free and Premium versions of Malwarebytes.
 
 
These differences are also shown in the Malwarebytes interface immediately after it has been installed.  See below….
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
The Premium Trial is a 14-day opportunity to use the Premium version of the program, and to see if it is better suited to your needs. 
The Premium Trial is available at no cost, but you can only use it one time for each version of Malwarebytes.  The Premium Trial is
automatically started during installation.  Once installed, the program provides options to convert from Free to Premium, and from
Premium Trial to Premium.
 
If you elect to use the Premium Trial and do not wish to purchase a Premium subscription at the end of the trial, your Malwarebytes
program will revert to Free mode.  The only differences will be that the added features enabled by the trial will cease to function. 
All other functionality remains unchanged.
 
If you are a new Malwarebytes user, or are a free/Premium Trial user upgrading to this version, you will be alerted that a scan has
not been run.  Click Scan Now and Malwarebytes will run a scan for you.  After the scan (and cleanup, if needed) has been
completed, you will see the user interface as shown below.
 
 
 

Malwarebytes for Windows User Guide 4 
 
Please take note of the Why Premium button in the lower left corner.  Click that button for a brief slide show that describes the
differences between Free and Premium modes.  While Malwarebytes does an effective job of disinfecting your computer after an
attack, there is no replacement for preventing the attack from ever happening.
 
If you have already purchased a license, you may wish to activate your copy of Malwarebytes at this time.  You can do that now (or
at any time) by clicking the Activate License button at the top right portion of the Malwarebytes user interface.
 

Activation
 
Malwarebytes is available for users of any modern Windows client to download and install at no cost.  You can also purchase an
annual subscription, which entitles you to take advantage of real-time protection, scan/update scheduling and access policies.  If
no license has been installed into the product, the blue title bar at the top of the screen will show two buttons, Activate License
and Upgrade Now.  When clicked, Upgrade Now launches a browser window which opens to the Malwarebytes web site
pricing/purchase page.  Your license information will be in an email sent to you by Malwarebytes at the time of purchase.  Locate
your license information and click the Activate License button.  You will then see the following screen.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 5 Please note the checkbox and the words “My license came with a License ID.”  If you are using our “old style” license, you will also
need to check that box and enter your License ID along with your Key.
 
Please note:  You must be online with an active Internet connection in order to successfully activate your Premium license.
 
The construction of the Key is different, so make sure that you choose the right screen for entering your license information based
on whether you have an ID and Key, or just a Key.  After entering your license information, click the Activate License button.  Your
Malwarebytes screen will refresh, as shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Please note that the two license-related links in the Menu Bar have been replaced by a link called My Account.  Also note that the
banner has changed from Malwarebytes Premium Trial to Malwarebytes Premium.
 

A Final Word about Administrative Rights
 
If you installed Malwarebytes from a downloaded installation file, you automatically started a Premium Trial, and were offered the
capability to activate the Premium features if you had purchased an annual subscription.  You may have decided to wait until later. 
If that is the case, please remember that you should be logged in to Windows as an Administrator before doing either of those
tasks.
 
We will go into much more detail about the features of Malwarebytes, but before doing that, we should introduce you to the
Malwarebytes user interface.
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 6 Screen Layout
 
The Malwarebytes program interface is designed around a screen layout which is simplified and uncluttered.  We want to make it
easy for you to configure the program to serve your needs, and we hope this layout helps to do that.  The screenshot below shows
the Dashboard – the screen you see when Malwarebytes is launched for the first time.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Let's talk about the primary elements which make up our user interface.
 

Menu Bar
 
The Menu Bar is displayed at the top of the screen at all times. There are two buttons in the Menu Bar. A description for both
follows.
 
My Account
 
This button will take you to the setting options to manage your Malwarebytes subscription(s) and license(s). For more information,
please refer to pages 35-36 of this guide.
 
Notification Center
 
The Notification Center provides a convenient location to view recent notifications generated by Malwarebytes. Clicking the icon
will show the 5 most recent notifications. You may scroll down to view up to 25 notifications by using your mouse wheel. You can
view additional details for each notification by clicking it – Malwarebytes will bring you to the relevant screen.
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 7 
 

Menu Pane
 
The Menu Pane contains the main program options, which will be discussed in detail in this guide.  They consist of:
 
  • Dashboard: What you see here. While the exact details change over time, the look is consistent.
  • Scan: Select the type of scan you wish to run, run it, and view the results.
  • Quarantine: Delete or restore threats which have been detected by program scans.
  • Reports: View reports related to program operation, threats which have been detected, and threats which have been
      removed.
  • Settings: Configure every aspect of Malwarebytes, so that it can protect you efficiently.
 
In addition, there are settings for Account information.  While in Premium Trial mode, options are present to buy a Premium
subscription and to Activate the program.  Once you have purchased a subscription, those two options will revert to a single option
which handles details of your account.  More on those later.
 

Status/Option Pane
 
When the Dashboard is selected from the Menu Pane, the center of the screen is filled with the Status Pane.  It is designed to give
you quick information that tells you whether there is anything for you to be concerned about.  When the Dashboard is selected,
the Detail Pane is also displayed.  More on that momentarily.
 
When any menu option other than the Dashboard is selected, all space except the space used by the Menu Pane is allocated to the
selected menu option.  This provides sufficient room for information pertaining to any menu option to be cleanly displayed.
 
 
 
 
 

Malwarebytes for Windows User Guide 8 Detail Pane
 
The Detail Pane is shown only when the Dashboard is selected.  It shows information on protection options, protection updates,
and detail pertaining to the most recent scan.  This information is shown on other screen displays as part of the menu option
selected by the user, but are all displayed here for quick recognition.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 9 Dashboard
 
Each time Malwarebytes is launched, the first page visible to the user is the Dashboard.  It provides program status, and acts as a
launch pad for all program operations.  A screenshot of the user interface – featuring the Dashboard – is shown below for reference.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Status Pane
 
The main area of the screen is the Status Pane, providing current system status.  Within the Main Window, the first item displayed
is the Status Banner.  This banner displays a status message along with an icon, whose color is based on program status.  The color
is meant to alert the user to conditions which may require intervention.  Colors used are similar to traffic stop signals – green simply
indicates a good status; orange indicates a warning of a condition which may become more severe over time; red indicates that
your immediate attention is needed.  Following is a full list of status messages.  If a recommended method of correcting the
problem is immediately available, it will appear as a functional button on the banner itself.
 
  • Color: green (no problem)
        o Awesome! You’re protected. (Premium mode and Premium Trial modes which will expire more than 7 days in
            the future)
        o You’re running Malwarebytes Free. (free mode only)
  • Color: orange (non-critical problem)
        o You’re not fully protected.
        o Your Protection Updates are not current.
        o Your program version is out of date
        o Your Premium Trial ends in <x> days. (trial expiring in 3-7 days)
        o Renew to avoid losing protection against malware, bad websites, and other threats
  • Color: red (critical problem)
        o Your Premium Trial ends in <x> days. (trial expiring in 0-3 days)
        o Your trial has expired
        o Renew to avoid losing protection against malware, bad websites, and other threats
        o We were unable to renew your subscription (renewal failed, and you are now in 30-day grace period)
 
 
 

Malwarebytes for Windows User Guide 10 Real-Time Protection
 
This item shows the status for each of the four Real-Time Protection features.  Please note that real-time protection is enabled only
for Malwarebytes Premium and Malwarebytes Premium Trial users.  This feature is not available if you are using the Free version.
 
Settings
 
Settings are accessed from the Main Menu, and also by clicking the small gear at the top right of the Real-Time Protection panel. 
When clicked, the Settings screen will be displayed, allowing access to all program settings.  Please refer to the Settings portion of
this guide (pages 24-35) for complete information on this topic.
 

Scan Status
 
This panel shows your scanning activity at a glance.  You can easily see when the last scan was completed, when the next scan is
scheduled, and the status of your protection updates.  There are four icons on the title bar for this panel, as shown here.
 

 
 
A description for each icon – in the order shown – is as follows.
 
View Scan Reports
 
This icon takes you to Reports, where you can view detailed reports on scans which Malwarebytes has performed on your computer. 
Please note that information shown here is limited to the last scan that was executed.  See the Reports Pane (pages 21-23) for
information on reports as a whole.
 
Schedule a Scan
 
The second icon allows scans to be scheduled for automatic execution.  This option is available only for Malwarebytes Premium and
Malwarebytes Premium Trial users.  The icon remains visible in Free mode, but clicking it has no effect.  When clicked, the Settings
screen will be displayed, allowing access to the Scan Schedule screen.  Please refer to the Scan Schedule portion of this guide (pages
13-15) for full information on this topic.
 
Check for Updates
 
The third icon causes Malwarebytes to connect with Malwarebytes servers to check for protection updates more current than those
in use, and download them if they exist.  This option is functional for all program modes.
 
Help
 
The fourth icon links to the Malwarebytes User Guide on the Malwarebytes website.  This behavior is consistent throughout the
program.
 

Protection History
 
This panel shows three key statistics.  It shows how many items were scanned, how many threats were detected during scans, and
how many threats were detected by real-time protection.  Please note that the number of items scanned includes individual files
that are part of archive files, as well as components in dynamic link library (DLL) files.  Also note that real-time detections can only
occur in Premium and Premium Trial modes.
 
 
 
 
 

Malwarebytes for Windows User Guide 11 Scan
 
The Scan Pane is the introduction to scan-related options in the program.  When you click Scan in the Menu Pane, you will see the
screen shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
On this screen, you may select the Scan Method and the Scan Schedule.  Let’s look first at Scan Methods.  There are three scan types
which can be executed – Threat Scan, Custom Scan, and Hyper Scan.  Hyper Scan is only available to users of the Premium or
Premium Trial modes.  Please note that global scan settings used by Threat Scans and Hyper Scans are selected in Settings (see
pages 30-31).  Following are more detailed descriptions of each of the scan modes.
 

Threat Scan
 
This method of scanning detects a large majority of threats that your computer may be faced with.  Areas and methods tested
include:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Registry Objects: Configuration changes which may have been made to the Windows registry.
  • File System Objects: Files stored on your computer's local disk drives which may contain malicious programs or code
      snippets.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects – as well as in other areas –
      which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats
      cannot reassemble themselves.
 
The Threat Scan is the scan method which we recommend for daily scans.  While it will not scan every file on your computer, it will
scan the locations which most commonly are the launch point for a malware attack.
 
 
 
 
 

Malwarebytes for Windows User Guide 12 Custom Scan
 
You may also choose to run a custom scan.  A custom scan allows you to scan according to specifications which you define at the
time of the scan.  These settings will override scan settings defined elsewhere.  A screenshot of the custom scan configuration
screen is shown below.  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Custom Scanning Options
 
These settings provide capability to determine the functional areas that will be scanned.  They are as follows:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.  It is
      important to note that threats detected during scans are still considered threats if they have an active component in
      memory.  As an extra measure of safety, memory objects should be scanned.
  • Startup and Registry Objects: Executable files and/or modifications which are initiated at computer startup, as well as
      registry-based configuration changes that can alter startup behavior.
  • Archives: If this setting is checked, archive files (ZIP, 7Z, RAR, CAB and MSI) will be scanned up to two levels  deep. 
      Encrypted (password-protected) archives cannot be tested.  If left unchecked, archive files will be ignored.
  • Rootkits: These are files stored on your computer's local disk drives which are invisible to the operating system.  These
      files may also influence system behavior.
 
Potentially Unwanted Programs/Modifications
 
These settings allow the user to choose how Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications
(PUMs) will be treated if they are detected.
 
Folders to be Scanned
 
This setting allows the user to include or exclude directories, subdirectories, and individual files from scans.  It utilizes a Windows
Explorer-like presentation model.  In the screenshot shown above, every directory except Desktop is selected for a custom scan. 
You may scan parent directories separately from child directories based on individual selections.
 
 
 
Malwarebytes for Windows User Guide 13 Hyper Scan
 
This scanning option is only available to users of Malwarebytes Premium and Malwarebytes Premium Trial versions.  This method of
scanning is limited to detection of immediate threats.  Areas and methods tested include:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
 
While a Hyper Scan will clean any threats which have been detected, we strongly recommend that a Threat Scan be performed if
a Hyper Scan has detected threats.
 

Scan Schedule
 
This tab allows users of the Premium and Premium Trial versions to add, edit and remove scheduled scans to be executed by
Malwarebytes.  This feature is not available to users of the Free version.  A screenshot of this tab is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
One scheduled scan is defined when Malwarebytes is installed.  Premium and Premium Trial users are free to modify or delete scans
at will, while Free users are provided with a single monthly scheduled scan.  Please note that if the initial task is deleted without a
replacement task being defined, your Malwarebytes program will not deliver the positive results that you expect.  The same
methods are used here to add a new task as well as to edit an existing task, so let's Add a new task in Basic mode.
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 14 Basic Mode
 
A screenshot of the basic Add Schedule screen is shown here.
 
                                                                  You can choose the
                                                                  specific task to be
                                                                  added on the left side of
                                                                  the screen, in the
                                                                  Scheduled Task area. 
                                                                  You may choose from
                                                                  the following tasks:
 
                                                                  • Threat Scan
                                                                  • Custom Scan
                                                                  • Hyper Scan
 
 
 

 
 
Scan types have been previously discussed in the Scan section of this guide (pages 11-19).  Please refer to those pages for further
information if desired.  The Frequency and Settings section allows you to define the timeframe (Schedule Frequency) that a task
will be executed, and how often (Recurrence).  For scans, this translates to:
 
  • Frequency = Hourly, recurrence in range of 1-48 hours
  • Frequency = Daily, recurrence in range of 1-60 days
  • Frequency = Weekly, recurrence in range of 1-8 weeks
  • Frequency = Monthly, fixed setting
  • Frequency = Once, fixed
  • Frequency = On Reboot, fixed
 
Advanced Mode
 
At the bottom left corner of the Add Schedule window is the Advanced button.  Click that to expand the Add Schedule window to
expose several more options.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
In Advanced Mode, we add options which tailor the scan more to your liking.  Let's look a little deeper, beginning with the
advanced options for scans.
 

Malwarebytes for Windows User Guide 15 Advanced Scan Options
 
Scheduled Task defines what task (scan/update) is to be added/edited, and when that task should begin – specifying both the date
and time.  Schedule Options provides several added capabilities to the basic settings which have already been described.  Here's a
rundown on the advanced options.
 
  • Quarantine all threats automatically: This option determines if a newly-detected threat would be automatically
      quarantined, or if you would be notified so that you could choose a course of action.  While automatic quarantine may
      seem to be the best course of action, it could have negative implications if a false positive was encountered.  A false
      positive is the categorization of a legitimate file as a malicious file.  It does rarely occur, and when it does, Malwarebytes
      Customer Success will assist you in having the offending file evaluated more fully by our Research group.
  • Restart computer when required for threat removal: This is available only if threats are automatically quarantined, and is
    not selected by default.  Some threats may require a computer restart to completely eliminate the threat, but we feel it’s
      best to notify you at the time, so you may save your work before restarting your computer.  If this were checked, you
      could lose work unless you were monitoring the scan in progress.
  • Scan for rootkits: This option allows specialized testing for the presence of rootkits.  Due to its nature, it increases the
      required time for a scan to execute.  This option is not available for Hyper Scans.
  • Scan within archives: This is selected by default.  It allows scanning to go two levels deep within archive files.  If not
      selected, the archive will be ignored.  It will also be ignored if it is encrypted.  This option is not available for Hyper Scans.
 
Frequency and Settings was discussed in the previous section (Advanced Mode).  Please refer to that section for more detail.
 
Recovery Options allow you to recover from a missed task (e.g. your computer was off at the time a scan was to take place).  A
scheduled task – if missed – will run at its next opportunity as long as it is within the duration specified by the Recover if missed by
selector and the Recover missed tasks checkbox is checked.
 

Watching Scan Progress
 
Each scan method requires a different amount of time to complete.  Unless significant changes have occurred on your local disk, a
Hyper Scan or Threat Scan should each be rather consistent from scan to scan.   A custom scan time interval may vary widely each
time, based on the areas scanned, the number of files involved, and the size and complexity of the files.  The screenshot below is
an example of a scan in process.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Malwarebytes for Windows User Guide 16 The progress bar shows milestones for each phase of the scan, with each milestone represented by a green or gray symbol.  In this
screenshot, some milestones are shown with green checkmarks, indicating that phase of the scan has been completed.  Scan
Memory is represented by an animation which indicates that this phase of the scan is currently being performed.  The remainder
of the tasks are shown as grey hourglasses, and are yet to be started.
 
You may also pause a scan while it is in process by clicking the Pause button.  The scan phase in progress will change to indicate
that the scan has been paused.  Click Resume to continue the scan where it left off.  You may also click Cancel at any time to
terminate the scan.  Results of the scan will be reported as if the scan ran to completion.
 

Scan Results
 
After a scan has been executed, Scan Results are displayed as shown here.  In this scan, three threats were detected.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
You may move threats to Quarantine by selecting the threat (using checkboxes to the left of the threat’s name) and clicking
Quarantine Selected.  If any threats are not selected to be moved to Quarantine, you will be prompted to Ignore Once, Ignore
Always, or Cancel.  Ignore Once will result in the threat once again being reported as a threat during the next scan execution. 
Ignore Always causes the threat to be added to Exclusions.   A threat which has been added to Exclusions will no longer be reported
as a threat unless there is reason to believe that it has been tampered with.  You must provide a disposition for each threat
displayed on this screen.
 
Threats which have been moved into Quarantine cannot harm your computer.  They are neutralized as part of the Quarantine
process.  Please see Quarantine (page 20) for further information.
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 17 Scan Summary
 
The final screen to be displayed as part of a scan is the Scan Summary.  It provides summary information about the scan, and allows
you to view scan detail on screen, or export scan summary or scan detail to a text file.  A screenshot of the Scan Summary is shown
below.  Free and Premium Trial users will see a reminder of the value of a Malwarebytes subscription on this page as well.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Clicking the View Report button displays the Scan Report for the scan just completed.  It is shown here as well.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
When threats are detected during a scan, the user must decide how these threats should be handled.  The following series of
screenshots detail this flow.  In the first screenshot, twenty threats have been detected.  By default, all are selected for removal. 
Please note that the total number of detected threats is shown above the list of threats, as is the number of threats selected for
removal.
 
 
 
Malwarebytes for Windows User Guide 18 
 
In order to demonstrate the behavior of this screen, we will uncheck some of the threats.  This indicates that only the checked
threats are to be removed.  Clicking the Quarantine Selected button results in the screen shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Threats that were not selected still require remediation, based on input supplied by the user.  In this case, the choices available are
Ignore Once, Ignore Always and Cancel.  Clicking the Ignore Once button temporarily ignores a threat, although it will be shown
as a threat on subsequent scans.  Selecting Ignore Always results in the threat being added to the Exclusion List.  It would not be
 
 
 
Malwarebytes for Windows User Guide 19 scanned in the future.  Clicking Cancel keeps you on this screen until you choose how to handle all detected threats.  Once a
disposition has been selected for all detected threats, the screen below will be displayed.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Although threats have been quarantined, you must restart the computer to assure the threat removal process is complete.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 20 Quarantine
 
When executing scans (on-demand or as part of real-time protection), some programs, files or registry keys may have been
categorized as threats.  At that time, they were removed from the disk location where they were stored, placed in quarantine, and
modified so that they could not pose a threat to your computer.  There may be items which fall into this category, but are not
malicious.  It is up to individual users to research and make this determination.  Upon entry to the Quarantine option, you are
presented with the screen shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Quarantined items are shown in a table format, with pertinent information presented to help you determine what action needs to
be taken.  Each item listed has a checkbox in the leftmost column.  Check the checkbox to restore or delete the item.  Please note
that the Restore and Delete buttons are greyed out until items are selected.  If you wish to apply the same action to all quarantined
items, select the checkbox in the table header and click Restore or Delete.
 
Please be aware that quarantined items which are not deleted or restored will continue to be visible here until action is taken.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 21 Reports
 
The Reports Pane displays a list of scans and real-time protection detections, in reverse chronological order.  A Protection Event that
starts with the word Scan is a report summarizing the specified scan.  All other reports listed on this screen are detail pertaining to
detections made by real-time protection.  A screenshot is shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Selected reports may be viewed on screen, or exported to a text file for later viewing.  Opening a report will display a summary of
the event.  You can click the Advanced tab to view more information about the event. Details displayed for Protection Events will
be relevant to the type of event shown.  Please note that only manual (on demand) scans are available for users of the free version
of Malwarebytes.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 22 The Scan Report may appear in two different forms.  If one or more threats were detected during a scan, the report will appear as:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Please note that the bottom portion of the report shows the threats detected during the scan.  It is scrollable when required.  The
top portion of the report contains a summary of the scan.  You can click the Advanced button to view more details, as shown here:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 23 Viewing or Deleting Logs
 
You may view any log file by clicking the log to select it, then clicking the View Report button.  As mentioned previously, there are
several output options for Protection Logs.  To delete logs, click the checkbox corresponding to those logs you wish to delete, then
click the Delete button.  Please bear in mind that computers which have significant threat activity will also have larger logs.  You
should periodically check how much disk space is being used for logs, so that logs do not impact normal operation of your
computer.
 
Please note that an Export button is shown at the bottom left corner of this screen.  This allows you to make a copy of the log for
use by other programs.  You may export to your clipboard or to a text (TXT) file.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 24 Settings
 
The Settings screen allows the user to change all Malwarebytes operational settings.  We have grouped settings by the
areas/functions which they control into tabs to maintain a clean user interface.  When you select any tab, you will see the Detail
Pane change to reflect the tab which you selected.  At the same time, the tab itself is highlighted.
 
Before we dig in to each of the tabs, a brief description of each is in order.
 
  • Application Settings: Settings that affect Malwarebytes, as well as how it coexists with Windows.
  • Protection Settings: How Malwarebytes should protect you during scans and (for Premium/Trial mode users only) Real-
      Time Protection.
  • Scan Schedule: When Malwarebytes should execute scans and check for protection updates.  This setting is functional
      only for users of Premium/Trial mode.
  • Exclusions: Items which will be excluded from testing which detects malware, as well as websites which are categorized
    as malicious but specifically approved by the user.
  • My Account: Information pertaining to the status of your subscription.
  • About: Version numbers corresponding to Malwarebytes as a whole, and for various components of the program which
    may be updated individually.  Malwarebytes company resources are also listed on this page.
 
When Settings is selected, the Application tab is always selected.  If you navigate away from Settings – to Dashboard, Scan,
Quarantine or Reports – you will always return to the Application tab of Settings when you click on Settings.
 
Now, let's take a look at Application Settings!
 

Application Settings
 
This is the entry screen you will see when you click on Settings in the Menu Pane.  It controls how Malwarebytes interacts with
many aspects of your computer’s operating system.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
The scroll bar at the right of this screen indicates there are many more options available on this screen than what appear here.  We
will now cover each of them in order.
 
 
 
Malwarebytes for Windows User Guide 25 Application Updates
 
Malwarebytes may have updates available for individual program components, or for the full program.  We provide two toggle
switches which allow you to choose whether either or both upgrade modes can be integrated into your copy of Malwarebytes
when they are available.  Click Install Application Updates to check for available program updates or upgrades.  You can choose if
you upgrade, and when.  Upgrades only happen with your consent.
 
Notifications
 
Notifications regarding scans, real time protection, updates and subscriptions occur in windows at the lower right corner of your
screen, outside of the Malwarebytes interface.  You may enable or disable these notifications.  Most notifications are enabled by
default, while a few can be disabled.  Please note that some non-critical information may not be visible if you disable notifications. 
Disabled notifications do not leave the user at risk at any time. The following notifications may be disabled.  Please refer to
Appendix A (Notification Window Examples) at the end of this guide for further information.
 
    • Malicious Website Blocked
    • Malware Detected (auto-quarantine)
    • Non-Malware Detected (auto-quarantine)
 
Some users intentionally turn off one or more components of real-time protection.  Users may now disable notifications that
components have been turned off.  Please note that as a result of this setting, users will be unable to receive notifications regarding
real-time protection failures in the event of program malfunction.
 
Impact of Scans on System
 
Most users schedule scans to occur during times when their computer is typically idle.  Execution of a manual scan may be
performed as a matter of convenience, or while other tasks are being executed.  The performance of lower-powered computers
may be affected by execution of the Malwarebytes scan.  This setting allows the user to determine the priority of the scan to be
performed.  Lower scan priority will require more time to execute while impacting other operations to a lesser degree.  High priority
allows the scan to be executed at the maximum speed which the computer allows, but may affect other tasks.
 
Windows Context Menus
 
Malwarebytes has the capability to launch a Threat Scan upon one or more individual files or directories from within Windows
Explorer by using the context menu that becomes available when the files/directories are right-clicked.  This setting allows that
capability to be turned on or off.  The default setting is On.
 
Display Language
 
This setting determines the language used throughout.  This is pre-set, based on the language used during program installation. 
It can be modified at will.
 
Event Log Data
 
This setting provides additional information regarding program actions which are beyond typical needs of the user.  Should you
encounter a technical issue with Malwarebytes, our Customer Success engineers may request that you enable this setting to
provide additional troubleshooting information.  Once troubleshooting is complete, please remember to turn this setting off to
prevent unnecessary disk usage.  The default setting is Off.
 
Proxy Server
 
This determines whether Internet connections will use a proxy server.  This is more often used on a corporate network.  It has two
primary purposes.  The first is to funnel communications to and from the outside world through a single connection point, thus
assuring anonymity of all computers on the internal network.  The second purpose is to cache content.  This means that external
content which had recently been downloaded is saved locally for some period of time, and subsequent requests by that user (or
others) could use the recently-saved data.  This conserves significant bandwidth, resulting in lower operating costs.
 
 
 
 
 
Malwarebytes for Windows User Guide 26                                       By default, Malwarebytes does not use a proxy.  If configured to
                                      do so, the bottom panel will change to provide configuration
                                      options as shown in the screenshot shown here.
 
                                      You can now specify the IP address or name of a proxy server,
                                      as well as the appropriate port number.  If a proxy is in use, the
                                      name and port number must be specified by the person who
                                      controls access to the proxy server.  He will also be able to tell
                                      you whether authentication is required to use the server, and if
                                      so, provide a user name and password which have been
                                      assigned to you.
 
 
 

User Access
 
This slider allows users of Malwarebytes Premium and Malwarebytes Premium Trial versions to restrict access to various features
and functions in Malwarebytes with password protection.  The Edit User Access button is only visible when the slider is in the On
position, allowing the user to define sections of the program which require a password to access.
 
 
 

 
 
When the Edit User Access button is clicked, a new window opens directly above the Malwarebytes program screen to restrict
access to selected areas of the program only to those users who possess the password.  The password is also defined on this screen.
 
WARNING: This password is not recoverable.  If you lose your password, you will have to reinstall Malwarebytes to access restricted
features.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
As shown above, the Reports tab has been placed under password control.  This also causes User Access to be placed under
password control.  This prevents unauthorized users from gaining access to restricted areas.
 

Malwarebytes for Windows User Guide 27                                                     When attempting to gain access to a
                                                    restricted area, you will be required to enter
                                                    a password (as shown here).
 
 
 
 
 
 
 
                                                    If an incorrect password is entered, or if a
                                                    null password is used, this error message
                                                    will be displayed.
 
 
 
 
If this feature has been enabled and is subsequently disabled, any restrictions which have been defined are cancelled.  This feature
is not available to users of the Free version.  Currently, only one policy may be in effect at any given time.
 
Windows Action Center
 
You may have noticed an icon in your system tray with a red X superimposed over a white flag. That is a status indicator for the
Windows Action Center, which tells you when your computer has a security issue that needs your attention.  Malwarebytes Premium
or Malwarebytes Premium Trial can now be registered as a security solution on your computer.  There are three settings available,
which will be abbreviated here for easier reading.  Brief descriptions for the meaning of each setting are also provided. 
 
  • Let Malwarebytes choose whether to register: Malwarebytes will determine whether it should be registered in Action
      Center. The program will not register when Microsoft Security Essentials is in use on a Windows 7 or older operating
      system. It will also not register when Windows Defender is used on a Windows 8 or newer OS.
  • Always register Malwarebytes: Malwarebytes program status will always appear in Action Center.
  • Never register Malwarebytes: Malwarebytes program status will never appear in Action Center.
 

Beta Application Updates
 
Some Malwarebytes users want to try the newest features as soon as they are available, while some prefer to wait until the product
is released.  We have added this program setting so that if you want the latest and greatest immediately, we can deliver it to you
automatically.  When you enable this setting, you will see the following dialog box.
 
 
 
 
 
 
 

 
 
Usage and Threat Statistics
 
If you check this box, you will be sending us information to help us do our jobs.  We like to know what countries Malwarebytes is
being used in, and the breakdown of Premium, Premium Trial, and Free versions.  Our Research organization likes to keep track of
what malware we are detecting and how often.  We learn that from what you send us, and helps us to serve you more effectively. 
We hope that's fine with you as well.  For a full list of information that is collected, please see the Malwarebytes Privacy Policy, at:
 
 

Malwarebytes for Windows User Guide 28 Protection
 
Most settings which control how Malwarebytes protects your computer are located on the Protection tab.   Settings are grouped
by category.  A screenshot is shown below, along with descriptions of all settings available on this tab.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Real-Time Protection
 
Malwarebytes offers four different types of real-time protection.  These features are available only to users of the Premium and
Premium Trial modes.  It is important to note that Premium Trial users who do not convert to a Premium subscription will lose all
real-time protection features at the end of their trial.
 
Web Protection protects Premium/Trial users by blocking access to/from Internet addresses which are known or suspected of
engaging in malicious activity.  This feature does not treat different protocols differently.  It does not distinguish between your
favorite game being served on one port and a potential malware source being served on another.  Should you choose to disable
this feature, you could inadvertently compromise your computer's safety.  Please note that this option is disabled if you are using
the Free version.
 
Exploit Protection uses multiple protection layers to guard against attempted exploits of vulnerabilities in legitimate applications. 
When applications are launched by the user, exploit protection is also launched as a shield.  This protection will often detect and
neutralize attacks that go undetected by other security applications.  It is on by default for Premium/Premium Trial users.
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 29 
 
Many popular applications have been pre-configured for shielding.  A screenshot is shown above.  To change the status of any
application, either use the Protection slider, or double click either the Application or File Name.  Premium/Premium Trial users may
add protection for other applications, and edit specifications for any defined shield.  The Edit screen is shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
You may specify an Application name which is easily recognizable, and the Application file name.  You can also browse for the file. 
Select a Program type which most closely resembles the purpose of the application.  If you are unsure, select Other.
 
The same screen is used to edit existing entries.
 
 
 
Malwarebytes for Windows User Guide 30 In addition, Premium/Premium Trial users can modify advanced exploit protection settings.  Several advanced settings are spread
across four tabs, depending on the classification of protection they provide.  One tab is shown here as an example.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Each advanced setting is available for up to six different application groups, the groups representing the method by which threats
will attempt to exploit vulnerabilities in applications of that type.  Protection may be turned on (checked), off (unchecked), or is
not applicable for that group of applications (greyed out).  While these settings provide very specific protection, they should only
be changed when requested by a Malwarebytes Customer Success specialist.  Incorrect settings may result in impaired protection.
 
Malware Protection may be turned on or off as needed by Premium/Premium Trial users.  It is on by default.  This feature protects
against malware present in code/files that try to execute on your computer.  These files may have been downloaded, imported
from a USB drive, or received as an email attachment.  While we do not recommend disabling this protection mechanism, there
may be times when it needs to be done to troubleshoot compatibility issues that arise with anti-virus updates or computer startup
problems.  If either situation does occur, start your computer in Safe Mode, disable Malware Protection, isolate and correct the
issue, then turn Malware Protection back on.  Please note that this option is disabled if you are using the Free version.
 
Ransomware Protection provides Premium/Premium Trial users protection against the threat of ransomware.  This protection is
not available for users of Windows XP or Windows Vista.  While all other protection features may provide some degree of protection
against ransomware, well-crafted ransomware may go undetected until it attempts to initiate its attack.  As many computer users
have found, there is little or no remedy available after the fact.  We strongly recommend that ransomware protection be turned
on at all times.  It is on by default.  Please note that this option is disabled if you are using the Free version.
 
Scan Options
 
Scan for rootkits utilizes a specific set of rules and tests to determine if a rootkit is present on your computer.  For readers who are
unfamiliar with this term, an explanation may be handy.  A rootkit is malicious software that can be placed on a computer which
has the ability to modify operating system files in a manner that hides its presence.  Malware detection methods that rely on hooks
to the operating system for detection and analysis would prove ineffective if the hooks had been purposely manipulated by
malware.  Our testing method is more intensive and more effective, but including rootkit scans as part of your overall scan strategy
increases the time required to perform a scan.
 
 
 

Malwarebytes for Windows User Guide 31 When Scan within archives is enabled, Malwarebytes will scan two levels deep within archive (ZIP, RAR, 7Z, CAB and MSI) files.  If
this option is disabled, the archive is excluded from scanning.  Please note that encrypted archives cannot be fully tested.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
We have introduced a new signature-less detection technology which takes advantage of machine learning to supplement existing
detection methods.
 
Potential Threats
 
In addition to malicious software detection and elimination, Malwarebytes also detects and acts upon two classes of non-malware. 
These are Potentially Unwanted Programs (PUP's) and Potentially Unwanted Modifications (PUM's).  In many cases, PUP's appear
in the form of toolbars and other application software which are installed on your computer as part of a bundle.  You may have
asked for one application, and it came with a second application that was not mentioned, or was mentioned, but you did not
uncheck the checkbox next to it to prevent it from being installed at the same time.  You may also want and use the PUP.  We do
not judge the merit of the program or its usability.  We do offer a method of removing it if you choose to.
 
PUM's are a bit different.  These are modifications that are typically related to the Windows registry.  As a user, you will generally
not be making changes to the registry that would qualify as a PUM, though the possibility does exist.  Because it does, we allow
you to define your own rules when it comes to how they are treated.
 
With regard to both types of modifications, we provide three handling methods.  These are:
 
  • Ignore detections: Malwarebytes will not act on detection, nor will you be alerted.
  • Warn user: You will be alerted to the detection.  You may choose to ignore it, create an exclusion, or treat it as malware.
  • Always detect PUPs/PUMs (recommended): The detection will be treated as malware, and corrective actions will occur.
 
While PUP's and PUM's are both handled in the same manner, each is handled according to separate guidelines which you specify.
 
Updates
 
Users of Malwarebytes Premium and Malwarebytes Premium Trial have the ability to automatically check for protection updates,
and to specify when those checks will be performed.  The date range is adjustable between fifteen (15) minutes and fourteen (14)
days, the increment depending on the range (minutes/hours/days).  We recommend that you do not allow the rules database to
become dated, as much damage can be caused by zero-day infections – those threats that are too new to be adequately protected
 
 
 
Malwarebytes for Windows User Guide 32 against by anti-virus software.  The default for this feature is on.  You may also have Malwarebytes display a notification in the
corner of your screen if protection updates are more than 24 hours old.
 
Startup Options
 
These settings define how Malwarebytes behaves when your computer starts.  You may launch several applications at startup, and
they may initiate processes which require Malwarebytes launch timing to be adjusted.  Let's look at each setting in detail.
 
  • Start Malwarebytes at Windows startup:  If this setting is unchecked, Malwarebytes will not start with Windows.  No real-
      time protection layers will start when Windows starts, though they may still be started manually by launching
      Malwarebytes.
  • Delay Real-Time Protection when Malwarebytes starts:  There may be times when the startup of system services used by
      Malwarebytes conflicts with services required by other applications at boot time.  When this is the case, turn this setting
    on.  You may also adjust the delay timing.  You will need to experiment with the specific delay setting necessary to
      compensate for any conflicts that are noted.  When required, this must be done on a case-by-case basis.  The delay setting
    is adjustable from 15-180 seconds, in increments of 15 seconds.
  • Enable self-protection module:  This setting controls whether Malwarebytes creates a safe zone to prevent malicious
      manipulation of the program and its components.  Checking this box introduces a one-time delay as the self-protection
      module is enabled.  While not a negative, the delay may be considered undesirable by some users.  When unchecked,
    the "early start" option which follows is disabled.
  • Enable self-protection module early start:  When self-protection is enabled, you may choose to enable or disable this
      option.  When enabled, the self-protection module will become enabled earlier in the computer's boot process –
      essentially changing the order of services and drivers associated with your computer's startup.
 
Automatic Quarantine
 
Users of Malwarebytes Premium and Malwarebytes Premium Trial may specify whether malware will be automatically quarantined
when it is detected.  The default setting is on.  If the users decline to automatically quarantine malware, a notification will display
in the lower right corner of the screen for each detection, and the user must specify whether the file is to be ignored once, ignored
always (added to Exclusions) or quarantined.
 
Scan Schedule
 
You may also adjust Scan Schedules here as part of program settings.  This aspect of program settings has already been covered
on pages 11-19.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 33 Exclusions
 
This tab allows additions to, or deletions from a list of items to be excluded from scans.  The list may include files, folders, websites,
applications which connect to the Internet, or previously detected exploits.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Add Exclusion
 
Exclusions are exempt from scanning and from real-time protection.  This may include files, folders, web sites, applications and
safe programs which have been identified as exploits.  Clicking Add Exclusion launches the Add Exclusion Wizard, as shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Malwarebytes for Windows User Guide 34 You may then add items – one at a time – to the list of exclusions.  Each item type is defined by criteria as follows:
 
  • File or folder: Its location on the file system, and whether it should be excluded from malware and ransomware, only
      malware or only ransomware.  While you may have your own reasons for excluding files or folders from scans, the primary
      reason for doing so is to prevent potential conflicts with anti-virus software.  Malwarebytes works well alongside most
      anti-virus software, but anti-virus updates by some vendors may occasionally be flagged as a threat.  For this reason, we
      offer the provision for you to exclude certain disk content from scanning.  This is commonly offered by anti-virus vendors
    as well.
 
      NOTES: 
 ● Clicking Select Folder… selects only folders, which by default will also exclude any files within those folders,
      as well as subfolders.
 ● Clicking Select Files… selects individual files for exclusion.  The status of the folder is unchanged.
 
  • Website: Enter the Domain or IP Address to specify the web address.  When adding a domain manually, please add it
      both with and without the "www." prefix.  Depending on several external factors, the domain may still be blocked if only
    one variation is entered.  Also, domain exclusions are only functional on Windows Vista Service Pack 2, Windows 7,
      Windows 8.x and Windows 10.  Please note: Exclusions can also be added by clicking the link in the notification message
      when the website is blocked by Malwarebytes Website Protection.
  • Application that connects to the Internet: Specify the name of the application.  This is most applicable if the detection is
    a false positive (legitimate application with some similar characteristics to malware).
  • Previously Detected Exploit: Specify the MD5 hash of the exploit.  This is most applicable if the detection is a false positive
      (legitimate application with some similar characteristics to malware).  The hash guarantees uniqueness of the file in
      question.
 

My Account
 
Here, you can click the Go to My Account button to obtain status of all of your subscriptions, and change preferences related to
your account.  You can also deactivate your license – useful when moving your Malwarebytes program to a new computer – or
change license key.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 

Malwarebytes for Windows User Guide 35 All of the information shown here is self-explanatory.  A set of option buttons are available at the bottom of the screen.  The options
vary depend on the mode of the program.  Buttons for the three program modes are shown below.
 

          Premium Mode
            options
 
 
        Premium Trial Mode
            Options
 
 
          Free mode
            Options
 
 
          Free mode
            Options (*)
 
 
When Malwarebytes was installed, Premium Trial mode was set automatically (if you were eligible for a trial).  There may be
circumstances where you have the option of re-entering Premium Trial mode.  This would result in the second Free mode display. 
If you click the button Change License Key (Premium mode) or I Already Have a License (Premium Trial or Free mode), you will see
the following screen superimposed over the Malwarebytes interface.
 
                                                  Follow screen instructions to enter your license
                                                  information.  If you do not have a license, either
                                                press Cancel (to close this window and return to
                                                the screen you came from), or Purchase a License
                                                to go to the Malwarebytes website and purchase
                                                a license for the product.
 
 
 
 
 

 
 

About
 
This tab tells you more about Malwarebytes, and what resources are available to you should you need technical assistance.  The
upper panel contains Version Information.  We have split up the program into software components.  If you have configured the
program to provide program updates, it is easier and faster for us to provide the newest version to you by updating the
components that have changed, rather than updating the entire program.  It also benefits you if you need technical support,
because the versions of each component may influence the direction that our Customer Success engineers take when
troubleshooting an issue.
 
The Resources section provides contact addresses (URLs) which may assist you for sales, support, and educational purposes.  In
addition, you can view the third-party notices (open source software which we use in our products) as well as a link to our End User
Licensing Agreement (EULA).
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 36 Appendix A: Notification Window Examples
 
Malwarebytes provides a number of user notifications during operation.  These notifications are always positioned in the lower
right corner of your screen.  The length of time that they will remain on your screen is configurable in Application Settings (page
24).
 

Scan Notifications
 
 
 
                                                An automatic scan has been completed. Malware was
                                                  detected during execution of the scan.  Click Upgrade Now
                                                to purchase Malwarebytes Premium. This notification will
                                                only appear for Malwarebytes Free users.
 
 
 
 
 
                                                A scan (scheduled or on-demand) has been completed. 
                                                  Malware was detected during execution of the scan.  Click
                                                View Scan Results to review the scan log to determine the
                                                exact nature of the threat(s).
 
 
 
 
                                                A scan (scheduled or on-demand) has been completed. 
                                                  Non-Malware was detected during execution of the scan. 
                                                This is typically a Potentially Unwanted Program (PUP) or
                                                Potentially Unwanted Modification (PUM), which may be
                                                  acceptable to you.  Click View Scan Results to review the
 
                                               scan log to determine the exact nature of the threat(s).
 
 
 
                                                A scan (scheduled or on demand) has been completed.  No
                                                  problems were detected.
 
 
 

Real Time Protection Notifications
 
 
 
                                                After the user has indicated that they wish to turn off
                                                  notifications regarding real-time protection components,
                                                this notification will be displayed to request confirmation
                                                of the user’s wishes.
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 37 
 
                                                One or more components of real-time protection are
                                                disabled.  You may re-enable protection by clicking Turn
                                                On button, or by clicking Manage Protection Settings.  This
                                                is not available for Malwarebytes free users.
 
 
 
 
                                                  Malware has been detected as a function of real-time
                                                protection.  You have not chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so no specific action has been taken.  The program now
                                                being detected as malware may be acceptable to you, so
                                                you may choose to allow its execution once, always, or
                                                elect to quarantine it at this time.  This is not available for
 
 Malwarebytes Free users.
 
 
 
                                                  Real-time protection has detected a Potentially Unwanted
                                                Program (PUP).  You have not chosen to ignore this type of
                                                activity, or to exercise the auto-quarantine capability upon
                                                  detection, so no specific action has been taken.  This
                                                  detection may be acceptable to you, so you may choose to
                                                ignore it once, always, or elect to quarantine it at this time. 
                                                This is not available for Malwarebytes Free users.
 
 
 
 
                                                  Malware has been detected as a function of real-time
                                                protection.  You have chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so the offending software has been moved to quarantine
                                                and modified so that it may not cause any damage to your
                                                  computer.
 
