Malwarebytes EDR: On Demand Evaluation

This report can be downloaded in pdf format.

Executive Summary (video playlist)

Malwarebytes EDR is a hassle-free experience for those with limited cybersecurity resources, allowing for a small staff to manage hundreds of endpoints with ease. The trade-off however is that it leaves the user entirely dependent on its own detection capabilities. Our experience suggests most IT admins will be able to handle all aspects of the Nebula UI, but analysts will struggle to investigate unknown processes or network activities unless they are flagged specifically. The product comes with a high level of automation and somewhat bridges the gap between typical anti-malware and analyst focused EDR solutions. The best parts about Malwarebytes EDR include a simplified incident handling process, low alerts, and great ransomware rollback capabilities.

Usability (video)

  • The user interface uses a simple two-layer approach that is geared towards admins rather than analysts

  • Information about endpoints and detected threats is displayed concisely on the home screen

  • Actions like remediating threats, isolating endpoints are easy to perform with essentially a single click

  • Settings are highly customizable, although applying them to endpoints can be a multi-step process through groups and policies

  • User groups and account management is fairly simple albeit a bit limited in terms of access customization

  • The product functions with a high level of automation and alerting is non-intrusive

  • This is one of the more silent EDR products we have tested

  • In our false positive test, Malwarebytes EDR performed above expectations and did not incorrectly flag any common files as false positives

  • While most of the user experience is coherent, it does not lend itself well to in depth investigations and search and analysis capabilities are not as powerful

  • Threat reports are easy to generate and the emails are great in terms of readability

Remediation (video)

  • Most remediation occurs automatically as the product detects and quarantines new threats in most cases

  • In the event of suspicious activity, if enabled the feature can produce alerts for potential new threats or zero-day attacks

  • Both a comprehensive lockdown and remediation can be carried out in a one click process that eliminates the complexity of incident handling

  • Malwarebytes EDR features one of the best implementations we have seen of a simplified incident resolution process including ransomware rollback capabilities

  • Due to the slow and reactive nature of the suspicious activity monitoring it may be susceptible to certain types of wipers like Petya and other less common threats like bootkits

  • Malwarebytes EDR relies heavily on cloud sandbox analysis for most suspicious activity detections

Ransomware Rollback (video)

  • In a test against against several contemporary and infamous ransomware including the likes of WastedLocker, BlackClaw, WannaCry and many others, Malwarebytes EDR was able to detect encryption behavior without the help of its signatures and perform a successful rollback

  • While event detection took several minutes and the response was entirely reactive, in each case, all data was successfully restored

  • The rollback of user data is part of the remediation process and does not require any further action when configured correctly

  • Malwarebytes EDR provides a wide range of customization in terms of resource usage and rollback timeframe which can be configured up to several days, thus being one of the more flexible implementations of a rollback feature that we have encountered.

  • This feature, where applicable, is quiet and automatic, and provides good results with very little user intervention required

Threat Hunting (video)

  • Malwarebytes EDR provides basic threat hunting features through Flight Recorder and suspicious activity monitoring

  • Several key metadata like process graphs and system activity logs are displayed in a clean, simplified, and user-friendly interface

  • Event types (process/registry/network) are color coded and easy to identify

  • Each suspicious activity is wrapped into an incident type view and presented with direct resolution options

  • Integration with services like VirusTotal is quite limited and there are no avenues for in depth lookups of undetected processes

  • Advanced search and investigation capabilities are limited, and the product cannot be used to perform any independent threat or event analysis

  • There is a noted lack of sync between the Flight Recorder and suspicious activity views and switching between them can be tedious

  • The product’s threat hunting capabilities are focused on investigating incidents that are already detected and summarized and not unknown activity

Leo

Founder, The PC Security Channel