INSTALL  AND  ACTIVATE  MALWAREBYTES  PRO  PROTECTION  SOFTWARE

For many years MalwareBytes malware protection software has been one of the leading software tools in identifying and removing stubborn malware (malicious software) problems; especially for "Computer Engineers", who view it as one of their must have tools. They usually use the FREE Version of malwarebytes which is portable and can therefore be installed on many computers from their usb flash drive or usb hard drive. This scenario is okay for them because it means they can do a one-off scan of your computer and then leave you to do any subsequent, manual, scans for your computer. The downside for you though is that your computer will not be benefitting from the extra features of MalwareBytes PRO.


The "Computer Engineer" might of installed a 14 Days Trial of the pro version of malwarebytes for you, in order for them to carry out a better scan of your computer, but still you would not be getting the benefits of realtime (always on) protection and better scanning options. Although the pro version of malwarebytes is not portable, as it is only licensed for one installation on one computer, it is worth buying purely for its overall power of realtime protection against malware and its malware removal success rate. It has not been considered one of the best malware removers for nothing. With a Discount Code off the internet I paid 15.96 instead of 19.95.

THE  INSTALLATION  PROCESS

Once you have paid for MalwareBytes PRO you will receive your DOWNLOAD link and a confirmation e-mail that contains your receipt and product key (serial number) information. Clicking on the DOWNLOAD link (not shown here) will download a set up file called mbam-consumer.exe into your DOWNLOADS folder. That set up file amongst other things contains the actual Installation Wizard - The part of the set up file that guides you through the actual installation steps. Do not worry too much about the installation wizard at this point because I will be guiding you through the same steps of course, so for now just double click on the mbam-consumer.exe set up file to continue.

If you do need more information about installing software in general read the Installing Software category and in particular the Office 2010, RealPlayer, QuickTime and Firefox installation sections.



Fig 1.0  Double click on the set up file called mbam-consumer.exe to continue

Clicking on the mbam-consumer.exe file brings up the following security requester which is simply asking you if you trust the set up file? If you do simply click on the requester's RUN button to continue with the installation process, otherwise click on its CANCEL button. At any time throughout the installation process you can click on the Cancel button, if a Cancel button is available of course. However. Even if you click on a Cancel button the installation might have gone too far for it to be stopped, cancelled and/or reversed. So think very carefully before deciding to install any thing onto your Computer.



Fig 1.1  Wait for the Auto-Play requester to appear and then click on the LAUNCH MALWAREBYTES INSTALL link to continue

After clicking on the RUN button you are than asked which language you would like to use with MalwareBytes PRO. In this example I have kept the default language of English but you can easily change this by clicking on the drop-down menu and selecting a different language. Once your desired langauge is displayed click on the requester's OK button to proceed. Doing so will then launch the installation wizard (Fig 1.3).



Fig 1.2  Select your language, if need be, from the drop-down menu and then click on the OK button to continue




Fig 1.3  The installation wizard's Welcome screen - Click on the NEXT button to continue

The first step of the installation wizard (above) is just a Welcome screen, that you should read before clicking on its NEXT button. After that comes the License Agreement, whose Terms & Conditions you must agree to before continuing.



Fig 1.4  Tick the two I ACCEPT... checkboxes and then click on the NEXT button

Read the License Agreement carefully. Although these tend to contain useless information, they usually explain Copyright issues or Usage issues that clarify who can use the software and who cannot. So if, for example, you are told that a certain piece of software is Free and/or Free To Use you may want to clarify this by reading the agreement. Some installation wizards do not allow you to continue, by fading out the NEXT button, until you have read (scrolled down) the license agreement. When you are ready and if you agree, put a tick next to the two I ACCEPT... checkboxes and then click on the NEXT button (above) to continue.

The next step displays additional information about the New Features and Updates added to this version of MalwareBytes. Read it, if you want to, and then click on the NEXT button.



Fig 1.5  Click on the NEXT button to continue

The fourth step of the installation wizard asks you where you would like to install (store) the actual MalwareBytes files on your computer. By default (normal behaviour) the files are installed (stored) inside a folder called - Malwarebytes' Anti-Malware - which is a sub-folder of the Program Files (x86) folder; a system folder basically. Normally you do not change the path name of the Malwarebytes' Anti-Malware folder. So for this example just click on the NEXT button to continue.