 
 
 
 
                                                A Potentially Unwanted Program (PUP) has been detected
                                                as a function of real-time protection.  You have chosen to
                                                exercise the auto-quarantine capability when a PUP has
                                                been detected, so the offending software has been moved
                                                to quarantine and modified so that it may not cause any
                                                damage to your computer.
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 38 
 
                                                An attempt has been made by software present on your
                                                  computer to contact a website suspected to be malicious,
                                                and has been blocked.  This detection occurred as a
                                                  function of real-time protection.  You may allow access by
                                                clicking Manage Exclusions, which will redirect you to the
                                                Exclusions screens.
 
                                                Please note: Unblocking a website out of convenience may
                                                result in damage being caused to your computer.
 
 
 
 

                                                  Anti-exploit protection has prevented an attacker from
                                                  exploiting your computer through a vulnerability. 
 

 
 
 
 

                                                  Anti-ransomware protection has prevented an attacker
                                                from exploiting your computer with suspected
                                                  ransomware.  The threat has been neutralized and moved
                                                to Quarantine.
 

 
 
 
 
                                                After threats have been quarantined, your computer must
                                                be rebooted to complete the quarantine process, and this
                                                  notification is displayed.  After assuring that other work is
                                                saved, click Reboot Now to perform that task.
 
 
 

Update Notifications
 
 
 

                                                A program update for Malwarebytes is available.  Click
                                                Install Now to get the latest program protection.
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 39 
 
                                                Your Malwarebytes updates are out of date.  Click Update
                                                Now to cause an immediate update.  Failure to update will
                                                cause subsequent scans to use outdated protection rules,
                                                which could jeopardize the safety of your computer.
 
 
 
 
 
  
 
  
 
  
 

Premium Notifications
 
 
                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, you will begin to see this message
                                                thirty (30) days before the expiration of your subscription,
                                                  counting down the number of days remaining on your
                                                  subscription. Click Renew Now button to renew your
 
 subscription in a new browser window/tab.
 
 
 
                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, this notification is displayed on the
                                                final day of your subscription.  Click Renew Now button to
                                                renew your subscription in a new browser window/tab.
 
 
 
 If you do not have auto-renewal set up on your account
                                                and have not responded to pending expiration, you will
                                                see this notification a maximum of three times after your
                                                  subscription has expired.  At this point, you have reverted
                                                to the free version of Malwarebytes.  Premium features
                                                have been disabled.  Click Upgrade Now to renew your
                                                  subscription in a new browser window/tab.  A slightly
 different version of this notification appears within the
                                                  Malwarebytes user interface.
 
 
 
                                                This notification is displayed if your subscription cannot be
                                                  renewed.  Usually the reason for this is an expired
                                                  credit/debit card.  You will be given an opportunity to
                                                update your card information, and your subscription will
                                                remain in force for a brief period.
 
 
 
 
 

Malwarebytes for Windows User Guide 40 
 
                                                Your subscription has expired and could not be
                                                  automatically renewed.  Your Malwarebytes service has
                                                been downgraded from Premium to Free.  You can still run
                                                scans for protection, though real-time protection is no
                                                longer in force.
 
 
 
 
 
 
  
 
  
 

Premium Trial Notifications
 
 
 
                                                  Beginning five days before your Premium trial expires, you
                                                will receive a notification once per day about the expiring
                                                trial, and be given an opportunity to upgrade to Premium
                                                or to enter your Premium license information.
 
 
 
 
 
                                                On the last day of your Premium trial, you will receive a
                                                single notification, and be given an opportunity to
                                                upgrade to Premium or to enter your Premium license
                                                  information.
 
 
 
 
 

                                                After your Premium trial expires, you will receive this
                                                  notification in the Malwarebytes user interface as well as in
                                                the Windows system tray.
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 41
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

Victor Gouveia
 

Does this user guide take into account blind people, or is it just written with the general user in mind?
 
Not for nothing, but a great many of these user guides have images instead of actual written explanations, and they usually state to click on something, even though the Jaws’ various cursors can’t get to it.
 
Victor
 

From: Mike B.
Sent: Thursday, October 25, 2018 3:26 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws
 
Hi Again Sherri,
 
Below is the user guide from Malwarebytes.  It's for a slightly older version but, it works the same way as the latest version.
 
            Malwarebytes for Windows User Guide
 
                                      Version 3.4.5
 
                                      29 March 2018
 
 
 
 
 
 
 
 
 
 

Notices
 
Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws.  Except as expressly permitted in your license agreement or allowed by
law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or
display any part, in any form, or by any means.  You may copy and use this document for your internal reference purposes only.
 
This document is provided “as-is.”  The information contained in this document is subject to change without notice and is not
warranted to be error-free.  If you find any errors, we would appreciate your comments; please report them to us in writing.
 
The Malwarebytes logo is a trademark of Malwarebytes.  Windows is a registered trademark of Microsoft Corporation.  All other
trademarks or registered trademarks listed belong to their respective owners.
 
Copyright © 2018 Malwarebytes.  All rights reserved.
 

Third Party Project Usage
 
Malwarebytes software is made possible thanks in part to many open source and third party projects.  A requirement of many of
these projects is that credit is given where credit is due.  Information about each third party/open source project used in
Malwarebytes software – as well as licenses for each – are available on the following page.
 
 

Sample Code in Documentation
 
The sample code described herein is provided on an “as is” basis, without warranty of any kind, to the fullest extent permitted by
law. Malwarebytes does not warrant or guarantee the individual success developers may have in implementing the sample code
on their development platforms. You are solely responsible for testing and maintaining all scripts.
 
Malwarebytes does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or
completeness of any data or information relating to the sample code. Malwarebytes disclaims all warranties, express or implied,
and in particular, disclaims all warranties of merchantability, fitness for a particular purpose, and warranties related to the code, or
any service or software related there to.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

CWC04-3045a                                   Table of Contents
 

Introduction ............................................................................................................................ 1
 
What’s New in Malwarebytes for Windows ................................................................. 2
 
System Requirements ......................................................................................................... 3
 
Installation .............................................................................................................................. 4
 
  Free, Premium Trial or Premium? ........................................................................................................ 4
 
  Activation .................................................................................................................................................... 5
 
  A Final Word about Administrative Rights ....................................................................................... 6
 
Screen Layout ....................................................................................................................... 7
 
  Menu Bar ..................................................................................................................................................... 7
      My Account ........................................................................................................................................................................ 7
      Notification Center .................................................................................................................................. 7
 
  Menu Pane ................................................................................................................................................. 8
 
    Status/Option Pane ................................................................................................................................. 8
 
  Detail Pane ................................................................................................................................................. 9
 
Dashboard ............................................................................................................................ 10
 
  Status Pane ............................................................................................................................................... 10
 
  Real-Time Protection.............................................................................................................................. 11
      Settings .............................................................................................................................................................................. 11
 
  Scan Status ................................................................................................................................................ 11
      View Scan Reports .......................................................................................................................................................... 11
      Schedule a Scan............................................................................................................................................................... 11
      Check for Updates .......................................................................................................................................................... 11
      Help ..................................................................................................................................................................................... 11
 
  Protection History ................................................................................................................................... 11
 
Scan ........................................................................................................................................ 12
 
  Threat Scan ............................................................................................................................................... 12
 
  Custom Scan ............................................................................................................................................ 13
      Custom Scanning Options............................................................................................................................................ 13
      Potentially Unwanted Programs/Modifications ..................................................................................................... 13
      Folders to be Scanned ................................................................................................................................................... 13
 
  Hyper Scan ............................................................................................................................................... 14
 
  Scan Schedules ....................................................................................................................................... 14
      Basic Mode ........................................................................................................................................................................ 15
      Advanced Mode .............................................................................................................................................................. 15
      Advanced Scan Options ................................................................................................................................................ 16
 
  Watching Scan Progress ...................................................................................................................... 16
 
  Scan Results ............................................................................................................................................. 17
 
  Scan Summary ......................................................................................................................................... 18
 
Quarantine ............................................................................................................................ 21 Reports .................................................................................................................................. 22
 
  Viewing or Deleting Logs .................................................................................................................... 24
 
Settings ................................................................................................................................. 25
 
  Application Settings .............................................................................................................................. 25
      Application Updates ...................................................................................................................................................... 26
      Notifications ..................................................................................................................................................................... 26
      Impact of Scans on System ......................................................................................................................................... 26
      Windows Context Menus ............................................................................................................................................. 26
      Display Language ........................................................................................................................................................... 26
      Event Log Data................................................................................................................................................................ 26
      Proxy Server ..................................................................................................................................................................... 26
      User Access ...................................................................................................................................................................... 27
      Windows Action Center ............................................................................................................................................... 28
      Beta Application Updates ............................................................................................................................................ 28
      Usage and Threat Statistics ......................................................................................................................................... 28
 
  Protection ................................................................................................................................................ 29
      Real-Time Protection .................................................................................................................................................... 29
      Scan Options .................................................................................................................................................................... 31
      Potential Threats ............................................................................................................................................................ 32
      Updates ............................................................................................................................................................................. 32
      Startup Options .............................................................................................................................................................. 33
      Automatic Quarantine .................................................................................................................................................. 33
 
  Scan Schedule ........................................................................................................................................ 33
 
  Exclusions ................................................................................................................................................. 34
      Add Exclusion .................................................................................................................................................................. 34
 
  My Account ............................................................................................................................................. 35
 
  About ........................................................................................................................................................ 36
 
Appendix A: Notification Window Examples ............................................................. 37
 
  Introduction
 
Malwarebytes for Windows (“Malwarebytes”) is an "AV replacement."  It is not an AV.  It does not incorporate the same old engine
for file-infectors and other malware that you find in a typical AV or Internet security suite, the large and inefficient library of
signatures, or the bloatware features which are becoming more prevalent.
 
You don't need to pay for a traditional AV anymore!  At Malwarebytes, we have always approached things differently and, as many
people know based on their own positive experience with Malwarebytes finding and remediating malware that gets past AVs, we
know a thing or two about zero-day malware and their infection tactics.  We have always believed that no one product can do it
all, and the free AV that comes with modern operating systems, in conjunction with Malwarebytes is all you will ever need.
 
In today's modern threat world, bad guys have learned how to evade AV protection, making it more important than ever before
to be able to disrupt attacks in as many different stages of the attack chain as possible.  Malwarebytes, layered with the AV (which
is the default mode) or as your stand-alone defense, is the most effective approach against modern threats.  And if all else fails,
you need the best remediation technology available.
 
Malwarebytes has been engineered to provide the most effective layered approach of prevention, detection and remediation
technologies:
 
  1. Application hardening, to make them more resilient against attacks.
  2. Anti-exploit technology, to shield applications from vulnerability exploits (currently one of the top infection vectors).
  3. Application Behavior Enforcement, an advanced and signature-less technology which prevents common infection
      vectors (e.g. web & email based social engineering).
  4. Anti-ransomware, a signature-less technology designed to behaviorally detect ransomware.
  5. Revamped Anti-Malware and Web Blocking engines, offering more aggressive detection techniques.
  6. Hardened and modular architecture design, allowing seamless integration of new detection and protection technologies
    in the future.
  7. Highly effective as always in malware remediation, an often overlooked part of the protection stack.
  8. Ability to run as primary protection (no AV) or secondary protection (alongside existing AV).
  9. Engineered to be our next corporate endpoint client, providing major improvements to our endpoint management
      capabilities and new enterprise-focused offerings
  10. Last but not least, our Research Team has been growing and adapting lately, with notable additions to the lineup from
      JRT and AdwCleaner, our new aggressive stance against PUPs, as well as new R&D technologies which we will be
      unveiling shortly.
 
Welcome to the Malwarebytes User Guide! 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 1 What’s New in Malwarebytes for Windows
 
This version of Malwarebytes contains many improvements and bug fixes.  Following is a list of changes.
 
Performance/protective capability
 
  • Improved remediation for hijacked shortcuts
  • Continued improvements to overall protection, detection and remediation
 
Usability
 
  • Device Name now syncs to the Malwarebytes My Account portal for users on the paid version
  • Improved accessibility features for the Notification Center
  • Added custom messages designed to highlight the value of Malwarebytes protection and help it remain free
 
Stability/issues fixed
 
  • Fixed problem when cutting / pasting files with anti-ransomware enabled
  • Fixed problem where USB stick would not eject properly with anti-ransomware enabled
  • Fixed a service crash related to self-protection
  • Fixed a blue screen crash related to Web Protection
  • Addressed other miscellaneous defects
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 2 System Requirements
 
Following are minimum requirements for a computer system on which Malwarebytes may be installed.  Please note that these
requirements do not include any other functionality that the computer is responsible for.
 
  • Operating System: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista (Service Pack 1 or later), Windows
    XP (Service Pack 3 or later, 32-bit only)
 
      PLEASE NOTE: Anti-ransomware protection is not supported for Windows XP or Windows Vista, due to architectural
      constraints.
 
  • CPU:  800 MHz or faster, with SSE2 technology.  This includes most modern Intel x86 processors as well as AMD’s Athlon
    64, Sempron 64, Turion 64 and Phenom CPU families.  Please refer to the following page for further information:
 
 https://en.wikipedia.org/wiki/SSE2
 
  • RAM:  2048 MB (64-bit OS), 1024 MB (32-bit OS, except 256 MB for Windows XP)
 
  • Free Disk Space:  250 MB
 
  • Recommended Screen Resolution: 1024x768 or higher
 
  • Active Internet Connection
 
WARNING: If you are upgrading from Malwarebytes Anti-Malware version 2.x and have enabled Malwarebytes’ self-protection
feature, please disable it prior to initiating the upgrade.  It prevents the Malwarebytes installation program from doing its job.
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 3 Installation
 
To begin the installation, double-click on the Malwarebytes installation file which you downloaded.  If you are installing
Malwarebytes on a Windows version newer than Windows XP, a Windows dialog box will be presented in the middle of your screen,
labeled User Account Control.  Verify that the publisher is listed as Malwarebytes Corporation and click Yes.  This Windows security
feature assures limited application capabilities unless and until you authorize higher capabilities.  Installation will begin once this
has been approved.  The installation program guides you and allows you to provide alternate information if you do not wish to
accept defaults.  Each screen also allows you to terminate installation if you do not wish to continue.  
 

Free, Premium Trial or Premium?
 
Before you begin, we want to let you know that throughout this guide, you will see references to the Free, Premium Trial, and
Premium versions of Malwarebytes.  This is likely unfamiliar territory for new Malwarebytes users.  The following link provides a
basic rundown on the differences between the Free and Premium versions of Malwarebytes.
 
 
These differences are also shown in the Malwarebytes interface immediately after it has been installed.  See below….
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
The Premium Trial is a 14-day opportunity to use the Premium version of the program, and to see if it is better suited to your needs. 
The Premium Trial is available at no cost, but you can only use it one time for each version of Malwarebytes.  The Premium Trial is
automatically started during installation.  Once installed, the program provides options to convert from Free to Premium, and from
Premium Trial to Premium.
 
If you elect to use the Premium Trial and do not wish to purchase a Premium subscription at the end of the trial, your Malwarebytes
program will revert to Free mode.  The only differences will be that the added features enabled by the trial will cease to function. 
All other functionality remains unchanged.
 
If you are a new Malwarebytes user, or are a free/Premium Trial user upgrading to this version, you will be alerted that a scan has
not been run.  Click Scan Now and Malwarebytes will run a scan for you.  After the scan (and cleanup, if needed) has been
completed, you will see the user interface as shown below.
 
 
 

Malwarebytes for Windows User Guide 4 
 
Please take note of the Why Premium button in the lower left corner.  Click that button for a brief slide show that describes the
differences between Free and Premium modes.  While Malwarebytes does an effective job of disinfecting your computer after an
attack, there is no replacement for preventing the attack from ever happening.
 
If you have already purchased a license, you may wish to activate your copy of Malwarebytes at this time.  You can do that now (or
at any time) by clicking the Activate License button at the top right portion of the Malwarebytes user interface.
 

Activation
 
Malwarebytes is available for users of any modern Windows client to download and install at no cost.  You can also purchase an
annual subscription, which entitles you to take advantage of real-time protection, scan/update scheduling and access policies.  If
no license has been installed into the product, the blue title bar at the top of the screen will show two buttons, Activate License
and Upgrade Now.  When clicked, Upgrade Now launches a browser window which opens to the Malwarebytes web site
pricing/purchase page.  Your license information will be in an email sent to you by Malwarebytes at the time of purchase.  Locate
your license information and click the Activate License button.  You will then see the following screen.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 5 Please note the checkbox and the words “My license came with a License ID.”  If you are using our “old style” license, you will also
need to check that box and enter your License ID along with your Key.
 
Please note:  You must be online with an active Internet connection in order to successfully activate your Premium license.
 
The construction of the Key is different, so make sure that you choose the right screen for entering your license information based
on whether you have an ID and Key, or just a Key.  After entering your license information, click the Activate License button.  Your
Malwarebytes screen will refresh, as shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Please note that the two license-related links in the Menu Bar have been replaced by a link called My Account.  Also note that the
banner has changed from Malwarebytes Premium Trial to Malwarebytes Premium.
 

A Final Word about Administrative Rights
 
If you installed Malwarebytes from a downloaded installation file, you automatically started a Premium Trial, and were offered the
capability to activate the Premium features if you had purchased an annual subscription.  You may have decided to wait until later. 
If that is the case, please remember that you should be logged in to Windows as an Administrator before doing either of those
tasks.
 
We will go into much more detail about the features of Malwarebytes, but before doing that, we should introduce you to the
Malwarebytes user interface.
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 6 Screen Layout
 
The Malwarebytes program interface is designed around a screen layout which is simplified and uncluttered.  We want to make it
easy for you to configure the program to serve your needs, and we hope this layout helps to do that.  The screenshot below shows
the Dashboard – the screen you see when Malwarebytes is launched for the first time.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Let's talk about the primary elements which make up our user interface.
 

Menu Bar
 
The Menu Bar is displayed at the top of the screen at all times. There are two buttons in the Menu Bar. A description for both
follows.
 
My Account
 
This button will take you to the setting options to manage your Malwarebytes subscription(s) and license(s). For more information,
please refer to pages 35-36 of this guide.
 
Notification Center
 
The Notification Center provides a convenient location to view recent notifications generated by Malwarebytes. Clicking the icon
will show the 5 most recent notifications. You may scroll down to view up to 25 notifications by using your mouse wheel. You can
view additional details for each notification by clicking it – Malwarebytes will bring you to the relevant screen.
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 7 
 

Menu Pane
 
The Menu Pane contains the main program options, which will be discussed in detail in this guide.  They consist of:
 
  • Dashboard: What you see here. While the exact details change over time, the look is consistent.
  • Scan: Select the type of scan you wish to run, run it, and view the results.
  • Quarantine: Delete or restore threats which have been detected by program scans.
  • Reports: View reports related to program operation, threats which have been detected, and threats which have been
      removed.
  • Settings: Configure every aspect of Malwarebytes, so that it can protect you efficiently.
 
In addition, there are settings for Account information.  While in Premium Trial mode, options are present to buy a Premium
subscription and to Activate the program.  Once you have purchased a subscription, those two options will revert to a single option
which handles details of your account.  More on those later.
 

Status/Option Pane
 
When the Dashboard is selected from the Menu Pane, the center of the screen is filled with the Status Pane.  It is designed to give
you quick information that tells you whether there is anything for you to be concerned about.  When the Dashboard is selected,
the Detail Pane is also displayed.  More on that momentarily.
 
When any menu option other than the Dashboard is selected, all space except the space used by the Menu Pane is allocated to the
selected menu option.  This provides sufficient room for information pertaining to any menu option to be cleanly displayed.
 
 
 
 
 

Malwarebytes for Windows User Guide 8 Detail Pane
 
The Detail Pane is shown only when the Dashboard is selected.  It shows information on protection options, protection updates,
and detail pertaining to the most recent scan.  This information is shown on other screen displays as part of the menu option
selected by the user, but are all displayed here for quick recognition.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 9 Dashboard
 
Each time Malwarebytes is launched, the first page visible to the user is the Dashboard.  It provides program status, and acts as a
launch pad for all program operations.  A screenshot of the user interface – featuring the Dashboard – is shown below for reference.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Status Pane
 
The main area of the screen is the Status Pane, providing current system status.  Within the Main Window, the first item displayed
is the Status Banner.  This banner displays a status message along with an icon, whose color is based on program status.  The color
is meant to alert the user to conditions which may require intervention.  Colors used are similar to traffic stop signals – green simply
indicates a good status; orange indicates a warning of a condition which may become more severe over time; red indicates that
your immediate attention is needed.  Following is a full list of status messages.  If a recommended method of correcting the
problem is immediately available, it will appear as a functional button on the banner itself.
 
  • Color: green (no problem)
        o Awesome! You’re protected. (Premium mode and Premium Trial modes which will expire more than 7 days in
            the future)
        o You’re running Malwarebytes Free. (free mode only)
  • Color: orange (non-critical problem)
        o You’re not fully protected.
        o Your Protection Updates are not current.
        o Your program version is out of date
        o Your Premium Trial ends in <x> days. (trial expiring in 3-7 days)
        o Renew to avoid losing protection against malware, bad websites, and other threats
  • Color: red (critical problem)
        o Your Premium Trial ends in <x> days. (trial expiring in 0-3 days)
        o Your trial has expired
        o Renew to avoid losing protection against malware, bad websites, and other threats
        o We were unable to renew your subscription (renewal failed, and you are now in 30-day grace period)
 
 
 

Malwarebytes for Windows User Guide 10 Real-Time Protection
 
This item shows the status for each of the four Real-Time Protection features.  Please note that real-time protection is enabled only
for Malwarebytes Premium and Malwarebytes Premium Trial users.  This feature is not available if you are using the Free version.
 
Settings
 
Settings are accessed from the Main Menu, and also by clicking the small gear at the top right of the Real-Time Protection panel. 
When clicked, the Settings screen will be displayed, allowing access to all program settings.  Please refer to the Settings portion of
this guide (pages 24-35) for complete information on this topic.
 

Scan Status
 
This panel shows your scanning activity at a glance.  You can easily see when the last scan was completed, when the next scan is
scheduled, and the status of your protection updates.  There are four icons on the title bar for this panel, as shown here.
 

 
 
A description for each icon – in the order shown – is as follows.
 
View Scan Reports
 
This icon takes you to Reports, where you can view detailed reports on scans which Malwarebytes has performed on your computer. 
Please note that information shown here is limited to the last scan that was executed.  See the Reports Pane (pages 21-23) for
information on reports as a whole.
 
Schedule a Scan
 
The second icon allows scans to be scheduled for automatic execution.  This option is available only for Malwarebytes Premium and
Malwarebytes Premium Trial users.  The icon remains visible in Free mode, but clicking it has no effect.  When clicked, the Settings
screen will be displayed, allowing access to the Scan Schedule screen.  Please refer to the Scan Schedule portion of this guide (pages
13-15) for full information on this topic.
 
Check for Updates
 
The third icon causes Malwarebytes to connect with Malwarebytes servers to check for protection updates more current than those
in use, and download them if they exist.  This option is functional for all program modes.
 
Help
 
The fourth icon links to the Malwarebytes User Guide on the Malwarebytes website.  This behavior is consistent throughout the
program.
 

Protection History
 
This panel shows three key statistics.  It shows how many items were scanned, how many threats were detected during scans, and
how many threats were detected by real-time protection.  Please note that the number of items scanned includes individual files
that are part of archive files, as well as components in dynamic link library (DLL) files.  Also note that real-time detections can only
occur in Premium and Premium Trial modes.
 
 
 
 
 

Malwarebytes for Windows User Guide 11 Scan
 
The Scan Pane is the introduction to scan-related options in the program.  When you click Scan in the Menu Pane, you will see the
screen shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
On this screen, you may select the Scan Method and the Scan Schedule.  Let’s look first at Scan Methods.  There are three scan types
which can be executed – Threat Scan, Custom Scan, and Hyper Scan.  Hyper Scan is only available to users of the Premium or
Premium Trial modes.  Please note that global scan settings used by Threat Scans and Hyper Scans are selected in Settings (see
pages 30-31).  Following are more detailed descriptions of each of the scan modes.
 

Threat Scan
 
This method of scanning detects a large majority of threats that your computer may be faced with.  Areas and methods tested
include:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Registry Objects: Configuration changes which may have been made to the Windows registry.
  • File System Objects: Files stored on your computer's local disk drives which may contain malicious programs or code
      snippets.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects – as well as in other areas –
      which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats
      cannot reassemble themselves.
 
The Threat Scan is the scan method which we recommend for daily scans.  While it will not scan every file on your computer, it will
scan the locations which most commonly are the launch point for a malware attack.
 
 
 
 
 

Malwarebytes for Windows User Guide 12 Custom Scan
 
You may also choose to run a custom scan.  A custom scan allows you to scan according to specifications which you define at the
time of the scan.  These settings will override scan settings defined elsewhere.  A screenshot of the custom scan configuration
screen is shown below.  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Custom Scanning Options
 
These settings provide capability to determine the functional areas that will be scanned.  They are as follows:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.  It is
      important to note that threats detected during scans are still considered threats if they have an active component in
      memory.  As an extra measure of safety, memory objects should be scanned.
  • Startup and Registry Objects: Executable files and/or modifications which are initiated at computer startup, as well as
      registry-based configuration changes that can alter startup behavior.
  • Archives: If this setting is checked, archive files (ZIP, 7Z, RAR, CAB and MSI) will be scanned up to two levels  deep. 
      Encrypted (password-protected) archives cannot be tested.  If left unchecked, archive files will be ignored.
  • Rootkits: These are files stored on your computer's local disk drives which are invisible to the operating system.  These
      files may also influence system behavior.
 
Potentially Unwanted Programs/Modifications
 
These settings allow the user to choose how Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications
(PUMs) will be treated if they are detected.
 
Folders to be Scanned
 
This setting allows the user to include or exclude directories, subdirectories, and individual files from scans.  It utilizes a Windows
Explorer-like presentation model.  In the screenshot shown above, every directory except Desktop is selected for a custom scan. 
You may scan parent directories separately from child directories based on individual selections.
 
 
 
Malwarebytes for Windows User Guide 13 Hyper Scan
 
This scanning option is only available to users of Malwarebytes Premium and Malwarebytes Premium Trial versions.  This method of
scanning is limited to detection of immediate threats.  Areas and methods tested include:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
 
While a Hyper Scan will clean any threats which have been detected, we strongly recommend that a Threat Scan be performed if
a Hyper Scan has detected threats.
 

Scan Schedule
 
This tab allows users of the Premium and Premium Trial versions to add, edit and remove scheduled scans to be executed by
Malwarebytes.  This feature is not available to users of the Free version.  A screenshot of this tab is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
One scheduled scan is defined when Malwarebytes is installed.  Premium and Premium Trial users are free to modify or delete scans
at will, while Free users are provided with a single monthly scheduled scan.  Please note that if the initial task is deleted without a
replacement task being defined, your Malwarebytes program will not deliver the positive results that you expect.  The same
methods are used here to add a new task as well as to edit an existing task, so let's Add a new task in Basic mode.
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 14 Basic Mode
 
A screenshot of the basic Add Schedule screen is shown here.
 
                                                                  You can choose the
                                                                  specific task to be
                                                                  added on the left side of
                                                                  the screen, in the
                                                                  Scheduled Task area. 
                                                                  You may choose from
                                                                  the following tasks:
 
                                                                  • Threat Scan
                                                                  • Custom Scan
                                                                  • Hyper Scan
 
 
 

 
 
Scan types have been previously discussed in the Scan section of this guide (pages 11-19).  Please refer to those pages for further
information if desired.  The Frequency and Settings section allows you to define the timeframe (Schedule Frequency) that a task
will be executed, and how often (Recurrence).  For scans, this translates to:
 
  • Frequency = Hourly, recurrence in range of 1-48 hours
  • Frequency = Daily, recurrence in range of 1-60 days
  • Frequency = Weekly, recurrence in range of 1-8 weeks
  • Frequency = Monthly, fixed setting
  • Frequency = Once, fixed
  • Frequency = On Reboot, fixed
 
Advanced Mode
 
At the bottom left corner of the Add Schedule window is the Advanced button.  Click that to expand the Add Schedule window to
expose several more options.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

In Advanced Mode, we add options which tailor the scan more to your liking.  Let's look a little deeper, beginning with the
advanced options for scans.
 

Malwarebytes for Windows User Guide 15 Advanced Scan Options
 
Scheduled Task defines what task (scan/update) is to be added/edited, and when that task should begin – specifying both the date
and time.  Schedule Options provides several added capabilities to the basic settings which have already been described.  Here's a
rundown on the advanced options.
 
  • Quarantine all threats automatically: This option determines if a newly-detected threat would be automatically
      quarantined, or if you would be notified so that you could choose a course of action.  While automatic quarantine may
      seem to be the best course of action, it could have negative implications if a false positive was encountered.  A false
      positive is the categorization of a legitimate file as a malicious file.  It does rarely occur, and when it does, Malwarebytes
      Customer Success will assist you in having the offending file evaluated more fully by our Research group.
  • Restart computer when required for threat removal: This is available only if threats are automatically quarantined, and is
    not selected by default.  Some threats may require a computer restart to completely eliminate the threat, but we feel it’s
      best to notify you at the time, so you may save your work before restarting your computer.  If this were checked, you
      could lose work unless you were monitoring the scan in progress.
  • Scan for rootkits: This option allows specialized testing for the presence of rootkits.  Due to its nature, it increases the
      required time for a scan to execute.  This option is not available for Hyper Scans.
  • Scan within archives: This is selected by default.  It allows scanning to go two levels deep within archive files.  If not
      selected, the archive will be ignored.  It will also be ignored if it is encrypted.  This option is not available for Hyper Scans.
 
Frequency and Settings was discussed in the previous section (Advanced Mode).  Please refer to that section for more detail.
 
Recovery Options allow you to recover from a missed task (e.g. your computer was off at the time a scan was to take place).  A
scheduled task – if missed – will run at its next opportunity as long as it is within the duration specified by the Recover if missed by
selector and the Recover missed tasks checkbox is checked.
 

Watching Scan Progress
 
Each scan method requires a different amount of time to complete.  Unless significant changes have occurred on your local disk, a
Hyper Scan or Threat Scan should each be rather consistent from scan to scan.   A custom scan time interval may vary widely each
time, based on the areas scanned, the number of files involved, and the size and complexity of the files.  The screenshot below is
an example of a scan in process.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Malwarebytes for Windows User Guide 16 The progress bar shows milestones for each phase of the scan, with each milestone represented by a green or gray symbol.  In this
screenshot, some milestones are shown with green checkmarks, indicating that phase of the scan has been completed.  Scan
Memory is represented by an animation which indicates that this phase of the scan is currently being performed.  The remainder
of the tasks are shown as grey hourglasses, and are yet to be started.
 
You may also pause a scan while it is in process by clicking the Pause button.  The scan phase in progress will change to indicate
that the scan has been paused.  Click Resume to continue the scan where it left off.  You may also click Cancel at any time to
terminate the scan.  Results of the scan will be reported as if the scan ran to completion.
 

Scan Results
 
After a scan has been executed, Scan Results are displayed as shown here.  In this scan, three threats were detected.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
You may move threats to Quarantine by selecting the threat (using checkboxes to the left of the threat’s name) and clicking
Quarantine Selected.  If any threats are not selected to be moved to Quarantine, you will be prompted to Ignore Once, Ignore
Always, or Cancel.  Ignore Once will result in the threat once again being reported as a threat during the next scan execution. 
Ignore Always causes the threat to be added to Exclusions.   A threat which has been added to Exclusions will no longer be reported
as a threat unless there is reason to believe that it has been tampered with.  You must provide a disposition for each threat
displayed on this screen.
 
Threats which have been moved into Quarantine cannot harm your computer.  They are neutralized as part of the Quarantine
process.  Please see Quarantine (page 20) for further information.
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 17 Scan Summary
 
The final screen to be displayed as part of a scan is the Scan Summary.  It provides summary information about the scan, and allows
you to view scan detail on screen, or export scan summary or scan detail to a text file.  A screenshot of the Scan Summary is shown
below.  Free and Premium Trial users will see a reminder of the value of a Malwarebytes subscription on this page as well.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Clicking the View Report button displays the Scan Report for the scan just completed.  It is shown here as well.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
When threats are detected during a scan, the user must decide how these threats should be handled.  The following series of
screenshots detail this flow.  In the first screenshot, twenty threats have been detected.  By default, all are selected for removal. 
Please note that the total number of detected threats is shown above the list of threats, as is the number of threats selected for
removal.
 
 
 
Malwarebytes for Windows User Guide 18 
 
In order to demonstrate the behavior of this screen, we will uncheck some of the threats.  This indicates that only the checked
threats are to be removed.  Clicking the Quarantine Selected button results in the screen shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Threats that were not selected still require remediation, based on input supplied by the user.  In this case, the choices available are
Ignore Once, Ignore Always and Cancel.  Clicking the Ignore Once button temporarily ignores a threat, although it will be shown
as a threat on subsequent scans.  Selecting Ignore Always results in the threat being added to the Exclusion List.  It would not be
 
 
 
Malwarebytes for Windows User Guide 19 scanned in the future.  Clicking Cancel keeps you on this screen until you choose how to handle all detected threats.  Once a
disposition has been selected for all detected threats, the screen below will be displayed.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Although threats have been quarantined, you must restart the computer to assure the threat removal process is complete.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 20 Quarantine
 
When executing scans (on-demand or as part of real-time protection), some programs, files or registry keys may have been
categorized as threats.  At that time, they were removed from the disk location where they were stored, placed in quarantine, and
modified so that they could not pose a threat to your computer.  There may be items which fall into this category, but are not
malicious.  It is up to individual users to research and make this determination.  Upon entry to the Quarantine option, you are
presented with the screen shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Quarantined items are shown in a table format, with pertinent information presented to help you determine what action needs to
be taken.  Each item listed has a checkbox in the leftmost column.  Check the checkbox to restore or delete the item.  Please note
that the Restore and Delete buttons are greyed out until items are selected.  If you wish to apply the same action to all quarantined
items, select the checkbox in the table header and click Restore or Delete.
 
Please be aware that quarantined items which are not deleted or restored will continue to be visible here until action is taken.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 21 Reports
 
The Reports Pane displays a list of scans and real-time protection detections, in reverse chronological order.  A Protection Event that
starts with the word Scan is a report summarizing the specified scan.  All other reports listed on this screen are detail pertaining to
detections made by real-time protection.  A screenshot is shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Selected reports may be viewed on screen, or exported to a text file for later viewing.  Opening a report will display a summary of
the event.  You can click the Advanced tab to view more information about the event. Details displayed for Protection Events will
be relevant to the type of event shown.  Please note that only manual (on demand) scans are available for users of the free version
of Malwarebytes.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 22 The Scan Report may appear in two different forms.  If one or more threats were detected during a scan, the report will appear as:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Please note that the bottom portion of the report shows the threats detected during the scan.  It is scrollable when required.  The
top portion of the report contains a summary of the scan.  You can click the Advanced button to view more details, as shown here:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 23 Viewing or Deleting Logs
 
You may view any log file by clicking the log to select it, then clicking the View Report button.  As mentioned previously, there are
several output options for Protection Logs.  To delete logs, click the checkbox corresponding to those logs you wish to delete, then
click the Delete button.  Please bear in mind that computers which have significant threat activity will also have larger logs.  You
should periodically check how much disk space is being used for logs, so that logs do not impact normal operation of your
computer.
 
Please note that an Export button is shown at the bottom left corner of this screen.  This allows you to make a copy of the log for
use by other programs.  You may export to your clipboard or to a text (TXT) file.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 24 Settings
 
The Settings screen allows the user to change all Malwarebytes operational settings.  We have grouped settings by the
areas/functions which they control into tabs to maintain a clean user interface.  When you select any tab, you will see the Detail
Pane change to reflect the tab which you selected.  At the same time, the tab itself is highlighted.
 
Before we dig in to each of the tabs, a brief description of each is in order.
 
  • Application Settings: Settings that affect Malwarebytes, as well as how it coexists with Windows.
  • Protection Settings: How Malwarebytes should protect you during scans and (for Premium/Trial mode users only) Real-
      Time Protection.
  • Scan Schedule: When Malwarebytes should execute scans and check for protection updates.  This setting is functional
      only for users of Premium/Trial mode.
  • Exclusions: Items which will be excluded from testing which detects malware, as well as websites which are categorized
    as malicious but specifically approved by the user.
  • My Account: Information pertaining to the status of your subscription.
  • About: Version numbers corresponding to Malwarebytes as a whole, and for various components of the program which
    may be updated individually.  Malwarebytes company resources are also listed on this page.
 
When Settings is selected, the Application tab is always selected.  If you navigate away from Settings – to Dashboard, Scan,
Quarantine or Reports – you will always return to the Application tab of Settings when you click on Settings.
 
Now, let's take a look at Application Settings!
 

Application Settings
 
This is the entry screen you will see when you click on Settings in the Menu Pane.  It controls how Malwarebytes interacts with
many aspects of your computer’s operating system.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
The scroll bar at the right of this screen indicates there are many more options available on this screen than what appear here.  We
will now cover each of them in order.
 
 
 
Malwarebytes for Windows User Guide 25 Application Updates
 
Malwarebytes may have updates available for individual program components, or for the full program.  We provide two toggle
switches which allow you to choose whether either or both upgrade modes can be integrated into your copy of Malwarebytes
when they are available.  Click Install Application Updates to check for available program updates or upgrades.  You can choose if
you upgrade, and when.  Upgrades only happen with your consent.
 
Notifications
 
Notifications regarding scans, real time protection, updates and subscriptions occur in windows at the lower right corner of your
screen, outside of the Malwarebytes interface.  You may enable or disable these notifications.  Most notifications are enabled by
default, while a few can be disabled.  Please note that some non-critical information may not be visible if you disable notifications. 
Disabled notifications do not leave the user at risk at any time. The following notifications may be disabled.  Please refer to
Appendix A (Notification Window Examples) at the end of this guide for further information.
 
    • Malicious Website Blocked
    • Malware Detected (auto-quarantine)
    • Non-Malware Detected (auto-quarantine)
 
Some users intentionally turn off one or more components of real-time protection.  Users may now disable notifications that
components have been turned off.  Please note that as a result of this setting, users will be unable to receive notifications regarding
real-time protection failures in the event of program malfunction.
 
Impact of Scans on System
 
Most users schedule scans to occur during times when their computer is typically idle.  Execution of a manual scan may be
performed as a matter of convenience, or while other tasks are being executed.  The performance of lower-powered computers
may be affected by execution of the Malwarebytes scan.  This setting allows the user to determine the priority of the scan to be
performed.  Lower scan priority will require more time to execute while impacting other operations to a lesser degree.  High priority
allows the scan to be executed at the maximum speed which the computer allows, but may affect other tasks.
 
Windows Context Menus
 
Malwarebytes has the capability to launch a Threat Scan upon one or more individual files or directories from within Windows
Explorer by using the context menu that becomes available when the files/directories are right-clicked.  This setting allows that
capability to be turned on or off.  The default setting is On.
 
Display Language
 
This setting determines the language used throughout.  This is pre-set, based on the language used during program installation. 
It can be modified at will.
 
Event Log Data
 
This setting provides additional information regarding program actions which are beyond typical needs of the user.  Should you
encounter a technical issue with Malwarebytes, our Customer Success engineers may request that you enable this setting to
provide additional troubleshooting information.  Once troubleshooting is complete, please remember to turn this setting off to
prevent unnecessary disk usage.  The default setting is Off.
 
Proxy Server
 
This determines whether Internet connections will use a proxy server.  This is more often used on a corporate network.  It has two
primary purposes.  The first is to funnel communications to and from the outside world through a single connection point, thus
assuring anonymity of all computers on the internal network.  The second purpose is to cache content.  This means that external
content which had recently been downloaded is saved locally for some period of time, and subsequent requests by that user (or
others) could use the recently-saved data.  This conserves significant bandwidth, resulting in lower operating costs.
 
 
 
 
 
Malwarebytes for Windows User Guide 26                                       By default, Malwarebytes does not use a proxy.  If configured to
                                      do so, the bottom panel will change to provide configuration
                                      options as shown in the screenshot shown here.
 
                                      You can now specify the IP address or name of a proxy server,
                                      as well as the appropriate port number.  If a proxy is in use, the
                                      name and port number must be specified by the person who
                                      controls access to the proxy server.  He will also be able to tell
                                      you whether authentication is required to use the server, and if
                                      so, provide a user name and password which have been
                                      assigned to you.
 
 
 

User Access
 
This slider allows users of Malwarebytes Premium and Malwarebytes Premium Trial versions to restrict access to various features
and functions in Malwarebytes with password protection.  The Edit User Access button is only visible when the slider is in the On
position, allowing the user to define sections of the program which require a password to access.
 
 
 

 
 
When the Edit User Access button is clicked, a new window opens directly above the Malwarebytes program screen to restrict
access to selected areas of the program only to those users who possess the password.  The password is also defined on this screen.
 
WARNING: This password is not recoverable.  If you lose your password, you will have to reinstall Malwarebytes to access restricted
features.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
As shown above, the Reports tab has been placed under password control.  This also causes User Access to be placed under
password control.  This prevents unauthorized users from gaining access to restricted areas.
 

Malwarebytes for Windows User Guide 27                                                     When attempting to gain access to a
                                                    restricted area, you will be required to enter
                                                    a password (as shown here).
 
 
 
 
 
 
 
                                                    If an incorrect password is entered, or if a
                                                    null password is used, this error message
                                                    will be displayed.
 
 
 

If this feature has been enabled and is subsequently disabled, any restrictions which have been defined are cancelled.  This feature
is not available to users of the Free version.  Currently, only one policy may be in effect at any given time.
 
Windows Action Center
 
You may have noticed an icon in your system tray with a red X superimposed over a white flag. That is a status indicator for the
Windows Action Center, which tells you when your computer has a security issue that needs your attention.  Malwarebytes Premium
or Malwarebytes Premium Trial can now be registered as a security solution on your computer.  There are three settings available,
which will be abbreviated here for easier reading.  Brief descriptions for the meaning of each setting are also provided. 
 
  • Let Malwarebytes choose whether to register: Malwarebytes will determine whether it should be registered in Action
      Center. The program will not register when Microsoft Security Essentials is in use on a Windows 7 or older operating
      system. It will also not register when Windows Defender is used on a Windows 8 or newer OS.
  • Always register Malwarebytes: Malwarebytes program status will always appear in Action Center.
  • Never register Malwarebytes: Malwarebytes program status will never appear in Action Center.
 

Beta Application Updates
 
Some Malwarebytes users want to try the newest features as soon as they are available, while some prefer to wait until the product
is released.  We have added this program setting so that if you want the latest and greatest immediately, we can deliver it to you
automatically.  When you enable this setting, you will see the following dialog box.
 
 
 
 
 
 
 

 
 
Usage and Threat Statistics
 
If you check this box, you will be sending us information to help us do our jobs.  We like to know what countries Malwarebytes is
being used in, and the breakdown of Premium, Premium Trial, and Free versions.  Our Research organization likes to keep track of
what malware we are detecting and how often.  We learn that from what you send us, and helps us to serve you more effectively. 
We hope that's fine with you as well.  For a full list of information that is collected, please see the Malwarebytes Privacy Policy, at:
 
 

Malwarebytes for Windows User Guide 28 Protection
 
Most settings which control how Malwarebytes protects your computer are located on the Protection tab.   Settings are grouped
by category.  A screenshot is shown below, along with descriptions of all settings available on this tab.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Real-Time Protection
 
Malwarebytes offers four different types of real-time protection.  These features are available only to users of the Premium and
Premium Trial modes.  It is important to note that Premium Trial users who do not convert to a Premium subscription will lose all
real-time protection features at the end of their trial.
 
