Nebula
Modules
Endpoint Detection & Response
Protection Layers/Features
Misc.
100

This contains a limited feature set that allows Nebula administrators to view their console and take action on threats while away from their desks.

What is the ThreatDown Admin app?

100

Assess threat exposure by identifying and prioritizing action against software vulnerabilities by matching them against an up-to-date inventory of installed drivers, software and operating system modules.

What is Vulnerability Assessment?

100

This particular EDR policy setting must be enabled for us to observe the behaviors of processes, registry, file system, and network activity on the endpoint using a heuristic algorithms looking for deviations.

What is Suspicious Activity Monitoring?

100

Protects endpoints by limiting end user ability to uninstall Malwarebytes. This also prevents malicious threats from stopping, modifying, or deleting Malwarebytes.

What is Tamper Protection?

100

Expands ThreatDown’s best-in-class support with faster response time SLAs, extended support availability, and more.

What is Premium Support?

200

This feature evaluates your environment and provides customized recommendations based on an analysis of your Nebula configuration.

What is the Nebula Security Advisor (SAM)?

200

Ensuring defenses are up to date across your ecosystem by accelerating identification, deployment, installation, and verification of operating system and application code revisions, across device operating systems and a wide range of third-party applications.

What is Patch Management?

200

The capability that allows freeform threat hunting across all devices managed by EDR.

What is Flight Recorder Search?

200

Traces every installation, modification, and process, including in-memory executables that others miss, to ensure thorough remediation, prevent reinfection, and reduce costs and efforts.

What is Malwarebytes' proprietary Linking Engine (Remediation Engine)?

200

This ThreatDown protection stops intrusive ads and tracking scripts to increase browser speed and employee productivity.

What is Browser Phishing Protection?

300

This interface lets administrators automate tasks, integrate with other tools, access reports, and manage their ThreatDown tenant.

What is ThreatDown APIs?

300

This Nebula module protects your endpoints by preventing unauthorized software from executing across your endpoints.

What is Application Block?

300

The 3 modes of Endpoint Isolation.

What is.... 

1. Network Isolation: Prevent the endpoint from communicating with other devices on your network.

2. Process Isolation: Restrict which processes can run on the endpoint and prevent processes from interacting.

3. Desktop Isolation (Windows only): Prevent end users from accessing the endpoint.

300

This Endpoint Detection and Response feature can be used to upload a file within the Nebula console and receive a comprehensive report on the item, indicating if the file is malicious or not.

What is Sandbox Analysis?

300

After 13 consecutive quarters of unmatched success, ThreatDown was first and only winner of this award in March 2025.

What is the MRG Effitas Product of the Year Award?

400

This dual security method to authenticate users can be enabled to protect your account in case your login credentials are compromised.

What is Multi-Factor Authentication (MFA)/2-Factor Authentication (2FA)?

400

Threats flagged by this Module's AI or reported by users are automatically grouped, categorized, and managed by our machine learning engine. This fully automated remediation process greatly reduces the time and effort required for threat mitigation.

What is Email Security?

400

These EDR features are available for MacOS and Linux.

What is...

Suspicious Activity Monitoring

Flight Recorder Search

Network Isolation

Process Isolation

400

What are the 2 Matching-Based Protection Layers in Endpoint Protection?

What is...

1. Web Protection: Helps prevent access to malicious websites, ad networks, scammer networks

2. Payload Analysis: Anti-malware technology designed to identify entire families of known and relevant malware with heuristic and behavioral rules

400

This year's annually released report uncovers how attackers are evading detection with stealthier tactics and how to protect your business from the latest threats.

What is the 2025 State of Ransomware Report?

500

The 3 default schedules provided "out-of-the-box" for every new tenant.

What is....

Daily Software Inventory Scan

Daily Detection Threat Scan

Weekly Detection Custom Scan

500

This Module limits the number of domain-based threats on a network. This ensures their data remains secure while allowing control over what employees can access regardless of the connected network.

What is DNS Filtering?

500

Ability to investigate attacks, collect forensic data, and remediate detections on remote endpoints. Authorized Super Admins can securely access their endpoints remotely with Malwarebytes Nebula.

What is Active Response Shell?

500

What are 3 of the 5 Behavior-based Protection Layers in Endpoint Protection?

What is...

1. Application Hardening: Reduces vulnerability exploit surface and proactively detects fingerprinting attempts used by advanced attacks

2. Exploit Mitigation: Proactively detects and blocks attempts to abuse vulnerabilities and remotely execute code on the endpoint

3. Application Behavior: Helps prevent applications from being leveraged to infect the endpoint

4. Anomaly Detection Machine Learning: Proactively identifies unknown viruses and malware via machine learning techniques

5. Ransomware Mitigation: Detects and blocks ransomware identified via behavioral monitoring technology

500

When login attempts are made through Windows protocols, this feature counts unsuccessful login attempts within a specified period of time and temporarily blocks the incoming IP address by creating a Windows Firewall block rule.

What is Brute Force Protection?

M
e
n
u