When malicious files are detected and quarantined, the files and registry settings are copied and encrypted into a quarantine folder on the endpoint. The Quarantine page in Nebula is an index for each item on the endpoint and allows you to restore or delete detected files.
TIP - To favorite this page, click the favorite icon on the top left. To manage your favorites, see My favorites in Nebula.
While Malwarebytes uses its best judgment whether a file is a threat, false positives are possible. You may also find items in Quarantine which are legitimate. View detected items and cross check the information to verify if the file is legitimate with other Threat Intelligence databases such as VirusTotal using the SHA256 hash of the file.
On the left navigation menu, go to Monitor > Quarantine to view the list of all quarantined threat data.
The following features are available on the Quarantine page:
- Click Add / Remove Columns in the top-right to choose which columns to display.
- Drag and drop certain column headers to the results bar to group data by those parameters.
- Column pinning and auto-sizing: Next to a column header, click the filter
button to display a checkbox list of different sub-filters you can apply. Click the filter
tab to pin or auto size for the selected column.
- Right-click menu: In the table, click and drag to select and highlight a section of the table. Right-click on your selected information to copy the cells and information.
- Select all: Click the checkbox next to the Threat name column header.
- Create Exclusions: Create exclusions on the selected quarantined items. Only Super Admins can create exclusions. For more information on exclusions, see Overview of exclusions in Nebula.
- Restore: Moves the item from Quarantine to its original location on the endpoint. Use this for items you know are legitimate.
- Delete: Submits a task to the endpoint to permanently delete the encrypted quarantined items.
- Restore & Create Exclusion: Restore and create exclusions on the selected quarantined items.
Click on a column filter icon to narrow the results. When clicking on the filter icon, the filter list at the top of the screen shows which filters are applied. Click on a filtered item to remove it, or Clear Filters to remove them all.
Click a threat name for details, or click an endpoint to jump to the details screen for that endpoint.
Expand quarantine details
Under the Name column, click one of the listed file names to view more details. In the Quarantine Details window, you can view the following information:
- Name: Click the name to open a glossary explanation of the detection.
- Category: The protection that was triggered by the detection.
- Type: The type of detection, such as a file or outbound connection.
- Location: The location of the detection on the endpoint.
- Detection ID: The detection identification used by Malwarebytes threat researchers.
- Endpoint: Click the endpoint name to go to the Overview page for the endpoint.
- Scanned At: Date and time when the scan occurred that found the detection.
- Quarantined At: Date and time when the detection was quarantined. Threats blocked by Real-Time Protection will not show the Quarantined At field.
- Reported At: Date and time when the quarantined detection was reported to the Nebula console.
- Scan ID: The identification for the scan that found the detection. Click the Scan ID to view the Scan Report for the effected endpoint.
While the Quarantine section shows all quarantined threats across your network, the actual threats remain in an encrypted state on the endpoints where they were found. The quarantine location is a predefined folder on your endpoints:
- Windows endpoints: C:\ProgramData\Malwarebytes\MBAMService\Quarantine
- Mac endpoints: /Library/Application Support/Malwarebytes/NCEP/Quarantine/
- Linux endpoints: /var/lib/mblinux/quarantine
Return to the Malwarebytes Nebula Administrator Guide.