Web Protection protects Premium/Trial users by blocking access to/from Internet addresses which are known or suspected of
engaging in malicious activity.  This feature does not treat different protocols differently.  It does not distinguish between your
favorite game being served on one port and a potential malware source being served on another.  Should you choose to disable
this feature, you could inadvertently compromise your computer's safety.  Please note that this option is disabled if you are using
the Free version.
 
Exploit Protection uses multiple protection layers to guard against attempted exploits of vulnerabilities in legitimate applications. 
When applications are launched by the user, exploit protection is also launched as a shield.  This protection will often detect and
neutralize attacks that go undetected by other security applications.  It is on by default for Premium/Premium Trial users.
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 29 
 
Many popular applications have been pre-configured for shielding.  A screenshot is shown above.  To change the status of any
application, either use the Protection slider, or double click either the Application or File Name.  Premium/Premium Trial users may
add protection for other applications, and edit specifications for any defined shield.  The Edit screen is shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
You may specify an Application name which is easily recognizable, and the Application file name.  You can also browse for the file. 
Select a Program type which most closely resembles the purpose of the application.  If you are unsure, select Other.
 
The same screen is used to edit existing entries.
 
 
 
Malwarebytes for Windows User Guide 30 In addition, Premium/Premium Trial users can modify advanced exploit protection settings.  Several advanced settings are spread
across four tabs, depending on the classification of protection they provide.  One tab is shown here as an example.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Each advanced setting is available for up to six different application groups, the groups representing the method by which threats
will attempt to exploit vulnerabilities in applications of that type.  Protection may be turned on (checked), off (unchecked), or is
not applicable for that group of applications (greyed out).  While these settings provide very specific protection, they should only
be changed when requested by a Malwarebytes Customer Success specialist.  Incorrect settings may result in impaired protection.
 
Malware Protection may be turned on or off as needed by Premium/Premium Trial users.  It is on by default.  This feature protects
against malware present in code/files that try to execute on your computer.  These files may have been downloaded, imported
from a USB drive, or received as an email attachment.  While we do not recommend disabling this protection mechanism, there
may be times when it needs to be done to troubleshoot compatibility issues that arise with anti-virus updates or computer startup
problems.  If either situation does occur, start your computer in Safe Mode, disable Malware Protection, isolate and correct the
issue, then turn Malware Protection back on.  Please note that this option is disabled if you are using the Free version.
 
Ransomware Protection provides Premium/Premium Trial users protection against the threat of ransomware.  This protection is
not available for users of Windows XP or Windows Vista.  While all other protection features may provide some degree of protection
against ransomware, well-crafted ransomware may go undetected until it attempts to initiate its attack.  As many computer users
have found, there is little or no remedy available after the fact.  We strongly recommend that ransomware protection be turned
on at all times.  It is on by default.  Please note that this option is disabled if you are using the Free version.
 
Scan Options
 
Scan for rootkits utilizes a specific set of rules and tests to determine if a rootkit is present on your computer.  For readers who are
unfamiliar with this term, an explanation may be handy.  A rootkit is malicious software that can be placed on a computer which
has the ability to modify operating system files in a manner that hides its presence.  Malware detection methods that rely on hooks
to the operating system for detection and analysis would prove ineffective if the hooks had been purposely manipulated by
malware.  Our testing method is more intensive and more effective, but including rootkit scans as part of your overall scan strategy
increases the time required to perform a scan.
 
 
 

Malwarebytes for Windows User Guide 31 When Scan within archives is enabled, Malwarebytes will scan two levels deep within archive (ZIP, RAR, 7Z, CAB and MSI) files.  If
this option is disabled, the archive is excluded from scanning.  Please note that encrypted archives cannot be fully tested.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
We have introduced a new signature-less detection technology which takes advantage of machine learning to supplement existing
detection methods.
 
Potential Threats
 
In addition to malicious software detection and elimination, Malwarebytes also detects and acts upon two classes of non-malware. 
These are Potentially Unwanted Programs (PUP's) and Potentially Unwanted Modifications (PUM's).  In many cases, PUP's appear
in the form of toolbars and other application software which are installed on your computer as part of a bundle.  You may have
asked for one application, and it came with a second application that was not mentioned, or was mentioned, but you did not
uncheck the checkbox next to it to prevent it from being installed at the same time.  You may also want and use the PUP.  We do
not judge the merit of the program or its usability.  We do offer a method of removing it if you choose to.
 
PUM's are a bit different.  These are modifications that are typically related to the Windows registry.  As a user, you will generally
not be making changes to the registry that would qualify as a PUM, though the possibility does exist.  Because it does, we allow
you to define your own rules when it comes to how they are treated.
 
With regard to both types of modifications, we provide three handling methods.  These are:
 
  • Ignore detections: Malwarebytes will not act on detection, nor will you be alerted.
  • Warn user: You will be alerted to the detection.  You may choose to ignore it, create an exclusion, or treat it as malware.
  • Always detect PUPs/PUMs (recommended): The detection will be treated as malware, and corrective actions will occur.
 
While PUP's and PUM's are both handled in the same manner, each is handled according to separate guidelines which you specify.
 
Updates
 
Users of Malwarebytes Premium and Malwarebytes Premium Trial have the ability to automatically check for protection updates,
and to specify when those checks will be performed.  The date range is adjustable between fifteen (15) minutes and fourteen (14)
days, the increment depending on the range (minutes/hours/days).  We recommend that you do not allow the rules database to
become dated, as much damage can be caused by zero-day infections – those threats that are too new to be adequately protected
 
 
 
Malwarebytes for Windows User Guide 32 against by anti-virus software.  The default for this feature is on.  You may also have Malwarebytes display a notification in the
corner of your screen if protection updates are more than 24 hours old.
 
Startup Options
 
These settings define how Malwarebytes behaves when your computer starts.  You may launch several applications at startup, and
they may initiate processes which require Malwarebytes launch timing to be adjusted.  Let's look at each setting in detail.
 
  • Start Malwarebytes at Windows startup:  If this setting is unchecked, Malwarebytes will not start with Windows.  No real-
      time protection layers will start when Windows starts, though they may still be started manually by launching
      Malwarebytes.
  • Delay Real-Time Protection when Malwarebytes starts:  There may be times when the startup of system services used by
      Malwarebytes conflicts with services required by other applications at boot time.  When this is the case, turn this setting
    on.  You may also adjust the delay timing.  You will need to experiment with the specific delay setting necessary to
      compensate for any conflicts that are noted.  When required, this must be done on a case-by-case basis.  The delay setting
    is adjustable from 15-180 seconds, in increments of 15 seconds.
  • Enable self-protection module:  This setting controls whether Malwarebytes creates a safe zone to prevent malicious
      manipulation of the program and its components.  Checking this box introduces a one-time delay as the self-protection
      module is enabled.  While not a negative, the delay may be considered undesirable by some users.  When unchecked,
    the "early start" option which follows is disabled.
  • Enable self-protection module early start:  When self-protection is enabled, you may choose to enable or disable this
      option.  When enabled, the self-protection module will become enabled earlier in the computer's boot process –
      essentially changing the order of services and drivers associated with your computer's startup.
 
Automatic Quarantine
 
Users of Malwarebytes Premium and Malwarebytes Premium Trial may specify whether malware will be automatically quarantined
when it is detected.  The default setting is on.  If the users decline to automatically quarantine malware, a notification will display
in the lower right corner of the screen for each detection, and the user must specify whether the file is to be ignored once, ignored
always (added to Exclusions) or quarantined.
 
Scan Schedule
 
You may also adjust Scan Schedules here as part of program settings.  This aspect of program settings has already been covered
on pages 11-19.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 33 Exclusions
 
This tab allows additions to, or deletions from a list of items to be excluded from scans.  The list may include files, folders, websites,
applications which connect to the Internet, or previously detected exploits.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Add Exclusion
 
Exclusions are exempt from scanning and from real-time protection.  This may include files, folders, web sites, applications and
safe programs which have been identified as exploits.  Clicking Add Exclusion launches the Add Exclusion Wizard, as shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Malwarebytes for Windows User Guide 34 You may then add items – one at a time – to the list of exclusions.  Each item type is defined by criteria as follows:
 
  • File or folder: Its location on the file system, and whether it should be excluded from malware and ransomware, only
      malware or only ransomware.  While you may have your own reasons for excluding files or folders from scans, the primary
      reason for doing so is to prevent potential conflicts with anti-virus software.  Malwarebytes works well alongside most
      anti-virus software, but anti-virus updates by some vendors may occasionally be flagged as a threat.  For this reason, we
      offer the provision for you to exclude certain disk content from scanning.  This is commonly offered by anti-virus vendors
    as well.
 
      NOTES: 
● Clicking Select Folder… selects only folders, which by default will also exclude any files within those folders,
      as well as subfolders.
● Clicking Select Files… selects individual files for exclusion.  The status of the folder is unchanged.
 
  • Website: Enter the Domain or IP Address to specify the web address.  When adding a domain manually, please add it
      both with and without the "www." prefix.  Depending on several external factors, the domain may still be blocked if only
    one variation is entered.  Also, domain exclusions are only functional on Windows Vista Service Pack 2, Windows 7,
      Windows 8.x and Windows 10.  Please note: Exclusions can also be added by clicking the link in the notification message
      when the website is blocked by Malwarebytes Website Protection.
  • Application that connects to the Internet: Specify the name of the application.  This is most applicable if the detection is
    a false positive (legitimate application with some similar characteristics to malware).
  • Previously Detected Exploit: Specify the MD5 hash of the exploit.  This is most applicable if the detection is a false positive
      (legitimate application with some similar characteristics to malware).  The hash guarantees uniqueness of the file in
      question.
 

My Account
 
Here, you can click the Go to My Account button to obtain status of all of your subscriptions, and change preferences related to
your account.  You can also deactivate your license – useful when moving your Malwarebytes program to a new computer – or
change license key.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 

Malwarebytes for Windows User Guide 35 All of the information shown here is self-explanatory.  A set of option buttons are available at the bottom of the screen.  The options
vary depend on the mode of the program.  Buttons for the three program modes are shown below.
 

          Premium Mode
            options
 
 
        Premium Trial Mode
            Options
 
 
          Free mode
            Options
 
 
          Free mode
            Options (*)
 
 
When Malwarebytes was installed, Premium Trial mode was set automatically (if you were eligible for a trial).  There may be
circumstances where you have the option of re-entering Premium Trial mode.  This would result in the second Free mode display. 
If you click the button Change License Key (Premium mode) or I Already Have a License (Premium Trial or Free mode), you will see
the following screen superimposed over the Malwarebytes interface.
 
                                                  Follow screen instructions to enter your license
                                                  information.  If you do not have a license, either
                                                press Cancel (to close this window and return to
                                                the screen you came from), or Purchase a License
                                                to go to the Malwarebytes website and purchase
                                                a license for the product.
 
 
 
 
 

 
 

About
 
This tab tells you more about Malwarebytes, and what resources are available to you should you need technical assistance.  The
upper panel contains Version Information.  We have split up the program into software components.  If you have configured the
program to provide program updates, it is easier and faster for us to provide the newest version to you by updating the
components that have changed, rather than updating the entire program.  It also benefits you if you need technical support,
because the versions of each component may influence the direction that our Customer Success engineers take when
troubleshooting an issue.
 
The Resources section provides contact addresses (URLs) which may assist you for sales, support, and educational purposes.  In
addition, you can view the third-party notices (open source software which we use in our products) as well as a link to our End User
Licensing Agreement (EULA).
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 36 Appendix A: Notification Window Examples
 
Malwarebytes provides a number of user notifications during operation.  These notifications are always positioned in the lower
right corner of your screen.  The length of time that they will remain on your screen is configurable in Application Settings (page
24).
 

Scan Notifications
 
 
 
                                                An automatic scan has been completed. Malware was
                                                  detected during execution of the scan.  Click Upgrade Now
                                                to purchase Malwarebytes Premium. This notification will
                                                only appear for Malwarebytes Free users.
 
 
 
 
 
                                                A scan (scheduled or on-demand) has been completed. 
                                                  Malware was detected during execution of the scan.  Click
                                                View Scan Results to review the scan log to determine the
                                                exact nature of the threat(s).
 
 
 

                                                A scan (scheduled or on-demand) has been completed. 
                                                  Non-Malware was detected during execution of the scan. 
                                                This is typically a Potentially Unwanted Program (PUP) or
                                                Potentially Unwanted Modification (PUM), which may be
                                                  acceptable to you.  Click View Scan Results to review the
 
                                               scan log to determine the exact nature of the threat(s).
 
 
 
                                                A scan (scheduled or on demand) has been completed.  No
                                                  problems were detected.
 
 
 

Real Time Protection Notifications
 
 
 
                                                After the user has indicated that they wish to turn off
                                                  notifications regarding real-time protection components,
                                                this notification will be displayed to request confirmation
                                                of the user’s wishes.
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 37 
 
                                                One or more components of real-time protection are
                                                disabled.  You may re-enable protection by clicking Turn
                                                On button, or by clicking Manage Protection Settings.  This
                                                is not available for Malwarebytes free users.
 
 
 

                                                  Malware has been detected as a function of real-time
                                                protection.  You have not chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so no specific action has been taken.  The program now
                                                being detected as malware may be acceptable to you, so
                                                you may choose to allow its execution once, always, or
                                                elect to quarantine it at this time.  This is not available for
 
Malwarebytes Free users.
 
 
 
                                                  Real-time protection has detected a Potentially Unwanted
                                                Program (PUP).  You have not chosen to ignore this type of
                                                activity, or to exercise the auto-quarantine capability upon
                                                  detection, so no specific action has been taken.  This
                                                  detection may be acceptable to you, so you may choose to
                                                ignore it once, always, or elect to quarantine it at this time. 
                                                This is not available for Malwarebytes Free users.
 
 
 
 
                                                  Malware has been detected as a function of real-time
                                                protection.  You have chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so the offending software has been moved to quarantine
                                                and modified so that it may not cause any damage to your
                                                  computer.
 
 
 
 
 
                                                A Potentially Unwanted Program (PUP) has been detected
                                                as a function of real-time protection.  You have chosen to
                                                exercise the auto-quarantine capability when a PUP has
                                                been detected, so the offending software has been moved
                                                to quarantine and modified so that it may not cause any
                                                damage to your computer.
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 38 
 
                                                An attempt has been made by software present on your
                                                  computer to contact a website suspected to be malicious,
                                                and has been blocked.  This detection occurred as a
                                                  function of real-time protection.  You may allow access by
                                                clicking Manage Exclusions, which will redirect you to the
                                                Exclusions screens.
 
                                                Please note: Unblocking a website out of convenience may
                                                result in damage being caused to your computer.
 
 
 
 

                                                  Anti-exploit protection has prevented an attacker from
                                                  exploiting your computer through a vulnerability. 
 

 
 
 
 

                                                  Anti-ransomware protection has prevented an attacker
                                                from exploiting your computer with suspected
                                                  ransomware.  The threat has been neutralized and moved
                                                to Quarantine.
 

 
 
 
 
                                                After threats have been quarantined, your computer must
                                                be rebooted to complete the quarantine process, and this
                                                  notification is displayed.  After assuring that other work is
                                                saved, click Reboot Now to perform that task.
 
 
 

Update Notifications
 
 
 

                                                A program update for Malwarebytes is available.  Click
                                                Install Now to get the latest program protection.
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 39 
 
                                                Your Malwarebytes updates are out of date.  Click Update
                                                Now to cause an immediate update.  Failure to update will
                                                cause subsequent scans to use outdated protection rules,
                                                which could jeopardize the safety of your computer.
 
 
 
 
 
  
 
  
 
  
 

Premium Notifications
 

                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, you will begin to see this message
                                                thirty (30) days before the expiration of your subscription,
                                                  counting down the number of days remaining on your
                                                  subscription. Click Renew Now button to renew your
 
subscription in a new browser window/tab.
 
 
 
                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, this notification is displayed on the
                                                final day of your subscription.  Click Renew Now button to
                                                renew your subscription in a new browser window/tab.
 
 
 
If you do not have auto-renewal set up on your account
                                                and have not responded to pending expiration, you will
                                                see this notification a maximum of three times after your
                                                  subscription has expired.  At this point, you have reverted
                                                to the free version of Malwarebytes.  Premium features
                                                have been disabled.  Click Upgrade Now to renew your
                                                  subscription in a new browser window/tab.  A slightly
different version of this notification appears within the
                                                  Malwarebytes user interface.
 
 
 
                                                This notification is displayed if your subscription cannot be
                                                  renewed.  Usually the reason for this is an expired
                                                  credit/debit card.  You will be given an opportunity to
                                                update your card information, and your subscription will
                                                remain in force for a brief period.
 
 
 
 
 

Malwarebytes for Windows User Guide 40 
 
                                                Your subscription has expired and could not be
                                                  automatically renewed.  Your Malwarebytes service has
                                                been downgraded from Premium to Free.  You can still run
                                                scans for protection, though real-time protection is no
                                                longer in force.
 
 
 
 
  
 
  
 

Premium Trial Notifications
 
 
 
                                                  Beginning five days before your Premium trial expires, you
                                                will receive a notification once per day about the expiring
                                                trial, and be given an opportunity to upgrade to Premium
                                                or to enter your Premium license information.
 
 
 
 
 
                                                On the last day of your Premium trial, you will receive a
                                                single notification, and be given an opportunity to
                                                upgrade to Premium or to enter your Premium license
                                                  information.
 
 
 
 
 

                                                After your Premium trial expires, you will receive this
                                                  notification in the Malwarebytes user interface as well as in
                                                the Windows system tray.
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 41
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.
----- Original Message -----
From: Sherri
To: jaws-users-list@groups. io
Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws
 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

JM Casey <crystallogic@...>
 

I don’t think it mentions blind people specifically, but it should still be useful for us.

I probably perused it (or something like it) when I first got the programme.

 

Of course one does have to get used to terminology like “click on”, etc, in the computer world, and apply knowledge as it pertains to screen-readers and keyboards accordingly.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Victor Gouveia
Sent: October 25, 2018 5:48 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Does this user guide take into account blind people, or is it just written with the general user in mind?

 

Not for nothing, but a great many of these user guides have images instead of actual written explanations, and they usually state to click on something, even though the Jaws’ various cursors can’t get to it.

 

Victor

 

From: Mike B.

Sent: Thursday, October 25, 2018 3:26 PM

Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Again Sherri,

 

Below is the user guide from Malwarebytes.  It's for a slightly older version but, it works the same way as the latest version.

 

            Malwarebytes for Windows User Guide

 

                                      Version 3.4.5

 

                                      29 March 2018
 
 
 
 
 
 
 
 
 

 


Notices

 

Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws.  Except as expressly permitted in your license agreement or allowed by
law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or
display any part, in any form, or by any means.  You may copy and use this document for your internal reference purposes only.

 

This document is provided “as-is.”  The information contained in this document is subject to change without notice and is not
warranted to be error-free.  If you find any errors, we would appreciate your comments; please report them to us in writing.

 

The Malwarebytes logo is a trademark of Malwarebytes.  Windows is a registered trademark of Microsoft Corporation.  All other
trademarks or registered trademarks listed belong to their respective owners.

 

Copyright © 2018 Malwarebytes.  All rights reserved.

 


Third Party Project Usage

 

Malwarebytes software is made possible thanks in part to many open source and third party projects.  A requirement of many of
these projects is that credit is given where credit is due.  Information about each third party/open source project used in
Malwarebytes software – as well as licenses for each – are available on the following page.

 

 


Sample Code in Documentation

 

The sample code described herein is provided on an “as is” basis, without warranty of any kind, to the fullest extent permitted by
law. Malwarebytes does not warrant or guarantee the individual success developers may have in implementing the sample code
on their development platforms. You are solely responsible for testing and maintaining all scripts.

 

Malwarebytes does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or
completeness of any data or information relating to the sample code. Malwarebytes disclaims all warranties, express or implied,
and in particular, disclaims all warranties of merchantability, fitness for a particular purpose, and warranties related to the code, or
any service or software related there to.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


CWC04-3045a                                   Table of Contents

 


Introduction ............................................................................................................................ 1

 

What’s New in Malwarebytes for Windows ................................................................. 2

 

System Requirements ......................................................................................................... 3

 

Installation .............................................................................................................................. 4

 

  Free, Premium Trial or Premium? ........................................................................................................ 4

 

  Activation .................................................................................................................................................... 5

 

  A Final Word about Administrative Rights ....................................................................................... 6

 

Screen Layout ....................................................................................................................... 7

 

  Menu Bar ..................................................................................................................................................... 7
      My Account ........................................................................................................................................................................ 7
      Notification Center .................................................................................................................................. 7

 

  Menu Pane ................................................................................................................................................. 8

 

    Status/Option Pane ................................................................................................................................. 8

 

  Detail Pane ................................................................................................................................................. 9

 

Dashboard ............................................................................................................................ 10

 

  Status Pane ............................................................................................................................................... 10

 

  Real-Time Protection.............................................................................................................................. 11
      Settings .............................................................................................................................................................................. 11

 

  Scan Status ................................................................................................................................................ 11
      View Scan Reports .......................................................................................................................................................... 11
      Schedule a Scan............................................................................................................................................................... 11
      Check for Updates .......................................................................................................................................................... 11
      Help ..................................................................................................................................................................................... 11

 

  Protection History ................................................................................................................................... 11

 

Scan ........................................................................................................................................ 12

 

  Threat Scan ............................................................................................................................................... 12

 

  Custom Scan ............................................................................................................................................ 13
      Custom Scanning Options............................................................................................................................................ 13
      Potentially Unwanted Programs/Modifications ..................................................................................................... 13
      Folders to be Scanned ................................................................................................................................................... 13

 

  Hyper Scan ............................................................................................................................................... 14

 

  Scan Schedules ....................................................................................................................................... 14
      Basic Mode ........................................................................................................................................................................ 15
      Advanced Mode .............................................................................................................................................................. 15
      Advanced Scan Options ................................................................................................................................................ 16

 

  Watching Scan Progress ...................................................................................................................... 16

 

  Scan Results ............................................................................................................................................. 17

 

  Scan Summary ......................................................................................................................................... 18

 

Quarantine ............................................................................................................................ 21 Reports .................................................................................................................................. 22

 

  Viewing or Deleting Logs .................................................................................................................... 24

 

Settings ................................................................................................................................. 25

 

  Application Settings .............................................................................................................................. 25
      Application Updates ...................................................................................................................................................... 26
      Notifications ..................................................................................................................................................................... 26
      Impact of Scans on System ......................................................................................................................................... 26
      Windows Context Menus ............................................................................................................................................. 26
      Display Language ........................................................................................................................................................... 26
      Event Log Data................................................................................................................................................................ 26
      Proxy Server ..................................................................................................................................................................... 26
      User Access ...................................................................................................................................................................... 27
      Windows Action Center ............................................................................................................................................... 28
      Beta Application Updates ............................................................................................................................................ 28
      Usage and Threat Statistics ......................................................................................................................................... 28

 

  Protection ................................................................................................................................................ 29
      Real-Time Protection .................................................................................................................................................... 29
      Scan Options .................................................................................................................................................................... 31
      Potential Threats ............................................................................................................................................................ 32
      Updates ............................................................................................................................................................................. 32
      Startup Options .............................................................................................................................................................. 33
      Automatic Quarantine .................................................................................................................................................. 33

 

  Scan Schedule ........................................................................................................................................ 33

 

  Exclusions ................................................................................................................................................. 34
      Add Exclusion .................................................................................................................................................................. 34

 

  My Account ............................................................................................................................................. 35

 

  About ........................................................................................................................................................ 36

 

Appendix A: Notification Window Examples ............................................................. 37

 

  Introduction

 

Malwarebytes for Windows (“Malwarebytes”) is an "AV replacement."  It is not an AV.  It does not incorporate the same old engine
for file-infectors and other malware that you find in a typical AV or Internet security suite, the large and inefficient library of
signatures, or the bloatware features which are becoming more prevalent.

 

You don't need to pay for a traditional AV anymore!  At Malwarebytes, we have always approached things differently and, as many
people know based on their own positive experience with Malwarebytes finding and remediating malware that gets past AVs, we
know a thing or two about zero-day malware and their infection tactics.  We have always believed that no one product can do it
all, and the free AV that comes with modern operating systems, in conjunction with Malwarebytes is all you will ever need.

 

In today's modern threat world, bad guys have learned how to evade AV protection, making it more important than ever before
to be able to disrupt attacks in as many different stages of the attack chain as possible.  Malwarebytes, layered with the AV (which
is the default mode) or as your stand-alone defense, is the most effective approach against modern threats.  And if all else fails,
you need the best remediation technology available.

 

Malwarebytes has been engineered to provide the most effective layered approach of prevention, detection and remediation
technologies:

 

  1. Application hardening, to make them more resilient against attacks.
  2. Anti-exploit technology, to shield applications from vulnerability exploits (currently one of the top infection vectors).
  3. Application Behavior Enforcement, an advanced and signature-less technology which prevents common infection
      vectors (e.g. web & email based social engineering).
  4. Anti-ransomware, a signature-less technology designed to behaviorally detect ransomware.
  5. Revamped Anti-Malware and Web Blocking engines, offering more aggressive detection techniques.
  6. Hardened and modular architecture design, allowing seamless integration of new detection and protection technologies
    in the future.
  7. Highly effective as always in malware remediation, an often overlooked part of the protection stack.
  8. Ability to run as primary protection (no AV) or secondary protection (alongside existing AV).
  9. Engineered to be our next corporate endpoint client, providing major improvements to our endpoint management
      capabilities and new enterprise-focused offerings
  10. Last but not least, our Research Team has been growing and adapting lately, with notable additions to the lineup from
      JRT and AdwCleaner, our new aggressive stance against PUPs, as well as new R&D technologies which we will be
      unveiling shortly.

 

Welcome to the Malwarebytes User Guide! 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 1 What’s New in Malwarebytes for Windows

 

This version of Malwarebytes contains many improvements and bug fixes.  Following is a list of changes.

 

Performance/protective capability

 

  • Improved remediation for hijacked shortcuts
  • Continued improvements to overall protection, detection and remediation

 

Usability

 

  • Device Name now syncs to the Malwarebytes My Account portal for users on the paid version
  • Improved accessibility features for the Notification Center
  • Added custom messages designed to highlight the value of Malwarebytes protection and help it remain free

 

Stability/issues fixed

 

  • Fixed problem when cutting / pasting files with anti-ransomware enabled
  • Fixed problem where USB stick would not eject properly with anti-ransomware enabled
  • Fixed a service crash related to self-protection
  • Fixed a blue screen crash related to Web Protection
  • Addressed other miscellaneous defects

 


 
 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 2 System Requirements

 

Following are minimum requirements for a computer system on which Malwarebytes may be installed.  Please note that these
requirements do not include any other functionality that the computer is responsible for.

 

  • Operating System: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista (Service Pack 1 or later), Windows
    XP (Service Pack 3 or later, 32-bit only)

 

      PLEASE NOTE: Anti-ransomware protection is not supported for Windows XP or Windows Vista, due to architectural
      constraints.

 

  • CPU:  800 MHz or faster, with SSE2 technology.  This includes most modern Intel x86 processors as well as AMD’s Athlon
    64, Sempron 64, Turion 64 and Phenom CPU families.  Please refer to the following page for further information:
 
 https://en.wikipedia.org/wiki/SSE2

 

  • RAM:  2048 MB (64-bit OS), 1024 MB (32-bit OS, except 256 MB for Windows XP)

 

  • Free Disk Space:  250 MB

 

  • Recommended Screen Resolution: 1024x768 or higher

 

  • Active Internet Connection

 

WARNING: If you are upgrading from Malwarebytes Anti-Malware version 2.x and have enabled Malwarebytes’ self-protection
feature, please disable it prior to initiating the upgrade.  It prevents the Malwarebytes installation program from doing its job.

 


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 3 Installation

 

To begin the installation, double-click on the Malwarebytes installation file which you downloaded.  If you are installing
Malwarebytes on a Windows version newer than Windows XP, a Windows dialog box will be presented in the middle of your screen,
labeled User Account Control.  Verify that the publisher is listed as Malwarebytes Corporation and click Yes.  This Windows security
feature assures limited application capabilities unless and until you authorize higher capabilities.  Installation will begin once this
has been approved.  The installation program guides you and allows you to provide alternate information if you do not wish to
accept defaults.  Each screen also allows you to terminate installation if you do not wish to continue.  

 


Free, Premium Trial or Premium?

 

Before you begin, we want to let you know that throughout this guide, you will see references to the Free, Premium Trial, and
Premium versions of Malwarebytes.  This is likely unfamiliar territory for new Malwarebytes users.  The following link provides a
basic rundown on the differences between the Free and Premium versions of Malwarebytes.

 

 

These differences are also shown in the Malwarebytes interface immediately after it has been installed.  See below….

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The Premium Trial is a 14-day opportunity to use the Premium version of the program, and to see if it is better suited to your needs. 
The Premium Trial is available at no cost, but you can only use it one time for each version of Malwarebytes.  The Premium Trial is
automatically started during installation.  Once installed, the program provides options to convert from Free to Premium, and from
Premium Trial to Premium.

 

If you elect to use the Premium Trial and do not wish to purchase a Premium subscription at the end of the trial, your Malwarebytes
program will revert to Free mode.  The only differences will be that the added features enabled by the trial will cease to function. 
All other functionality remains unchanged.

 

If you are a new Malwarebytes user, or are a free/Premium Trial user upgrading to this version, you will be alerted that a scan has
not been run.  Click Scan Now and Malwarebytes will run a scan for you.  After the scan (and cleanup, if needed) has been
completed, you will see the user interface as shown below.

 

 

 


Malwarebytes for Windows User Guide 4 

 

Please take note of the Why Premium button in the lower left corner.  Click that button for a brief slide show that describes the
differences between Free and Premium modes.  While Malwarebytes does an effective job of disinfecting your computer after an
attack, there is no replacement for preventing the attack from ever happening.

 

If you have already purchased a license, you may wish to activate your copy of Malwarebytes at this time.  You can do that now (or
at any time) by clicking the Activate License button at the top right portion of the Malwarebytes user interface.

 


Activation

 

Malwarebytes is available for users of any modern Windows client to download and install at no cost.  You can also purchase an
annual subscription, which entitles you to take advantage of real-time protection, scan/update scheduling and access policies.  If
no license has been installed into the product, the blue title bar at the top of the screen will show two buttons, Activate License
and Upgrade Now.  When clicked, Upgrade Now launches a browser window which opens to the Malwarebytes web site
pricing/purchase page.  Your license information will be in an email sent to you by Malwarebytes at the time of purchase.  Locate
your license information and click the Activate License button.  You will then see the following screen.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 5 Please note the checkbox and the words “My license came with a License ID.”  If you are using our “old style” license, you will also
need to check that box and enter your License ID along with your Key.

 

Please note:  You must be online with an active Internet connection in order to successfully activate your Premium license.

 

The construction of the Key is different, so make sure that you choose the right screen for entering your license information based
on whether you have an ID and Key, or just a Key.  After entering your license information, click the Activate License button.  Your
Malwarebytes screen will refresh, as shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Please note that the two license-related links in the Menu Bar have been replaced by a link called My Account.  Also note that the
banner has changed from Malwarebytes Premium Trial to Malwarebytes Premium.

 


A Final Word about Administrative Rights

 

If you installed Malwarebytes from a downloaded installation file, you automatically started a Premium Trial, and were offered the
capability to activate the Premium features if you had purchased an annual subscription.  You may have decided to wait until later. 
If that is the case, please remember that you should be logged in to Windows as an Administrator before doing either of those
tasks.

 

We will go into much more detail about the features of Malwarebytes, but before doing that, we should introduce you to the
Malwarebytes user interface.

 

 

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 6 Screen Layout

 

The Malwarebytes program interface is designed around a screen layout which is simplified and uncluttered.  We want to make it
easy for you to configure the program to serve your needs, and we hope this layout helps to do that.  The screenshot below shows
the Dashboard – the screen you see when Malwarebytes is launched for the first time.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Let's talk about the primary elements which make up our user interface.

 


Menu Bar

 

The Menu Bar is displayed at the top of the screen at all times. There are two buttons in the Menu Bar. A description for both
follows.

 

My Account

 

This button will take you to the setting options to manage your Malwarebytes subscription(s) and license(s). For more information,
please refer to pages 35-36 of this guide.

 

Notification Center

 

The Notification Center provides a convenient location to view recent notifications generated by Malwarebytes. Clicking the icon
will show the 5 most recent notifications. You may scroll down to view up to 25 notifications by using your mouse wheel. You can
view additional details for each notification by clicking it – Malwarebytes will bring you to the relevant screen.

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 7 

 


Menu Pane

 

The Menu Pane contains the main program options, which will be discussed in detail in this guide.  They consist of:

 

  • Dashboard: What you see here. While the exact details change over time, the look is consistent.
  • Scan: Select the type of scan you wish to run, run it, and view the results.
  • Quarantine: Delete or restore threats which have been detected by program scans.
  • Reports: View reports related to program operation, threats which have been detected, and threats which have been
      removed.
  • Settings: Configure every aspect of Malwarebytes, so that it can protect you efficiently.

 

In addition, there are settings for Account information.  While in Premium Trial mode, options are present to buy a Premium
subscription and to Activate the program.  Once you have purchased a subscription, those two options will revert to a single option
which handles details of your account.  More on those later.

 


Status/Option Pane

 

When the Dashboard is selected from the Menu Pane, the center of the screen is filled with the Status Pane.  It is designed to give
you quick information that tells you whether there is anything for you to be concerned about.  When the Dashboard is selected,
the Detail Pane is also displayed.  More on that momentarily.

 

When any menu option other than the Dashboard is selected, all space except the space used by the Menu Pane is allocated to the
selected menu option.  This provides sufficient room for information pertaining to any menu option to be cleanly displayed.

 

 

 

 

 


Malwarebytes for Windows User Guide 8 Detail Pane

 

The Detail Pane is shown only when the Dashboard is selected.  It shows information on protection options, protection updates,
and detail pertaining to the most recent scan.  This information is shown on other screen displays as part of the menu option
selected by the user, but are all displayed here for quick recognition.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 9 Dashboard

 

Each time Malwarebytes is launched, the first page visible to the user is the Dashboard.  It provides program status, and acts as a
launch pad for all program operations.  A screenshot of the user interface – featuring the Dashboard – is shown below for reference.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 


Status Pane

 

The main area of the screen is the Status Pane, providing current system status.  Within the Main Window, the first item displayed
is the Status Banner.  This banner displays a status message along with an icon, whose color is based on program status.  The color
is meant to alert the user to conditions which may require intervention.  Colors used are similar to traffic stop signals – green simply
indicates a good status; orange indicates a warning of a condition which may become more severe over time; red indicates that
your immediate attention is needed.  Following is a full list of status messages.  If a recommended method of correcting the
problem is immediately available, it will appear as a functional button on the banner itself.

 

  • Color: green (no problem)
        o Awesome! You’re protected. (Premium mode and Premium Trial modes which will expire more than 7 days in
            the future)
        o You’re running Malwarebytes Free. (free mode only)
  • Color: orange (non-critical problem)
        o You’re not fully protected.
        o Your Protection Updates are not current.
        o Your program version is out of date
        o Your Premium Trial ends in <x> days. (trial expiring in 3-7 days)
        o Renew to avoid losing protection against malware, bad websites, and other threats
  • Color: red (critical problem)
        o Your Premium Trial ends in <x> days. (trial expiring in 0-3 days)
        o Your trial has expired
        o Renew to avoid losing protection against malware, bad websites, and other threats
        o We were unable to renew your subscription (renewal failed, and you are now in 30-day grace period)

 

 

 


Malwarebytes for Windows User Guide 10 Real-Time Protection

 

This item shows the status for each of the four Real-Time Protection features.  Please note that real-time protection is enabled only
for Malwarebytes Premium and Malwarebytes Premium Trial users.  This feature is not available if you are using the Free version.

 

Settings

 

Settings are accessed from the Main Menu, and also by clicking the small gear at the top right of the Real-Time Protection panel. 
When clicked, the Settings screen will be displayed, allowing access to all program settings.  Please refer to the Settings portion of
this guide (pages 24-35) for complete information on this topic.

 


Scan Status

 

This panel shows your scanning activity at a glance.  You can easily see when the last scan was completed, when the next scan is
scheduled, and the status of your protection updates.  There are four icons on the title bar for this panel, as shown here.

 


 

 

A description for each icon – in the order shown – is as follows.

 

View Scan Reports

 

This icon takes you to Reports, where you can view detailed reports on scans which Malwarebytes has performed on your computer. 
Please note that information shown here is limited to the last scan that was executed.  See the Reports Pane (pages 21-23) for
information on reports as a whole.

 

Schedule a Scan

 

The second icon allows scans to be scheduled for automatic execution.  This option is available only for Malwarebytes Premium and
Malwarebytes Premium Trial users.  The icon remains visible in Free mode, but clicking it has no effect.  When clicked, the Settings
screen will be displayed, allowing access to the Scan Schedule screen.  Please refer to the Scan Schedule portion of this guide (pages
13-15) for full information on this topic.

 

Check for Updates

 

The third icon causes Malwarebytes to connect with Malwarebytes servers to check for protection updates more current than those
in use, and download them if they exist.  This option is functional for all program modes.

 

Help

 

The fourth icon links to the Malwarebytes User Guide on the Malwarebytes website.  This behavior is consistent throughout the
program.

 


Protection History

 

This panel shows three key statistics.  It shows how many items were scanned, how many threats were detected during scans, and
how many threats were detected by real-time protection.  Please note that the number of items scanned includes individual files
that are part of archive files, as well as components in dynamic link library (DLL) files.  Also note that real-time detections can only
occur in Premium and Premium Trial modes.

 

 

 

 

 


Malwarebytes for Windows User Guide 11 Scan

 

The Scan Pane is the introduction to scan-related options in the program.  When you click Scan in the Menu Pane, you will see the
screen shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

On this screen, you may select the Scan Method and the Scan Schedule.  Let’s look first at Scan Methods.  There are three scan types
which can be executed – Threat Scan, Custom Scan, and Hyper Scan.  Hyper Scan is only available to users of the Premium or
Premium Trial modes.  Please note that global scan settings used by Threat Scans and Hyper Scans are selected in Settings (see
pages 30-31).  Following are more detailed descriptions of each of the scan modes.

 


Threat Scan

 

This method of scanning detects a large majority of threats that your computer may be faced with.  Areas and methods tested
include:

 

  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Registry Objects: Configuration changes which may have been made to the Windows registry.
  • File System Objects: Files stored on your computer's local disk drives which may contain malicious programs or code
      snippets.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects – as well as in other areas –
      which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats
      cannot reassemble themselves.

 

The Threat Scan is the scan method which we recommend for daily scans.  While it will not scan every file on your computer, it will
scan the locations which most commonly are the launch point for a malware attack.

 

 

 

 

 


Malwarebytes for Windows User Guide 12 Custom Scan

 

You may also choose to run a custom scan.  A custom scan allows you to scan according to specifications which you define at the
time of the scan.  These settings will override scan settings defined elsewhere.  A screenshot of the custom scan configuration
screen is shown below.  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Custom Scanning Options

 

These settings provide capability to determine the functional areas that will be scanned.  They are as follows:

 

  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.  It is
      important to note that threats detected during scans are still considered threats if they have an active component in
      memory.  As an extra measure of safety, memory objects should be scanned.
  • Startup and Registry Objects: Executable files and/or modifications which are initiated at computer startup, as well as
      registry-based configuration changes that can alter startup behavior.
  • Archives: If this setting is checked, archive files (ZIP, 7Z, RAR, CAB and MSI) will be scanned up to two levels  deep. 
      Encrypted (password-protected) archives cannot be tested.  If left unchecked, archive files will be ignored.
  • Rootkits: These are files stored on your computer's local disk drives which are invisible to the operating system.  These
      files may also influence system behavior.

 

Potentially Unwanted Programs/Modifications

 

These settings allow the user to choose how Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications
(PUMs) will be treated if they are detected.

 

Folders to be Scanned

 

This setting allows the user to include or exclude directories, subdirectories, and individual files from scans.  It utilizes a Windows
Explorer-like presentation model.  In the screenshot shown above, every directory except Desktop is selected for a custom scan. 
You may scan parent directories separately from child directories based on individual selections.

 

 

 

Malwarebytes for Windows User Guide 13 Hyper Scan

 

This scanning option is only available to users of Malwarebytes Premium and Malwarebytes Premium Trial versions.  This method of
scanning is limited to detection of immediate threats.  Areas and methods tested include:

 

  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.

 

While a Hyper Scan will clean any threats which have been detected, we strongly recommend that a Threat Scan be performed if
a Hyper Scan has detected threats.

 


Scan Schedule

 

This tab allows users of the Premium and Premium Trial versions to add, edit and remove scheduled scans to be executed by
Malwarebytes.  This feature is not available to users of the Free version.  A screenshot of this tab is shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

One scheduled scan is defined when Malwarebytes is installed.  Premium and Premium Trial users are free to modify or delete scans
at will, while Free users are provided with a single monthly scheduled scan.  Please note that if the initial task is deleted without a
replacement task being defined, your Malwarebytes program will not deliver the positive results that you expect.  The same
methods are used here to add a new task as well as to edit an existing task, so let's Add a new task in Basic mode.

 

 

 

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 14 Basic Mode

 

A screenshot of the basic Add Schedule screen is shown here.

 

                                                                  You can choose the
                                                                  specific task to be
                                                                  added on the left side of
                                                                  the screen, in the
                                                                  Scheduled Task area. 
                                                                  You may choose from
                                                                  the following tasks:

 

                                                                  • Threat Scan
                                                                  • Custom Scan
                                                                  • Hyper Scan

 

 

 


 

 

Scan types have been previously discussed in the Scan section of this guide (pages 11-19).  Please refer to those pages for further
information if desired.  The Frequency and Settings section allows you to define the timeframe (Schedule Frequency) that a task
will be executed, and how often (Recurrence).  For scans, this translates to:

 

  • Frequency = Hourly, recurrence in range of 1-48 hours
  • Frequency = Daily, recurrence in range of 1-60 days
  • Frequency = Weekly, recurrence in range of 1-8 weeks
  • Frequency = Monthly, fixed setting
  • Frequency = Once, fixed
  • Frequency = On Reboot, fixed

 

Advanced Mode

 

At the bottom left corner of the Add Schedule window is the Advanced button.  Click that to expand the Add Schedule window to
expose several more options.  A screenshot is shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


In Advanced Mode, we add options which tailor the scan more to your liking.  Let's look a little deeper, beginning with the
advanced options for scans.

 


Malwarebytes for Windows User Guide 15 Advanced Scan Options

 

Scheduled Task defines what task (scan/update) is to be added/edited, and when that task should begin – specifying both the date
and time.  Schedule Options provides several added capabilities to the basic settings which have already been described.  Here's a
rundown on the advanced options.

