
Repair System: Includes various system-related repairs in case a Windows service is not functioning correctly that Malwarebytes for Windows is dependent on. All user configurations and other data are removed. The Premium license key is backed up and reinstated. Clean: Performs an automated uninstallation of all Malwarebytes products installed to the computer and prompts to install the latest version of Malwarebytes for Windows afterwards. The information is saved to a file on the Desktop named mbst-grab-results.zip and can be added as an email attachment or uploaded to a forum post to assist with troubleshooting the issue at hand. As part of this process, Farbar Recovery Scan Tool (FRST) is run to perform a complete diagnosis. Gather Logs: Collects troubleshooting information from the computer. The Advanced menu page contains four categories: Place a checkmark next to Accept License Agreement and click Next You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Only attempts to write to protected disk sectors will be recorded in the Windows event log (under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1124).Īttempts to modify or delete files in protected folders will not be recorded.Double-click mb-support-X.X.X.XXXX.exe to run the program The Windows event log will record these attempts under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1123. The Windows event log will record these attempts under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1124. These attempts will not be recorded in the Windows event log. The following will not be blocked and will be allowed to run: The Windows event log will record these blocks under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1123. Attempts by untrusted apps to write to disk sectors Attempts by untrusted apps to modify or delete files in protected folders You can add additional trusted applications in the Configure allowed applications GP setting.ĭefault system folders are automatically protected, but you can add folders in the Configure protected folders GP setting. Microsoft Defender Antivirus automatically determines which applications can be trusted. You can also choose to only block or audit writes to disk sectors while still allowing the modification or deletion of files in protected folders. Modify or delete files in protected folders, such as the Documents folder
You can choose to block, audit, or allow attempts by untrusted apps to:
Enable or disable controlled folder access for untrusted applications.