Configure Endpoint Security - Malwarebytes EDR

This article describes the steps required to configure Malwarebytes to send Syslog messages
to the RocketCyber CEF Syslog Collector. Refer to Configure RocketCyber Syslog Collector.

The following steps enable Malwarebytes threat data to be sent to the RocketCyber SOC platform per tenant.

  1. Open Malwarebytes (Nebula) console
    * If you are using Malwarebytes (OneView) multi-tenant console, navigate to sites and click on 'launch site'. This will grant you access to Nebula where configuration is needed.
    Screenshot_2022-12-30_at_11.58.05_AM.png
  2. Navigate to Settings / Syslog Logging
  3. Click Add, then Select a 'Windows' endpoint, then click Assign.
  4. Click Syslog Settings in top right corner.
  5. Fill in required details:
    • IP Address: x.x.x.x (a Static IP is recommended)
    • Port: 514 is usually the default, however if you are using the RocketCyber Firewall Analyzer for this organization on the same computing device for SYSLOG collection, we recommend a different port such as 541 or 551
    • Protocol: UDP is recommended
    • Severity: 1 was used for testing this integration. This setting determines the Severity of all Malwarebytes events sent to RocketCyber CEF syslog collector.
      malwarebytes_syslog.png
    • Communication interval: 5 (minutes) is recommended. * note if this endpoint is offline and/or unable to communicate to the Malwarebytes cloud, data is preserved for 24 hours and then submitted to RocketCyber syslog collector when communication is established. Any data older than 24 hours will not be submitted to the RocketCyber syslog collector.
  1. Next, see Configure RocketCyber Syslog Collector if this step has not been performed.

Congratulations, your RocketCyber SOC is now prepared to receive Malwarebytes threat data.
Screenshot_2022-12-30_at_12.11.53_PM.png