 

  • Quarantine all threats automatically: This option determines if a newly-detected threat would be automatically
      quarantined, or if you would be notified so that you could choose a course of action.  While automatic quarantine may
      seem to be the best course of action, it could have negative implications if a false positive was encountered.  A false
      positive is the categorization of a legitimate file as a malicious file.  It does rarely occur, and when it does, Malwarebytes
      Customer Success will assist you in having the offending file evaluated more fully by our Research group.
  • Restart computer when required for threat removal: This is available only if threats are automatically quarantined, and is
    not selected by default.  Some threats may require a computer restart to completely eliminate the threat, but we feel it’s
      best to notify you at the time, so you may save your work before restarting your computer.  If this were checked, you
      could lose work unless you were monitoring the scan in progress.
  • Scan for rootkits: This option allows specialized testing for the presence of rootkits.  Due to its nature, it increases the
      required time for a scan to execute.  This option is not available for Hyper Scans.
  • Scan within archives: This is selected by default.  It allows scanning to go two levels deep within archive files.  If not
      selected, the archive will be ignored.  It will also be ignored if it is encrypted.  This option is not available for Hyper Scans.

 

Frequency and Settings was discussed in the previous section (Advanced Mode).  Please refer to that section for more detail.

 

Recovery Options allow you to recover from a missed task (e.g. your computer was off at the time a scan was to take place).  A
scheduled task – if missed – will run at its next opportunity as long as it is within the duration specified by the Recover if missed by
selector and the Recover missed tasks checkbox is checked.

 


Watching Scan Progress

 

Each scan method requires a different amount of time to complete.  Unless significant changes have occurred on your local disk, a
Hyper Scan or Threat Scan should each be rather consistent from scan to scan.   A custom scan time interval may vary widely each
time, based on the areas scanned, the number of files involved, and the size and complexity of the files.  The screenshot below is
an example of a scan in process.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 


Malwarebytes for Windows User Guide 16 The progress bar shows milestones for each phase of the scan, with each milestone represented by a green or gray symbol.  In this
screenshot, some milestones are shown with green checkmarks, indicating that phase of the scan has been completed.  Scan
Memory is represented by an animation which indicates that this phase of the scan is currently being performed.  The remainder
of the tasks are shown as grey hourglasses, and are yet to be started.

 

You may also pause a scan while it is in process by clicking the Pause button.  The scan phase in progress will change to indicate
that the scan has been paused.  Click Resume to continue the scan where it left off.  You may also click Cancel at any time to
terminate the scan.  Results of the scan will be reported as if the scan ran to completion.

 


Scan Results

 

After a scan has been executed, Scan Results are displayed as shown here.  In this scan, three threats were detected.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 
 
You may move threats to Quarantine by selecting the threat (using checkboxes to the left of the threat’s name) and clicking
Quarantine Selected.  If any threats are not selected to be moved to Quarantine, you will be prompted to Ignore Once, Ignore
Always, or Cancel.  Ignore Once will result in the threat once again being reported as a threat during the next scan execution. 
Ignore Always causes the threat to be added to Exclusions.   A threat which has been added to Exclusions will no longer be reported
as a threat unless there is reason to believe that it has been tampered with.  You must provide a disposition for each threat
displayed on this screen.

 

Threats which have been moved into Quarantine cannot harm your computer.  They are neutralized as part of the Quarantine
process.  Please see Quarantine (page 20) for further information.

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 17 Scan Summary

 

The final screen to be displayed as part of a scan is the Scan Summary.  It provides summary information about the scan, and allows
you to view scan detail on screen, or export scan summary or scan detail to a text file.  A screenshot of the Scan Summary is shown
below.  Free and Premium Trial users will see a reminder of the value of a Malwarebytes subscription on this page as well.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Clicking the View Report button displays the Scan Report for the scan just completed.  It is shown here as well.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

When threats are detected during a scan, the user must decide how these threats should be handled.  The following series of
screenshots detail this flow.  In the first screenshot, twenty threats have been detected.  By default, all are selected for removal. 
Please note that the total number of detected threats is shown above the list of threats, as is the number of threats selected for
removal.

 

 

 

Malwarebytes for Windows User Guide 18 

 

In order to demonstrate the behavior of this screen, we will uncheck some of the threats.  This indicates that only the checked
threats are to be removed.  Clicking the Quarantine Selected button results in the screen shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Threats that were not selected still require remediation, based on input supplied by the user.  In this case, the choices available are
Ignore Once, Ignore Always and Cancel.  Clicking the Ignore Once button temporarily ignores a threat, although it will be shown
as a threat on subsequent scans.  Selecting Ignore Always results in the threat being added to the Exclusion List.  It would not be

 

 

 

Malwarebytes for Windows User Guide 19 scanned in the future.  Clicking Cancel keeps you on this screen until you choose how to handle all detected threats.  Once a
disposition has been selected for all detected threats, the screen below will be displayed.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Although threats have been quarantined, you must restart the computer to assure the threat removal process is complete.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 20 Quarantine

 

When executing scans (on-demand or as part of real-time protection), some programs, files or registry keys may have been
categorized as threats.  At that time, they were removed from the disk location where they were stored, placed in quarantine, and
modified so that they could not pose a threat to your computer.  There may be items which fall into this category, but are not
malicious.  It is up to individual users to research and make this determination.  Upon entry to the Quarantine option, you are
presented with the screen shown here.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Quarantined items are shown in a table format, with pertinent information presented to help you determine what action needs to
be taken.  Each item listed has a checkbox in the leftmost column.  Check the checkbox to restore or delete the item.  Please note
that the Restore and Delete buttons are greyed out until items are selected.  If you wish to apply the same action to all quarantined
items, select the checkbox in the table header and click Restore or Delete.

 

Please be aware that quarantined items which are not deleted or restored will continue to be visible here until action is taken.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 21 Reports

 

The Reports Pane displays a list of scans and real-time protection detections, in reverse chronological order.  A Protection Event that
starts with the word Scan is a report summarizing the specified scan.  All other reports listed on this screen are detail pertaining to
detections made by real-time protection.  A screenshot is shown here.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Selected reports may be viewed on screen, or exported to a text file for later viewing.  Opening a report will display a summary of
the event.  You can click the Advanced tab to view more information about the event. Details displayed for Protection Events will
be relevant to the type of event shown.  Please note that only manual (on demand) scans are available for users of the free version
of Malwarebytes.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 22 The Scan Report may appear in two different forms.  If one or more threats were detected during a scan, the report will appear as:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Please note that the bottom portion of the report shows the threats detected during the scan.  It is scrollable when required.  The
top portion of the report contains a summary of the scan.  You can click the Advanced button to view more details, as shown here:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 23 Viewing or Deleting Logs

 

You may view any log file by clicking the log to select it, then clicking the View Report button.  As mentioned previously, there are
several output options for Protection Logs.  To delete logs, click the checkbox corresponding to those logs you wish to delete, then
click the Delete button.  Please bear in mind that computers which have significant threat activity will also have larger logs.  You
should periodically check how much disk space is being used for logs, so that logs do not impact normal operation of your
computer.

 

Please note that an Export button is shown at the bottom left corner of this screen.  This allows you to make a copy of the log for
use by other programs.  You may export to your clipboard or to a text (TXT) file.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 24 Settings

 

The Settings screen allows the user to change all Malwarebytes operational settings.  We have grouped settings by the
areas/functions which they control into tabs to maintain a clean user interface.  When you select any tab, you will see the Detail
Pane change to reflect the tab which you selected.  At the same time, the tab itself is highlighted.

 

Before we dig in to each of the tabs, a brief description of each is in order.

 

  • Application Settings: Settings that affect Malwarebytes, as well as how it coexists with Windows.
  • Protection Settings: How Malwarebytes should protect you during scans and (for Premium/Trial mode users only) Real-
      Time Protection.
  • Scan Schedule: When Malwarebytes should execute scans and check for protection updates.  This setting is functional
      only for users of Premium/Trial mode.
  • Exclusions: Items which will be excluded from testing which detects malware, as well as websites which are categorized
    as malicious but specifically approved by the user.
  • My Account: Information pertaining to the status of your subscription.
  • About: Version numbers corresponding to Malwarebytes as a whole, and for various components of the program which
    may be updated individually.  Malwarebytes company resources are also listed on this page.

 

When Settings is selected, the Application tab is always selected.  If you navigate away from Settings – to Dashboard, Scan,
Quarantine or Reports – you will always return to the Application tab of Settings when you click on Settings.

 

Now, let's take a look at Application Settings!

 


Application Settings

 

This is the entry screen you will see when you click on Settings in the Menu Pane.  It controls how Malwarebytes interacts with
many aspects of your computer’s operating system.  A screenshot is shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

The scroll bar at the right of this screen indicates there are many more options available on this screen than what appear here.  We
will now cover each of them in order.

 

 

 

Malwarebytes for Windows User Guide 25 Application Updates

 

Malwarebytes may have updates available for individual program components, or for the full program.  We provide two toggle
switches which allow you to choose whether either or both upgrade modes can be integrated into your copy of Malwarebytes
when they are available.  Click Install Application Updates to check for available program updates or upgrades.  You can choose if
you upgrade, and when.  Upgrades only happen with your consent.

 

Notifications

 

Notifications regarding scans, real time protection, updates and subscriptions occur in windows at the lower right corner of your
screen, outside of the Malwarebytes interface.  You may enable or disable these notifications.  Most notifications are enabled by
default, while a few can be disabled.  Please note that some non-critical information may not be visible if you disable notifications. 
Disabled notifications do not leave the user at risk at any time. The following notifications may be disabled.  Please refer to
Appendix A (Notification Window Examples) at the end of this guide for further information.

 

    • Malicious Website Blocked
    • Malware Detected (auto-quarantine)
    • Non-Malware Detected (auto-quarantine)

 

Some users intentionally turn off one or more components of real-time protection.  Users may now disable notifications that
components have been turned off.  Please note that as a result of this setting, users will be unable to receive notifications regarding
real-time protection failures in the event of program malfunction.

 

Impact of Scans on System

 

Most users schedule scans to occur during times when their computer is typically idle.  Execution of a manual scan may be
performed as a matter of convenience, or while other tasks are being executed.  The performance of lower-powered computers
may be affected by execution of the Malwarebytes scan.  This setting allows the user to determine the priority of the scan to be
performed.  Lower scan priority will require more time to execute while impacting other operations to a lesser degree.  High priority
allows the scan to be executed at the maximum speed which the computer allows, but may affect other tasks.

 

Windows Context Menus

 

Malwarebytes has the capability to launch a Threat Scan upon one or more individual files or directories from within Windows
Explorer by using the context menu that becomes available when the files/directories are right-clicked.  This setting allows that
capability to be turned on or off.  The default setting is On.

 

Display Language

 

This setting determines the language used throughout.  This is pre-set, based on the language used during program installation. 
It can be modified at will.

 

Event Log Data

 

This setting provides additional information regarding program actions which are beyond typical needs of the user.  Should you
encounter a technical issue with Malwarebytes, our Customer Success engineers may request that you enable this setting to
provide additional troubleshooting information.  Once troubleshooting is complete, please remember to turn this setting off to
prevent unnecessary disk usage.  The default setting is Off.

 

Proxy Server

 

This determines whether Internet connections will use a proxy server.  This is more often used on a corporate network.  It has two
primary purposes.  The first is to funnel communications to and from the outside world through a single connection point, thus
assuring anonymity of all computers on the internal network.  The second purpose is to cache content.  This means that external
content which had recently been downloaded is saved locally for some period of time, and subsequent requests by that user (or
others) could use the recently-saved data.  This conserves significant bandwidth, resulting in lower operating costs.

 

 

 

 

 

Malwarebytes for Windows User Guide 26                                       By default, Malwarebytes does not use a proxy.  If configured to
                                      do so, the bottom panel will change to provide configuration
                                      options as shown in the screenshot shown here.

 

                                      You can now specify the IP address or name of a proxy server,
                                      as well as the appropriate port number.  If a proxy is in use, the
                                      name and port number must be specified by the person who
                                      controls access to the proxy server.  He will also be able to tell
                                      you whether authentication is required to use the server, and if
                                      so, provide a user name and password which have been
                                      assigned to you.

 

 

 


User Access

 

This slider allows users of Malwarebytes Premium and Malwarebytes Premium Trial versions to restrict access to various features
and functions in Malwarebytes with password protection.  The Edit User Access button is only visible when the slider is in the On
position, allowing the user to define sections of the program which require a password to access.

 

 

 


 

 

When the Edit User Access button is clicked, a new window opens directly above the Malwarebytes program screen to restrict
access to selected areas of the program only to those users who possess the password.  The password is also defined on this screen.

 

WARNING: This password is not recoverable.  If you lose your password, you will have to reinstall Malwarebytes to access restricted
features.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

As shown above, the Reports tab has been placed under password control.  This also causes User Access to be placed under
password control.  This prevents unauthorized users from gaining access to restricted areas.

 


Malwarebytes for Windows User Guide 27                                                     When attempting to gain access to a
                                                    restricted area, you will be required to enter
                                                    a password (as shown here).

 

 

 

 

 

 

 

                                                    If an incorrect password is entered, or if a
                                                    null password is used, this error message
                                                    will be displayed.

 

 

 


If this feature has been enabled and is subsequently disabled, any restrictions which have been defined are cancelled.  This feature
is not available to users of the Free version.  Currently, only one policy may be in effect at any given time.

 

Windows Action Center

 

You may have noticed an icon in your system tray with a red X superimposed over a white flag. That is a status indicator for the
Windows Action Center, which tells you when your computer has a security issue that needs your attention.  Malwarebytes Premium
or Malwarebytes Premium Trial can now be registered as a security solution on your computer.  There are three settings available,
which will be abbreviated here for easier reading.  Brief descriptions for the meaning of each setting are also provided. 

 

  • Let Malwarebytes choose whether to register: Malwarebytes will determine whether it should be registered in Action
      Center. The program will not register when Microsoft Security Essentials is in use on a Windows 7 or older operating
      system. It will also not register when Windows Defender is used on a Windows 8 or newer OS.
  • Always register Malwarebytes: Malwarebytes program status will always appear in Action Center.
  • Never register Malwarebytes: Malwarebytes program status will never appear in Action Center.

 


Beta Application Updates

 

Some Malwarebytes users want to try the newest features as soon as they are available, while some prefer to wait until the product
is released.  We have added this program setting so that if you want the latest and greatest immediately, we can deliver it to you
automatically.  When you enable this setting, you will see the following dialog box.

 

 

 

 

 

 

 


 

 

Usage and Threat Statistics

 

If you check this box, you will be sending us information to help us do our jobs.  We like to know what countries Malwarebytes is
being used in, and the breakdown of Premium, Premium Trial, and Free versions.  Our Research organization likes to keep track of
what malware we are detecting and how often.  We learn that from what you send us, and helps us to serve you more effectively. 
We hope that's fine with you as well.  For a full list of information that is collected, please see the Malwarebytes Privacy Policy, at:

 

 


Malwarebytes for Windows User Guide 28 Protection

 

Most settings which control how Malwarebytes protects your computer are located on the Protection tab.   Settings are grouped
by category.  A screenshot is shown below, along with descriptions of all settings available on this tab.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Real-Time Protection

 

Malwarebytes offers four different types of real-time protection.  These features are available only to users of the Premium and
Premium Trial modes.  It is important to note that Premium Trial users who do not convert to a Premium subscription will lose all
real-time protection features at the end of their trial.

 

Web Protection protects Premium/Trial users by blocking access to/from Internet addresses which are known or suspected of
engaging in malicious activity.  This feature does not treat different protocols differently.  It does not distinguish between your
favorite game being served on one port and a potential malware source being served on another.  Should you choose to disable
this feature, you could inadvertently compromise your computer's safety.  Please note that this option is disabled if you are using
the Free version.

 

Exploit Protection uses multiple protection layers to guard against attempted exploits of vulnerabilities in legitimate applications. 
When applications are launched by the user, exploit protection is also launched as a shield.  This protection will often detect and
neutralize attacks that go undetected by other security applications.  It is on by default for Premium/Premium Trial users.

 

 

 

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 29 

 

Many popular applications have been pre-configured for shielding.  A screenshot is shown above.  To change the status of any
application, either use the Protection slider, or double click either the Application or File Name.  Premium/Premium Trial users may
add protection for other applications, and edit specifications for any defined shield.  The Edit screen is shown here.

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

You may specify an Application name which is easily recognizable, and the Application file name.  You can also browse for the file. 
Select a Program type which most closely resembles the purpose of the application.  If you are unsure, select Other.

 

The same screen is used to edit existing entries.

 

 

 

Malwarebytes for Windows User Guide 30 In addition, Premium/Premium Trial users can modify advanced exploit protection settings.  Several advanced settings are spread
across four tabs, depending on the classification of protection they provide.  One tab is shown here as an example.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Each advanced setting is available for up to six different application groups, the groups representing the method by which threats
will attempt to exploit vulnerabilities in applications of that type.  Protection may be turned on (checked), off (unchecked), or is
not applicable for that group of applications (greyed out).  While these settings provide very specific protection, they should only
be changed when requested by a Malwarebytes Customer Success specialist.  Incorrect settings may result in impaired protection.

 

Malware Protection may be turned on or off as needed by Premium/Premium Trial users.  It is on by default.  This feature protects
against malware present in code/files that try to execute on your computer.  These files may have been downloaded, imported
from a USB drive, or received as an email attachment.  While we do not recommend disabling this protection mechanism, there
may be times when it needs to be done to troubleshoot compatibility issues that arise with anti-virus updates or computer startup
problems.  If either situation does occur, start your computer in Safe Mode, disable Malware Protection, isolate and correct the
issue, then turn Malware Protection back on.  Please note that this option is disabled if you are using the Free version.

 

Ransomware Protection provides Premium/Premium Trial users protection against the threat of ransomware.  This protection is
not available for users of Windows XP or Windows Vista.  While all other protection features may provide some degree of protection
against ransomware, well-crafted ransomware may go undetected until it attempts to initiate its attack.  As many computer users
have found, there is little or no remedy available after the fact.  We strongly recommend that ransomware protection be turned
on at all times.  It is on by default.  Please note that this option is disabled if you are using the Free version.

 

Scan Options

 

Scan for rootkits utilizes a specific set of rules and tests to determine if a rootkit is present on your computer.  For readers who are
unfamiliar with this term, an explanation may be handy.  A rootkit is malicious software that can be placed on a computer which
has the ability to modify operating system files in a manner that hides its presence.  Malware detection methods that rely on hooks
to the operating system for detection and analysis would prove ineffective if the hooks had been purposely manipulated by
malware.  Our testing method is more intensive and more effective, but including rootkit scans as part of your overall scan strategy
increases the time required to perform a scan.

 

 

 


Malwarebytes for Windows User Guide 31 When Scan within archives is enabled, Malwarebytes will scan two levels deep within archive (ZIP, RAR, 7Z, CAB and MSI) files.  If
this option is disabled, the archive is excluded from scanning.  Please note that encrypted archives cannot be fully tested.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

We have introduced a new signature-less detection technology which takes advantage of machine learning to supplement existing
detection methods.

 

Potential Threats

 

In addition to malicious software detection and elimination, Malwarebytes also detects and acts upon two classes of non-malware. 
These are Potentially Unwanted Programs (PUP's) and Potentially Unwanted Modifications (PUM's).  In many cases, PUP's appear
in the form of toolbars and other application software which are installed on your computer as part of a bundle.  You may have
asked for one application, and it came with a second application that was not mentioned, or was mentioned, but you did not
uncheck the checkbox next to it to prevent it from being installed at the same time.  You may also want and use the PUP.  We do
not judge the merit of the program or its usability.  We do offer a method of removing it if you choose to.

 

PUM's are a bit different.  These are modifications that are typically related to the Windows registry.  As a user, you will generally
not be making changes to the registry that would qualify as a PUM, though the possibility does exist.  Because it does, we allow
you to define your own rules when it comes to how they are treated.

 

With regard to both types of modifications, we provide three handling methods.  These are:

 

  • Ignore detections: Malwarebytes will not act on detection, nor will you be alerted.
  • Warn user: You will be alerted to the detection.  You may choose to ignore it, create an exclusion, or treat it as malware.
  • Always detect PUPs/PUMs (recommended): The detection will be treated as malware, and corrective actions will occur.

 

While PUP's and PUM's are both handled in the same manner, each is handled according to separate guidelines which you specify.

 

Updates

 

Users of Malwarebytes Premium and Malwarebytes Premium Trial have the ability to automatically check for protection updates,
and to specify when those checks will be performed.  The date range is adjustable between fifteen (15) minutes and fourteen (14)
days, the increment depending on the range (minutes/hours/days).  We recommend that you do not allow the rules database to
become dated, as much damage can be caused by zero-day infections – those threats that are too new to be adequately protected

 

 

 

Malwarebytes for Windows User Guide 32 against by anti-virus software.  The default for this feature is on.  You may also have Malwarebytes display a notification in the
corner of your screen if protection updates are more than 24 hours old.

 

Startup Options

 

These settings define how Malwarebytes behaves when your computer starts.  You may launch several applications at startup, and
they may initiate processes which require Malwarebytes launch timing to be adjusted.  Let's look at each setting in detail.

 

  • Start Malwarebytes at Windows startup:  If this setting is unchecked, Malwarebytes will not start with Windows.  No real-
      time protection layers will start when Windows starts, though they may still be started manually by launching
      Malwarebytes.
  • Delay Real-Time Protection when Malwarebytes starts:  There may be times when the startup of system services used by
      Malwarebytes conflicts with services required by other applications at boot time.  When this is the case, turn this setting
    on.  You may also adjust the delay timing.  You will need to experiment with the specific delay setting necessary to
      compensate for any conflicts that are noted.  When required, this must be done on a case-by-case basis.  The delay setting
    is adjustable from 15-180 seconds, in increments of 15 seconds.
  • Enable self-protection module:  This setting controls whether Malwarebytes creates a safe zone to prevent malicious
      manipulation of the program and its components.  Checking this box introduces a one-time delay as the self-protection
      module is enabled.  While not a negative, the delay may be considered undesirable by some users.  When unchecked,
    the "early start" option which follows is disabled.
  • Enable self-protection module early start:  When self-protection is enabled, you may choose to enable or disable this
      option.  When enabled, the self-protection module will become enabled earlier in the computer's boot process –
      essentially changing the order of services and drivers associated with your computer's startup.

 

Automatic Quarantine

 

Users of Malwarebytes Premium and Malwarebytes Premium Trial may specify whether malware will be automatically quarantined
when it is detected.  The default setting is on.  If the users decline to automatically quarantine malware, a notification will display
in the lower right corner of the screen for each detection, and the user must specify whether the file is to be ignored once, ignored
always (added to Exclusions) or quarantined.

 

Scan Schedule

 

You may also adjust Scan Schedules here as part of program settings.  This aspect of program settings has already been covered
on pages 11-19.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 33 Exclusions

 

This tab allows additions to, or deletions from a list of items to be excluded from scans.  The list may include files, folders, websites,
applications which connect to the Internet, or previously detected exploits.  A screenshot is shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

Add Exclusion

 

Exclusions are exempt from scanning and from real-time protection.  This may include files, folders, web sites, applications and
safe programs which have been identified as exploits.  Clicking Add Exclusion launches the Add Exclusion Wizard, as shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 


Malwarebytes for Windows User Guide 34 You may then add items – one at a time – to the list of exclusions.  Each item type is defined by criteria as follows:

 

  • File or folder: Its location on the file system, and whether it should be excluded from malware and ransomware, only
      malware or only ransomware.  While you may have your own reasons for excluding files or folders from scans, the primary
      reason for doing so is to prevent potential conflicts with anti-virus software.  Malwarebytes works well alongside most
      anti-virus software, but anti-virus updates by some vendors may occasionally be flagged as a threat.  For this reason, we
      offer the provision for you to exclude certain disk content from scanning.  This is commonly offered by anti-virus vendors
    as well.

 

      NOTES: 
● Clicking Select Folder… selects only folders, which by default will also exclude any files within those folders,
      as well as subfolders.
● Clicking Select Files… selects individual files for exclusion.  The status of the folder is unchanged.

 

  • Website: Enter the Domain or IP Address to specify the web address.  When adding a domain manually, please add it
      both with and without the "www." prefix.  Depending on several external factors, the domain may still be blocked if only
    one variation is entered.  Also, domain exclusions are only functional on Windows Vista Service Pack 2, Windows 7,
      Windows 8.x and Windows 10.  Please note: Exclusions can also be added by clicking the link in the notification message
      when the website is blocked by Malwarebytes Website Protection.
  • Application that connects to the Internet: Specify the name of the application.  This is most applicable if the detection is
    a false positive (legitimate application with some similar characteristics to malware).
  • Previously Detected Exploit: Specify the MD5 hash of the exploit.  This is most applicable if the detection is a false positive
      (legitimate application with some similar characteristics to malware).  The hash guarantees uniqueness of the file in
      question.

 


My Account

 

Here, you can click the Go to My Account button to obtain status of all of your subscriptions, and change preferences related to
your account.  You can also deactivate your license – useful when moving your Malwarebytes program to a new computer – or
change license key.  A screenshot is shown below.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

 

 


Malwarebytes for Windows User Guide 35 All of the information shown here is self-explanatory.  A set of option buttons are available at the bottom of the screen.  The options
vary depend on the mode of the program.  Buttons for the three program modes are shown below.

 


          Premium Mode
            options
 

 

        Premium Trial Mode
            Options
 

 

          Free mode
            Options
 

 

          Free mode
            Options (*)
 

 

When Malwarebytes was installed, Premium Trial mode was set automatically (if you were eligible for a trial).  There may be
circumstances where you have the option of re-entering Premium Trial mode.  This would result in the second Free mode display. 
If you click the button Change License Key (Premium mode) or I Already Have a License (Premium Trial or Free mode), you will see
the following screen superimposed over the Malwarebytes interface.

 

                                                  Follow screen instructions to enter your license
                                                  information.  If you do not have a license, either
                                                press Cancel (to close this window and return to
                                                the screen you came from), or Purchase a License
                                                to go to the Malwarebytes website and purchase
                                                a license for the product.

 

 

 

 

 


 

 


About

 

This tab tells you more about Malwarebytes, and what resources are available to you should you need technical assistance.  The
upper panel contains Version Information.  We have split up the program into software components.  If you have configured the
program to provide program updates, it is easier and faster for us to provide the newest version to you by updating the
components that have changed, rather than updating the entire program.  It also benefits you if you need technical support,
because the versions of each component may influence the direction that our Customer Success engineers take when
troubleshooting an issue.

 

The Resources section provides contact addresses (URLs) which may assist you for sales, support, and educational purposes.  In
addition, you can view the third-party notices (open source software which we use in our products) as well as a link to our End User
Licensing Agreement (EULA).

 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 36 Appendix A: Notification Window Examples

 

Malwarebytes provides a number of user notifications during operation.  These notifications are always positioned in the lower
right corner of your screen.  The length of time that they will remain on your screen is configurable in Application Settings (page
24).

 


Scan Notifications

 

 

 

                                                An automatic scan has been completed. Malware was
                                                  detected during execution of the scan.  Click Upgrade Now
                                                to purchase Malwarebytes Premium. This notification will
                                                only appear for Malwarebytes Free users.

 

 

 

 

 

                                                A scan (scheduled or on-demand) has been completed. 
                                                  Malware was detected during execution of the scan.  Click
                                                View Scan Results to review the scan log to determine the
                                                exact nature of the threat(s).

 

 

 


                                                A scan (scheduled or on-demand) has been completed. 
                                                  Non-Malware was detected during execution of the scan. 
                                                This is typically a Potentially Unwanted Program (PUP) or
                                                Potentially Unwanted Modification (PUM), which may be
                                                  acceptable to you.  Click View Scan Results to review the

 

                                               scan log to determine the exact nature of the threat(s).

 

 

 

                                                A scan (scheduled or on demand) has been completed.  No
                                                  problems were detected.

 

 

 


Real Time Protection Notifications

 

 

 

                                                After the user has indicated that they wish to turn off
                                                  notifications regarding real-time protection components,
                                                this notification will be displayed to request confirmation
                                                of the user’s wishes.
 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 37 

 

                                                One or more components of real-time protection are
                                                disabled.  You may re-enable protection by clicking Turn
                                                On button, or by clicking Manage Protection Settings.  This
                                                is not available for Malwarebytes free users.

 

 

 


                                                  Malware has been detected as a function of real-time
                                                protection.  You have not chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so no specific action has been taken.  The program now
                                                being detected as malware may be acceptable to you, so
                                                you may choose to allow its execution once, always, or
                                                elect to quarantine it at this time.  This is not available for

 

Malwarebytes Free users.

 

 

 

                                                  Real-time protection has detected a Potentially Unwanted
                                                Program (PUP).  You have not chosen to ignore this type of
                                                activity, or to exercise the auto-quarantine capability upon
                                                  detection, so no specific action has been taken.  This
                                                  detection may be acceptable to you, so you may choose to
                                                ignore it once, always, or elect to quarantine it at this time. 
                                                This is not available for Malwarebytes Free users.
 

 

 

 

                                                  Malware has been detected as a function of real-time
                                                protection.  You have chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so the offending software has been moved to quarantine
                                                and modified so that it may not cause any damage to your
                                                  computer.

 

 

 

 

 

                                                A Potentially Unwanted Program (PUP) has been detected
                                                as a function of real-time protection.  You have chosen to
                                                exercise the auto-quarantine capability when a PUP has
                                                been detected, so the offending software has been moved
                                                to quarantine and modified so that it may not cause any
                                                damage to your computer.
 

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 38 

 

                                                An attempt has been made by software present on your
                                                  computer to contact a website suspected to be malicious,
                                                and has been blocked.  This detection occurred as a
                                                  function of real-time protection.  You may allow access by
                                                clicking Manage Exclusions, which will redirect you to the
                                                Exclusions screens.

 

                                                Please note: Unblocking a website out of convenience may
                                                result in damage being caused to your computer.
 

 

 

 


                                                  Anti-exploit protection has prevented an attacker from
                                                  exploiting your computer through a vulnerability. 

 


 

 

 

 


                                                  Anti-ransomware protection has prevented an attacker
                                                from exploiting your computer with suspected
                                                  ransomware.  The threat has been neutralized and moved
                                                to Quarantine.

 


 

 

 

 

                                                After threats have been quarantined, your computer must
                                                be rebooted to complete the quarantine process, and this
                                                  notification is displayed.  After assuring that other work is
                                                saved, click Reboot Now to perform that task.

 

 

 


Update Notifications

 

 

 


                                                A program update for Malwarebytes is available.  Click
                                                Install Now to get the latest program protection.

 

 

 

 

 

 

 


Malwarebytes for Windows User Guide 39 

 

                                                Your Malwarebytes updates are out of date.  Click Update
                                                Now to cause an immediate update.  Failure to update will
                                                cause subsequent scans to use outdated protection rules,
                                                which could jeopardize the safety of your computer.

 

 

 

 

 

  

 

  

 

  

 


Premium Notifications

 


                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, you will begin to see this message
                                                thirty (30) days before the expiration of your subscription,
                                                  counting down the number of days remaining on your
                                                  subscription. Click Renew Now button to renew your

 

subscription in a new browser window/tab.

 

 

 

                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, this notification is displayed on the
                                                final day of your subscription.  Click Renew Now button to
                                                renew your subscription in a new browser window/tab.

 

 

 

If you do not have auto-renewal set up on your account
                                                and have not responded to pending expiration, you will
                                                see this notification a maximum of three times after your
                                                  subscription has expired.  At this point, you have reverted
                                                to the free version of Malwarebytes.  Premium features
                                                have been disabled.  Click Upgrade Now to renew your
                                                  subscription in a new browser window/tab.  A slightly
different version of this notification appears within the
                                                  Malwarebytes user interface.

 

 

 

                                                This notification is displayed if your subscription cannot be
                                                  renewed.  Usually the reason for this is an expired
                                                  credit/debit card.  You will be given an opportunity to
                                                update your card information, and your subscription will
                                                remain in force for a brief period.

 

 

 

 

 


Malwarebytes for Windows User Guide 40 

 

                                                Your subscription has expired and could not be
                                                  automatically renewed.  Your Malwarebytes service has
                                                been downgraded from Premium to Free.  You can still run
                                                scans for protection, though real-time protection is no
                                                longer in force.
 

 

 

 

  

 

  

 


Premium Trial Notifications

 

 

 

                                                  Beginning five days before your Premium trial expires, you
                                                will receive a notification once per day about the expiring
                                                trial, and be given an opportunity to upgrade to Premium
                                                or to enter your Premium license information.

 

 

 

 

 

                                                On the last day of your Premium trial, you will receive a
                                                single notification, and be given an opportunity to
                                                upgrade to Premium or to enter your Premium license
                                                  information.

 

 

 

 

 


                                                After your Premium trial expires, you will receive this
                                                  notification in the Malwarebytes user interface as well as in
                                                the Windows system tray.

 


 

 

 

 

 

 

 

 

 

 

 

 

 

 

Malwarebytes for Windows User Guide 41

Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

----- Original Message -----

From: Sherri

To: jaws-users-list@groups. io

Sent: Thursday, October 25, 2018 10:42 AM

Subject: [jaws-users] Using Malware Bytes with Jaws

 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

 

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

 

Marie
 

I recently purchased MWB on my laptop and all seems to be fine. However I installed on the desktop and can’t get it activated. Any ideas?
Marie
 
 

From: Mike B.
Sent: Thursday, October 25, 2018 12:20 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws
 
Hi Sherri,
 
Below is a brief tutorial I wrote awhile back on navigating MWB:
Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.
 
Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.
 
Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 
 
Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.
 
If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....
 
It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.
 
I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.
----- Original Message -----
From: Sherri
To: jaws-users-list@groups. io
Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws
 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

Mike B. <mike9902@...>
 


Hi Victor,
 
This is not written for blind people.  This is from Malwarebytes and is probably meant more for sighted folks than blind folks but, I only posted it because it explains the various features / options / settings in Malwarebytes, which the blind folks can try to adapt keystrokes to, or write to MWB and bitch at them!!  LOL
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

Sent: Thursday, October 25, 2018 2:47 PM
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

Does this user guide take into account blind people, or is it just written with the general user in mind?
 
Not for nothing, but a great many of these user guides have images instead of actual written explanations, and they usually state to click on something, even though the Jaws’ various cursors can’t get to it.
 
Victor
 
From: Mike B.
Sent: Thursday, October 25, 2018 3:26 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws
 
Hi Again Sherri,
 
Below is the user guide from Malwarebytes.  It's for a slightly older version but, it works the same way as the latest version.
 
            Malwarebytes for Windows User Guide
 
                                      Version 3.4.5
 
                                      29 March 2018
 
 
 
 
 
 
 
 
 
 

Notices
 
Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws.  Except as expressly permitted in your license agreement or allowed by
law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or
display any part, in any form, or by any means.  You may copy and use this document for your internal reference purposes only.
 
This document is provided “as-is.”  The information contained in this document is subject to change without notice and is not
warranted to be error-free.  If you find any errors, we would appreciate your comments; please report them to us in writing.
 
The Malwarebytes logo is a trademark of Malwarebytes.  Windows is a registered trademark of Microsoft Corporation.  All other
trademarks or registered trademarks listed belong to their respective owners.
 
Copyright © 2018 Malwarebytes.  All rights reserved.
 

Third Party Project Usage
 
Malwarebytes software is made possible thanks in part to many open source and third party projects.  A requirement of many of
these projects is that credit is given where credit is due.  Information about each third party/open source project used in
Malwarebytes software – as well as licenses for each – are available on the following page.
 
 

Sample Code in Documentation
 
The sample code described herein is provided on an “as is” basis, without warranty of any kind, to the fullest extent permitted by
law. Malwarebytes does not warrant or guarantee the individual success developers may have in implementing the sample code
on their development platforms. You are solely responsible for testing and maintaining all scripts.
 
Malwarebytes does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or
completeness of any data or information relating to the sample code. Malwarebytes disclaims all warranties, express or implied,
and in particular, disclaims all warranties of merchantability, fitness for a particular purpose, and warranties related to the code, or
any service or software related there to.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

CWC04-3045a                                   Table of Contents
 

Introduction ............................................................................................................................ 1
 
What’s New in Malwarebytes for Windows ................................................................. 2
 
System Requirements ......................................................................................................... 3
 
Installation .............................................................................................................................. 4
 
  Free, Premium Trial or Premium? ........................................................................................................ 4
 
  Activation .................................................................................................................................................... 5
 
  A Final Word about Administrative Rights ....................................................................................... 6
 
Screen Layout ....................................................................................................................... 7
 
  Menu Bar ..................................................................................................................................................... 7
      My Account ........................................................................................................................................................................ 7
      Notification Center .................................................................................................................................. 7
 
  Menu Pane ................................................................................................................................................. 8
 
    Status/Option Pane ................................................................................................................................. 8
 
  Detail Pane ................................................................................................................................................. 9
 
Dashboard ............................................................................................................................ 10
 
  Status Pane ............................................................................................................................................... 10
 
  Real-Time Protection.............................................................................................................................. 11
      Settings .............................................................................................................................................................................. 11
 
  Scan Status ................................................................................................................................................ 11
      View Scan Reports .......................................................................................................................................................... 11
      Schedule a Scan............................................................................................................................................................... 11
      Check for Updates .......................................................................................................................................................... 11
      Help ..................................................................................................................................................................................... 11
 
  Protection History ................................................................................................................................... 11
 
Scan ........................................................................................................................................ 12
 
  Threat Scan ............................................................................................................................................... 12
 
  Custom Scan ............................................................................................................................................ 13
      Custom Scanning Options............................................................................................................................................ 13
      Potentially Unwanted Programs/Modifications ..................................................................................................... 13
      Folders to be Scanned ................................................................................................................................................... 13
 
  Hyper Scan ............................................................................................................................................... 14
 
  Scan Schedules ....................................................................................................................................... 14
      Basic Mode ........................................................................................................................................................................ 15
      Advanced Mode .............................................................................................................................................................. 15
      Advanced Scan Options ................................................................................................................................................ 16
 
  Watching Scan Progress ...................................................................................................................... 16
 
  Scan Results ............................................................................................................................................. 17
 
  Scan Summary ......................................................................................................................................... 18
 
Quarantine ............................................................................................................................ 21 Reports .................................................................................................................................. 22
 
  Viewing or Deleting Logs .................................................................................................................... 24
 
Settings ................................................................................................................................. 25
 
  Application Settings .............................................................................................................................. 25
      Application Updates ...................................................................................................................................................... 26
      Notifications ..................................................................................................................................................................... 26
      Impact of Scans on System ......................................................................................................................................... 26
      Windows Context Menus ............................................................................................................................................. 26
      Display Language ........................................................................................................................................................... 26
      Event Log Data................................................................................................................................................................ 26
      Proxy Server ..................................................................................................................................................................... 26
      User Access ...................................................................................................................................................................... 27
      Windows Action Center ............................................................................................................................................... 28
      Beta Application Updates ............................................................................................................................................ 28
      Usage and Threat Statistics ......................................................................................................................................... 28
 
  Protection ................................................................................................................................................ 29
      Real-Time Protection .................................................................................................................................................... 29
      Scan Options .................................................................................................................................................................... 31
      Potential Threats ............................................................................................................................................................ 32
      Updates ............................................................................................................................................................................. 32
      Startup Options .............................................................................................................................................................. 33
      Automatic Quarantine .................................................................................................................................................. 33
 
  Scan Schedule ........................................................................................................................................ 33
 
  Exclusions ................................................................................................................................................. 34
      Add Exclusion .................................................................................................................................................................. 34
 
  My Account ............................................................................................................................................. 35
 
  About ........................................................................................................................................................ 36
 
Appendix A: Notification Window Examples ............................................................. 37
 
  Introduction
 
Malwarebytes for Windows (“Malwarebytes”) is an "AV replacement."  It is not an AV.  It does not incorporate the same old engine
for file-infectors and other malware that you find in a typical AV or Internet security suite, the large and inefficient library of
signatures, or the bloatware features which are becoming more prevalent.
 
You don't need to pay for a traditional AV anymore!  At Malwarebytes, we have always approached things differently and, as many
people know based on their own positive experience with Malwarebytes finding and remediating malware that gets past AVs, we
know a thing or two about zero-day malware and their infection tactics.  We have always believed that no one product can do it
all, and the free AV that comes with modern operating systems, in conjunction with Malwarebytes is all you will ever need.
 
In today's modern threat world, bad guys have learned how to evade AV protection, making it more important than ever before
to be able to disrupt attacks in as many different stages of the attack chain as possible.  Malwarebytes, layered with the AV (which
is the default mode) or as your stand-alone defense, is the most effective approach against modern threats.  And if all else fails,
you need the best remediation technology available.
 
Malwarebytes has been engineered to provide the most effective layered approach of prevention, detection and remediation
technologies:
 
  1. Application hardening, to make them more resilient against attacks.
  2. Anti-exploit technology, to shield applications from vulnerability exploits (currently one of the top infection vectors).
  3. Application Behavior Enforcement, an advanced and signature-less technology which prevents common infection
      vectors (e.g. web & email based social engineering).
  4. Anti-ransomware, a signature-less technology designed to behaviorally detect ransomware.
  5. Revamped Anti-Malware and Web Blocking engines, offering more aggressive detection techniques.
  6. Hardened and modular architecture design, allowing seamless integration of new detection and protection technologies
    in the future.
  7. Highly effective as always in malware remediation, an often overlooked part of the protection stack.
  8. Ability to run as primary protection (no AV) or secondary protection (alongside existing AV).
  9. Engineered to be our next corporate endpoint client, providing major improvements to our endpoint management
      capabilities and new enterprise-focused offerings
  10. Last but not least, our Research Team has been growing and adapting lately, with notable additions to the lineup from
      JRT and AdwCleaner, our new aggressive stance against PUPs, as well as new R&D technologies which we will be
      unveiling shortly.
 
Welcome to the Malwarebytes User Guide! 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 1 What’s New in Malwarebytes for Windows
 
This version of Malwarebytes contains many improvements and bug fixes.  Following is a list of changes.
 
Performance/protective capability
 
  • Improved remediation for hijacked shortcuts
  • Continued improvements to overall protection, detection and remediation
 
Usability
 
  • Device Name now syncs to the Malwarebytes My Account portal for users on the paid version
  • Improved accessibility features for the Notification Center
  • Added custom messages designed to highlight the value of Malwarebytes protection and help it remain free
 
Stability/issues fixed
 
  • Fixed problem when cutting / pasting files with anti-ransomware enabled
  • Fixed problem where USB stick would not eject properly with anti-ransomware enabled
  • Fixed a service crash related to self-protection
  • Fixed a blue screen crash related to Web Protection
  • Addressed other miscellaneous defects
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 2 System Requirements
 
Following are minimum requirements for a computer system on which Malwarebytes may be installed.  Please note that these
requirements do not include any other functionality that the computer is responsible for.
 
  • Operating System: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista (Service Pack 1 or later), Windows
    XP (Service Pack 3 or later, 32-bit only)
 
      PLEASE NOTE: Anti-ransomware protection is not supported for Windows XP or Windows Vista, due to architectural
      constraints.
 