Fig 1.6  Click on the NEXT button to continue

For the next step just click on its NEXT button too. It wants to know if you would like shortcut icons created on the START Menu for MalwareBytes. In this example I have put a tick next to the DON'T CREATE A START MENU FOLDER option, but you could leave it unticked if you wish. It is a matter of preference as to whether or not you want your START Menu cluttered with, unnecessary, folder icons. As malwarebytes is an automatic, always running, program there is no need for its folder icon to be on the START Menu simply because you won't normally have a need to click on it.



Fig 1.7  Click on the NEXT button to continue

The next step is similar to the above but in this case you are being asked if you want to create a Desktop shortcut icon and a Quick Launch (taskbar) shortcut icon. Decide what icon(s) you want and don't want before clicking on the NEXT button. If you are using Windows 7 the CREATE A QUICK LAUNCH option should be unticked as Windows 7 doesn't technically have use for the old quick launch anymore; as it uses its newer Taskbar.



Fig 1.8  Click on the NEXT button to continue

Finally!! MalwareBytes can be installed on your computer as the installation wizard has now got enough information, about your own preferences, to proceed. So all you need to do now is click on the INSTALL button and look at the green guage (progress bar!).



Fig 1.9  Click on the INSTALL button to proceed with the actual installation of MalwareBytes




Fig 1.10  MalwareBytes is now being installed inside the Malwarebytes' Anti-Malware folder




Fig 1.11  MalwareBytes has been installed successfully - Click on the FINISH button to continue

Now that MalwareBytes has been installed successfully, with you clicking on the FINISH button (above), it will then attempt to update its definition (malware database) file - This definition file is similar to the Virus Definition file explained in the protection software section.



Fig 1.12  MalwareBytes is updating its definition (malware database) file




Fig 1.13  Click on the OK button to continue

With the definition (malware database) file download and installed, and more importantly up-to-date, the next stage is to activate Malwarebytes so that you can gain realtime (always on) protection against malware amongst other things. At this stage you will need your e-mail ready as it contains your ID and Product Key (serial number).



Fig 1.14  Click on the ACTIVATE button to gain realtime (always on) protection against malware




Fig 1.15  Enter a valid ID and Product Key before clicking on the ACTIVATE button




Fig 1.16  A valid ID and Product Key have been entered - Click on the OK button to continue




Fig 1.17  Click on the OK button to continue

After activating your updated copy of MalwareBytes the next step is to configure (set up) Malwarebytes in terms of scanning for malware. At the same time, upon first installation of MalwareBytes, it is very important to carry out an initial scan for malware. You just don't know if any is lurking around, as the next example proves.

CONFIGURE  MALWAREBYTES  FOR  UPDATES  AND  SCANS

When the MalwareBytes main window first appears you should click on its PROTECTION Tab and then make sure all of the checkbox options are ticked. The first three options make sure that the important services of MalwareBytes are started when Windows 7 boots up while the last option states you want to be notified whenever any malware websites were blocked. One good reason to have this option switched on (ticked) at this stage is because it will make you aware, as time goes by, whether or not your internet activities are reason for concern (i.e. whether or not you are visiting dodgy websites indirectly).



Fig 2.0  Make sure all of the checkbox options are ticked for better protection

With the above step out of the way you are now ready to perform a Quick Scan of your computer for up-to-date, known, malware; as well as Heuristic malware - Heuristic means MalwareBytes will also scan for malware based on known behaviour and techniques used by malware. To perform a Quick Scan first click on the SCANNER Tab and make sure the PERFORM QUICK SCAN radio (circle/dot) button is selected, which it should be on first time use, and then click on the SCAN button.



Fig 2.1  Click on the SCAN button to perform the selected scan - Quick Scan




Fig 2.2  Your computer is now being scanned for malware (malicious software) problems

As the quick scan is being performed (above) it will scan thousands of system files, third-party files and personal files for malware problems - OBJECTS SCANNED. Ignore that reading and concentrate on the OBJECTS DETECTED reading. When the quick scan has completed (below) it should, hopefully, state OBJECTS DETECTED: 0. If not, you have malware problems.



