{"id":23741,"date":"2024-01-18T09:10:03","date_gmt":"2024-01-18T17:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/01\/18\/news-17471\/"},"modified":"2024-01-18T09:10:03","modified_gmt":"2024-01-18T17:10:03","slug":"news-17471","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/18\/news-17471\/","title":{"rendered":"Free access to ThreatDown Application Block: Elevate your Windows security at no cost"},"content":{"rendered":"\n<p>Malwarebytes continues to add value to its ThreatDown Bundles with the inclusion of Application Block as free for all ThreatDown Nebula accounts (excluding Mobile only accounts).&nbsp;Users don&#8217;t need to activate this new feature: the policy has been enabled in their account by default.<\/p>\n<p>For as many applications out there that help you keep business running as usual, there are just as many that can spell big trouble for your network security. Threat actors can embed malicious code in seemingly legitimate applications, which end users then innocently execute on their Windows endpoints. (And the bad guys are in).<\/p>\n<p>Or threat actors can find an application on your network with a known vulnerability for which no patch has been developed. (And again, they\u2019re in.)&nbsp;<\/p>\n<p>Application threats also don\u2019t just stop at cybercriminal gangs: organizations also just might not want employees using unproductive or unapproved applications and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shadow_IT\">the security risks that follow<\/a>.<\/p>\n<p>All of this is to say that having the ability to blocklist certain applications from running is a key part of an effective <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/09\/5-technologies-that-help-prevent-cyber-attacks-for-smbs\">layered defense<\/a>. Malwarebytes is adding <strong>Application Block <\/strong>for free in all ThreatDown Bundles<strong> <\/strong>to make it easier for under-resourced orgs to meet this important security requirement.<\/p>\n<p>Let\u2019s dive in to see how it works!<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-features\">Features<\/h2>\n<ul>\n<li>Log and monitor blocked application activity on endpoints.<\/li>\n<li>Block device access to specified software applications, though this does not include cloud applications.<\/li>\n<li>Block list rules are created and applied to policies across the console or sites.<\/li>\n<li>Dashboard and reporting for blocked applications.<\/li>\n<\/ul>\n<p>For a technical overview of Application Block for Nebula, click here:&nbsp;<a href=\"https:\/\/service.malwarebytes.com\/hc\/en-us\/sections\/10604417341587-Application-Block\">https:\/\/service.malwarebytes.com\/hc\/en-us\/sections\/10604417341587-Application-Block<\/a><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-enable-blocking\">Enable Blocking<\/h2>\n<p>When setting or modifying a policy in the Nebula console, go to the <strong>Software management<\/strong> tab at the bottom.<\/p>\n<p>There you\u2019ll find the&nbsp;<strong>Application block<\/strong>&nbsp;option for Windows. Let\u2019s go ahead and check it and then save this policy.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1768\" height=\"1434\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/easset_upload_file90813_258977_e.jpg?w=1024\" alt=\"\" class=\"wp-image-102307\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-block-rule-creation-management\">Block Rule Creation\/Management<\/h2>\n<p>Heading over to the Monitor tab, we\u2019ll find Application Block near the bottom of the drop-down menu. Let\u2019s click into that.&nbsp;<\/p>\n<p>We\u2019re taken to an activity log dashboard of blocked applications. Find the <strong>Rules<\/strong> tab near the top and click \u201cNew rule\u201d.&nbsp;<\/p>\n<p>Rules in Application Block for Nebula define which software applications and executables are blocked across your endpoints. We can apply this rule globally or to specific policies only.<\/p>\n<p>Basic application block rules select the Application or Vendor name to block the service. Advanced rules are available to use file information to block the service including Certificate property, File path, File property, and Hash value.<\/p>\n<p>Let\u2019s save this rule and head back over to our activity log!<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1878\" height=\"1482\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/easset_upload_file47565_258977_e.jpg?w=1024\" alt=\"\" class=\"wp-image-102308\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-application-block-activity-log\">Application Block Activity Log<\/h2>\n<p>The Activity Log tab displays blocked applications across all your managed endpoints. Blocked records are retained for approximately 90 days.<\/p>\n<p>View the following information for each endpoint&#8217;s activity record, including agent version, application data, and time blocked!<\/p>\n<p>For auditing or external reporting purposes, you can even download Application Block activity information to your local machine by selecting all or checking specific boxes for the rows you want to export and clicking Export. <\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1856\" height=\"1412\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/easset_upload_file66291_258977_e.jpg?w=1024\" alt=\"\" class=\"wp-image-102309\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-blocked-applications-dashboard-widget-showing-activity-over-the-last-30-days\">Blocked Applications dashboard widget showing activity over the last 30 days<\/h2>\n<p>We can get a full and quick picture of our endpoint data by heading over to the Nebula Dashboard. Here we can add, remove, and rearrange widgets\u2014including one for Application Block\u2014that give us insight into what applications were blocked and their frequency.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1768\" height=\"1434\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/easset_upload_file32890_258977_e.jpg?w=1024\" alt=\"\" class=\"wp-image-102310\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-plugging-the-holes-in-your-windows-endpoint-security\">Plugging the holes in your Windows endpoint security<\/h2>\n<p>Together with <a href=\"https:\/\/www.threatdown.com\/vulnerability-assessment\/\">free Vulnerability Assessment<\/a>, which effectively identifies and prioritizes critical security vulnerabilities, Application Block enhances overall security protection by preventing unauthorized software usage, offering a comprehensive security solution at no additional cost in all ThreatDown Bundles.<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-dark-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.threatdown.com\/pricing\/\"><strong>Experience ThreatDown Bundles<\/strong><\/a><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2024\/01\/free-access-to-threatdown-application-block-elevate-your-windows-security-at-no-cost\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Application Block is now free for all ThreatDown users. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-23741","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23741"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23741\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23741"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}