  • CPU:  800 MHz or faster, with SSE2 technology.  This includes most modern Intel x86 processors as well as AMD’s Athlon
    64, Sempron 64, Turion 64 and Phenom CPU families.  Please refer to the following page for further information:
 
 https://en.wikipedia.org/wiki/SSE2
 
  • RAM:  2048 MB (64-bit OS), 1024 MB (32-bit OS, except 256 MB for Windows XP)
 
  • Free Disk Space:  250 MB
 
  • Recommended Screen Resolution: 1024x768 or higher
 
  • Active Internet Connection
 
WARNING: If you are upgrading from Malwarebytes Anti-Malware version 2.x and have enabled Malwarebytes’ self-protection
feature, please disable it prior to initiating the upgrade.  It prevents the Malwarebytes installation program from doing its job.
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 3 Installation
 
To begin the installation, double-click on the Malwarebytes installation file which you downloaded.  If you are installing
Malwarebytes on a Windows version newer than Windows XP, a Windows dialog box will be presented in the middle of your screen,
labeled User Account Control.  Verify that the publisher is listed as Malwarebytes Corporation and click Yes.  This Windows security
feature assures limited application capabilities unless and until you authorize higher capabilities.  Installation will begin once this
has been approved.  The installation program guides you and allows you to provide alternate information if you do not wish to
accept defaults.  Each screen also allows you to terminate installation if you do not wish to continue.  
 

Free, Premium Trial or Premium?
 
Before you begin, we want to let you know that throughout this guide, you will see references to the Free, Premium Trial, and
Premium versions of Malwarebytes.  This is likely unfamiliar territory for new Malwarebytes users.  The following link provides a
basic rundown on the differences between the Free and Premium versions of Malwarebytes.
 
 
These differences are also shown in the Malwarebytes interface immediately after it has been installed.  See below….
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
The Premium Trial is a 14-day opportunity to use the Premium version of the program, and to see if it is better suited to your needs. 
The Premium Trial is available at no cost, but you can only use it one time for each version of Malwarebytes.  The Premium Trial is
automatically started during installation.  Once installed, the program provides options to convert from Free to Premium, and from
Premium Trial to Premium.
 
If you elect to use the Premium Trial and do not wish to purchase a Premium subscription at the end of the trial, your Malwarebytes
program will revert to Free mode.  The only differences will be that the added features enabled by the trial will cease to function. 
All other functionality remains unchanged.
 
If you are a new Malwarebytes user, or are a free/Premium Trial user upgrading to this version, you will be alerted that a scan has
not been run.  Click Scan Now and Malwarebytes will run a scan for you.  After the scan (and cleanup, if needed) has been
completed, you will see the user interface as shown below.
 
 
 

Malwarebytes for Windows User Guide 4 
 
Please take note of the Why Premium button in the lower left corner.  Click that button for a brief slide show that describes the
differences between Free and Premium modes.  While Malwarebytes does an effective job of disinfecting your computer after an
attack, there is no replacement for preventing the attack from ever happening.
 
If you have already purchased a license, you may wish to activate your copy of Malwarebytes at this time.  You can do that now (or
at any time) by clicking the Activate License button at the top right portion of the Malwarebytes user interface.
 

Activation
 
Malwarebytes is available for users of any modern Windows client to download and install at no cost.  You can also purchase an
annual subscription, which entitles you to take advantage of real-time protection, scan/update scheduling and access policies.  If
no license has been installed into the product, the blue title bar at the top of the screen will show two buttons, Activate License
and Upgrade Now.  When clicked, Upgrade Now launches a browser window which opens to the Malwarebytes web site
pricing/purchase page.  Your license information will be in an email sent to you by Malwarebytes at the time of purchase.  Locate
your license information and click the Activate License button.  You will then see the following screen.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 5 Please note the checkbox and the words “My license came with a License ID.”  If you are using our “old style” license, you will also
need to check that box and enter your License ID along with your Key.
 
Please note:  You must be online with an active Internet connection in order to successfully activate your Premium license.
 
The construction of the Key is different, so make sure that you choose the right screen for entering your license information based
on whether you have an ID and Key, or just a Key.  After entering your license information, click the Activate License button.  Your
Malwarebytes screen will refresh, as shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Please note that the two license-related links in the Menu Bar have been replaced by a link called My Account.  Also note that the
banner has changed from Malwarebytes Premium Trial to Malwarebytes Premium.
 

A Final Word about Administrative Rights
 
If you installed Malwarebytes from a downloaded installation file, you automatically started a Premium Trial, and were offered the
capability to activate the Premium features if you had purchased an annual subscription.  You may have decided to wait until later. 
If that is the case, please remember that you should be logged in to Windows as an Administrator before doing either of those
tasks.
 
We will go into much more detail about the features of Malwarebytes, but before doing that, we should introduce you to the
Malwarebytes user interface.
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 6 Screen Layout
 
The Malwarebytes program interface is designed around a screen layout which is simplified and uncluttered.  We want to make it
easy for you to configure the program to serve your needs, and we hope this layout helps to do that.  The screenshot below shows
the Dashboard – the screen you see when Malwarebytes is launched for the first time.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Let's talk about the primary elements which make up our user interface.
 

Menu Bar
 
The Menu Bar is displayed at the top of the screen at all times. There are two buttons in the Menu Bar. A description for both
follows.
 
My Account
 
This button will take you to the setting options to manage your Malwarebytes subscription(s) and license(s). For more information,
please refer to pages 35-36 of this guide.
 
Notification Center
 
The Notification Center provides a convenient location to view recent notifications generated by Malwarebytes. Clicking the icon
will show the 5 most recent notifications. You may scroll down to view up to 25 notifications by using your mouse wheel. You can
view additional details for each notification by clicking it – Malwarebytes will bring you to the relevant screen.
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 7 
 

Menu Pane
 
The Menu Pane contains the main program options, which will be discussed in detail in this guide.  They consist of:
 
  • Dashboard: What you see here. While the exact details change over time, the look is consistent.
  • Scan: Select the type of scan you wish to run, run it, and view the results.
  • Quarantine: Delete or restore threats which have been detected by program scans.
  • Reports: View reports related to program operation, threats which have been detected, and threats which have been
      removed.
  • Settings: Configure every aspect of Malwarebytes, so that it can protect you efficiently.
 
In addition, there are settings for Account information.  While in Premium Trial mode, options are present to buy a Premium
subscription and to Activate the program.  Once you have purchased a subscription, those two options will revert to a single option
which handles details of your account.  More on those later.
 

Status/Option Pane
 
When the Dashboard is selected from the Menu Pane, the center of the screen is filled with the Status Pane.  It is designed to give
you quick information that tells you whether there is anything for you to be concerned about.  When the Dashboard is selected,
the Detail Pane is also displayed.  More on that momentarily.
 
When any menu option other than the Dashboard is selected, all space except the space used by the Menu Pane is allocated to the
selected menu option.  This provides sufficient room for information pertaining to any menu option to be cleanly displayed.
 
 
 
 
 

Malwarebytes for Windows User Guide 8 Detail Pane
 
The Detail Pane is shown only when the Dashboard is selected.  It shows information on protection options, protection updates,
and detail pertaining to the most recent scan.  This information is shown on other screen displays as part of the menu option
selected by the user, but are all displayed here for quick recognition.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 9 Dashboard
 
Each time Malwarebytes is launched, the first page visible to the user is the Dashboard.  It provides program status, and acts as a
launch pad for all program operations.  A screenshot of the user interface – featuring the Dashboard – is shown below for reference.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Status Pane
 
The main area of the screen is the Status Pane, providing current system status.  Within the Main Window, the first item displayed
is the Status Banner.  This banner displays a status message along with an icon, whose color is based on program status.  The color
is meant to alert the user to conditions which may require intervention.  Colors used are similar to traffic stop signals – green simply
indicates a good status; orange indicates a warning of a condition which may become more severe over time; red indicates that
your immediate attention is needed.  Following is a full list of status messages.  If a recommended method of correcting the
problem is immediately available, it will appear as a functional button on the banner itself.
 
  • Color: green (no problem)
        o Awesome! You’re protected. (Premium mode and Premium Trial modes which will expire more than 7 days in
            the future)
        o You’re running Malwarebytes Free. (free mode only)
  • Color: orange (non-critical problem)
        o You’re not fully protected.
        o Your Protection Updates are not current.
        o Your program version is out of date
        o Your Premium Trial ends in <x> days. (trial expiring in 3-7 days)
        o Renew to avoid losing protection against malware, bad websites, and other threats
  • Color: red (critical problem)
        o Your Premium Trial ends in <x> days. (trial expiring in 0-3 days)
        o Your trial has expired
        o Renew to avoid losing protection against malware, bad websites, and other threats
        o We were unable to renew your subscription (renewal failed, and you are now in 30-day grace period)
 
 
 

Malwarebytes for Windows User Guide 10 Real-Time Protection
 
This item shows the status for each of the four Real-Time Protection features.  Please note that real-time protection is enabled only
for Malwarebytes Premium and Malwarebytes Premium Trial users.  This feature is not available if you are using the Free version.
 
Settings
 
Settings are accessed from the Main Menu, and also by clicking the small gear at the top right of the Real-Time Protection panel. 
When clicked, the Settings screen will be displayed, allowing access to all program settings.  Please refer to the Settings portion of
this guide (pages 24-35) for complete information on this topic.
 

Scan Status
 
This panel shows your scanning activity at a glance.  You can easily see when the last scan was completed, when the next scan is
scheduled, and the status of your protection updates.  There are four icons on the title bar for this panel, as shown here.
 

 
 
A description for each icon – in the order shown – is as follows.
 
View Scan Reports
 
This icon takes you to Reports, where you can view detailed reports on scans which Malwarebytes has performed on your computer. 
Please note that information shown here is limited to the last scan that was executed.  See the Reports Pane (pages 21-23) for
information on reports as a whole.
 
Schedule a Scan
 
The second icon allows scans to be scheduled for automatic execution.  This option is available only for Malwarebytes Premium and
Malwarebytes Premium Trial users.  The icon remains visible in Free mode, but clicking it has no effect.  When clicked, the Settings
screen will be displayed, allowing access to the Scan Schedule screen.  Please refer to the Scan Schedule portion of this guide (pages
13-15) for full information on this topic.
 
Check for Updates
 
The third icon causes Malwarebytes to connect with Malwarebytes servers to check for protection updates more current than those
in use, and download them if they exist.  This option is functional for all program modes.
 
Help
 
The fourth icon links to the Malwarebytes User Guide on the Malwarebytes website.  This behavior is consistent throughout the
program.
 

Protection History
 
This panel shows three key statistics.  It shows how many items were scanned, how many threats were detected during scans, and
how many threats were detected by real-time protection.  Please note that the number of items scanned includes individual files
that are part of archive files, as well as components in dynamic link library (DLL) files.  Also note that real-time detections can only
occur in Premium and Premium Trial modes.
 
 
 
 
 

Malwarebytes for Windows User Guide 11 Scan
 
The Scan Pane is the introduction to scan-related options in the program.  When you click Scan in the Menu Pane, you will see the
screen shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
On this screen, you may select the Scan Method and the Scan Schedule.  Let’s look first at Scan Methods.  There are three scan types
which can be executed – Threat Scan, Custom Scan, and Hyper Scan.  Hyper Scan is only available to users of the Premium or
Premium Trial modes.  Please note that global scan settings used by Threat Scans and Hyper Scans are selected in Settings (see
pages 30-31).  Following are more detailed descriptions of each of the scan modes.
 

Threat Scan
 
This method of scanning detects a large majority of threats that your computer may be faced with.  Areas and methods tested
include:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Registry Objects: Configuration changes which may have been made to the Windows registry.
  • File System Objects: Files stored on your computer's local disk drives which may contain malicious programs or code
      snippets.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects – as well as in other areas –
      which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats
      cannot reassemble themselves.
 
The Threat Scan is the scan method which we recommend for daily scans.  While it will not scan every file on your computer, it will
scan the locations which most commonly are the launch point for a malware attack.
 
 
 
 
 

Malwarebytes for Windows User Guide 12 Custom Scan
 
You may also choose to run a custom scan.  A custom scan allows you to scan according to specifications which you define at the
time of the scan.  These settings will override scan settings defined elsewhere.  A screenshot of the custom scan configuration
screen is shown below.  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Custom Scanning Options
 
These settings provide capability to determine the functional areas that will be scanned.  They are as follows:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.  It is
      important to note that threats detected during scans are still considered threats if they have an active component in
      memory.  As an extra measure of safety, memory objects should be scanned.
  • Startup and Registry Objects: Executable files and/or modifications which are initiated at computer startup, as well as
      registry-based configuration changes that can alter startup behavior.
  • Archives: If this setting is checked, archive files (ZIP, 7Z, RAR, CAB and MSI) will be scanned up to two levels  deep. 
      Encrypted (password-protected) archives cannot be tested.  If left unchecked, archive files will be ignored.
  • Rootkits: These are files stored on your computer's local disk drives which are invisible to the operating system.  These
      files may also influence system behavior.
 
Potentially Unwanted Programs/Modifications
 
These settings allow the user to choose how Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications
(PUMs) will be treated if they are detected.
 
Folders to be Scanned
 
This setting allows the user to include or exclude directories, subdirectories, and individual files from scans.  It utilizes a Windows
Explorer-like presentation model.  In the screenshot shown above, every directory except Desktop is selected for a custom scan. 
You may scan parent directories separately from child directories based on individual selections.
 
 
 
Malwarebytes for Windows User Guide 13 Hyper Scan
 
This scanning option is only available to users of Malwarebytes Premium and Malwarebytes Premium Trial versions.  This method of
scanning is limited to detection of immediate threats.  Areas and methods tested include:
 
  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
 
While a Hyper Scan will clean any threats which have been detected, we strongly recommend that a Threat Scan be performed if
a Hyper Scan has detected threats.
 

Scan Schedule
 
This tab allows users of the Premium and Premium Trial versions to add, edit and remove scheduled scans to be executed by
Malwarebytes.  This feature is not available to users of the Free version.  A screenshot of this tab is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
One scheduled scan is defined when Malwarebytes is installed.  Premium and Premium Trial users are free to modify or delete scans
at will, while Free users are provided with a single monthly scheduled scan.  Please note that if the initial task is deleted without a
replacement task being defined, your Malwarebytes program will not deliver the positive results that you expect.  The same
methods are used here to add a new task as well as to edit an existing task, so let's Add a new task in Basic mode.
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 14 Basic Mode
 
A screenshot of the basic Add Schedule screen is shown here.
 
                                                                  You can choose the
                                                                  specific task to be
                                                                  added on the left side of
                                                                  the screen, in the
                                                                  Scheduled Task area. 
                                                                  You may choose from
                                                                  the following tasks:
 
                                                                  • Threat Scan
                                                                  • Custom Scan
                                                                  • Hyper Scan
 
 
 

 
 
Scan types have been previously discussed in the Scan section of this guide (pages 11-19).  Please refer to those pages for further
information if desired.  The Frequency and Settings section allows you to define the timeframe (Schedule Frequency) that a task
will be executed, and how often (Recurrence).  For scans, this translates to:
 
  • Frequency = Hourly, recurrence in range of 1-48 hours
  • Frequency = Daily, recurrence in range of 1-60 days
  • Frequency = Weekly, recurrence in range of 1-8 weeks
  • Frequency = Monthly, fixed setting
  • Frequency = Once, fixed
  • Frequency = On Reboot, fixed
 
Advanced Mode
 
At the bottom left corner of the Add Schedule window is the Advanced button.  Click that to expand the Add Schedule window to
expose several more options.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

In Advanced Mode, we add options which tailor the scan more to your liking.  Let's look a little deeper, beginning with the
advanced options for scans.
 

Malwarebytes for Windows User Guide 15 Advanced Scan Options
 
Scheduled Task defines what task (scan/update) is to be added/edited, and when that task should begin – specifying both the date
and time.  Schedule Options provides several added capabilities to the basic settings which have already been described.  Here's a
rundown on the advanced options.
 
  • Quarantine all threats automatically: This option determines if a newly-detected threat would be automatically
      quarantined, or if you would be notified so that you could choose a course of action.  While automatic quarantine may
      seem to be the best course of action, it could have negative implications if a false positive was encountered.  A false
      positive is the categorization of a legitimate file as a malicious file.  It does rarely occur, and when it does, Malwarebytes
      Customer Success will assist you in having the offending file evaluated more fully by our Research group.
  • Restart computer when required for threat removal: This is available only if threats are automatically quarantined, and is
    not selected by default.  Some threats may require a computer restart to completely eliminate the threat, but we feel it’s
      best to notify you at the time, so you may save your work before restarting your computer.  If this were checked, you
      could lose work unless you were monitoring the scan in progress.
  • Scan for rootkits: This option allows specialized testing for the presence of rootkits.  Due to its nature, it increases the
      required time for a scan to execute.  This option is not available for Hyper Scans.
  • Scan within archives: This is selected by default.  It allows scanning to go two levels deep within archive files.  If not
      selected, the archive will be ignored.  It will also be ignored if it is encrypted.  This option is not available for Hyper Scans.
 
Frequency and Settings was discussed in the previous section (Advanced Mode).  Please refer to that section for more detail.
 
Recovery Options allow you to recover from a missed task (e.g. your computer was off at the time a scan was to take place).  A
scheduled task – if missed – will run at its next opportunity as long as it is within the duration specified by the Recover if missed by
selector and the Recover missed tasks checkbox is checked.
 

Watching Scan Progress
 
Each scan method requires a different amount of time to complete.  Unless significant changes have occurred on your local disk, a
Hyper Scan or Threat Scan should each be rather consistent from scan to scan.   A custom scan time interval may vary widely each
time, based on the areas scanned, the number of files involved, and the size and complexity of the files.  The screenshot below is
an example of a scan in process.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Malwarebytes for Windows User Guide 16 The progress bar shows milestones for each phase of the scan, with each milestone represented by a green or gray symbol.  In this
screenshot, some milestones are shown with green checkmarks, indicating that phase of the scan has been completed.  Scan
Memory is represented by an animation which indicates that this phase of the scan is currently being performed.  The remainder
of the tasks are shown as grey hourglasses, and are yet to be started.
 
You may also pause a scan while it is in process by clicking the Pause button.  The scan phase in progress will change to indicate
that the scan has been paused.  Click Resume to continue the scan where it left off.  You may also click Cancel at any time to
terminate the scan.  Results of the scan will be reported as if the scan ran to completion.
 

Scan Results
 
After a scan has been executed, Scan Results are displayed as shown here.  In this scan, three threats were detected.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
You may move threats to Quarantine by selecting the threat (using checkboxes to the left of the threat’s name) and clicking
Quarantine Selected.  If any threats are not selected to be moved to Quarantine, you will be prompted to Ignore Once, Ignore
Always, or Cancel.  Ignore Once will result in the threat once again being reported as a threat during the next scan execution. 
Ignore Always causes the threat to be added to Exclusions.   A threat which has been added to Exclusions will no longer be reported
as a threat unless there is reason to believe that it has been tampered with.  You must provide a disposition for each threat
displayed on this screen.
 
Threats which have been moved into Quarantine cannot harm your computer.  They are neutralized as part of the Quarantine
process.  Please see Quarantine (page 20) for further information.
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 17 Scan Summary
 
The final screen to be displayed as part of a scan is the Scan Summary.  It provides summary information about the scan, and allows
you to view scan detail on screen, or export scan summary or scan detail to a text file.  A screenshot of the Scan Summary is shown
below.  Free and Premium Trial users will see a reminder of the value of a Malwarebytes subscription on this page as well.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Clicking the View Report button displays the Scan Report for the scan just completed.  It is shown here as well.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
When threats are detected during a scan, the user must decide how these threats should be handled.  The following series of
screenshots detail this flow.  In the first screenshot, twenty threats have been detected.  By default, all are selected for removal. 
Please note that the total number of detected threats is shown above the list of threats, as is the number of threats selected for
removal.
 
 
 
Malwarebytes for Windows User Guide 18 
 
In order to demonstrate the behavior of this screen, we will uncheck some of the threats.  This indicates that only the checked
threats are to be removed.  Clicking the Quarantine Selected button results in the screen shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Threats that were not selected still require remediation, based on input supplied by the user.  In this case, the choices available are
Ignore Once, Ignore Always and Cancel.  Clicking the Ignore Once button temporarily ignores a threat, although it will be shown
as a threat on subsequent scans.  Selecting Ignore Always results in the threat being added to the Exclusion List.  It would not be
 
 
 
Malwarebytes for Windows User Guide 19 scanned in the future.  Clicking Cancel keeps you on this screen until you choose how to handle all detected threats.  Once a
disposition has been selected for all detected threats, the screen below will be displayed.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Although threats have been quarantined, you must restart the computer to assure the threat removal process is complete.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 20 Quarantine
 
When executing scans (on-demand or as part of real-time protection), some programs, files or registry keys may have been
categorized as threats.  At that time, they were removed from the disk location where they were stored, placed in quarantine, and
modified so that they could not pose a threat to your computer.  There may be items which fall into this category, but are not
malicious.  It is up to individual users to research and make this determination.  Upon entry to the Quarantine option, you are
presented with the screen shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Quarantined items are shown in a table format, with pertinent information presented to help you determine what action needs to
be taken.  Each item listed has a checkbox in the leftmost column.  Check the checkbox to restore or delete the item.  Please note
that the Restore and Delete buttons are greyed out until items are selected.  If you wish to apply the same action to all quarantined
items, select the checkbox in the table header and click Restore or Delete.
 
Please be aware that quarantined items which are not deleted or restored will continue to be visible here until action is taken.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 21 Reports
 
The Reports Pane displays a list of scans and real-time protection detections, in reverse chronological order.  A Protection Event that
starts with the word Scan is a report summarizing the specified scan.  All other reports listed on this screen are detail pertaining to
detections made by real-time protection.  A screenshot is shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Selected reports may be viewed on screen, or exported to a text file for later viewing.  Opening a report will display a summary of
the event.  You can click the Advanced tab to view more information about the event. Details displayed for Protection Events will
be relevant to the type of event shown.  Please note that only manual (on demand) scans are available for users of the free version
of Malwarebytes.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 22 The Scan Report may appear in two different forms.  If one or more threats were detected during a scan, the report will appear as:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Please note that the bottom portion of the report shows the threats detected during the scan.  It is scrollable when required.  The
top portion of the report contains a summary of the scan.  You can click the Advanced button to view more details, as shown here:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 23 Viewing or Deleting Logs
 
You may view any log file by clicking the log to select it, then clicking the View Report button.  As mentioned previously, there are
several output options for Protection Logs.  To delete logs, click the checkbox corresponding to those logs you wish to delete, then
click the Delete button.  Please bear in mind that computers which have significant threat activity will also have larger logs.  You
should periodically check how much disk space is being used for logs, so that logs do not impact normal operation of your
computer.
 
Please note that an Export button is shown at the bottom left corner of this screen.  This allows you to make a copy of the log for
use by other programs.  You may export to your clipboard or to a text (TXT) file.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 24 Settings
 
The Settings screen allows the user to change all Malwarebytes operational settings.  We have grouped settings by the
areas/functions which they control into tabs to maintain a clean user interface.  When you select any tab, you will see the Detail
Pane change to reflect the tab which you selected.  At the same time, the tab itself is highlighted.
 
Before we dig in to each of the tabs, a brief description of each is in order.
 
  • Application Settings: Settings that affect Malwarebytes, as well as how it coexists with Windows.
  • Protection Settings: How Malwarebytes should protect you during scans and (for Premium/Trial mode users only) Real-
      Time Protection.
  • Scan Schedule: When Malwarebytes should execute scans and check for protection updates.  This setting is functional
      only for users of Premium/Trial mode.
  • Exclusions: Items which will be excluded from testing which detects malware, as well as websites which are categorized
    as malicious but specifically approved by the user.
  • My Account: Information pertaining to the status of your subscription.
  • About: Version numbers corresponding to Malwarebytes as a whole, and for various components of the program which
    may be updated individually.  Malwarebytes company resources are also listed on this page.
 
When Settings is selected, the Application tab is always selected.  If you navigate away from Settings – to Dashboard, Scan,
Quarantine or Reports – you will always return to the Application tab of Settings when you click on Settings.
 
Now, let's take a look at Application Settings!
 

Application Settings
 
This is the entry screen you will see when you click on Settings in the Menu Pane.  It controls how Malwarebytes interacts with
many aspects of your computer’s operating system.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
The scroll bar at the right of this screen indicates there are many more options available on this screen than what appear here.  We
will now cover each of them in order.
 
 
 
Malwarebytes for Windows User Guide 25 Application Updates
 
Malwarebytes may have updates available for individual program components, or for the full program.  We provide two toggle
switches which allow you to choose whether either or both upgrade modes can be integrated into your copy of Malwarebytes
when they are available.  Click Install Application Updates to check for available program updates or upgrades.  You can choose if
you upgrade, and when.  Upgrades only happen with your consent.
 
Notifications
 
Notifications regarding scans, real time protection, updates and subscriptions occur in windows at the lower right corner of your
screen, outside of the Malwarebytes interface.  You may enable or disable these notifications.  Most notifications are enabled by
default, while a few can be disabled.  Please note that some non-critical information may not be visible if you disable notifications. 
Disabled notifications do not leave the user at risk at any time. The following notifications may be disabled.  Please refer to
Appendix A (Notification Window Examples) at the end of this guide for further information.
 
    • Malicious Website Blocked
    • Malware Detected (auto-quarantine)
    • Non-Malware Detected (auto-quarantine)
 
Some users intentionally turn off one or more components of real-time protection.  Users may now disable notifications that
components have been turned off.  Please note that as a result of this setting, users will be unable to receive notifications regarding
real-time protection failures in the event of program malfunction.
 
Impact of Scans on System
 
Most users schedule scans to occur during times when their computer is typically idle.  Execution of a manual scan may be
performed as a matter of convenience, or while other tasks are being executed.  The performance of lower-powered computers
may be affected by execution of the Malwarebytes scan.  This setting allows the user to determine the priority of the scan to be
performed.  Lower scan priority will require more time to execute while impacting other operations to a lesser degree.  High priority
allows the scan to be executed at the maximum speed which the computer allows, but may affect other tasks.
 
Windows Context Menus
 
Malwarebytes has the capability to launch a Threat Scan upon one or more individual files or directories from within Windows
Explorer by using the context menu that becomes available when the files/directories are right-clicked.  This setting allows that
capability to be turned on or off.  The default setting is On.
 
Display Language
 
This setting determines the language used throughout.  This is pre-set, based on the language used during program installation. 
It can be modified at will.
 
Event Log Data
 
This setting provides additional information regarding program actions which are beyond typical needs of the user.  Should you
encounter a technical issue with Malwarebytes, our Customer Success engineers may request that you enable this setting to
provide additional troubleshooting information.  Once troubleshooting is complete, please remember to turn this setting off to
prevent unnecessary disk usage.  The default setting is Off.
 
Proxy Server
 
This determines whether Internet connections will use a proxy server.  This is more often used on a corporate network.  It has two
primary purposes.  The first is to funnel communications to and from the outside world through a single connection point, thus
assuring anonymity of all computers on the internal network.  The second purpose is to cache content.  This means that external
content which had recently been downloaded is saved locally for some period of time, and subsequent requests by that user (or
others) could use the recently-saved data.  This conserves significant bandwidth, resulting in lower operating costs.
 
 
 
 
 
Malwarebytes for Windows User Guide 26                                       By default, Malwarebytes does not use a proxy.  If configured to
                                      do so, the bottom panel will change to provide configuration
                                      options as shown in the screenshot shown here.
 
                                      You can now specify the IP address or name of a proxy server,
                                      as well as the appropriate port number.  If a proxy is in use, the
                                      name and port number must be specified by the person who
                                      controls access to the proxy server.  He will also be able to tell
                                      you whether authentication is required to use the server, and if
                                      so, provide a user name and password which have been
                                      assigned to you.
 
 
 

User Access
 
This slider allows users of Malwarebytes Premium and Malwarebytes Premium Trial versions to restrict access to various features
and functions in Malwarebytes with password protection.  The Edit User Access button is only visible when the slider is in the On
position, allowing the user to define sections of the program which require a password to access.
 
 
 

 
 
When the Edit User Access button is clicked, a new window opens directly above the Malwarebytes program screen to restrict
access to selected areas of the program only to those users who possess the password.  The password is also defined on this screen.
 
WARNING: This password is not recoverable.  If you lose your password, you will have to reinstall Malwarebytes to access restricted
features.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
As shown above, the Reports tab has been placed under password control.  This also causes User Access to be placed under
password control.  This prevents unauthorized users from gaining access to restricted areas.
 

Malwarebytes for Windows User Guide 27                                                     When attempting to gain access to a
                                                    restricted area, you will be required to enter
                                                    a password (as shown here).
 
 
 
 
 
 
 
                                                    If an incorrect password is entered, or if a
                                                    null password is used, this error message
                                                    will be displayed.
 
 
 

If this feature has been enabled and is subsequently disabled, any restrictions which have been defined are cancelled.  This feature
is not available to users of the Free version.  Currently, only one policy may be in effect at any given time.
 
Windows Action Center
 
You may have noticed an icon in your system tray with a red X superimposed over a white flag. That is a status indicator for the
Windows Action Center, which tells you when your computer has a security issue that needs your attention.  Malwarebytes Premium
or Malwarebytes Premium Trial can now be registered as a security solution on your computer.  There are three settings available,
which will be abbreviated here for easier reading.  Brief descriptions for the meaning of each setting are also provided. 
 
  • Let Malwarebytes choose whether to register: Malwarebytes will determine whether it should be registered in Action
      Center. The program will not register when Microsoft Security Essentials is in use on a Windows 7 or older operating
      system. It will also not register when Windows Defender is used on a Windows 8 or newer OS.
  • Always register Malwarebytes: Malwarebytes program status will always appear in Action Center.
  • Never register Malwarebytes: Malwarebytes program status will never appear in Action Center.
 

Beta Application Updates
 
Some Malwarebytes users want to try the newest features as soon as they are available, while some prefer to wait until the product
is released.  We have added this program setting so that if you want the latest and greatest immediately, we can deliver it to you
automatically.  When you enable this setting, you will see the following dialog box.
 
 
 
 
 
 
 

 
 
Usage and Threat Statistics
 
If you check this box, you will be sending us information to help us do our jobs.  We like to know what countries Malwarebytes is
being used in, and the breakdown of Premium, Premium Trial, and Free versions.  Our Research organization likes to keep track of
what malware we are detecting and how often.  We learn that from what you send us, and helps us to serve you more effectively. 
We hope that's fine with you as well.  For a full list of information that is collected, please see the Malwarebytes Privacy Policy, at:
 
 

Malwarebytes for Windows User Guide 28 Protection
 
Most settings which control how Malwarebytes protects your computer are located on the Protection tab.   Settings are grouped
by category.  A screenshot is shown below, along with descriptions of all settings available on this tab.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Real-Time Protection
 
Malwarebytes offers four different types of real-time protection.  These features are available only to users of the Premium and
Premium Trial modes.  It is important to note that Premium Trial users who do not convert to a Premium subscription will lose all
real-time protection features at the end of their trial.
 
Web Protection protects Premium/Trial users by blocking access to/from Internet addresses which are known or suspected of
engaging in malicious activity.  This feature does not treat different protocols differently.  It does not distinguish between your
favorite game being served on one port and a potential malware source being served on another.  Should you choose to disable
this feature, you could inadvertently compromise your computer's safety.  Please note that this option is disabled if you are using
the Free version.
 
Exploit Protection uses multiple protection layers to guard against attempted exploits of vulnerabilities in legitimate applications. 
When applications are launched by the user, exploit protection is also launched as a shield.  This protection will often detect and
neutralize attacks that go undetected by other security applications.  It is on by default for Premium/Premium Trial users.
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 29 
 
Many popular applications have been pre-configured for shielding.  A screenshot is shown above.  To change the status of any
application, either use the Protection slider, or double click either the Application or File Name.  Premium/Premium Trial users may
add protection for other applications, and edit specifications for any defined shield.  The Edit screen is shown here.
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
You may specify an Application name which is easily recognizable, and the Application file name.  You can also browse for the file. 
Select a Program type which most closely resembles the purpose of the application.  If you are unsure, select Other.
 
The same screen is used to edit existing entries.
 
 
 
Malwarebytes for Windows User Guide 30 In addition, Premium/Premium Trial users can modify advanced exploit protection settings.  Several advanced settings are spread
across four tabs, depending on the classification of protection they provide.  One tab is shown here as an example.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Each advanced setting is available for up to six different application groups, the groups representing the method by which threats
will attempt to exploit vulnerabilities in applications of that type.  Protection may be turned on (checked), off (unchecked), or is
not applicable for that group of applications (greyed out).  While these settings provide very specific protection, they should only
be changed when requested by a Malwarebytes Customer Success specialist.  Incorrect settings may result in impaired protection.
 
Malware Protection may be turned on or off as needed by Premium/Premium Trial users.  It is on by default.  This feature protects
against malware present in code/files that try to execute on your computer.  These files may have been downloaded, imported
from a USB drive, or received as an email attachment.  While we do not recommend disabling this protection mechanism, there
may be times when it needs to be done to troubleshoot compatibility issues that arise with anti-virus updates or computer startup
problems.  If either situation does occur, start your computer in Safe Mode, disable Malware Protection, isolate and correct the
issue, then turn Malware Protection back on.  Please note that this option is disabled if you are using the Free version.
 
Ransomware Protection provides Premium/Premium Trial users protection against the threat of ransomware.  This protection is
not available for users of Windows XP or Windows Vista.  While all other protection features may provide some degree of protection
against ransomware, well-crafted ransomware may go undetected until it attempts to initiate its attack.  As many computer users
have found, there is little or no remedy available after the fact.  We strongly recommend that ransomware protection be turned
on at all times.  It is on by default.  Please note that this option is disabled if you are using the Free version.
 
Scan Options
 
Scan for rootkits utilizes a specific set of rules and tests to determine if a rootkit is present on your computer.  For readers who are
unfamiliar with this term, an explanation may be handy.  A rootkit is malicious software that can be placed on a computer which
has the ability to modify operating system files in a manner that hides its presence.  Malware detection methods that rely on hooks
to the operating system for detection and analysis would prove ineffective if the hooks had been purposely manipulated by
malware.  Our testing method is more intensive and more effective, but including rootkit scans as part of your overall scan strategy
increases the time required to perform a scan.
 
 
 

Malwarebytes for Windows User Guide 31 When Scan within archives is enabled, Malwarebytes will scan two levels deep within archive (ZIP, RAR, 7Z, CAB and MSI) files.  If
this option is disabled, the archive is excluded from scanning.  Please note that encrypted archives cannot be fully tested.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
We have introduced a new signature-less detection technology which takes advantage of machine learning to supplement existing
detection methods.
 
Potential Threats
 
In addition to malicious software detection and elimination, Malwarebytes also detects and acts upon two classes of non-malware. 
These are Potentially Unwanted Programs (PUP's) and Potentially Unwanted Modifications (PUM's).  In many cases, PUP's appear
in the form of toolbars and other application software which are installed on your computer as part of a bundle.  You may have
asked for one application, and it came with a second application that was not mentioned, or was mentioned, but you did not
uncheck the checkbox next to it to prevent it from being installed at the same time.  You may also want and use the PUP.  We do
not judge the merit of the program or its usability.  We do offer a method of removing it if you choose to.
 
PUM's are a bit different.  These are modifications that are typically related to the Windows registry.  As a user, you will generally
not be making changes to the registry that would qualify as a PUM, though the possibility does exist.  Because it does, we allow
you to define your own rules when it comes to how they are treated.
 
With regard to both types of modifications, we provide three handling methods.  These are:
 
  • Ignore detections: Malwarebytes will not act on detection, nor will you be alerted.
  • Warn user: You will be alerted to the detection.  You may choose to ignore it, create an exclusion, or treat it as malware.
  • Always detect PUPs/PUMs (recommended): The detection will be treated as malware, and corrective actions will occur.
 
While PUP's and PUM's are both handled in the same manner, each is handled according to separate guidelines which you specify.
 
Updates
 
Users of Malwarebytes Premium and Malwarebytes Premium Trial have the ability to automatically check for protection updates,
and to specify when those checks will be performed.  The date range is adjustable between fifteen (15) minutes and fourteen (14)
days, the increment depending on the range (minutes/hours/days).  We recommend that you do not allow the rules database to
become dated, as much damage can be caused by zero-day infections – those threats that are too new to be adequately protected
 
 
 
Malwarebytes for Windows User Guide 32 against by anti-virus software.  The default for this feature is on.  You may also have Malwarebytes display a notification in the
corner of your screen if protection updates are more than 24 hours old.
 
Startup Options
 
These settings define how Malwarebytes behaves when your computer starts.  You may launch several applications at startup, and
they may initiate processes which require Malwarebytes launch timing to be adjusted.  Let's look at each setting in detail.
 
  • Start Malwarebytes at Windows startup:  If this setting is unchecked, Malwarebytes will not start with Windows.  No real-
      time protection layers will start when Windows starts, though they may still be started manually by launching
      Malwarebytes.
  • Delay Real-Time Protection when Malwarebytes starts:  There may be times when the startup of system services used by
      Malwarebytes conflicts with services required by other applications at boot time.  When this is the case, turn this setting
    on.  You may also adjust the delay timing.  You will need to experiment with the specific delay setting necessary to
      compensate for any conflicts that are noted.  When required, this must be done on a case-by-case basis.  The delay setting
    is adjustable from 15-180 seconds, in increments of 15 seconds.
  • Enable self-protection module:  This setting controls whether Malwarebytes creates a safe zone to prevent malicious
      manipulation of the program and its components.  Checking this box introduces a one-time delay as the self-protection
      module is enabled.  While not a negative, the delay may be considered undesirable by some users.  When unchecked,
    the "early start" option which follows is disabled.
  • Enable self-protection module early start:  When self-protection is enabled, you may choose to enable or disable this
      option.  When enabled, the self-protection module will become enabled earlier in the computer's boot process –
      essentially changing the order of services and drivers associated with your computer's startup.
 
Automatic Quarantine
 
Users of Malwarebytes Premium and Malwarebytes Premium Trial may specify whether malware will be automatically quarantined
when it is detected.  The default setting is on.  If the users decline to automatically quarantine malware, a notification will display
in the lower right corner of the screen for each detection, and the user must specify whether the file is to be ignored once, ignored
always (added to Exclusions) or quarantined.
 
Scan Schedule
 
You may also adjust Scan Schedules here as part of program settings.  This aspect of program settings has already been covered
on pages 11-19.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 33 Exclusions
 
This tab allows additions to, or deletions from a list of items to be excluded from scans.  The list may include files, folders, websites,
applications which connect to the Internet, or previously detected exploits.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
Add Exclusion
 
Exclusions are exempt from scanning and from real-time protection.  This may include files, folders, web sites, applications and
safe programs which have been identified as exploits.  Clicking Add Exclusion launches the Add Exclusion Wizard, as shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

Malwarebytes for Windows User Guide 34 You may then add items – one at a time – to the list of exclusions.  Each item type is defined by criteria as follows:
 
  • File or folder: Its location on the file system, and whether it should be excluded from malware and ransomware, only
      malware or only ransomware.  While you may have your own reasons for excluding files or folders from scans, the primary
      reason for doing so is to prevent potential conflicts with anti-virus software.  Malwarebytes works well alongside most
      anti-virus software, but anti-virus updates by some vendors may occasionally be flagged as a threat.  For this reason, we
      offer the provision for you to exclude certain disk content from scanning.  This is commonly offered by anti-virus vendors
    as well.
 
      NOTES: 
● Clicking Select Folder… selects only folders, which by default will also exclude any files within those folders,
      as well as subfolders.
● Clicking Select Files… selects individual files for exclusion.  The status of the folder is unchanged.
 
  • Website: Enter the Domain or IP Address to specify the web address.  When adding a domain manually, please add it
      both with and without the "www." prefix.  Depending on several external factors, the domain may still be blocked if only
    one variation is entered.  Also, domain exclusions are only functional on Windows Vista Service Pack 2, Windows 7,
      Windows 8.x and Windows 10.  Please note: Exclusions can also be added by clicking the link in the notification message
      when the website is blocked by Malwarebytes Website Protection.
  • Application that connects to the Internet: Specify the name of the application.  This is most applicable if the detection is
    a false positive (legitimate application with some similar characteristics to malware).
  • Previously Detected Exploit: Specify the MD5 hash of the exploit.  This is most applicable if the detection is a false positive
      (legitimate application with some similar characteristics to malware).  The hash guarantees uniqueness of the file in
      question.
 

My Account
 
Here, you can click the Go to My Account button to obtain status of all of your subscriptions, and change preferences related to
your account.  You can also deactivate your license – useful when moving your Malwarebytes program to a new computer – or
change license key.  A screenshot is shown below.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 

Malwarebytes for Windows User Guide 35 All of the information shown here is self-explanatory.  A set of option buttons are available at the bottom of the screen.  The options
vary depend on the mode of the program.  Buttons for the three program modes are shown below.
 

          Premium Mode
            options
 
 
        Premium Trial Mode
            Options
 
 
          Free mode
            Options
 
 
          Free mode
            Options (*)
 
 
When Malwarebytes was installed, Premium Trial mode was set automatically (if you were eligible for a trial).  There may be
circumstances where you have the option of re-entering Premium Trial mode.  This would result in the second Free mode display. 
If you click the button Change License Key (Premium mode) or I Already Have a License (Premium Trial or Free mode), you will see
the following screen superimposed over the Malwarebytes interface.
 
                                                  Follow screen instructions to enter your license
                                                  information.  If you do not have a license, either
                                                press Cancel (to close this window and return to
                                                the screen you came from), or Purchase a License
                                                to go to the Malwarebytes website and purchase
                                                a license for the product.
 
 
 
 
 

 
 

About
 
This tab tells you more about Malwarebytes, and what resources are available to you should you need technical assistance.  The
upper panel contains Version Information.  We have split up the program into software components.  If you have configured the
program to provide program updates, it is easier and faster for us to provide the newest version to you by updating the
components that have changed, rather than updating the entire program.  It also benefits you if you need technical support,
because the versions of each component may influence the direction that our Customer Success engineers take when
troubleshooting an issue.
 
The Resources section provides contact addresses (URLs) which may assist you for sales, support, and educational purposes.  In
addition, you can view the third-party notices (open source software which we use in our products) as well as a link to our End User
Licensing Agreement (EULA).
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 36 Appendix A: Notification Window Examples
 
Malwarebytes provides a number of user notifications during operation.  These notifications are always positioned in the lower
right corner of your screen.  The length of time that they will remain on your screen is configurable in Application Settings (page
24).
 

Scan Notifications
 
 
 
                                                An automatic scan has been completed. Malware was
                                                  detected during execution of the scan.  Click Upgrade Now
                                                to purchase Malwarebytes Premium. This notification will
                                                only appear for Malwarebytes Free users.
 
 
 
 
 
                                                A scan (scheduled or on-demand) has been completed. 
                                                  Malware was detected during execution of the scan.  Click
                                                View Scan Results to review the scan log to determine the
                                                exact nature of the threat(s).
 
 
 

                                                A scan (scheduled or on-demand) has been completed. 
                                                  Non-Malware was detected during execution of the scan. 
                                                This is typically a Potentially Unwanted Program (PUP) or
                                                Potentially Unwanted Modification (PUM), which may be
                                                  acceptable to you.  Click View Scan Results to review the
 
                                               scan log to determine the exact nature of the threat(s).
 
 
 
                                                A scan (scheduled or on demand) has been completed.  No
                                                  problems were detected.
 
 
 

Real Time Protection Notifications
 
 
 
                                                After the user has indicated that they wish to turn off
                                                  notifications regarding real-time protection components,
                                                this notification will be displayed to request confirmation
                                                of the user’s wishes.
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 37 
 
                                                One or more components of real-time protection are
                                                disabled.  You may re-enable protection by clicking Turn
                                                On button, or by clicking Manage Protection Settings.  This
                                                is not available for Malwarebytes free users.
 
