{"id":26,"date":"2015-08-25T14:34:07","date_gmt":"2015-08-25T19:34:07","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=26"},"modified":"2015-10-23T13:56:22","modified_gmt":"2015-10-23T17:56:22","slug":"malwarebytes","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2015\/08\/25\/malwarebytes\/","title":{"rendered":"MalwareBytes!"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2015\/08\/mbam.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-29\" src=\"http:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2015\/08\/mbam-300x122.jpg\" alt=\"mbam\" width=\"300\" height=\"122\" srcset=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2015\/08\/mbam-300x122.jpg 300w, https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2015\/08\/mbam.jpg 351w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>In addition to standard anti-virus protection with software such as McAfee AntiVirus and Windows Defender, the MalwareBytes product serves as a <strong>complement<\/strong> to the antivirus software on your computer.\u00a0 It works together with your antivirus software to provide more robust protection. MalwareBytes is an anti-malware program that protects your system from infections on your computer that antivirus software can&#8217;t.\u00a0 Malware can get installed onto your computer from visiting infected websites, opening up malicious emails and other methods.<\/p>\n<p>Since 2009, UMass Lowell has been using the &#8216;Premium&#8217; version of MalwareBytes.\u00a0 The license associated with this software expires in early September.\u00a0 At this point, individual licenses will no longer be distributed.<\/p>\n<p>To avoid an interruption in malware protection on Windows based systems, the Information Technology department will be pushing out a new version of MalwareBytes, known as MalwareBytes Anti-Malware for Business.\u00a0 This deployment will be happening via the DELL KACE software installation service and will require no intervention on your part.<\/p>\n<p>This installation will not occur on your windows computer if it is not &#8216;joined to the Active Directory domain&#8217;.\u00a0 If you login to your computer by using your uml.edu credentials, your system is &#8216;on the domain&#8217; and will be automatically updated.\u00a0 If your computer does not fit into this category, please contact the IT Service Desk at x44357 in order to have the DELL KACE agent installed onto your computer, therefore allowing you to receive the latest version.\u00a0 Please note that this version CANNOT be used on personally owned systems.<\/p>\n<p>After mid September, please contact the IT Service Desk at x44357 should your current version of Malwarebytes issue warnings such as &#8216;License has expired&#8217;.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In addition to standard anti-virus protection with software such as McAfee AntiVirus and Windows Defender, the MalwareBytes product serves as a complement to the antivirus software on your computer.\u00a0 It works together with your antivirus software to provide more robust &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2015\/08\/25\/malwarebytes\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":272,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/26"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/272"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":5,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"predecessor-version":[{"id":96,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/26\/revisions\/96"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}