Fig 2.3  How many objects did MalwareBytes detect on your computer?

In the above example I did not have any malware problems after a quick scan of 200,000+ files - OBJECTS DETECTED: 0 - but this doesn't mean there aren't any problems. Meaning, you should always perform a full scan the first time you install MalwareBytes. So in this example when the quick scan has been performed I will then click on the MAIN MENU button (above), to get back to the main menu of the SCANNER Tab, and then select the PERFORM FULL SCAN option (below) before clicking on the SCAN button.

And because I am going to perform a full scan MalwareBytes will pop-up its Full Scan window (Fig 2.5 below) that allows me to select the hard drives to scan. In this example it had my C:\ and E:\ hard drive partitions selected by default, but as I only want my C:\ hard drive partition scanning (which contains the Windows 7 operating system, third-party files and my personal files) I will deselect E:\ before clicking on the SCAN button.



Fig 2.4  Select the PERFORM FULL SCAN option and then click on the SCAN button




Fig 2.5  Now select the hard drives to scan before clicking on the SCAN button

Clicking on the SCAN button of the Full Scan window (above) will then perform the actual full scan. As you will now see, MalwareBytes finds one malware problem - one malware problem that was NOT detected with a quick scan.



Fig 2.6  The full scan is complete - 1 malware problem found - Click on the SHOW RESULTS button to continue

When MalwareBytes finds one or more problems clicking on the SHOW RESULTS button (above) will list those malware problems in more detail (below). In this example it has found the bug (malware) called pup.bundleoffers.iiq inside a file called coretemp_1236.exe. This is a CPU Temperature utility I downloaded and purposely placed inside my C:\ drive for this MalwareBytes test. The utility is an established, recommended, utility but obviously the download website is a different story. So it just goes to show that you have to be careful of what you are downloading and more importantly where you are downloading it from. It also helps if you perform a full scan of your computer with MalwareBytes every now and then.

In any case; regardless of trusted software on a bad website or trusted software on a trusted website, whenever you get a malware notice (object found) you should ALWAYS have MalwareBytes quarantine that software and if necessary delete that software. In many cases it is better for MalwareBytes to delete the software whereby you either redownload/reinstall it from a better website or just don't use that software again (class it as unworthy). I say in many cases simply because there will be times when you know a piece of software and its website to be trustworthy whereby you feel MalwareBytes has made a bad judgement; but this only comes with experience of the internet - In other words, read reviews about the software you are going to install. Search the internet for the bugs name to see what others have said about it and experienced. Only then will you know for sure what the true story is and what action to take on the bug (malware).

With a problem found, make sure it is selected in the list of malware problems and then click on the REMOVE SELECTED button to remove it. The might need restarting in order to get rid of the malware problem. If so, make sure you have saved any important work you may be doing before clicking on the REMOVE SELECTED button.



Fig 2.7  Select the problem(s) you want taking care of and then click on the REMOVE SELECTED button to continue




Fig 2.8  The computer needs restarting before this bug (malware) can be removed

If the above message requester appears click on its YES button to restart the computer, otherwise click on its NO button to restart the computer later. You may want to restart the computer later because you are still doing some, important, work and/or still doing malware scans with other programs; such as SpyBot.

On top of the above message requester MalwareBytes will also create a log file for you that details more information about the scan. In this example the action taken against the one malware problem can be seen at the bottom of the log - (pup.bundleoffers.iiq) Quarantined and Deleted Successfully.



Fig 2.9  The one malware problem has been Quarantined and Deleted Successfully

The FREE version of MalwareBytes will do just as well as the PRO version, but as said; The PRO version does offer real time protection and better scanning options. I've only touched on the basics (normal use) of MalwareBytes, but it does have more to offer settings-wise and therefore protection-wise. Either way, it should be one of the must-have protection tools on your computer. These days you cannot afford to be as ignorant as a few years ago - Malware programmers, con-artists and online fraudsters are getting better and better at what they do which means you need the best protection software out there; paid-for or free.