 
 

                                                  Malware has been detected as a function of real-time
                                                protection.  You have not chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so no specific action has been taken.  The program now
                                                being detected as malware may be acceptable to you, so
                                                you may choose to allow its execution once, always, or
                                                elect to quarantine it at this time.  This is not available for
 
Malwarebytes Free users.
 
 
 
                                                  Real-time protection has detected a Potentially Unwanted
                                                Program (PUP).  You have not chosen to ignore this type of
                                                activity, or to exercise the auto-quarantine capability upon
                                                  detection, so no specific action has been taken.  This
                                                  detection may be acceptable to you, so you may choose to
                                                ignore it once, always, or elect to quarantine it at this time. 
                                                This is not available for Malwarebytes Free users.
 
 
 
 
                                                  Malware has been detected as a function of real-time
                                                protection.  You have chosen to exercise the auto-
                                                quarantine capability when malware has been detected,
                                                so the offending software has been moved to quarantine
                                                and modified so that it may not cause any damage to your
                                                  computer.
 
 
 
 
 
                                                A Potentially Unwanted Program (PUP) has been detected
                                                as a function of real-time protection.  You have chosen to
                                                exercise the auto-quarantine capability when a PUP has
                                                been detected, so the offending software has been moved
                                                to quarantine and modified so that it may not cause any
                                                damage to your computer.
 
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 38 
 
                                                An attempt has been made by software present on your
                                                  computer to contact a website suspected to be malicious,
                                                and has been blocked.  This detection occurred as a
                                                  function of real-time protection.  You may allow access by
                                                clicking Manage Exclusions, which will redirect you to the
                                                Exclusions screens.
 
                                                Please note: Unblocking a website out of convenience may
                                                result in damage being caused to your computer.
 
 
 
 

                                                  Anti-exploit protection has prevented an attacker from
                                                  exploiting your computer through a vulnerability. 
 

 
 
 
 

                                                  Anti-ransomware protection has prevented an attacker
                                                from exploiting your computer with suspected
                                                  ransomware.  The threat has been neutralized and moved
                                                to Quarantine.
 

 
 
 
 
                                                After threats have been quarantined, your computer must
                                                be rebooted to complete the quarantine process, and this
                                                  notification is displayed.  After assuring that other work is
                                                saved, click Reboot Now to perform that task.
 
 
 

Update Notifications
 
 
 

                                                A program update for Malwarebytes is available.  Click
                                                Install Now to get the latest program protection.
 
 
 
 
 
 
 

Malwarebytes for Windows User Guide 39 
 
                                                Your Malwarebytes updates are out of date.  Click Update
                                                Now to cause an immediate update.  Failure to update will
                                                cause subsequent scans to use outdated protection rules,
                                                which could jeopardize the safety of your computer.
 
 
 
 
 
  
 
  
 
  
 

Premium Notifications
 

                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, you will begin to see this message
                                                thirty (30) days before the expiration of your subscription,
                                                  counting down the number of days remaining on your
                                                  subscription. Click Renew Now button to renew your
 
subscription in a new browser window/tab.
 
 
 
                                                If you do not have auto-renewal set up on your
                                                  Malwarebytes account, this notification is displayed on the
                                                final day of your subscription.  Click Renew Now button to
                                                renew your subscription in a new browser window/tab.
 
 
 
If you do not have auto-renewal set up on your account
                                                and have not responded to pending expiration, you will
                                                see this notification a maximum of three times after your
                                                  subscription has expired.  At this point, you have reverted
                                                to the free version of Malwarebytes.  Premium features
                                                have been disabled.  Click Upgrade Now to renew your
                                                  subscription in a new browser window/tab.  A slightly
different version of this notification appears within the
                                                  Malwarebytes user interface.
 
 
 
                                                This notification is displayed if your subscription cannot be
                                                  renewed.  Usually the reason for this is an expired
                                                  credit/debit card.  You will be given an opportunity to
                                                update your card information, and your subscription will
                                                remain in force for a brief period.
 
 
 
 
 

Malwarebytes for Windows User Guide 40 
 
                                                Your subscription has expired and could not be
                                                  automatically renewed.  Your Malwarebytes service has
                                                been downgraded from Premium to Free.  You can still run
                                                scans for protection, though real-time protection is no
                                                longer in force.
 
 
 
 
  
 
  
 

Premium Trial Notifications
 
 
 
                                                  Beginning five days before your Premium trial expires, you
                                                will receive a notification once per day about the expiring
                                                trial, and be given an opportunity to upgrade to Premium
                                                or to enter your Premium license information.
 
 
 
 
 
                                                On the last day of your Premium trial, you will receive a
                                                single notification, and be given an opportunity to
                                                upgrade to Premium or to enter your Premium license
                                                  information.
 
 
 
 
 

                                                After your Premium trial expires, you will receive this
                                                  notification in the Malwarebytes user interface as well as in
                                                the Windows system tray.
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
Malwarebytes for Windows User Guide 41
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.
----- Original Message -----
From: Sherri
To: jaws-users-list@groups. io
Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws
 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

TheHangMan
 

Hi Mike,

I gave up in mywarebyts a couple versions back, because it was not jaws friendly.

I been using the windows10 malremover.

Go to the run dialog and type NRT press enter.

That’s it, just wait for the scan to finish.

 

HTH,

 

 

Jorge,

There is no better symbol for the purpose we serve than the emblem every Marine earns: the Eagle, Globe and Anchor. The eagle represents the proud nation we defend. It stands at the ready with our coastlines in sight and the entire world within reach of its outstretched wings. The globe represents our worldwide presence. The anchor points both to the Marine Corps' naval heritage and its ability to access any coastline in the world. Together, the eagle, globe and anchor symbolize our commitment to defend our nation—in the air, on land and at sea.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Mike B.
Sent: Thursday, October 25, 2018 3:20 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Sherri,

 

Below is a brief tutorial I wrote awhile back on navigating MWB:

Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.

 

Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.

 

Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 

 

Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.

 

If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....

 

It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.

 

I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.

Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

----- Original Message -----

From: Sherri

Sent: Thursday, October 25, 2018 10:42 AM

Subject: [jaws-users] Using Malware Bytes with Jaws

 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

 

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

 

Mike B. <mike9902@...>
 


Hi Marie,
 
Is your license good for only 1 computer or, did you get a license good for multiple computers / devices?  When activating MWB I've had problems getting the ID code & Key Code to paste into their respective fields, meaning sometimes you need to experiment with trying to paste the Key code then the ID code, but if this doesn't work try doing the ID code first then the Key Code.  Below are the activation steps from MWB:
To activate Malwarebytes Anti-Malware Premium:
 
1. Click Activate License located at the top right of the application. If you can't find Activate, you have already registered the product. 
2. Enter the Key into the Key box
3. If you also have an ID, please click / check the box next to "My license came with a License ID"
4. Enter the ID from the e-mail into the ID box
5. Click Activate License
list end
 
Malwarebytes Anti-Malware will now enable all Premium features and automatically enable the real-time protection module.
If this does not resolve your issue or if you have further questions, please contact support. 
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

Sent: Thursday, October 25, 2018 4:29 PM
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

I recently purchased MWB on my laptop and all seems to be fine. However I installed on the desktop and can’t get it activated. Any ideas?
Marie
 
 
From: Mike B.
Sent: Thursday, October 25, 2018 12:20 PM
Subject: Re: [jaws-users] Using Malware Bytes with Jaws
 
Hi Sherri,
 
Below is a brief tutorial I wrote awhile back on navigating MWB:
Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.
 
Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.
 
Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 
 
Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.
 
If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....
 
It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.
 
I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.
----- Original Message -----
From: Sherri
To: jaws-users-list@groups. io
Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws
 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

Larry Gassman
 

The user guide may be a bit outdated but Malwarebytes seems to be very accessible with JAWS especially the latest versions.
Rarely, have I seen user guides written with the visually impaired person in mind.
in this case, I would doubt it.
Larry Gassman

At 03:35 PM 10/25/2018, JM Casey wrote:
I don’t think it mentions blind people specifically, but it should still be useful for us.
I probably perused it (or something like it) when I first got the programme.

Of course one does have to get used to terminology like “click onâ€&#65533;, etc, in the computer world, and apply knowledge as it pertains to screen-readers and keyboards accordingly.


From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Victor Gouveia
Sent: October 25, 2018 5:48 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

Does this user guide take into account blind people, or is it just written with the general user in mind?

Not for nothing, but a great many of these user guides have images instead of actual written explanations, and they usually state to click on something, even though the Jaws’ various cursors can’t get to it.

Victor

From: Mike B.
Sent: Thursday, October 25, 2018 3:26 PM
To: <mailto:jaws-users-list@groups.io>jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

Hi Again Sherri,

Below is the user guide from Malwarebytes. It's for a slightly older version but, it works the same way as the latest version.

Malwarebytes for Windows User Guide

Version 3.4.5

29 March 2018











Notices

Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by
law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or
display any part, in any form, or by any means. You may copy and use this document for your internal reference purposes only.

This document is provided “as-is.â€&#65533; The information contained in this document is subject to change without notice and is not
warranted to be error-free. If you find any errors, we would appreciate your comments; please report them to us in writing.

The Malwarebytes logo is a trademark of Malwarebytes. Windows is a registered trademark of Microsoft Corporation. All other
trademarks or registered trademarks listed belong to their respective owners.

Copyright © 2018 Malwarebytes. All rights reserved.


Third Party Project Usage

Malwarebytes software is made possible thanks in part to many open source and third party projects. A requirement of many of
these projects is that credit is given where credit is due. Information about each third party/open source project used in
Malwarebytes software – as well as licenses for each – are available oe on the following page.

<https://www.malwarebytes.com/support/thirdpartynotices/>https://www.malwarebytes.com/support/thirdpartynotices/


Sample Code in Documentation

The sample code described herein is provided on an “as isâ€&#65533; basis, without warranty of any kind, to the fullest extent permitted by
law. Malwarebytes does not warrant or guarantee the individual success developers may have in implementing the sample code
on their development platforms. You are solely responsible for testing and maintaining all scripts.

Malwarebytes does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or
completeness of any data or information relating to the sample code. Malwarebytes disclaims all warranties, express or implied,
and in particular, disclaims all warranties of merchantability, fitness for a particular purpose, and warranties related to the code, or
any service or software related there to.


















CWC04-3045a Table of Contents


Introduction ............................................................................................................................ 1

What’s New in Malwarebytes for Windows ................................................................. 2

System Requirements ......................................................................................................... 3

Installation .............................................................................................................................. 4

Free, Premium Trial or Premium? ........................................................................................................ 4

Activation .................................................................................................................................................... 5

A Final Word about Administrative Rights ....................................................................................... 6

Screen Layout ....................................................................................................................... 7

Menu Bar ..................................................................................................................................................... 7
My Account ........................................................................................................................................................................ 7
Notification Center .................................................................................................................................. 7

Menu Pane ................................................................................................................................................. 8

Status/Option Pane ................................................................................................................................. 8

Detail Pane ................................................................................................................................................. 9

Dashboard ............................................................................................................................ 10

Status Pane ............................................................................................................................................... 10

Real-Time Protection.............................................................................................................................. 11
Settings .............................................................................................................................................................................. 11

Scan Status ................................................................................................................................................ 11
View Scan Reports .......................................................................................................................................................... 11
Schedule a Scan............................................................................................................................................................... 11
Check for Updates .......................................................................................................................................................... 11
Help ..................................................................................................................................................................................... 11

Protection History ................................................................................................................................... 11

Scan ........................................................................................................................................ 12

Threat Scan ............................................................................................................................................... 12

Custom Scan ............................................................................................................................................ 13
Custom Scanning Options............................................................................................................................................ 13
Potentially Unwanted Programs/Modifications ..................................................................................................... 13
Folders to be Scanned ................................................................................................................................................... 13

Hyper Scan ............................................................................................................................................... 14

Scan Schedules ....................................................................................................................................... 14
Basic Mode ........................................................................................................................................................................ 15
Advanced Mode .............................................................................................................................................................. 15
Advanced Scan Options ................................................................................................................................................ 16

Watching Scan Progress ...................................................................................................................... 16

Scan Results ............................................................................................................................................. 17

Scan Summary ......................................................................................................................................... 18

Quarantine ............................................................................................................................ 21 Reports .................................................................................................................................. 22

Viewing or Deleting Logs .................................................................................................................... 24

Settings ................................................................................................................................. 25

Application Settings .............................................................................................................................. 25
Application Updates ...................................................................................................................................................... 26
Notifications ..................................................................................................................................................................... 26
Impact of Scans on System ......................................................................................................................................... 26
Windows Context Menus ............................................................................................................................................. 26
Display Language ........................................................................................................................................................... 26
Event Log Data................................................................................................................................................................ 26
Proxy Server ..................................................................................................................................................................... 26
User Access ...................................................................................................................................................................... 27
Windows Action Center ............................................................................................................................................... 28
Beta Application Updates ............................................................................................................................................ 28
Usage and Threat Statistics ......................................................................................................................................... 28

Protection ................................................................................................................................................ 29
Real-Time Protection .................................................................................................................................................... 29
Scan Options .................................................................................................................................................................... 31
Potential Threats ............................................................................................................................................................ 32
Updates ............................................................................................................................................................................. 32
Startup Options .............................................................................................................................................................. 33
Automatic Quarantine .................................................................................................................................................. 33

Scan Schedule ........................................................................................................................................ 33

Exclusions ................................................................................................................................................. 34
Add Exclusion .................................................................................................................................................................. 34

My Account ............................................................................................................................................. 35

About ........................................................................................................................................................ 36

Appendix A: Notification Window Examples ............................................................. 37

Introduction

Malwarebytes for Windows (“Malwarebytesâ€&#65533;) is an "AV replacement." It is not an AV. It does not incorporate the same old engine
for file-infectors and other malware that you find in a typical AV or Internet security suite, the large and inefficient library of
signatures, or the bloatware features which are becoming more prevalent.

You don't need to pay for a traditional AV anymore! At Malwarebytes, we have always approached things differently and, as many
people know based on their own positive experience with Malwarebytes finding and remediating malware that gets past AVs, we
know a thing or two about zero-day malware and their infection tactics. We have always believed that no one product can do it
all, and the free AV that comes with modern operating systems, in conjunction with Malwarebytes is all you will ever need.

In today's modern threat world, bad guys have learned how to evade AV protection, making it more important than ever before
to be able to disrupt attacks in as many different stages of the attack chain as possible. Malwarebytes, layered with the AV (which
is the default mode) or as your stand-alone defense, is the most effective approach against modern threats. And if all else fails,
you need the best remediation technology available.

Malwarebytes has been engineered to provide the most effective layered approach of prevention, detection and remediation
technologies:

1. Application hardening, to make them more resilient against attacks.
2. Anti-exploit technology, to shield applications from vulnerability exploits (currently one of the top infection vectors).
3. Application Behavior Enforcement, an advanced and signature-less technology which prevents common infection
vectors (e.g. web & email based social engineering).
4. Anti-ransomware, a signature-less technology designed to behaviorally detect ransomware.
5. Revamped Anti-Malware and Web Blocking engines, offering more aggressive detection techniques.
6. Hardened and modular architecture design, allowing seamless integration of new detection and protection technologies
in the future.
7. Highly effective as always in malware remediation, an often overlooked part of the protection stack.
8. Ability to run as primary protection (no AV) or secondary protection (alongside existing AV).
9. Engineered to be our next corporate endpoint client, providing major improvements to our endpoint management
capabilities and new enterprise-focused offerings
10. Last but not least, our Research Team has been growing and adapting lately, with notable additions to the lineup from
JRT and AdwCleaner, our new aggressive stance against PUPs, as well as new R&D technologies which we will be
unveiling shortly.

Welcome to the Malwarebytes User Guide!





















Malwarebytes for Windows User Guide 1 What’s New in Malwarebytes for Windows

This version of Malwarebytes contains many improvements and bug fixes. Following is a list of changes.

Performance/protective capability

• Improveed remediation for hijacked shortcuts
• Continued improveements to overall protection, detection and remediation

Usability

• Device Name now syncs to the Malwarebytes My Accouunt portal for users on the paid version
• Improved accesssibility features for the Notification Center
• Added cuustom messages designed to highlight the value of Malwarebytes protection and help it remain free

Stability/issues fixed

• Fixed problem when cutting / pasting files with anti-ransomware enabled
• Fixed problem where USB stick would not eject prooperly with anti-ransomware enabled
• Fixed a service craash related to self-protection
• Fixed a blue screen crassh related to Web Protection
• Addressed other miscellaneeous defects































Malwarebytes for Windows User Guide 2 System Requirements

Following are minimum requirements for a computer system on which Malwarebytes may be installed. Please note that these
requirements do not include any other functionality that the computer is responsible for.

• Opeerating System: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista (Service Pack 1 or later), Windows
XP (Service Pack 3 or later, 32-bit only)

PLEASE NOTE: Anti-ransomware protection is not supported for Windows XP or Windows Vista, due to architectural
constraints.

• CPU: 800 MHz or faster, with SSE2 technollogy. This includes most modern Intel x86 processors as well as AMD’s Athlon
64, Sempron 64, Turion 64 and Phenom CPU families. Please refer to the following page for further information:

<https://en.wikipedia.org/wiki/SSE2>https://en.wikipedia.org/wiki/SSE2

• RAM: 22048 MB (64-bit OS), 1024 MB (32-bit OS, except 256 MB for Windows XP)

• Free Disk Space: 250 MB

• Recommended Screen Resolution: 1024x768 or higher

• Active Internet Connection


WARNING: If you are upgrading from Malwarebytes Anti-Malware version 2.x and have enabled Malwarebytes’ self-protection
feature, please disable it prior to initiating the upgrade. It prevents the Malwarebytes installation program from doing its job.






























Malwarebytes for Windows User Guide 3 Installation

To begin the installation, double-click on the Malwarebytes installation file which you downloaded. If you are installing
Malwarebytes on a Windows version newer than Windows XP, a Windows dialog box will be presented in the middle of your screen,
labeled User Account Control. Verify that the publisher is listed as Malwarebytes Corporation and click Yes. This Windows security
feature assures limited application capabilities unless and until you authorize higher capabilities. Installation will begin once this
has been approved. The installation program guides you and allows you to provide alternate information if you do not wish to
accept defaults. Each screen also allows you to terminate installation if you do not wish to continue.


Free, Premium Trial or Premium?

Before you begin, we want to let you know that throughout this guide, you will see references to the Free, Premium Trial, and
Premium versions of Malwarebytes. This is likely unfamiliar territory for new Malwarebytes users. The following link provides a
basic rundown on the differences between the Free and Premium versions of Malwarebytes.

<https://www.malwarebytes.com/trial/#comparison-chart>https://www.malwarebytes.com/trial/#comparison-chart

These differences are also shown in the Malwarebytes interface immediately after it has been installed. See below….





















The Premium Trial is a 14-day opportunity to use the Premium version of the program, and to see if it is better suited to your needs.
The Premium Trial is available at no cost, but you can only use it one time for each version of Malwarebytes. The Premium Trial is
automatically started during installation. Once installed, the program provides options to convert from Free to Premium, and from
Premium Trial to Premium.

If you elect to use the Premium Trial and do not wish to purchase a Premium subscription at the end of the trial, your Malwarebytes
program will revert to Free mode. The only differences will be that the added features enabled by the trial will cease to function.
All other functionality remains unchanged.

If you are a new Malwarebytes user, or are a free/Premium Trial user upgrading to this version, you will be alerted that a scan has
not been run. Click Scan Now and Malwarebytes will run a scan for you. After the scan (and cleanup, if needed) has been
completed, you will see the user interface as shown below.




Malwarebytes for Windows User Guide 4

Please take note of the Why Premium button in the lower left corner. Click that button for a brief slide show that describes the
differences between Free and Premium modes. While Malwarebytes does an effective job of disinfecting your computer after an
attack, there is no replacement for preventing the attack from ever happening.

If you have already purchased a license, you may wish to activate your copy of Malwarebytes at this time. You can do that now (or
at any time) by clicking the Activate License button at the top right portion of the Malwarebytes user interface.


Activation

Malwarebytes is available for users of any modern Windows client to download and install at no cost. You can also purchase an
annual subscription, which entitles you to take advantage of real-time protection, scan/update scheduling and access policies. If
no license has been installed into the product, the blue title bar at the top of the screen will show two buttons, Activate License
and Upgrade Now. When clicked, Upgrade Now launches a browser window which opens to the Malwarebytes web site
pricing/purchase page. Your license information will be in an email sent to you by Malwarebytes at the time of purchase. Locate
your license information and click the Activate License button. You will then see the following screen.

















Malwarebytes for Windows User Guide 5 Please note the checkbox and the words “My license came with a License ID.â€&#65533; If you are using our “old styleâ€&#65533; license, you will also
need to check that box and enter your License ID along with your Key.

Please note: You must be online with an active Internet connection in order to successfully activate your Premium license.

The construction of the Key is different, so make sure that you choose the right screen for entering your license information based
on whether you have an ID and Key, or just a Key. After entering your license information, click the Activate License button. Your
Malwarebytes screen will refresh, as shown below.






















Please note that the two license-related links in the Menu Bar have been replaced by a link called My Account. Also note that the
banner has changed from Malwarebytes Premium Trial to Malwarebytes Premium.


A Final Word about Administrative Rights

If you installed Malwarebytes from a downloaded installation file, you automatically started a Premium Trial, and were offered the
capability to activate the Premium features if you had purchased an annual subscription. You may have decided to wait until later.
If that is the case, please remember that you should be logged in to Windows as an Administrator before doing either of those
tasks.

We will go into much more detail about the features of Malwarebytes, but before doing that, we should introduce you to the
Malwarebytes user interface.













Malwarebytes for Windows User Guide 6 Screen Layout

The Malwarebytes program interface is designed around a screen layout which is simplified and uncluttered. We want to make it
easy for you to configure the program to serve your needs, and we hope this layout helps to do that. The screenshot below shows
the Dashboard – tthe screen you see when Malwarebytes is launched for the first time.






















Let's talk about the primary elements which make up our user interface.


Menu Bar

The Menu Bar is displayed at the top of the screen at all times. There are two buttons in the Menu Bar. A description for both
follows.

My Account

This button will take you to the setting options to manage your Malwarebytes subscription(s) and license(s). For more information,
please refer to pages 35-36 of this guide.

Notification Center

The Notification Center provides a convenient location to view recent notifications generated by Malwarebytes. Clicking the icon
will show the 5 most recent notifications. You may scroll down to view up to 25 notifications by using your mouse wheel. You can
view additional details for each notification by clicking it – Malwarebytes will bring you to the relevant screen.









Malwarebytes for Windows User Guide 7


Menu Pane

The Menu Pane contains the main program options, which will be discussed in detail in this guide. They consist of:

• Dashboard: What yoou see here. While the exact details change over time, the look is consistent.
• Scan: Select the type of scan you wish to run, run it, and view the results.
• Quarantine: Delete or restorre threats which have been detected by program scans.
• RReports: View reports related to program operation, threats which have been detected, and threats which have been
removed.
• Settings: Configure every aspect of Malwarebytees, so that it can protect you efficiently.

In addition, there are settings for Account information. While in Premium Trial mode, options are present to buy a Premium
subscription and to Activate the program. Once you have purchased a subscription, those two options will revert to a single option
which handles details of your account. More on those later.


Status/Option Pane

When the Dashboard is selected from the Menu Pane, the center of the screen is filled with the Status Pane. It is designed to give
you quick information that tells you whether there is anything for you to be concerned about. When the Dashboard is selected,
the Detail Pane is also displayed. More on that momentarily.

When any menu option other than the Dashboard is selected, all space except the space used by the Menu Pane is allocated to the
selected menu option. This provides sufficient room for information pertaining to any menu option to be cleanly displayed.






Malwarebytes for Windows User Guide 8 Detail Pane

The Detail Pane is shown only when the Dashboard is selected. It shows information on protection options, protection updates,
and detail pertaining to the most recent scan. This information is shown on other screen displays as part of the menu option
selected by the user, but are all displayed here for quick recognition.











































Malwarebytes for Windows User Guide 9 Dashboard

Each time Malwarebytes is launched, the first page visible to the user is the Dashboard. It provides program status, and acts as a
launch pad for all program operations. A screenshot of the user interface – featuring the Dashboard – is is shown below for reference.























Status Pane

The main area of the screen is the Status Pane, providing current system status. Within the Main Window, the first item displayed
is the Status Banner. This banner displays a status message along with an icon, whose color is based on program status. The color
is meant to alert the user to conditions which may require intervention. Colors used are similar to traffic stop signals – green simply
indicates a goodd status; orange indicates a warning of a condition which may become more severe over time; red indicates that
your immediate attention is needed. Following is a full list of status messages. If a recommended method of correcting the
problem is immediately available, it will appear as a functional button on the banner itself.

• Coolor: green (no problem)
o Awesome! You’re protected. (Premium mode and Premium Trial modes which will expire more than 7 days in
the future)
o You’re running Malwarebytes Free. (free mode only)
• Color: orange (non-critical problem)
o You’re not fully protected.
o Your Protection Updates are not current.
o Your program version is out of date
o Your Premium Trial ends in <x> days. (trial expiring in 3-7 days)
o Renew to avoid losing protection against malware, bad websites, and other threats
• Color: reed (critical problem)
o Your Premium Trial ends in <x> days. (trial expiring in 0-3 days)
o Your trial has expired
o Renew to avoid losing protection against malware, bad websites, and other threats
o We were unable to renew your subscription (renewal failed, and you are now in 30-day grace period)




Malwarebytes for Windows User Guide 10 Real-Time Protection

This item shows the status for each of the four Real-Time Protection features. Please note that real-time protection is enabled only
for Malwarebytes Premium and Malwarebytes Premium Trial users. This feature is not available if you are using the Free version.

Settings

Settings are accessed from the Main Menu, and also by clicking the small gear at the top right of the Real-Time Protection panel.
When clicked, the Settings screen will be displayed, allowing access to all program settings. Please refer to the Settings portion of
this guide (pages 24-35) for complete information on this topic.


Scan Status

This panel shows your scanning activity at a glance. You can easily see when the last scan was completed, when the next scan is
scheduled, and the status of your protection updates. There are four icons on the title bar for this panel, as shown here.




A description for each icon – in the order shown – is as folfollows.

View Scan Reports

This icon takes you to Reports, where you can view detailed reports on scans which Malwarebytes has performed on your computer.
Please note that information shown here is limited to the last scan that was executed. See the Reports Pane (pages 21-23) for
information on reports as a whole.

Schedule a Scan

The second icon allows scans to be scheduled for automatic execution. This option is available only for Malwarebytes Premium and
Malwarebytes Premium Trial users. The icon remains visible in Free mode, but clicking it has no effect. When clicked, the Settings
screen will be displayed, allowing access to the Scan Schedule screen. Please refer to the Scan Schedule portion of this guide (pages
13-15) for full information on this topic.

Check for Updates

The third icon causes Malwarebytes to connect with Malwarebytes servers to check for protection updates more current than those
in use, and download them if they exist. This option is functional for all program modes.

Help

The fourth icon links to the Malwarebytes User Guide on the Malwarebytes website. This behavior is consistent throughout the
program.


Protection History

This panel shows three key statistics. It shows how many items were scanned, how many threats were detected during scans, and
how many threats were detected by real-time protection. Please note that the number of items scanned includes individual files
that are part of archive files, as well as components in dynamic link library (DLL) files. Also note that real-time detections can only
occur in Premium and Premium Trial modes.






Malwarebytes for Windows User Guide 11 Scan

The Scan Pane is the introduction to scan-related options in the program. When you click Scan in the Menu Pane, you will see the
screen shown below.






















On this screen, you may select the Scan Method and the Scan Schedule. Let’s look first at Scan Methods. There are three scan types
which can be executed – Threat Scan, Custom Scan, and Hyper Scan. Hyper Scan is only available to users of the Premium or
Premium Trial modes. Please note that global scan settings used by Threat Scans and Hyper Scans are selected in Settings (see
pages 30-31). Following are more detailed descriptions of each of the scan modes.


Threat Scan

This method of scanning detects a large majority of threats that your computer may be faced with. Areas and methods tested
include:

• Memory Objects: Memory which has been allocated by operaating system processes, drivers, and other applications.
• Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
• Registry Objects: Configguration changes which may have been made to the Windows registry.
• File System Objects: Files stored on your computer's local diskk drives which may contain malicious programs or code
snippets.
• Heuristic Analysis: Analysis meethods which we employ in the previously-mentioned objects – as welll as in other areas –
which are iinstrumental in detection of and protection against threats, as well as the ability to assure that the threats
cannot reassemble themselves.

The Threat Scan is the scan method which we recommend for daily scans. While it will not scan every file on your computer, it will
scan the locations which most commonly are the launch point for a malware attack.






Malwarebytes for Windows User Guide 12 Custom Scan

You may also choose to run a custom scan. A custom scan allows you to scan according to specifications which you define at the
time of the scan. These settings will override scan settings defined elsewhere. A screenshot of the custom scan configuration
screen is shown below.






















Custom Scanning Options

These settings provide capability to determine the functional areas that will be scanned. They are as follows:

• Memory Objects: Memory whichh has been allocated by operating system processes, drivers, and other applications. It is
important to note that threats detected during scans are still considered threats if they have an active component in
memory. As an extra measure of safety, memory objects should be scanned.
• Startup and Registry Objects: Executable files and/or modificatiions which are initiated at computer startup, as well as
registry-based configuration changes that can alter startup behavior.
• Archives: If this setting is checked, archiive files (ZIP, 7Z, RAR, CAB and MSI) will be scanned up to two levels deep.
Encrypted (password-protected) archives cannot be tested. If left unchecked, archive files will be ignored.
• Rootkits: These are files stored on your ccomputer's local disk drives which are invisible to the operating system. These
files may also influence system behavior.

Potentially Unwanted Programs/Modifications

These settings allow the user to choose how Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications
(PUMs) will be treated if they are detected.

Folders to be Scanned

This setting allows the user to include or exclude directories, subdirectories, and individual files from scans. It utilizes a Windows
Explorer-like presentation model. In the screenshot shown above, every directory except Desktop is selected for a custom scan.
You may scan parent directories separately from child directories based on individual selections.



Malwarebytes for Windows User Guide 13 Hyper Scan

This scanning option is only available to users of Malwarebytes Premium and Malwarebytes Premium Trial versions. This method of
scanning is limited to detection of immediate threats. Areas and methods tested include:

• Memory Objects: Memory which has bbeen allocated by operating system processes, drivers, and other applications.
• Startup Objects: Executable files and/or modificatiions which will be initiated at computer startup.

While a Hyper Scan will clean any threats which have been detected, we strongly recommend that a Threat Scan be performed if
a Hyper Scan has detected threats.


Scan Schedule

This tab allows users of the Premium and Premium Trial versions to add, edit and remove scheduled scans to be executed by
Malwarebytes. This feature is not available to users of the Free version. A screenshot of this tab is shown below.






















One scheduled scan is defined when Malwarebytes is installed. Premium and Premium Trial users are free to modify or delete scans
at will, while Free users are provided with a single monthly scheduled scan. Please note that if the initial task is deleted without a
replacement task being defined, your Malwarebytes program will not deliver the positive results that you expect. The same
methods are used here to add a new task as well as to edit an existing task, so let's Add a new task in Basic mode.












Malwarebytes for Windows User Guide 14 Basic Mode

A screenshot of the basic Add Schedule screen is shown here.

You can choose the
specific task to be
added on the left side of
the screen, in the
Scheduled Task area.
You may choose from
the following tasks:

• Threat Scan
• Custom Scan
• Hyper Scan





Scan types have been previously discussed in the Scan section of this guide (pages 11-19). Please refer to those pages for further
information if desired. The Frequency and Settings section allows you to define the timeframe (Schedule Frequency) that a task
will be executed, and how often (Recurrence). For scans, this translates to:

• Frequency = Hourly, recurrence in range of 1-48 hours
• Frequency = Daily, recurrence in rangee of 1-60 days
• Frequency = Weekly, recurrence in rangge of 1-8 weeks
• Frequency = Monthly, fixed setting • Frequency = Once, fixed
• Frequencyncy = On Reboot, fixed

Advanced Mode

At the bottom left corner of the Add Schedule window is the Advanced button. Click that to expand the Add Schedule window to
expose several more options. A screenshot is shown below.


















In Advanced Mode, we add options which tailor the scan more to your liking. Let's look a little deeper, beginning with the
advanced options for scans.


Malwarebytes for Windows User Guide 15 Advanced Scan Options

Scheduled Task defines what task (scan/update) is to be added/edited, and when that task should begin – specifyiing both the date
and time. Schedule Options provides several added capabilities to the basic settings which have already been described. Here's a
rundown on the advanced options.

• Quarantine all threats automatically: This option determines if a newly-detected threat would be automatically
quarantined, or if you would be notified so that you could choose a course of action. While automatic quarantine may
seem to be the best course of action, it could have negative implications if a false positive was encountered. A false
positive is the categorization of a legitimate file as a malicious file. It does rarely occur, and when it does, Malwarebytes
Customer Success will assist you in having the offending file evaluated more fully by our Research group.
• Restart computer when required for threat removal: This is availlable only if threats are automatically quarantined, and is
not selected by default. Some threats may require a computer restart to completely eliminate the threat, but we feel it’s
best to notify you at the time, so you may save your work before restarting your computer. If this were checked, you
could lose work unless you were monitoring the scan in progress.
• Scan for rootkits: This optiion allows specialized testing for the presence of rootkits. Due to its nature, it increases the
required time for a scan to execute. This option is not available for Hyper Scans.
• Scan within archives: This is selected by default. It allows scanning to go two levels deep within archive files. If not
selected, the archive will be ignored. It will also be ignored if it is encrypted. This option is not available for Hyper Scans.

Frequency and Settings was discussed in the previous section (Advanced Mode). Please refer to that section for more detail.

Recovery Options allow you to recover from a missed task (e.g. your computer was off at the time a scan was to take place). A
scheduled task – if missed – will run at itsits next opportunity as long as it is within the duration specified by the Recover if missed by
selector and the Recover missed tasks checkbox is checked.


Watching Scan Progress

Each scan method requires a different amount of time to complete. Unless significant changes have occurred on your local disk, a
Hyper Scan or Threat Scan should each be rather consistent from scan to scan. A custom scan time interval may vary widely each
time, based on the areas scanned, the number of files involved, and the size and complexity of the files. The screenshot below is
an example of a scan in process.























Malwarebytes for Windows User Guide 16 The progress bar shows milestones for each phase of the scan, with each milestone represented by a green or gray symbol. In this
screenshot, some milestones are shown with green checkmarks, indicating that phase of the scan has been completed. Scan
Memory is represented by an animation which indicates that this phase of the scan is currently being performed. The remainder
of the tasks are shown as grey hourglasses, and are yet to be started.

You may also pause a scan while it is in process by clicking the Pause button. The scan phase in progress will change to indicate
that the scan has been paused. Click Resume to continue the scan where it left off. You may also click Cancel at any time to
terminate the scan. Results of the scan will be reported as if the scan ran to completion.


Scan Results

After a scan has been executed, Scan Results are displayed as shown here. In this scan, three threats were detected.






















You may move threats to Quarantine by selecting the threat (using checkboxes to the left of the threat’s name) and clicking
Quarantine Selected. If any threats are not selected to be moved to Quarantine, you will be prompted to Ignore Once, Ignore
Always, or Cancel. Ignore Once will result in the threat once again being reported as a threat during the next scan execution.
Ignore Always causes the threat to be added to Exclusions. A threat which has been added to Exclusions will no longer be reported
as a threat unless there is reason to believe that it has been tampered with. You must provide a disposition for each threat
displayed on this screen.

Threats which have been moved into Quarantine cannot harm your computer. They are neutralized as part of the Quarantine
process. Please see Quarantine (page 20) for further information.











Malwarebytes for Windows User Guide 17 Scan Summary

The final screen to be displayed as part of a scan is the Scan Summary. It provides summary information about the scan, and allows
you to view scan detail on screen, or export scan summary or scan detail to a text file. A screenshot of the Scan Summary is shown
below. Free and Premium Trial users will see a reminder of the value of a Malwarebytes subscription on this page as well.






















Clicking the View Report button displays the Scan Report for the scan just completed. It is shown here as well.

















When threats are detected during a scan, the user must decide how these threats should be handled. The following series of
screenshots detail this flow. In the first screenshot, twenty threats have been detected. By default, all are selected for removal.
Please note that the total number of detected threats is shown above the list of threats, as is the number of threats selected for
removal.



Malwarebytes for Windows User Guide 18

In order to demonstrate the behavior of this screen, we will uncheck some of the threats. This indicates that only the checked
threats are to be removed. Clicking the Quarantine Selected button results in the screen shown below.






















Threats that were not selected still require remediation, based on input supplied by the user. In this case, the choices available are
Ignore Once, Ignore Always and Cancel. Clicking the Ignore Once button temporarily ignores a threat, although it will be shown
as a threat on subsequent scans. Selecting Ignore Always results in the threat being added to the Exclusion List. It would not be



Malwarebytes for Windows User Guide 19 scanned in the future. Clicking Cancel keeps you on this screen until you choose how to handle all detected threats. Once a
disposition has been selected for all detected threats, the screen below will be displayed.






















Although threats have been quarantined, you must restart the computer to assure the threat removal process is complete.
























Malwarebytes for Windows User Guide 20 Quarantine

When executing scans (on-demand or as part of real-time protection), some programs, files or registry keys may have been
categorized as threats. At that time, they were removed from the disk location where they were stored, placed in quarantine, and
modified so that they could not pose a threat to your computer. There may be items which fall into this category, but are not
malicious. It is up to individual users to research and make this determination. Upon entry to the Quarantine option, you are
presented with the screen shown here.






















Quarantined items are shown in a table format, with pertinent information presented to help you determine what action needs to
be taken. Each item listed has a checkbox in the leftmost column. Check the checkbox to restore or delete the item. Please note
that the Restore and Delete buttons are greyed out until items are selected. If you wish to apply the same action to all quarantined
items, select the checkbox in the table header and click Restore or Delete.

Please be aware that quarantined items which are not deleted or restored will continue to be visible here until action is taken.
















Malwarebytes for Windows User Guide 21 Reports

The Reports Pane displays a list of scans and real-time protection detections, in reverse chronological order. A Protection Event that
starts with the word Scan is a report summarizing the specified scan. All other reports listed on this screen are detail pertaining to
detections made by real-time protection. A screenshot is shown here.






















Selected reports may be viewed on screen, or exported to a text file for later viewing. Opening a report will display a summary of
the event. You can click the Advanced tab to view more information about the event. Details displayed for Protection Events will
be relevant to the type of event shown. Please note that only manual (on demand) scans are available for users of the free version
of Malwarebytes.



















Malwarebytes for Windows User Guide 22 The Scan Report may appear in two different forms. If one or more threats were detected during a scan, the report will appear as:





















Please note that the bottom portion of the report shows the threats detected during the scan. It is scrollable when required. The
top portion of the report contains a summary of the scan. You can click the Advanced button to view more details, as shown here:


























Malwarebytes for Windows User Guide 23 Viewing or Deleting Logs

You may view any log file by clicking the log to select it, then clicking the View Report button. As mentioned previously, there are
several output options for Protection Logs. To delete logs, click the checkbox corresponding to those logs you wish to delete, then
click the Delete button. Please bear in mind that computers which have significant threat activity will also have larger logs. You
should periodically check how much disk space is being used for logs, so that logs do not impact normal operation of your
computer.

Please note that an Export button is shown at the bottom left corner of this screen. This allows you to make a copy of the log for
use by other programs. You may export to your clipboard or to a text (TXT) file.








































Malwarebytes for Windows User Guide 24 Settings

The Settings screen allows the user to change all Malwarebytes operational settings. We have grouped settings by the
areas/functions which they control into tabs to maintain a clean user interface. When you select any tab, you will see the Detail
Pane change to reflect the tab which you selected. At the same time, the tab itself is highlighted.

Before we dig in to each of the tabs, a brief description of each is in order.

• Application Settings: Settings that affect Malwarebytes, as well as how it coexists with Windows.
• Protection Settings: Hoow Malwarebytes should protect you during scans and (for Premium/Trial mode users only) Real-
Time Protection.
• Scan Schedule: When Malwarebytes should execute scans and chheck for protection updates. This setting is functional
only for users of Premium/Trial mode.
• Exclusions: Items which will be excluded from testing which detects malware, as well as websites which are categorized
as malicious but specifically approved by the user.
• Myy Account: Information pertaining to the status of your subscription.
• About: Version numbers corresponding to Malwarebytes as a whhole, and for various components of the program which
may be updated individually. Malwarebytes company resources are also listed on this page.

When Settings is selected, the Application tab is always selected. If you navigate away from Settings – tto Dashboard, Scan,
Quarantine or Reports – you will always retuurn to the Application tab of Settings when you click on Settings.

Now, let's take a look at Application Settings!


Application Settings

This is the entry screen you will see when you click on Settings in the Menu Pane. It controls how Malwarebytes interacts with
many aspects of your computer’s operating system. A screenshot is shown below.






















The scroll bar at the right of this screen indicates there are many more options available on this screen than what appear here. We
will now cover each of them in order.



Malwarebytes for Windows User Guide 25 Application Updates

Malwarebytes may have updates available for individual program components, or for the full program. We provide two toggle
switches which allow you to choose whether either or both upgrade modes can be integrated into your copy of Malwarebytes
when they are available. Click Install Application Updates to check for available program updates or upgrades. You can choose if
you upgrade, and when. Upgrades only happen with your consent.

Notifications

Notifications regarding scans, real time protection, updates and subscriptions occur in windows at the lower right corner of your
screen, outside of the Malwarebytes interface. You may enable or disable these notifications. Most notifications are enabled by
default, while a few can be disabled. Please note that some non-critical information may not be visible if you disable notifications.
Disabled notifications do not leave the user at risk at any time. The following notifications may be disabled. Please refer to
Appendix A (Notification Window Examples) at the end of this guide for further information.

• Malicious Website Blocked
• Malware Detected (auto-quarantine)
• Non-Malware Dettected (auto-quarantine)

Some users intentionally turn off one or more components of real-time protection. Users may now disable notifications that
components have been turned off. Please note that as a result of this setting, users will be unable to receive notifications regarding
real-time protection failures in the event of program malfunction.

Impact of Scans on System

Most users schedule scans to occur during times when their computer is typically idle. Execution of a manual scan may be
performed as a matter of convenience, or while other tasks are being executed. The performance of lower-powered computers
may be affected by execution of the Malwarebytes scan. This setting allows the user to determine the priority of the scan to be
performed. Lower scan priority will require more time to execute while impacting other operations to a lesser degree. High priority
allows the scan to be executed at the maximum speed which the computer allows, but may affect other tasks.

Windows Context Menus

Malwarebytes has the capability to launch a Threat Scan upon one or more individual files or directories from within Windows
Explorer by using the context menu that becomes available when the files/directories are right-clicked. This setting allows that
capability to be turned on or off. The default setting is On.

Display Language

This setting determines the language used throughout. This is pre-set, based on the language used during program installation.
It can be modified at will.

Event Log Data

This setting provides additional information regarding program actions which are beyond typical needs of the user. Should you
encounter a technical issue with Malwarebytes, our Customer Success engineers may request that you enable this setting to
provide additional troubleshooting information. Once troubleshooting is complete, please remember to turn this setting off to
prevent unnecessary disk usage. The default setting is Off.

Proxy Server

This determines whether Internet connections will use a proxy server. This is more often used on a corporate network. It has two
primary purposes. The first is to funnel communications to and from the outside world through a single connection point, thus
assuring anonymity of all computers on the internal network. The second purpose is to cache content. This means that external
content which had recently been downloaded is saved locally for some period of time, and subsequent requests by that user (or
others) could use the recently-saved data. This conserves significant bandwidth, resulting in lower operating costs.





Malwarebytes for Windows User Guide 26 By default, Malwarebytes does not use a proxy. If configured to
do so, the bottom panel will change to provide configuration
options as shown in the screenshot shown here.

You can now specify the IP address or name of a proxy server,
as well as the appropriate port number. If a proxy is in use, the
name and port number must be specified by the person who
controls access to the proxy server. He will also be able to tell
you whether authentication is required to use the server, and if
so, provide a user name and password which have been
assigned to you.




User Access

This slider allows users of Malwarebytes Premium and Malwarebytes Premium Trial versions to restrict access to various features
and functions in Malwarebytes with password protection. The Edit User Access button is only visible when the slider is in the On
position, allowing the user to define sections of the program which require a password to access.






When the Edit User Access button is clicked, a new window opens directly above the Malwarebytes program screen to restrict
access to selected areas of the program only to those users who possess the password. The password is also defined on this screen.

WARNING: This password is not recoverable. If you lose your password, you will have to reinstall Malwarebytes to access restricted
features.





















As shown above, the Reports tab has been placed under password control. This also causes User Access to be placed under
password control. This prevents unauthorized users from gaining access to restricted areas.


Malwarebytes for Windows User Guide 27 When attempting to gain access to a
restricted area, you will be required to enter
a password (as shown here).







If an incorrect password is entered, or if a
null password is used, this error message
will be displayed.




If this feature has been enabled and is subsequently disabled, any restrictions which have been defined are cancelled. This feature
is not available to users of the Free version. Currently, only one policy may be in effect at any given time.

Windows Action Center

You may have noticed an icon in your system tray with a red X superimposed over a white flag. That is a status indicator for the
Windows Action Center, which tells you when your computer has a security issue that needs your attention. Malwarebytes Premium
or Malwarebytes Premium Trial can now be registered as a security solution on your computer. There are three settings available,
which will be abbreviated here for easier reading. Brief descriptions for the meaning of each setting are also provided.

• Let Malwarebytes choose whether to register: Malwaarebytes will determine whether it should be registered in Action
Center. The program will not register when Microsoft Security Essentials is in use on a Windows 7 or older operating
system. It will also not register when Windows Defender is used on a Windows 8 or newer OS.
• Always reggister Malwarebytes: Malwarebytes program status will always appear in Action Center.
• Never register Malwarebytes: Malwarebytes prrogram status will never appear in Action Center.


Beta Application Updates

Some Malwarebytes users want to try the newest features as soon as they are available, while some prefer to wait until the product
is released. We have added this program setting so that if you want the latest and greatest immediately, we can deliver it to you
automatically. When you enable this setting, you will see the following dialog box.










Usage and Threat Statistics

If you check this box, you will be sending us information to help us do our jobs. We like to know what countries Malwarebytes is
being used in, and the breakdown of Premium, Premium Trial, and Free versions. Our Research organization likes to keep track of
what malware we are detecting and how often. We learn that from what you send us, and helps us to serve you more effectively.
We hope that's fine with you as well. For a full list of information that is collected, please see the Malwarebytes Privacy Policy, at:

<https://www.malwarebytes.com/privacy/>https://www.malwarebytes.com/privacy/


Malwarebytes for Windows User Guide 28 Protection

Most settings which control how Malwarebytes protects your computer are located on the Protection tab. Settings are grouped
by category. A screenshot is shown below, along with descriptions of all settings available on this tab.






















Real-Time Protection

Malwarebytes offers four different types of real-time protection. These features are available only to users of the Premium and
Premium Trial modes. It is important to note that Premium Trial users who do not convert to a Premium subscription will lose all
real-time protection features at the end of their trial.

Web Protection protects Premium/Trial users by blocking access to/from Internet addresses which are known or suspected of
engaging in malicious activity. This feature does not treat different protocols differently. It does not distinguish between your
favorite game being served on one port and a potential malware source being served on another. Should you choose to disable
this feature, you could inadvertently compromise your computer's safety. Please note that this option is disabled if you are using
the Free version.

Exploit Protection uses multiple protection layers to guard against attempted exploits of vulnerabilities in legitimate applications.
When applications are launched by the user, exploit protection is also launched as a shield. This protection will often detect and
neutralize attacks that go undetected by other security applications. It is on by default for Premium/Premium Trial users.












Malwarebytes for Windows User Guide 29

Many popular applications have been pre-configured for shielding. A screenshot is shown above. To change the status of any
application, either use the Protection slider, or double click either the Application or File Name. Premium/Premium Trial users may
add protection for other applications, and edit specifications for any defined shield. The Edit screen is shown here.
















You may specify an Application name which is easily recognizable, and the Application file name. You can also browse for the file.
Select a Program type which most closely resembles the purpose of the application. If you are unsure, select Other.

The same screen is used to edit existing entries.



Malwarebytes for Windows User Guide 30 In addition, Premium/Premium Trial users can modify advanced exploit protection settings. Several advanced settings are spread
across four tabs, depending on the classification of protection they provide. One tab is shown here as an example.
























Each advanced setting is available for up to six different application groups, the groups representing the method by which threats
will attempt to exploit vulnerabilities in applications of that type. Protection may be turned on (checked), off (unchecked), or is
not applicable for that group of applications (greyed out). While these settings provide very specific protection, they should only
be changed when requested by a Malwarebytes Customer Success specialist. Incorrect settings may result in impaired protection.

Malware Protection may be turned on or off as needed by Premium/Premium Trial users. It is on by default. This feature protects
against malware present in code/files that try to execute on your computer. These files may have been downloaded, imported
from a USB drive, or received as an email attachment. While we do not recommend disabling this protection mechanism, there
may be times when it needs to be done to troubleshoot compatibility issues that arise with anti-virus updates or computer startup
problems. If either situation does occur, start your computer in Safe Mode, disable Malware Protection, isolate and correct the
issue, then turn Malware Protection back on. Please note that this option is disabled if you are using the Free version.

Ransomware Protection provides Premium/Premium Trial users protection against the threat of ransomware. This protection is
not available for users of Windows XP or Windows Vista. While all other protection features may provide some degree of protection
against ransomware, well-crafted ransomware may go undetected until it attempts to initiate its attack. As many computer users
have found, there is little or no remedy available after the fact. We strongly recommend that ransomware protection be turned
on at all times. It is on by default. Please note that this option is disabled if you are using the Free version.

Scan Options

Scan for rootkits utilizes a specific set of rules and tests to determine if a rootkit is present on your computer. For readers who are
unfamiliar with this term, an explanation may be handy. A rootkit is malicious software that can be placed on a computer which
has the ability to modify operating system files in a manner that hides its presence. Malware detection methods that rely on hooks
to the operating system for detection and analysis would prove ineffective if the hooks had been purposely manipulated by
malware. Our testing method is more intensive and more effective, but including rootkit scans as part of your overall scan strategy
increases the time required to perform a scan.




Malwarebytes for Windows User Guide 31 When Scan within archives is enabled, Malwarebytes will scan two levels deep within archive (ZIP, RAR, 7Z, CAB and MSI) files. If
this option is disabled, the archive is excluded from scanning. Please note that encrypted archives cannot be fully tested.






















We have introduced a new signature-less detection technology which takes advantage of machine learning to supplement existing
detection methods.

Potential Threats

In addition to malicious software detection and elimination, Malwarebytes also detects and acts upon two classes of non-malware.
These are Potentially Unwanted Programs (PUP's) and Potentially Unwanted Modifications (PUM's). In many cases, PUP's appear
in the form of toolbars and other application software which are installed on your computer as part of a bundle. You may have
asked for one application, and it came with a second application that was not mentioned, or was mentioned, but you did not
uncheck the checkbox next to it to prevent it from being installed at the same time. You may also want and use the PUP. We do
not judge the merit of the program or its usability. We do offer a method of removing it if you choose to.

PUM's are a bit different. These are modifications that are typically related to the Windows registry. As a user, you will generally
not be making changes to the registry that would qualify as a PUM, though the possibility does exist. Because it does, we allow
you to define your own rules when it comes to how they are treated.

With regard to both types of modifications, we provide three handling methods. These are:

• Ignore detections: Malwarebytes will not act on dettection, nor will you be alerted.
• Warn user: You will bbe alerted to the detection. You may choose to ignore it, create an exclusion, or treat it as malware.
• Always detect PUPs/PUUMs (recommended): The detection will be treated as malware, and corrective actions will occur.

While PUP's and PUM's are both handled in the same manner, each is handled according to separate guidelines which you specify.

Updates

Users of Malwarebytes Premium and Malwarebytes Premium Trial have the ability to automatically check for protection updates,
and to specify when those checks will be performed. The date range is adjustable between fifteen (15) minutes and fourteen (14)
days, the increment depending on the range (minutes/hours/days). We recommend that you do not allow the rules database to
become dated, as much damage can be caused by zero-day infections – those threats thatt are too new to be adequately protected



Malwarebytes for Windows User Guide 32 against by anti-virus software. The default for this feature is on. You may also have Malwarebytes display a notification in the
corner of your screen if protection updates are more than 24 hours old.

Startup Options

These settings define how Malwarebytes behaves when your computer starts. You may launch several applications at startup, and
they may initiate processes which require Malwarebytes launch timing to be adjusted. Let's look at each setting in detail.

• Start Malwarebytes at Windowws startup: If this setting is unchecked, Malwarebytes will not start with Windows. No real-
time protection layers will start when Windows starts, though they may still be started manually by launching
Malwarebytes.
• Delay Real-Time Protection when Malwarebytes starts: p; There may be times when the startup of system services used by
Malwarebytes conflicts with services required by other applications at boot time. When this is the case, turn this setting
on. You may also adjust the delay timing. You will need to experiment with the specific delay setting necessary to
compensate for any conflicts that are noted. When required, this must be done on a case-by-case basis. The delay setting
is adjustable from 15-180 seconds, in increments of 15 seconds.
• Enable self-protectiion module: This setting controls whether Malwarebytes creates a safe zone to prevent malicious
manipulation of the program and its components. Checking this box introduces a one-time delay as the self-protection
module is enabled. While not a negative, the delay may be considered undesirable by some users. When unchecked,
the "early start" option which follows is disabled.
• EEnable self-protection module early start: When self-protection is enabled, you may choose to enable or disable this
option. When enabled, the self-protection module will become enabled earlier in the computer's boot process –
essentially changing the order of services and drivers associated with your computer's startup.

Automatic Quarantine

Users of Malwarebytes Premium and Malwarebytes Premium Trial may specify whether malware will be automatically quarantined
when it is detected. The default setting is on. If the users decline to automatically quarantine malware, a notification will display
in the lower right corner of the screen for each detection, and the user must specify whether the file is to be ignored once, ignored
always (added to Exclusions) or quarantined.

Scan Schedule

You may also adjust Scan Schedules here as part of program settings. This aspect of program settings has already been covered
on pages 11-19.




















Malwarebytes for Windows User Guide 33 Exclusions

This tab allows additions to, or deletions from a list of items to be excluded from scans. The list may include files, folders, websites,
applications which connect to the Internet, or previously detected exploits. A screenshot is shown below.






















Add Exclusion

Exclusions are exempt from scanning and from real-time protection. This may include files, folders, web sites, applications and
safe programs which have been identified as exploits. Clicking Add Exclusion launches the Add Exclusion Wizard, as shown below.





















Malwarebytes for Windows User Guide 34 You may then add items – one at a time – to the list of exclusions. Each item type is defined by criteria as follows:

• File or folderr: Its location on the file system, and whether it should be excluded from malware and ransomware, only
malware or only ransomware. While you may have your own reasons for excluding files or folders from scans, the primary
reason for doing so is to prevent potential conflicts with anti-virus software. Malwarebytes works well alongside most
anti-virus software, but anti-virus updates by some vendors may occasionally be flagged as a threat. For this reason, we
offer the provision for you to exclude certain disk content from scanning. This is commonly offered by anti-virus vendors
as well.

NOTES:
â—&#65533; Clicking Select Folder… selects only folders,, which by default will also exclude any files within those folders,
as well as subfolders.
â—&#65533; Clicking Select Files… selects individual files for exclusion. The stattus of the folder is unchanged.

• Website: Enter thee Domain or IP Address to specify the web address. When adding a domain manually, please add it
both with and without the "www." prefix. Depending on several external factors, the domain may still be blocked if only
one variation is entered. Also, domain exclusions are only functional on Windows Vista Service Pack 2, Windows 7,
Windows 8.x and Windows 10. Please note: Exclusions can also be added by clicking the link in the notification message
when the website is blocked by Malwarebytes Website Protection.
• Application that connects to the Internet: Specify the name of the application. This is most applicable if the detection is
a false positive (legitimate application with some similar characteristics to malware).
• Previously Detecteed Exploit: Specify the MD5 hash of the exploit. This is most applicable if the detection is a false positive
(legitimate application with some similar characteristics to malware). The hash guarantees uniqueness of the file in
question.


My Account

Here, you can click the Go to My Account button to obtain status of all of your subscriptions, and change preferences related to
your account. You can also deactivate your license – useful when moving your Malwarebytes program to aa new computer – or
change license key. A screenshot is shhown below.

























Malwarebytes for Windows User Guide 35 All of the information shown here is self-explanatory. A set of option buttons are available at the bottom of the screen. The options
vary depend on the mode of the program. Buttons for the three program modes are shown below.


Premium Mode
options


Premium Trial Mode
Options


Free mode
Options


Free mode
Options (*)


When Malwarebytes was installed, Premium Trial mode was set automatically (if you were eligible for a trial). There may be
circumstances where you have the option of re-entering Premium Trial mode. This would result in the second Free mode display.
If you click the button Change License Key (Premium mode) or I Already Have a License (Premium Trial or Free mode), you will see
the following screen superimposed over the Malwarebytes interface.

Follow screen instructions to enter your license
information. If you do not have a license, either
press Cancel (to close this window and return to
the screen you came from), or Purchase a License
to go to the Malwarebytes website and purchase
a license for the product.









About

This tab tells you more about Malwarebytes, and what resources are available to you should you need technical assistance. The
upper panel contains Version Information. We have split up the program into software components. If you have configured the
program to provide program updates, it is easier and faster for us to provide the newest version to you by updating the
components that have changed, rather than updating the entire program. It also benefits you if you need technical support,
because the versions of each component may influence the direction that our Customer Success engineers take when
troubleshooting an issue.

The Resources section provides contact addresses (URLs) which may assist you for sales, support, and educational purposes. In
addition, you can view the third-party notices (open source software which we use in our products) as well as a link to our End User
Licensing Agreement (EULA).









Malwarebytes for Windows User Guide 36 Appendix A: Notification Window Examples

Malwarebytes provides a number of user notifications during operation. These notifications are always positioned in the lower
right corner of your screen. The length of time that they will remain on your screen is configurable in Application Settings (page
24).


Scan Notifications



An automatic scan has been completed. Malware was
detected during execution of the scan. Click Upgrade Now
to purchase Malwarebytes Premium. This notification will
only appear for Malwarebytes Free users.





A scan (scheduled or on-demand) has been completed.
Malware was detected during execution of the scan. Click
View Scan Results to review the scan log to determine the
exact nature of the threat(s).




A scan (scheduled or on-demand) has been completed.
Non-Malware was detected during execution of the scan.
This is typically a Potentially Unwanted Program (PUP) or
Potentially Unwanted Modification (PUM), which may be
acceptable to you. Click View Scan Results to review the

scan log to determine the exact nature of the threat(s).



A scan (scheduled or on demand) has been completed. No
problems were detected.




Real Time Protection Notifications



After the user has indicated that they wish to turn off
notifications regarding real-time protection components,
this notification will be displayed to request confirmation
of the user’s wishes.








Malwarebytes for Windows User Guide 37

One or more components of real-time protection are
disabled. You may re-enable protection by clicking Turn
On button, or by clicking Manage Protection Settings. This
is not available for Malwarebytes free users.




Malware has been detected as a function of real-time
protection. You have not chosen to exercise the auto-
quarantine capability when malware has been detected,
so no specific action has been taken. The program now
being detected as malware may be acceptable to you, so
you may choose to allow its execution once, always, or
elect to quarantine it at this time. This is not available for

Malwarebytes Free users.



Real-time protection has detected a Potentially Unwanted
Program (PUP). You have not chosen to ignore this type of
activity, or to exercise the auto-quarantine capability upon
detection, so no specific action has been taken. This
detection may be acceptable to you, so you may choose to
ignore it once, always, or elect to quarantine it at this time.
This is not available for Malwarebytes Free users.




Malware has been detected as a function of real-time
protection. You have chosen to exercise the auto-
quarantine capability when malware has been detected,
so the offending software has been moved to quarantine
and modified so that it may not cause any damage to your
computer.





A Potentially Unwanted Program (PUP) has been detected
as a function of real-time protection. You have chosen to
exercise the auto-quarantine capability when a PUP has
been detected, so the offending software has been moved
to quarantine and modified so that it may not cause any
damage to your computer.









Malwarebytes for Windows User Guide 38

An attempt has been made by software present on your
computer to contact a website suspected to be malicious,
and has been blocked. This detection occurred as a
function of real-time protection. You may allow access by
clicking Manage Exclusions, which will redirect you to the
Exclusions screens.

Please note: Unblocking a website out of convenience may
result in damage being caused to your computer.





Anti-exploit protection has prevented an attacker from
exploiting your computer through a vulnerability.







Anti-ransomware protection has prevented an attacker
from exploiting your computer with suspected
ransomware. The threat has been neutralized and moved
to Quarantine.






After threats have been quarantined, your computer must
be rebooted to complete the quarantine process, and this
notification is displayed. After assuring that other work is
saved, click Reboot Now to perform that task.




Update Notifications




A program update for Malwarebytes is available. Click
Install Now to get the latest program protection.








Malwarebytes for Windows User Guide 39

Your Malwarebytes updates are out of date. Click Update
Now to cause an immediate update. Failure to update will
cause subsequent scans to use outdated protection rules,
which could jeopardize the safety of your computer.












Premium Notifications


If you do not have auto-renewal set up on your
Malwarebytes account, you will begin to see this message
thirty (30) days before the expiration of your subscription,
counting down the number of days remaining on your
subscription. Click Renew Now button to renew your

subscription in a new browser window/tab.



If you do not have auto-renewal set up on your
Malwarebytes account, this notification is displayed on the
final day of your subscription. Click Renew Now button to
renew your subscription in a new browser window/tab.



If you do not have auto-renewal set up on your account
and have not responded to pending expiration, you will
see this notification a maximum of three times after your
subscription has expired. At this point, you have reverted
to the free version of Malwarebytes. Premium features
have been disabled. Click Upgrade Now to renew your
subscription in a new browser window/tab. A slightly
different version of this notification appears within the
Malwarebytes user interface.



This notification is displayed if your subscription cannot be
renewed. Usually the reason for this is an expired
credit/debit card. You will be given an opportunity to
update your card information, and your subscription will
remain in force for a brief period.






Malwarebytes for Windows User Guide 40

Your subscription has expired and could not be
automatically renewed. Your Malwarebytes service has
been downgraded from Premium to Free. You can still run
scans for protection, though real-time protection is no
longer in force.









Premium Trial Notifications



Beginning five days before your Premium trial expires, you
will receive a notification once per day about the expiring
trial, and be given an opportunity to upgrade to Premium
or to enter your Premium license information.





On the last day of your Premium trial, you will receive a
single notification, and be given an opportunity to
upgrade to Premium or to enter your Premium license
information.






After your Premium trial expires, you will receive this
notification in the Malwarebytes user interface as well as in
the Windows system tray.
















Malwarebytes for Windows User Guide 41
Take care. Mike. Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement. In the end you have to ignore everything, & click I agree.
----- Original Message -----
From: Sherri
To: jaws-users-list@groups. io
Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws

Is there any way to use Malware Bytes with any version of Jaws. The only thing I can seem to do is perform a scan. I see the menus if I use the Jaws cursor, but I cannot get to them. I am using Jaws the latest version. Thank you.

Sherri Brun
flmom2006@...
President NFB of Central Florida
NFBF Newsline Marketer
Phone: 1-844-827-7371

The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations
of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back.
Together with love, hope, and determination, we transform dreams into reality.


Larry Gassman
 

The user guide may be a bit outdated but Malwarebytes seems to be very accessible with JAWS especially the latest versions.
Rarely, have I seen user guides written with the visually impaired person in mind.
in this case, I would doubt it.
Larry Gassman

At 03:35 PM 10/25/2018, JM Casey wrote:
I don’t think it mentions blind people specifically, but it should still be useful for us.
I probably perused it (or something like it) when I first got the programme.

Of course one does have to get used to terminology like “click onâ€&#65533;, etc, in the computer world, and apply knowledge as it pertains to screen-readers and keyboards accordingly.


From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Victor Gouveia
Sent: October 25, 2018 5:48 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

Does this user guide take into account blind people, or is it just written with the general user in mind?

Not for nothing, but a great many of these user guides have images instead of actual written explanations, and they usually state to click on something, even though the Jaws’ various cursors can’t get to it.

Victor

From: Mike B.
Sent: Thursday, October 25, 2018 3:26 PM
To: <mailto:jaws-users-list@groups.io>jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

Hi Again Sherri,

Below is the user guide from Malwarebytes. It's for a slightly older version but, it works the same way as the latest version.

Malwarebytes for Windows User Guide

Version 3.4.5

29 March 2018











Notices

Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by
law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or
display any part, in any form, or by any means. You may copy and use this document for your internal reference purposes only.

This document is provided “as-is.â€&#65533; The information contained in this document is subject to change without notice and is not
warranted to be error-free. If you find any errors, we would appreciate your comments; please report them to us in writing.

The Malwarebytes logo is a trademark of Malwarebytes. Windows is a registered trademark of Microsoft Corporation. All other
trademarks or registered trademarks listed belong to their respective owners.

Copyright © 2018 Malwarebytes. All rights reserved.


Third Party Project Usage

Malwarebytes software is made possible thanks in part to many open source and third party projects. A requirement of many of
these projects is that credit is given where credit is due. Information about each third party/open source project used in
Malwarebytes software – as well as licenses for each – are available oe on the following page.

<https://www.malwarebytes.com/support/thirdpartynotices/>https://www.malwarebytes.com/support/thirdpartynotices/


Sample Code in Documentation

The sample code described herein is provided on an “as isâ€&#65533; basis, without warranty of any kind, to the fullest extent permitted by
law. Malwarebytes does not warrant or guarantee the individual success developers may have in implementing the sample code
on their development platforms. You are solely responsible for testing and maintaining all scripts.

Malwarebytes does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or
completeness of any data or information relating to the sample code. Malwarebytes disclaims all warranties, express or implied,
and in particular, disclaims all warranties of merchantability, fitness for a particular purpose, and warranties related to the code, or
any service or software related there to.


















CWC04-3045a Table of Contents


Introduction ............................................................................................................................ 1

What’s New in Malwarebytes for Windows ................................................................. 2

System Requirements ......................................................................................................... 3

Installation .............................................................................................................................. 4

Free, Premium Trial or Premium? ........................................................................................................ 4

Activation .................................................................................................................................................... 5

A Final Word about Administrative Rights ....................................................................................... 6

Screen Layout ....................................................................................................................... 7

Menu Bar ..................................................................................................................................................... 7
My Account ........................................................................................................................................................................ 7
Notification Center .................................................................................................................................. 7

Menu Pane ................................................................................................................................................. 8

Status/Option Pane ................................................................................................................................. 8

Detail Pane ................................................................................................................................................. 9

Dashboard ............................................................................................................................ 10

Status Pane ............................................................................................................................................... 10

Real-Time Protection.............................................................................................................................. 11
Settings .............................................................................................................................................................................. 11

Scan Status ................................................................................................................................................ 11
View Scan Reports .......................................................................................................................................................... 11
Schedule a Scan............................................................................................................................................................... 11
Check for Updates .......................................................................................................................................................... 11
Help ..................................................................................................................................................................................... 11

Protection History ................................................................................................................................... 11

Scan ........................................................................................................................................ 12

Threat Scan ............................................................................................................................................... 12

Custom Scan ............................................................................................................................................ 13
Custom Scanning Options............................................................................................................................................ 13
Potentially Unwanted Programs/Modifications ..................................................................................................... 13
Folders to be Scanned ................................................................................................................................................... 13

Hyper Scan ............................................................................................................................................... 14

Scan Schedules ....................................................................................................................................... 14
Basic Mode ........................................................................................................................................................................ 15
Advanced Mode .............................................................................................................................................................. 15
Advanced Scan Options ................................................................................................................................................ 16

Watching Scan Progress ...................................................................................................................... 16

Scan Results ............................................................................................................................................. 17

Scan Summary ......................................................................................................................................... 18

Quarantine ............................................................................................................................ 21 Reports .................................................................................................................................. 22

Viewing or Deleting Logs .................................................................................................................... 24

Settings ................................................................................................................................. 25

Application Settings .............................................................................................................................. 25
Application Updates ...................................................................................................................................................... 26
Notifications ..................................................................................................................................................................... 26
Impact of Scans on System ......................................................................................................................................... 26
Windows Context Menus ............................................................................................................................................. 26
Display Language ........................................................................................................................................................... 26
Event Log Data................................................................................................................................................................ 26
Proxy Server ..................................................................................................................................................................... 26
User Access ...................................................................................................................................................................... 27
Windows Action Center ............................................................................................................................................... 28
Beta Application Updates ............................................................................................................................................ 28
Usage and Threat Statistics ......................................................................................................................................... 28

Protection ................................................................................................................................................ 29
Real-Time Protection .................................................................................................................................................... 29
Scan Options .................................................................................................................................................................... 31
Potential Threats ............................................................................................................................................................ 32
Updates ............................................................................................................................................................................. 32
Startup Options .............................................................................................................................................................. 33
Automatic Quarantine .................................................................................................................................................. 33

Scan Schedule ........................................................................................................................................ 33

Exclusions ................................................................................................................................................. 34
Add Exclusion .................................................................................................................................................................. 34

My Account ............................................................................................................................................. 35

About ........................................................................................................................................................ 36

Appendix A: Notification Window Examples ............................................................. 37

Introduction

Malwarebytes for Windows (“Malwarebytesâ€&#65533;) is an "AV replacement." It is not an AV. It does not incorporate the same old engine
for file-infectors and other malware that you find in a typical AV or Internet security suite, the large and inefficient library of
signatures, or the bloatware features which are becoming more prevalent.

You don't need to pay for a traditional AV anymore! At Malwarebytes, we have always approached things differently and, as many
people know based on their own positive experience with Malwarebytes finding and remediating malware that gets past AVs, we
know a thing or two about zero-day malware and their infection tactics. We have always believed that no one product can do it
all, and the free AV that comes with modern operating systems, in conjunction with Malwarebytes is all you will ever need.

In today's modern threat world, bad guys have learned how to evade AV protection, making it more important than ever before
to be able to disrupt attacks in as many different stages of the attack chain as possible. Malwarebytes, layered with the AV (which
is the default mode) or as your stand-alone defense, is the most effective approach against modern threats. And if all else fails,
you need the best remediation technology available.

Malwarebytes has been engineered to provide the most effective layered approach of prevention, detection and remediation
technologies:

1. Application hardening, to make them more resilient against attacks.
2. Anti-exploit technology, to shield applications from vulnerability exploits (currently one of the top infection vectors).
3. Application Behavior Enforcement, an advanced and signature-less technology which prevents common infection
vectors (e.g. web & email based social engineering).
4. Anti-ransomware, a signature-less technology designed to behaviorally detect ransomware.
5. Revamped Anti-Malware and Web Blocking engines, offering more aggressive detection techniques.
6. Hardened and modular architecture design, allowing seamless integration of new detection and protection technologies
in the future.
7. Highly effective as always in malware remediation, an often overlooked part of the protection stack.
8. Ability to run as primary protection (no AV) or secondary protection (alongside existing AV).
9. Engineered to be our next corporate endpoint client, providing major improvements to our endpoint management
capabilities and new enterprise-focused offerings
10. Last but not least, our Research Team has been growing and adapting lately, with notable additions to the lineup from
JRT and AdwCleaner, our new aggressive stance against PUPs, as well as new R&D technologies which we will be
unveiling shortly.

Welcome to the Malwarebytes User Guide!





















Malwarebytes for Windows User Guide 1 What’s New in Malwarebytes for Windows

This version of Malwarebytes contains many improvements and bug fixes. Following is a list of changes.

Performance/protective capability

• Improveed remediation for hijacked shortcuts
• Continued improveements to overall protection, detection and remediation

Usability

• Device Name now syncs to the Malwarebytes My Accouunt portal for users on the paid version
• Improved accesssibility features for the Notification Center
• Added cuustom messages designed to highlight the value of Malwarebytes protection and help it remain free

Stability/issues fixed

• Fixed problem when cutting / pasting files with anti-ransomware enabled
• Fixed problem where USB stick would not eject prooperly with anti-ransomware enabled
• Fixed a service craash related to self-protection
• Fixed a blue screen crassh related to Web Protection
• Addressed other miscellaneeous defects































Malwarebytes for Windows User Guide 2 System Requirements

Following are minimum requirements for a computer system on which Malwarebytes may be installed. Please note that these
requirements do not include any other functionality that the computer is responsible for.

• Opeerating System: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista (Service Pack 1 or later), Windows
XP (Service Pack 3 or later, 32-bit only)

PLEASE NOTE: Anti-ransomware protection is not supported for Windows XP or Windows Vista, due to architectural
constraints.

• CPU: 800 MHz or faster, with SSE2 technollogy. This includes most modern Intel x86 processors as well as AMD’s Athlon
64, Sempron 64, Turion 64 and Phenom CPU families. Please refer to the following page for further information:

<https://en.wikipedia.org/wiki/SSE2>https://en.wikipedia.org/wiki/SSE2

• RAM: 22048 MB (64-bit OS), 1024 MB (32-bit OS, except 256 MB for Windows XP)

• Free Disk Space: 250 MB

• Recommended Screen Resolution: 1024x768 or higher

• Active Internet Connection


WARNING: If you are upgrading from Malwarebytes Anti-Malware version 2.x and have enabled Malwarebytes’ self-protection
feature, please disable it prior to initiating the upgrade. It prevents the Malwarebytes installation program from doing its job.






























Malwarebytes for Windows User Guide 3 Installation

To begin the installation, double-click on the Malwarebytes installation file which you downloaded. If you are installing
Malwarebytes on a Windows version newer than Windows XP, a Windows dialog box will be presented in the middle of your screen,
labeled User Account Control. Verify that the publisher is listed as Malwarebytes Corporation and click Yes. This Windows security
feature assures limited application capabilities unless and until you authorize higher capabilities. Installation will begin once this
has been approved. The installation program guides you and allows you to provide alternate information if you do not wish to
accept defaults. Each screen also allows you to terminate installation if you do not wish to continue.


Free, Premium Trial or Premium?

Before you begin, we want to let you know that throughout this guide, you will see references to the Free, Premium Trial, and
Premium versions of Malwarebytes. This is likely unfamiliar territory for new Malwarebytes users. The following link provides a
basic rundown on the differences between the Free and Premium versions of Malwarebytes.

<https://www.malwarebytes.com/trial/#comparison-chart>https://www.malwarebytes.com/trial/#comparison-chart

These differences are also shown in the Malwarebytes interface immediately after it has been installed. See below….





















The Premium Trial is a 14-day opportunity to use the Premium version of the program, and to see if it is better suited to your needs.
The Premium Trial is available at no cost, but you can only use it one time for each version of Malwarebytes. The Premium Trial is
automatically started during installation. Once installed, the program provides options to convert from Free to Premium, and from
Premium Trial to Premium.

If you elect to use the Premium Trial and do not wish to purchase a Premium subscription at the end of the trial, your Malwarebytes
program will revert to Free mode. The only differences will be that the added features enabled by the trial will cease to function.
All other functionality remains unchanged.

If you are a new Malwarebytes user, or are a free/Premium Trial user upgrading to this version, you will be alerted that a scan has
not been run. Click Scan Now and Malwarebytes will run a scan for you. After the scan (and cleanup, if needed) has been
completed, you will see the user interface as shown below.




Malwarebytes for Windows User Guide 4

Please take note of the Why Premium button in the lower left corner. Click that button for a brief slide show that describes the
differences between Free and Premium modes. While Malwarebytes does an effective job of disinfecting your computer after an
attack, there is no replacement for preventing the attack from ever happening.

If you have already purchased a license, you may wish to activate your copy of Malwarebytes at this time. You can do that now (or
at any time) by clicking the Activate License button at the top right portion of the Malwarebytes user interface.


Activation

Malwarebytes is available for users of any modern Windows client to download and install at no cost. You can also purchase an
annual subscription, which entitles you to take advantage of real-time protection, scan/update scheduling and access policies. If
no license has been installed into the product, the blue title bar at the top of the screen will show two buttons, Activate License
and Upgrade Now. When clicked, Upgrade Now launches a browser window which opens to the Malwarebytes web site
pricing/purchase page. Your license information will be in an email sent to you by Malwarebytes at the time of purchase. Locate
your license information and click the Activate License button. You will then see the following screen.

















Malwarebytes for Windows User Guide 5 Please note the checkbox and the words “My license came with a License ID.â€&#65533; If you are using our “old styleâ€&#65533; license, you will also
need to check that box and enter your License ID along with your Key.

Please note: You must be online with an active Internet connection in order to successfully activate your Premium license.

The construction of the Key is different, so make sure that you choose the right screen for entering your license information based
on whether you have an ID and Key, or just a Key. After entering your license information, click the Activate License button. Your
Malwarebytes screen will refresh, as shown below.






















Please note that the two license-related links in the Menu Bar have been replaced by a link called My Account. Also note that the
banner has changed from Malwarebytes Premium Trial to Malwarebytes Premium.


A Final Word about Administrative Rights

If you installed Malwarebytes from a downloaded installation file, you automatically started a Premium Trial, and were offered the
capability to activate the Premium features if you had purchased an annual subscription. You may have decided to wait until later.
If that is the case, please remember that you should be logged in to Windows as an Administrator before doing either of those
tasks.

We will go into much more detail about the features of Malwarebytes, but before doing that, we should introduce you to the
Malwarebytes user interface.













Malwarebytes for Windows User Guide 6 Screen Layout

The Malwarebytes program interface is designed around a screen layout which is simplified and uncluttered. We want to make it
easy for you to configure the program to serve your needs, and we hope this layout helps to do that. The screenshot below shows
the Dashboard – tthe screen you see when Malwarebytes is launched for the first time.






















Let's talk about the primary elements which make up our user interface.


Menu Bar

The Menu Bar is displayed at the top of the screen at all times. There are two buttons in the Menu Bar. A description for both
follows.

My Account

This button will take you to the setting options to manage your Malwarebytes subscription(s) and license(s). For more information,
please refer to pages 35-36 of this guide.

Notification Center

The Notification Center provides a convenient location to view recent notifications generated by Malwarebytes. Clicking the icon
will show the 5 most recent notifications. You may scroll down to view up to 25 notifications by using your mouse wheel. You can
view additional details for each notification by clicking it – Malwarebytes will bring you to the relevant screen.









Malwarebytes for Windows User Guide 7


Menu Pane

The Menu Pane contains the main program options, which will be discussed in detail in this guide. They consist of:

• Dashboard: What yoou see here. While the exact details change over time, the look is consistent.
• Scan: Select the type of scan you wish to run, run it, and view the results.
• Quarantine: Delete or restorre threats which have been detected by program scans.
• RReports: View reports related to program operation, threats which have been detected, and threats which have been
removed.
• Settings: Configure every aspect of Malwarebytees, so that it can protect you efficiently.

In addition, there are settings for Account information. While in Premium Trial mode, options are present to buy a Premium
subscription and to Activate the program. Once you have purchased a subscription, those two options will revert to a single option
which handles details of your account. More on those later.


Status/Option Pane

When the Dashboard is selected from the Menu Pane, the center of the screen is filled with the Status Pane. It is designed to give
you quick information that tells you whether there is anything for you to be concerned about. When the Dashboard is selected,
the Detail Pane is also displayed. More on that momentarily.

When any menu option other than the Dashboard is selected, all space except the space used by the Menu Pane is allocated to the
selected menu option. This provides sufficient room for information pertaining to any menu option to be cleanly displayed.






Malwarebytes for Windows User Guide 8 Detail Pane

The Detail Pane is shown only when the Dashboard is selected. It shows information on protection options, protection updates,
and detail pertaining to the most recent scan. This information is shown on other screen displays as part of the menu option
selected by the user, but are all displayed here for quick recognition.











































Malwarebytes for Windows User Guide 9 Dashboard

Each time Malwarebytes is launched, the first page visible to the user is the Dashboard. It provides program status, and acts as a
launch pad for all program operations. A screenshot of the user interface – featuring the Dashboard – is is shown below for reference.























Status Pane

The main area of the screen is the Status Pane, providing current system status. Within the Main Window, the first item displayed
is the Status Banner. This banner displays a status message along with an icon, whose color is based on program status. The color
is meant to alert the user to conditions which may require intervention. Colors used are similar to traffic stop signals – green simply
indicates a goodd status; orange indicates a warning of a condition which may become more severe over time; red indicates that
your immediate attention is needed. Following is a full list of status messages. If a recommended method of correcting the
problem is immediately available, it will appear as a functional button on the banner itself.

• Coolor: green (no problem)
o Awesome! You’re protected. (Premium mode and Premium Trial modes which will expire more than 7 days in
the future)
o You’re running Malwarebytes Free. (free mode only)
• Color: orange (non-critical problem)
o You’re not fully protected.
o Your Protection Updates are not current.
o Your program version is out of date
o Your Premium Trial ends in <x> days. (trial expiring in 3-7 days)
o Renew to avoid losing protection against malware, bad websites, and other threats
• Color: reed (critical problem)
o Your Premium Trial ends in <x> days. (trial expiring in 0-3 days)
o Your trial has expired
o Renew to avoid losing protection against malware, bad websites, and other threats
o We were unable to renew your subscription (renewal failed, and you are now in 30-day grace period)




Malwarebytes for Windows User Guide 10 Real-Time Protection

This item shows the status for each of the four Real-Time Protection features. Please note that real-time protection is enabled only
for Malwarebytes Premium and Malwarebytes Premium Trial users. This feature is not available if you are using the Free version.

Settings

Settings are accessed from the Main Menu, and also by clicking the small gear at the top right of the Real-Time Protection panel.
When clicked, the Settings screen will be displayed, allowing access to all program settings. Please refer to the Settings portion of
this guide (pages 24-35) for complete information on this topic.


Scan Status

This panel shows your scanning activity at a glance. You can easily see when the last scan was completed, when the next scan is
scheduled, and the status of your protection updates. There are four icons on the title bar for this panel, as shown here.




A description for each icon – in the order shown – is as folfollows.

View Scan Reports

This icon takes you to Reports, where you can view detailed reports on scans which Malwarebytes has performed on your computer.
Please note that information shown here is limited to the last scan that was executed. See the Reports Pane (pages 21-23) for
information on reports as a whole.

Schedule a Scan

The second icon allows scans to be scheduled for automatic execution. This option is available only for Malwarebytes Premium and
Malwarebytes Premium Trial users. The icon remains visible in Free mode, but clicking it has no effect. When clicked, the Settings
screen will be displayed, allowing access to the Scan Schedule screen. Please refer to the Scan Schedule portion of this guide (pages
13-15) for full information on this topic.

Check for Updates

The third icon causes Malwarebytes to connect with Malwarebytes servers to check for protection updates more current than those
in use, and download them if they exist. This option is functional for all program modes.

Help

The fourth icon links to the Malwarebytes User Guide on the Malwarebytes website. This behavior is consistent throughout the
program.


Protection History

This panel shows three key statistics. It shows how many items were scanned, how many threats were detected during scans, and
how many threats were detected by real-time protection. Please note that the number of items scanned includes individual files
that are part of archive files, as well as components in dynamic link library (DLL) files. Also note that real-time detections can only
occur in Premium and Premium Trial modes.






Malwarebytes for Windows User Guide 11 Scan

The Scan Pane is the introduction to scan-related options in the program. When you click Scan in the Menu Pane, you will see the
screen shown below.






















On this screen, you may select the Scan Method and the Scan Schedule. Let’s look first at Scan Methods. There are three scan types
which can be executed – Threat Scan, Custom Scan, and Hyper Scan. Hyper Scan is only available to users of the Premium or
Premium Trial modes. Please note that global scan settings used by Threat Scans and Hyper Scans are selected in Settings (see
pages 30-31). Following are more detailed descriptions of each of the scan modes.


Threat Scan

This method of scanning detects a large majority of threats that your computer may be faced with. Areas and methods tested
include:

• Memory Objects: Memory which has been allocated by operaating system processes, drivers, and other applications.
• Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
• Registry Objects: Configguration changes which may have been made to the Windows registry.
• File System Objects: Files stored on your computer's local diskk drives which may contain malicious programs or code
snippets.
• Heuristic Analysis: Analysis meethods which we employ in the previously-mentioned objects – as welll as in other areas –
which are iinstrumental in detection of and protection against threats, as well as the ability to assure that the threats
cannot reassemble themselves.

The Threat Scan is the scan method which we recommend for daily scans. While it will not scan every file on your computer, it will
scan the locations which most commonly are the launch point for a malware attack.






Malwarebytes for Windows User Guide 12 Custom Scan

You may also choose to run a custom scan. A custom scan allows you to scan according to specifications which you define at the
time of the scan. These settings will override scan settings defined elsewhere. A screenshot of the custom scan configuration
screen is shown below.






















Custom Scanning Options

These settings provide capability to determine the functional areas that will be scanned. They are as follows:

• Memory Objects: Memory whichh has been allocated by operating system processes, drivers, and other applications. It is
important to note that threats detected during scans are still considered threats if they have an active component in
memory. As an extra measure of safety, memory objects should be scanned.
• Startup and Registry Objects: Executable files and/or modificatiions which are initiated at computer startup, as well as
registry-based configuration changes that can alter startup behavior.
• Archives: If this setting is checked, archiive files (ZIP, 7Z, RAR, CAB and MSI) will be scanned up to two levels deep.
Encrypted (password-protected) archives cannot be tested. If left unchecked, archive files will be ignored.
• Rootkits: These are files stored on your ccomputer's local disk drives which are invisible to the operating system. These
files may also influence system behavior.

Potentially Unwanted Programs/Modifications

These settings allow the user to choose how Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications
(PUMs) will be treated if they are detected.

Folders to be Scanned

This setting allows the user to include or exclude directories, subdirectories, and individual files from scans. It utilizes a Windows
Explorer-like presentation model. In the screenshot shown above, every directory except Desktop is selected for a custom scan.
You may scan parent directories separately from child directories based on individual selections.



Malwarebytes for Windows User Guide 13 Hyper Scan

This scanning option is only available to users of Malwarebytes Premium and Malwarebytes Premium Trial versions. This method of
scanning is limited to detection of immediate threats. Areas and methods tested include:

• Memory Objects: Memory which has bbeen allocated by operating system processes, drivers, and other applications.
• Startup Objects: Executable files and/or modificatiions which will be initiated at computer startup.

While a Hyper Scan will clean any threats which have been detected, we strongly recommend that a Threat Scan be performed if
a Hyper Scan has detected threats.


Scan Schedule

This tab allows users of the Premium and Premium Trial versions to add, edit and remove scheduled scans to be executed by
Malwarebytes. This feature is not available to users of the Free version. A screenshot of this tab is shown below.






















One scheduled scan is defined when Malwarebytes is installed. Premium and Premium Trial users are free to modify or delete scans
at will, while Free users are provided with a single monthly scheduled scan. Please note that if the initial task is deleted without a
replacement task being defined, your Malwarebytes program will not deliver the positive results that you expect. The same
methods are used here to add a new task as well as to edit an existing task, so let's Add a new task in Basic mode.












Malwarebytes for Windows User Guide 14 Basic Mode

A screenshot of the basic Add Schedule screen is shown here.

You can choose the
specific task to be
added on the left side of
the screen, in the
Scheduled Task area.
You may choose from
the following tasks:

• Threat Scan
• Custom Scan
• Hyper Scan





Scan types have been previously discussed in the Scan section of this guide (pages 11-19). Please refer to those pages for further
information if desired. The Frequency and Settings section allows you to define the timeframe (Schedule Frequency) that a task
will be executed, and how often (Recurrence). For scans, this translates to:

• Frequency = Hourly, recurrence in range of 1-48 hours
• Frequency = Daily, recurrence in rangee of 1-60 days
• Frequency = Weekly, recurrence in rangge of 1-8 weeks
• Frequency = Monthly, fixed setting • Frequency = Once, fixed
• Frequencyncy = On Reboot, fixed

Advanced Mode

At the bottom left corner of the Add Schedule window is the Advanced button. Click that to expand the Add Schedule window to
expose several more options. A screenshot is shown below.


















In Advanced Mode, we add options which tailor the scan more to your liking. Let's look a little deeper, beginning with the
advanced options for scans.


Malwarebytes for Windows User Guide 15 Advanced Scan Options

Scheduled Task defines what task (scan/update) is to be added/edited, and when that task should begin – specifyiing both the date
and time. Schedule Options provides several added capabilities to the basic settings which have already been described. Here's a
rundown on the advanced options.

• Quarantine all threats automatically: This option determines if a newly-detected threat would be automatically
quarantined, or if you would be notified so that you could choose a course of action. While automatic quarantine may
seem to be the best course of action, it could have negative implications if a false positive was encountered. A false
positive is the categorization of a legitimate file as a malicious file. It does rarely occur, and when it does, Malwarebytes
Customer Success will assist you in having the offending file evaluated more fully by our Research group.
• Restart computer when required for threat removal: This is availlable only if threats are automatically quarantined, and is
not selected by default. Some threats may require a computer restart to completely eliminate the threat, but we feel it’s
best to notify you at the time, so you may save your work before restarting your computer. If this were checked, you
could lose work unless you were monitoring the scan in progress.
• Scan for rootkits: This optiion allows specialized testing for the presence of rootkits. Due to its nature, it increases the
required time for a scan to execute. This option is not available for Hyper Scans.
• Scan within archives: This is selected by default. It allows scanning to go two levels deep within archive files. If not
selected, the archive will be ignored. It will also be ignored if it is encrypted. This option is not available for Hyper Scans.

Frequency and Settings was discussed in the previous section (Advanced Mode). Please refer to that section for more detail.

Recovery Options allow you to recover from a missed task (e.g. your computer was off at the time a scan was to take place). A
scheduled task – if missed – will run at itsits next opportunity as long as it is within the duration specified by the Recover if missed by
selector and the Recover missed tasks checkbox is checked.


Watching Scan Progress

Each scan method requires a different amount of time to complete. Unless significant changes have occurred on your local disk, a
Hyper Scan or Threat Scan should each be rather consistent from scan to scan. A custom scan time interval may vary widely each
time, based on the areas scanned, the number of files involved, and the size and complexity of the files. The screenshot below is
an example of a scan in process.























Malwarebytes for Windows User Guide 16 The progress bar shows milestones for each phase of the scan, with each milestone represented by a green or gray symbol. In this
screenshot, some milestones are shown with green checkmarks, indicating that phase of the scan has been completed. Scan
Memory is represented by an animation which indicates that this phase of the scan is currently being performed. The remainder
of the tasks are shown as grey hourglasses, and are yet to be started.

You may also pause a scan while it is in process by clicking the Pause button. The scan phase in progress will change to indicate
that the scan has been paused. Click Resume to continue the scan where it left off. You may also click Cancel at any time to
terminate the scan. Results of the scan will be reported as if the scan ran to completion.


Scan Results

After a scan has been executed, Scan Results are displayed as shown here. In this scan, three threats were detected.






















You may move threats to Quarantine by selecting the threat (using checkboxes to the left of the threat’s name) and clicking
Quarantine Selected. If any threats are not selected to be moved to Quarantine, you will be prompted to Ignore Once, Ignore
Always, or Cancel. Ignore Once will result in the threat once again being reported as a threat during the next scan execution.
Ignore Always causes the threat to be added to Exclusions. A threat which has been added to Exclusions will no longer be reported
as a threat unless there is reason to believe that it has been tampered with. You must provide a disposition for each threat
displayed on this screen.

Threats which have been moved into Quarantine cannot harm your computer. They are neutralized as part of the Quarantine
process. Please see Quarantine (page 20) for further information.











Malwarebytes for Windows User Guide 17 Scan Summary

The final screen to be displayed as part of a scan is the Scan Summary. It provides summary information about the scan, and allows
you to view scan detail on screen, or export scan summary or scan detail to a text file. A screenshot of the Scan Summary is shown
below. Free and Premium Trial users will see a reminder of the value of a Malwarebytes subscription on this page as well.






















Clicking the View Report button displays the Scan Report for the scan just completed. It is shown here as well.

















When threats are detected during a scan, the user must decide how these threats should be handled. The following series of
screenshots detail this flow. In the first screenshot, twenty threats have been detected. By default, all are selected for removal.
Please note that the total number of detected threats is shown above the list of threats, as is the number of threats selected for
removal.



Malwarebytes for Windows User Guide 18

In order to demonstrate the behavior of this screen, we will uncheck some of the threats. This indicates that only the checked
threats are to be removed. Clicking the Quarantine Selected button results in the screen shown below.






















Threats that were not selected still require remediation, based on input supplied by the user. In this case, the choices available are
Ignore Once, Ignore Always and Cancel. Clicking the Ignore Once button temporarily ignores a threat, although it will be shown
as a threat on subsequent scans. Selecting Ignore Always results in the threat being added to the Exclusion List. It would not be



Malwarebytes for Windows User Guide 19 scanned in the future. Clicking Cancel keeps you on this screen until you choose how to handle all detected threats. Once a
disposition has been selected for all detected threats, the screen below will be displayed.






















Although threats have been quarantined, you must restart the computer to assure the threat removal process is complete.
























Malwarebytes for Windows User Guide 20 Quarantine

When executing scans (on-demand or as part of real-time protection), some programs, files or registry keys may have been
categorized as threats. At that time, they were removed from the disk location where they were stored, placed in quarantine, and
modified so that they could not pose a threat to your computer. There may be items which fall into this category, but are not
malicious. It is up to individual users to research and make this determination. Upon entry to the Quarantine option, you are
presented with the screen shown here.






















Quarantined items are shown in a table format, with pertinent information presented to help you determine what action needs to
be taken. Each item listed has a checkbox in the leftmost column. Check the checkbox to restore or delete the item. Please note
that the Restore and Delete buttons are greyed out until items are selected. If you wish to apply the same action to all quarantined
items, select the checkbox in the table header and click Restore or Delete.

Please be aware that quarantined items which are not deleted or restored will continue to be visible here until action is taken.
















Malwarebytes for Windows User Guide 21 Reports

The Reports Pane displays a list of scans and real-time protection detections, in reverse chronological order. A Protection Event that
starts with the word Scan is a report summarizing the specified scan. All other reports listed on this screen are detail pertaining to
detections made by real-time protection. A screenshot is shown here.






















Selected reports may be viewed on screen, or exported to a text file for later viewing. Opening a report will display a summary of
the event. You can click the Advanced tab to view more information about the event. Details displayed for Protection Events will
be relevant to the type of event shown. Please note that only manual (on demand) scans are available for users of the free version
of Malwarebytes.



















Malwarebytes for Windows User Guide 22 The Scan Report may appear in two different forms. If one or more threats were detected during a scan, the report will appear as:





















Please note that the bottom portion of the report shows the threats detected during the scan. It is scrollable when required. The
top portion of the report contains a summary of the scan. You can click the Advanced button to view more details, as shown here:


























Malwarebytes for Windows User Guide 23 Viewing or Deleting Logs

You may view any log file by clicking the log to select it, then clicking the View Report button. As mentioned previously, there are
several output options for Protection Logs. To delete logs, click the checkbox corresponding to those logs you wish to delete, then
click the Delete button. Please bear in mind that computers which have significant threat activity will also have larger logs. You
should periodically check how much disk space is being used for logs, so that logs do not impact normal operation of your
computer.

Please note that an Export button is shown at the bottom left corner of this screen. This allows you to make a copy of the log for
use by other programs. You may export to your clipboard or to a text (TXT) file.








































Malwarebytes for Windows User Guide 24 Settings

The Settings screen allows the user to change all Malwarebytes operational settings. We have grouped settings by the
areas/functions which they control into tabs to maintain a clean user interface. When you select any tab, you will see the Detail
Pane change to reflect the tab which you selected. At the same time, the tab itself is highlighted.

Before we dig in to each of the tabs, a brief description of each is in order.

• Application Settings: Settings that affect Malwarebytes, as well as how it coexists with Windows.
• Protection Settings: Hoow Malwarebytes should protect you during scans and (for Premium/Trial mode users only) Real-
Time Protection.
• Scan Schedule: When Malwarebytes should execute scans and chheck for protection updates. This setting is functional
only for users of Premium/Trial mode.
• Exclusions: Items which will be excluded from testing which detects malware, as well as websites which are categorized
as malicious but specifically approved by the user.
• Myy Account: Information pertaining to the status of your subscription.
• About: Version numbers corresponding to Malwarebytes as a whhole, and for various components of the program which
may be updated individually. Malwarebytes company resources are also listed on this page.

When Settings is selected, the Application tab is always selected. If you navigate away from Settings – tto Dashboard, Scan,
Quarantine or Reports – you will always retuurn to the Application tab of Settings when you click on Settings.

Now, let's take a look at Application Settings!


Application Settings

This is the entry screen you will see when you click on Settings in the Menu Pane. It controls how Malwarebytes interacts with
many aspects of your computer’s operating system. A screenshot is shown below.






















The scroll bar at the right of this screen indicates there are many more options available on this screen than what appear here. We
will now cover each of them in order.



Malwarebytes for Windows User Guide 25 Application Updates

Malwarebytes may have updates available for individual program components, or for the full program. We provide two toggle
switches which allow you to choose whether either or both upgrade modes can be integrated into your copy of Malwarebytes
when they are available. Click Install Application Updates to check for available program updates or upgrades. You can choose if
you upgrade, and when. Upgrades only happen with your consent.

Notifications

Notifications regarding scans, real time protection, updates and subscriptions occur in windows at the lower right corner of your
screen, outside of the Malwarebytes interface. You may enable or disable these notifications. Most notifications are enabled by
default, while a few can be disabled. Please note that some non-critical information may not be visible if you disable notifications.
Disabled notifications do not leave the user at risk at any time. The following notifications may be disabled. Please refer to
Appendix A (Notification Window Examples) at the end of this guide for further information.

• Malicious Website Blocked
• Malware Detected (auto-quarantine)
• Non-Malware Dettected (auto-quarantine)

Some users intentionally turn off one or more components of real-time protection. Users may now disable notifications that
components have been turned off. Please note that as a result of this setting, users will be unable to receive notifications regarding
real-time protection failures in the event of program malfunction.

Impact of Scans on System

Most users schedule scans to occur during times when their computer is typically idle. Execution of a manual scan may be
performed as a matter of convenience, or while other tasks are being executed. The performance of lower-powered computers
may be affected by execution of the Malwarebytes scan. This setting allows the user to determine the priority of the scan to be
performed. Lower scan priority will require more time to execute while impacting other operations to a lesser degree. High priority
allows the scan to be executed at the maximum speed which the computer allows, but may affect other tasks.

Windows Context Menus

Malwarebytes has the capability to launch a Threat Scan upon one or more individual files or directories from within Windows
Explorer by using the context menu that becomes available when the files/directories are right-clicked. This setting allows that
capability to be turned on or off. The default setting is On.

Display Language

This setting determines the language used throughout. This is pre-set, based on the language used during program installation.
It can be modified at will.

Event Log Data

This setting provides additional information regarding program actions which are beyond typical needs of the user. Should you
encounter a technical issue with Malwarebytes, our Customer Success engineers may request that you enable this setting to
provide additional troubleshooting information. Once troubleshooting is complete, please remember to turn this setting off to
prevent unnecessary disk usage. The default setting is Off.

Proxy Server

This determines whether Internet connections will use a proxy server. This is more often used on a corporate network. It has two
primary purposes. The first is to funnel communications to and from the outside world through a single connection point, thus
assuring anonymity of all computers on the internal network. The second purpose is to cache content. This means that external
content which had recently been downloaded is saved locally for some period of time, and subsequent requests by that user (or
others) could use the recently-saved data. This conserves significant bandwidth, resulting in lower operating costs.





Malwarebytes for Windows User Guide 26 By default, Malwarebytes does not use a proxy. If configured to
do so, the bottom panel will change to provide configuration
options as shown in the screenshot shown here.

You can now specify the IP address or name of a proxy server,
as well as the appropriate port number. If a proxy is in use, the
name and port number must be specified by the person who
controls access to the proxy server. He will also be able to tell
you whether authentication is required to use the server, and if
so, provide a user name and password which have been
assigned to you.




User Access

This slider allows users of Malwarebytes Premium and Malwarebytes Premium Trial versions to restrict access to various features
and functions in Malwarebytes with password protection. The Edit User Access button is only visible when the slider is in the On
position, allowing the user to define sections of the program which require a password to access.






When the Edit User Access button is clicked, a new window opens directly above the Malwarebytes program screen to restrict
access to selected areas of the program only to those users who possess the password. The password is also defined on this screen.

WARNING: This password is not recoverable. If you lose your password, you will have to reinstall Malwarebytes to access restricted
features.





















As shown above, the Reports tab has been placed under password control. This also causes User Access to be placed under
password control. This prevents unauthorized users from gaining access to restricted areas.


Malwarebytes for Windows User Guide 27 When attempting to gain access to a
restricted area, you will be required to enter
a password (as shown here).







If an incorrect password is entered, or if a
null password is used, this error message
will be displayed.




If this feature has been enabled and is subsequently disabled, any restrictions which have been defined are cancelled. This feature
is not available to users of the Free version. Currently, only one policy may be in effect at any given time.

Windows Action Center

You may have noticed an icon in your system tray with a red X superimposed over a white flag. That is a status indicator for the
Windows Action Center, which tells you when your computer has a security issue that needs your attention. Malwarebytes Premium
or Malwarebytes Premium Trial can now be registered as a security solution on your computer. There are three settings available,
which will be abbreviated here for easier reading. Brief descriptions for the meaning of each setting are also provided.

• Let Malwarebytes choose whether to register: Malwaarebytes will determine whether it should be registered in Action
Center. The program will not register when Microsoft Security Essentials is in use on a Windows 7 or older operating
system. It will also not register when Windows Defender is used on a Windows 8 or newer OS.
• Always reggister Malwarebytes: Malwarebytes program status will always appear in Action Center.
• Never register Malwarebytes: Malwarebytes prrogram status will never appear in Action Center.


Beta Application Updates

Some Malwarebytes users want to try the newest features as soon as they are available, while some prefer to wait until the product
is released. We have added this program setting so that if you want the latest and greatest immediately, we can deliver it to you
automatically. When you enable this setting, you will see the following dialog box.










Usage and Threat Statistics

If you check this box, you will be sending us information to help us do our jobs. We like to know what countries Malwarebytes is
being used in, and the breakdown of Premium, Premium Trial, and Free versions. Our Research organization likes to keep track of
what malware we are detecting and how often. We learn that from what you send us, and helps us to serve you more effectively.
We hope that's fine with you as well. For a full list of information that is collected, please see the Malwarebytes Privacy Policy, at:

<https://www.malwarebytes.com/privacy/>https://www.malwarebytes.com/privacy/


Malwarebytes for Windows User Guide 28 Protection

Most settings which control how Malwarebytes protects your computer are located on the Protection tab. Settings are grouped
by category. A screenshot is shown below, along with descriptions of all settings available on this tab.






















Real-Time Protection

Malwarebytes offers four different types of real-time protection. These features are available only to users of the Premium and
Premium Trial modes. It is important to note that Premium Trial users who do not convert to a Premium subscription will lose all
real-time protection features at the end of their trial.

Web Protection protects Premium/Trial users by blocking access to/from Internet addresses which are known or suspected of
engaging in malicious activity. This feature does not treat different protocols differently. It does not distinguish between your
favorite game being served on one port and a potential malware source being served on another. Should you choose to disable
this feature, you could inadvertently compromise your computer's safety. Please note that this option is disabled if you are using
the Free version.

Exploit Protection uses multiple protection layers to guard against attempted exploits of vulnerabilities in legitimate applications.
When applications are launched by the user, exploit protection is also launched as a shield. This protection will often detect and
neutralize attacks that go undetected by other security applications. It is on by default for Premium/Premium Trial users.












Malwarebytes for Windows User Guide 29

Many popular applications have been pre-configured for shielding. A screenshot is shown above. To change the status of any
application, either use the Protection slider, or double click either the Application or File Name. Premium/Premium Trial users may
add protection for other applications, and edit specifications for any defined shield. The Edit screen is shown here.
















You may specify an Application name which is easily recognizable, and the Application file name. You can also browse for the file.
Select a Program type which most closely resembles the purpose of the application. If you are unsure, select Other.

The same screen is used to edit existing entries.



Malwarebytes for Windows User Guide 30 In addition, Premium/Premium Trial users can modify advanced exploit protection settings. Several advanced settings are spread
across four tabs, depending on the classification of protection they provide. One tab is shown here as an example.
























Each advanced setting is available for up to six different application groups, the groups representing the method by which threats
will attempt to exploit vulnerabilities in applications of that type. Protection may be turned on (checked), off (unchecked), or is
not applicable for that group of applications (greyed out). While these settings provide very specific protection, they should only
be changed when requested by a Malwarebytes Customer Success specialist. Incorrect settings may result in impaired protection.

Malware Protection may be turned on or off as needed by Premium/Premium Trial users. It is on by default. This feature protects
against malware present in code/files that try to execute on your computer. These files may have been downloaded, imported
from a USB drive, or received as an email attachment. While we do not recommend disabling this protection mechanism, there
may be times when it needs to be done to troubleshoot compatibility issues that arise with anti-virus updates or computer startup
problems. If either situation does occur, start your computer in Safe Mode, disable Malware Protection, isolate and correct the
issue, then turn Malware Protection back on. Please note that this option is disabled if you are using the Free version.

Ransomware Protection provides Premium/Premium Trial users protection against the threat of ransomware. This protection is
not available for users of Windows XP or Windows Vista. While all other protection features may provide some degree of protection
against ransomware, well-crafted ransomware may go undetected until it attempts to initiate its attack. As many computer users
have found, there is little or no remedy available after the fact. We strongly recommend that ransomware protection be turned
on at all times. It is on by default. Please note that this option is disabled if you are using the Free version.

Scan Options

Scan for rootkits utilizes a specific set of rules and tests to determine if a rootkit is present on your computer. For readers who are
unfamiliar with this term, an explanation may be handy. A rootkit is malicious software that can be placed on a computer which
has the ability to modify operating system files in a manner that hides its presence. Malware detection methods that rely on hooks
to the operating system for detection and analysis would prove ineffective if the hooks had been purposely manipulated by
malware. Our testing method is more intensive and more effective, but including rootkit scans as part of your overall scan strategy
increases the time required to perform a scan.




Malwarebytes for Windows User Guide 31 When Scan within archives is enabled, Malwarebytes will scan two levels deep within archive (ZIP, RAR, 7Z, CAB and MSI) files. If
this option is disabled, the archive is excluded from scanning. Please note that encrypted archives cannot be fully tested.






















We have introduced a new signature-less detection technology which takes advantage of machine learning to supplement existing
detection methods.

Potential Threats

In addition to malicious software detection and elimination, Malwarebytes also detects and acts upon two classes of non-malware.
These are Potentially Unwanted Programs (PUP's) and Potentially Unwanted Modifications (PUM's). In many cases, PUP's appear
in the form of toolbars and other application software which are installed on your computer as part of a bundle. You may have
asked for one application, and it came with a second application that was not mentioned, or was mentioned, but you did not
uncheck the checkbox next to it to prevent it from being installed at the same time. You may also want and use the PUP. We do
not judge the merit of the program or its usability. We do offer a method of removing it if you choose to.

PUM's are a bit different. These are modifications that are typically related to the Windows registry. As a user, you will generally
not be making changes to the registry that would qualify as a PUM, though the possibility does exist. Because it does, we allow
you to define your own rules when it comes to how they are treated.

With regard to both types of modifications, we provide three handling methods. These are:

• Ignore detections: Malwarebytes will not act on dettection, nor will you be alerted.
• Warn user: You will bbe alerted to the detection. You may choose to ignore it, create an exclusion, or treat it as malware.
• Always detect PUPs/PUUMs (recommended): The detection will be treated as malware, and corrective actions will occur.

While PUP's and PUM's are both handled in the same manner, each is handled according to separate guidelines which you specify.

Updates

Users of Malwarebytes Premium and Malwarebytes Premium Trial have the ability to automatically check for protection updates,
and to specify when those checks will be performed. The date range is adjustable between fifteen (15) minutes and fourteen (14)
days, the increment depending on the range (minutes/hours/days). We recommend that you do not allow the rules database to
become dated, as much damage can be caused by zero-day infections – those threats thatt are too new to be adequately protected



Malwarebytes for Windows User Guide 32 against by anti-virus software. The default for this feature is on. You may also have Malwarebytes display a notification in the
corner of your screen if protection updates are more than 24 hours old.

Startup Options

These settings define how Malwarebytes behaves when your computer starts. You may launch several applications at startup, and
they may initiate processes which require Malwarebytes launch timing to be adjusted. Let's look at each setting in detail.

• Start Malwarebytes at Windowws startup: If this setting is unchecked, Malwarebytes will not start with Windows. No real-
time protection layers will start when Windows starts, though they may still be started manually by launching
Malwarebytes.
• Delay Real-Time Protection when Malwarebytes starts: p; There may be times when the startup of system services used by
Malwarebytes conflicts with services required by other applications at boot time. When this is the case, turn this setting
on. You may also adjust the delay timing. You will need to experiment with the specific delay setting necessary to
compensate for any conflicts that are noted. When required, this must be done on a case-by-case basis. The delay setting
is adjustable from 15-180 seconds, in increments of 15 seconds.
• Enable self-protectiion module: This setting controls whether Malwarebytes creates a safe zone to prevent malicious
manipulation of the program and its components. Checking this box introduces a one-time delay as the self-protection
module is enabled. While not a negative, the delay may be considered undesirable by some users. When unchecked,
the "early start" option which follows is disabled.
• EEnable self-protection module early start: When self-protection is enabled, you may choose to enable or disable this
option. When enabled, the self-protection module will become enabled earlier in the computer's boot process –
essentially changing the order of services and drivers associated with your computer's startup.

Automatic Quarantine

Users of Malwarebytes Premium and Malwarebytes Premium Trial may specify whether malware will be automatically quarantined
when it is detected. The default setting is on. If the users decline to automatically quarantine malware, a notification will display
in the lower right corner of the screen for each detection, and the user must specify whether the file is to be ignored once, ignored
always (added to Exclusions) or quarantined.

Scan Schedule

You may also adjust Scan Schedules here as part of program settings. This aspect of program settings has already been covered
on pages 11-19.




















Malwarebytes for Windows User Guide 33 Exclusions

This tab allows additions to, or deletions from a list of items to be excluded from scans. The list may include files, folders, websites,
applications which connect to the Internet, or previously detected exploits. A screenshot is shown below.






















Add Exclusion

Exclusions are exempt from scanning and from real-time protection. This may include files, folders, web sites, applications and
safe programs which have been identified as exploits. Clicking Add Exclusion launches the Add Exclusion Wizard, as shown below.





















Malwarebytes for Windows User Guide 34 You may then add items – one at a time – to the list of exclusions. Each item type is defined by criteria as follows:

• File or folderr: Its location on the file system, and whether it should be excluded from malware and ransomware, only
malware or only ransomware. While you may have your own reasons for excluding files or folders from scans, the primary
reason for doing so is to prevent potential conflicts with anti-virus software. Malwarebytes works well alongside most
anti-virus software, but anti-virus updates by some vendors may occasionally be flagged as a threat. For this reason, we
offer the provision for you to exclude certain disk content from scanning. This is commonly offered by anti-virus vendors
as well.

NOTES:
â—&#65533; Clicking Select Folder… selects only folders,, which by default will also exclude any files within those folders,
as well as subfolders.
â—&#65533; Clicking Select Files… selects individual files for exclusion. The stattus of the folder is unchanged.

• Website: Enter thee Domain or IP Address to specify the web address. When adding a domain manually, please add it
both with and without the "www." prefix. Depending on several external factors, the domain may still be blocked if only
one variation is entered. Also, domain exclusions are only functional on Windows Vista Service Pack 2, Windows 7,
Windows 8.x and Windows 10. Please note: Exclusions can also be added by clicking the link in the notification message
when the website is blocked by Malwarebytes Website Protection.
• Application that connects to the Internet: Specify the name of the application. This is most applicable if the detection is
a false positive (legitimate application with some similar characteristics to malware).
• Previously Detecteed Exploit: Specify the MD5 hash of the exploit. This is most applicable if the detection is a false positive
(legitimate application with some similar characteristics to malware). The hash guarantees uniqueness of the file in
question.


My Account

Here, you can click the Go to My Account button to obtain status of all of your subscriptions, and change preferences related to
your account. You can also deactivate your license – useful when moving your Malwarebytes program to aa new computer – or
change license key. A screenshot is shhown below.

























Malwarebytes for Windows User Guide 35 All of the information shown here is self-explanatory. A set of option buttons are available at the bottom of the screen. The options
vary depend on the mode of the program. Buttons for the three program modes are shown below.


Premium Mode
options


Premium Trial Mode
Options


Free mode
Options


Free mode
Options (*)


When Malwarebytes was installed, Premium Trial mode was set automatically (if you were eligible for a trial). There may be
circumstances where you have the option of re-entering Premium Trial mode. This would result in the second Free mode display.
If you click the button Change License Key (Premium mode) or I Already Have a License (Premium Trial or Free mode), you will see
the following screen superimposed over the Malwarebytes interface.

Follow screen instructions to enter your license
information. If you do not have a license, either
press Cancel (to close this window and return to
the screen you came from), or Purchase a License
to go to the Malwarebytes website and purchase
a license for the product.









About

This tab tells you more about Malwarebytes, and what resources are available to you should you need technical assistance. The
upper panel contains Version Information. We have split up the program into software components. If you have configured the
program to provide program updates, it is easier and faster for us to provide the newest version to you by updating the
components that have changed, rather than updating the entire program. It also benefits you if you need technical support,
because the versions of each component may influence the direction that our Customer Success engineers take when
troubleshooting an issue.

The Resources section provides contact addresses (URLs) which may assist you for sales, support, and educational purposes. In
addition, you can view the third-party notices (open source software which we use in our products) as well as a link to our End User
Licensing Agreement (EULA).









Malwarebytes for Windows User Guide 36 Appendix A: Notification Window Examples

Malwarebytes provides a number of user notifications during operation. These notifications are always positioned in the lower
right corner of your screen. The length of time that they will remain on your screen is configurable in Application Settings (page
24).


Scan Notifications



An automatic scan has been completed. Malware was
detected during execution of the scan. Click Upgrade Now
to purchase Malwarebytes Premium. This notification will
only appear for Malwarebytes Free users.





A scan (scheduled or on-demand) has been completed.
Malware was detected during execution of the scan. Click
View Scan Results to review the scan log to determine the
exact nature of the threat(s).




A scan (scheduled or on-demand) has been completed.
Non-Malware was detected during execution of the scan.
This is typically a Potentially Unwanted Program (PUP) or
Potentially Unwanted Modification (PUM), which may be
acceptable to you. Click View Scan Results to review the

scan log to determine the exact nature of the threat(s).



A scan (scheduled or on demand) has been completed. No
problems were detected.




Real Time Protection Notifications



After the user has indicated that they wish to turn off
notifications regarding real-time protection components,
this notification will be displayed to request confirmation
of the user’s wishes.








Malwarebytes for Windows User Guide 37

One or more components of real-time protection are
disabled. You may re-enable protection by clicking Turn
On button, or by clicking Manage Protection Settings. This
is not available for Malwarebytes free users.




Malware has been detected as a function of real-time
protection. You have not chosen to exercise the auto-
quarantine capability when malware has been detected,
so no specific action has been taken. The program now
being detected as malware may be acceptable to you, so
you may choose to allow its execution once, always, or
elect to quarantine it at this time. This is not available for

Malwarebytes Free users.



Real-time protection has detected a Potentially Unwanted
Program (PUP). You have not chosen to ignore this type of
activity, or to exercise the auto-quarantine capability upon
detection, so no specific action has been taken. This
detection may be acceptable to you, so you may choose to
ignore it once, always, or elect to quarantine it at this time.
This is not available for Malwarebytes Free users.




Malware has been detected as a function of real-time
protection. You have chosen to exercise the auto-
quarantine capability when malware has been detected,
so the offending software has been moved to quarantine
and modified so that it may not cause any damage to your
computer.





A Potentially Unwanted Program (PUP) has been detected
as a function of real-time protection. You have chosen to
exercise the auto-quarantine capability when a PUP has
been detected, so the offending software has been moved
to quarantine and modified so that it may not cause any
damage to your computer.









Malwarebytes for Windows User Guide 38

An attempt has been made by software present on your
computer to contact a website suspected to be malicious,
and has been blocked. This detection occurred as a
function of real-time protection. You may allow access by
clicking Manage Exclusions, which will redirect you to the
Exclusions screens.

Please note: Unblocking a website out of convenience may
result in damage being caused to your computer.





Anti-exploit protection has prevented an attacker from
exploiting your computer through a vulnerability.







Anti-ransomware protection has prevented an attacker
from exploiting your computer with suspected
ransomware. The threat has been neutralized and moved
to Quarantine.






After threats have been quarantined, your computer must
be rebooted to complete the quarantine process, and this
notification is displayed. After assuring that other work is
saved, click Reboot Now to perform that task.




Update Notifications




A program update for Malwarebytes is available. Click
Install Now to get the latest program protection.








Malwarebytes for Windows User Guide 39

Your Malwarebytes updates are out of date. Click Update
Now to cause an immediate update. Failure to update will
cause subsequent scans to use outdated protection rules,
which could jeopardize the safety of your computer.












Premium Notifications


If you do not have auto-renewal set up on your
Malwarebytes account, you will begin to see this message
thirty (30) days before the expiration of your subscription,
counting down the number of days remaining on your
subscription. Click Renew Now button to renew your

subscription in a new browser window/tab.



If you do not have auto-renewal set up on your
Malwarebytes account, this notification is displayed on the
final day of your subscription. Click Renew Now button to
renew your subscription in a new browser window/tab.



If you do not have auto-renewal set up on your account
and have not responded to pending expiration, you will
see this notification a maximum of three times after your
subscription has expired. At this point, you have reverted
to the free version of Malwarebytes. Premium features
have been disabled. Click Upgrade Now to renew your
subscription in a new browser window/tab. A slightly
different version of this notification appears within the
Malwarebytes user interface.



This notification is displayed if your subscription cannot be
renewed. Usually the reason for this is an expired
credit/debit card. You will be given an opportunity to
update your card information, and your subscription will
remain in force for a brief period.






Malwarebytes for Windows User Guide 40

Your subscription has expired and could not be
automatically renewed. Your Malwarebytes service has
been downgraded from Premium to Free. You can still run
scans for protection, though real-time protection is no
longer in force.









Premium Trial Notifications



Beginning five days before your Premium trial expires, you
will receive a notification once per day about the expiring
trial, and be given an opportunity to upgrade to Premium
or to enter your Premium license information.





On the last day of your Premium trial, you will receive a
single notification, and be given an opportunity to
upgrade to Premium or to enter your Premium license
information.






After your Premium trial expires, you will receive this
notification in the Malwarebytes user interface as well as in
the Windows system tray.
















Malwarebytes for Windows User Guide 41
Take care. Mike. Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement. In the end you have to ignore everything, & click I agree.
----- Original Message -----
From: Sherri
To: jaws-users-list@groups. io
Sent: Thursday, October 25, 2018 10:42 AM
Subject: [jaws-users] Using Malware Bytes with Jaws

Is there any way to use Malware Bytes with any version of Jaws. The only thing I can seem to do is perform a scan. I see the menus if I use the Jaws cursor, but I cannot get to them. I am using Jaws the latest version. Thank you.

Sherri Brun
flmom2006@...
President NFB of Central Florida
NFBF Newsline Marketer
Phone: 1-844-827-7371

The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations
of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back.
Together with love, hope, and determination, we transform dreams into reality.


Mike B. <mike9902@...>
 

Hi Jorge,
 
MWB is accessible with Jaws but, it just takes a little more work with all the tabbing involved.
Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

Sent: Thursday, October 25, 2018 5:15 PM
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

Hi Mike,

I gave up in mywarebyts a couple versions back, because it was not jaws friendly.

I been using the windows10 malremover.

Go to the run dialog and type NRT press enter.

That’s it, just wait for the scan to finish.

 

HTH,

 

 

Jorge,

There is no better symbol for the purpose we serve than the emblem every Marine earns: the Eagle, Globe and Anchor. The eagle represents the proud nation we defend. It stands at the ready with our coastlines in sight and the entire world within reach of its outstretched wings. The globe represents our worldwide presence. The anchor points both to the Marine Corps' naval heritage and its ability to access any coastline in the world. Together, the eagle, globe and anchor symbolize our commitment to defend our nation—in the air, on land and at sea.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Mike B.
Sent: Thursday, October 25, 2018 3:20 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Sherri,

 

Below is a brief tutorial I wrote awhile back on navigating MWB:

Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.

 

Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.

 

Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 

 

Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.

 

If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....

 

It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.

 

I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.

Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

----- Original Message -----

From: Sherri

Sent: Thursday, October 25, 2018 10:42 AM

Subject: [jaws-users] Using Malware Bytes with Jaws

 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

 

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

 

Marie
 

Should this be “MRT” for malware removal tool”? Rather than NRT.
Marie
 
 

From: TheHangMan
Sent: Thursday, October 25, 2018 5:15 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws
 

Hi Mike,

I gave up in mywarebyts a couple versions back, because it was not jaws friendly.

I been using the windows10 malremover.

Go to the run dialog and type NRT press enter.

That’s it, just wait for the scan to finish.

 

HTH,

 

 

Jorge,

There is no better symbol for the purpose we serve than the emblem every Marine earns: the Eagle, Globe and Anchor. The eagle represents the proud nation we defend. It stands at the ready with our coastlines in sight and the entire world within reach of its outstretched wings. The globe represents our worldwide presence. The anchor points both to the Marine Corps' naval heritage and its ability to access any coastline in the world. Together, the eagle, globe and anchor symbolize our commitment to defend our nation—in the air, on land and at sea.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Mike B.
Sent: Thursday, October 25, 2018 3:20 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Sherri,

 

Below is a brief tutorial I wrote awhile back on navigating MWB:

Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.

 

Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.

 

Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 

 

Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.

 

If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....

 

It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.

 

I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.

Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

----- Original Message -----

From: Sherri

To: mailto:jaws-users-list@groups.%20io

Sent: Thursday, October 25, 2018 10:42 AM

Subject: [jaws-users] Using Malware Bytes with Jaws

 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

 

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

 

TheHangMan
 

Marie,

Yes, I made a mistake by typing a N  instead of a M.

 

Yes, and it’s the Defenders malware remover tool.

Have you tried it yet?

 

Jorge,

There is no better symbol for the purpose we serve than the emblem every Marine earns: the Eagle, Globe and Anchor. The eagle represents the proud nation we defend. It stands at the ready with our coastlines in sight and the entire world within reach of its outstretched wings. The globe represents our worldwide presence. The anchor points both to the Marine Corps' naval heritage and its ability to access any coastline in the world. Together, the eagle, globe and anchor symbolize our commitment to defend our nation—in the air, on land and at sea.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Marie
Sent: Friday, October 26, 2018 12:24 AM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Should this be “MRT” for malware removal tool”? Rather than NRT.

Marie

 

 

From: TheHangMan

Sent: Thursday, October 25, 2018 5:15 PM

Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Mike,

I gave up in mywarebyts a couple versions back, because it was not jaws friendly.

I been using the windows10 malremover.

Go to the run dialog and type NRT press enter.

That’s it, just wait for the scan to finish.

 

HTH,

 

 

Jorge,

There is no better symbol for the purpose we serve than the emblem every Marine earns: the Eagle, Globe and Anchor. The eagle represents the proud nation we defend. It stands at the ready with our coastlines in sight and the entire world within reach of its outstretched wings. The globe represents our worldwide presence. The anchor points both to the Marine Corps' naval heritage and its ability to access any coastline in the world. Together, the eagle, globe and anchor symbolize our commitment to defend our nation—in the air, on land and at sea.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Mike B.
Sent: Thursday, October 25, 2018 3:20 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Sherri,

 

Below is a brief tutorial I wrote awhile back on navigating MWB:

Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.

 

Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.

 

Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 

 

Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.

 

If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....

 

It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.

 

I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.

Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

----- Original Message -----

From: Sherri

Sent: Thursday, October 25, 2018 10:42 AM

Subject: [jaws-users] Using Malware Bytes with Jaws

 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

 

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.

 

 

Marie
 

not yet but will give it a try.
Marie
 
 

From: TheHangMan
Sent: Friday, October 26, 2018 12:30 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws
 

Marie,

Yes, I made a mistake by typing a N  instead of a M.

 

Yes, and it’s the Defenders malware remover tool.

Have you tried it yet?

 

Jorge,

There is no better symbol for the purpose we serve than the emblem every Marine earns: the Eagle, Globe and Anchor. The eagle represents the proud nation we defend. It stands at the ready with our coastlines in sight and the entire world within reach of its outstretched wings. The globe represents our worldwide presence. The anchor points both to the Marine Corps' naval heritage and its ability to access any coastline in the world. Together, the eagle, globe and anchor symbolize our commitment to defend our nation—in the air, on land and at sea.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Marie
Sent: Friday, October 26, 2018 12:24 AM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Should this be “MRT” for malware removal tool”? Rather than NRT.

Marie

 

 

From: TheHangMan

Sent: Thursday, October 25, 2018 5:15 PM

To: jaws-users-list@groups.io

Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Mike,

I gave up in mywarebyts a couple versions back, because it was not jaws friendly.

I been using the windows10 malremover.

Go to the run dialog and type NRT press enter.

That’s it, just wait for the scan to finish.

 

HTH,

 

 

Jorge,

There is no better symbol for the purpose we serve than the emblem every Marine earns: the Eagle, Globe and Anchor. The eagle represents the proud nation we defend. It stands at the ready with our coastlines in sight and the entire world within reach of its outstretched wings. The globe represents our worldwide presence. The anchor points both to the Marine Corps' naval heritage and its ability to access any coastline in the world. Together, the eagle, globe and anchor symbolize our commitment to defend our nation—in the air, on land and at sea.

 

 

From: jaws-users-list@groups.io <jaws-users-list@groups.io> On Behalf Of Mike B.
Sent: Thursday, October 25, 2018 3:20 PM
To: jaws-users-list@groups.io
Subject: Re: [jaws-users] Using Malware Bytes with Jaws

 

Hi Sherri,

 

Below is a brief tutorial I wrote awhile back on navigating MWB:

Whenever you open MWB you will hear Jaws report various Tabs as you Tab through the interface.  The tabs are Dashboard, Scan, Quarantine, Reports, & Settings  If you press the spacebar on any one of the tabs this selects this tab and now you have to tab many times to get to this tabs options.

 

Let's take the Scan tab for instance.  If you spacebar this tab., and tab several times you will come to its options for this selection.  Scan Type & Scan Schedule are its 2 options.  Press the spacebar on which option, then tab to review your choices for the selected option.  When you are through tabbing through that tabs options you will wratp around to the beginning of the innerface.  spacebar another tab, and you start all over again tabbing to options for the selected tab.  This is why I said earlier that the latest MWB is accessible, but requires tabbing like hell to review all the Tabs, options, & selections.

 

Your question about selecting Quarantined items is tough to answer because I haven't figured out a reliable & consistent way of doing this, so I use a combination of OCR, Jaws cursor, & Touch cursor gymnastics, or get someone sighted to select them all & remove!  LOL  LOL 

 

Here's an example I'll use on finding the scan options:
Open MWB and tab to, Scan Tab, press the spacebar to check it.
Tab to, Scan Types, and this should be checked, press the spacebar to check it if it isn't.
Tab to, Threat Scan, and this should be checked by default.  When you tab to this , Jaws should report some information about this scan.  Tab 1 time, this the Custom scan option, again Jaws should read some info about selecting this scan.  Tab 1 time, and this is the Hyper scan, and again Jaws should read information about this scan when you tab to it.  If you want to select either the, Custom, or Hyper, scans press the spacebar to select the scan, but the Threat scan, is probably your best choice and only takes a few minutes to run.
Tab 1 more time to the, Start Scan, button and press the spacebar to start.

 

If you ran a scan you would select the Reports tab and tab to the table of scans that you would choose from to review its results.  If you want quarantined items, select the, Quarantine tab....

 

It is really hard to describe this latest version of MWB, and the way I learned was to wear out my tab key, and pay close attention to various buttons, comboboxes, and whatever you will come across by selecting the diferent tabs, then reviewing the options of them.

 

I hope this helps, and I know I probably confused the hell out of you, but the best way to get acclamated with is to spen some time with it, paying close attention to what Jaws reports.

Take care.  Mike.  Go Dodgers!
Sent from my iBarstool.
Arguing with a woman is like reading a software license agreement.  In the end you have to ignore everything, & click I agree.

----- Original Message -----

From: Sherri

To: mailto:jaws-users-list@groups.%20io

Sent: Thursday, October 25, 2018 10:42 AM

Subject: [jaws-users] Using Malware Bytes with Jaws

 

Is there any way to use Malware Bytes with any version of Jaws.  The only thing I can seem to do is perform a scan.  I see the menus if I use the Jaws cursor, but I cannot get to them.  I am  using Jaws the latest version. Thank you.

 

Sherri Brun

flmom2006@...

President NFB of Central Florida

NFBF Newsline Marketer

Phone:  1-844-827-7371

 

                                The National Federation of the Blind knows that blindness is not the characteristic that defines you or your future. Every day we raise the expectations

of blind people, because low expectations create obstacles between blind people and our dreams. You can live the life you want; blindness is not what holds you back. 

Together with love, hope, and determination, we transform dreams into reality.