Breach Remediation

Provides advanced threat detection and remediation for your endpoints via an extensible platform.


Trusted by

Vermeer uses Malwarebytes Dole uses Malwarebytes Samsung uses Malwarebytes

Stop re-imaging, start hunting

According to Gartner, malicious threats remain undetected on business endpoints for 205 days on average*. Can your enterprise business wait that long? Our threat detection and remediation solution scans for and remediates malware, reducing dwell time and the need for endpoint re-imaging.

Malwarebytes Breach Remediation is engineered to integrate seamlessly into existing security stacks. If your endpoints require comprehensive advanced threat protection, we recommend Malwarebytes Endpoint Security.

*Sources: Gartner Security & Risk Management Summit Presentation, Defending Endpoints From Persistent Attack, Peter Firstbrook, 8-11 June 2015

Malwarebytes Breach Remediation Screenshots


Malwarebytes hunts for malware

Hunts for malware

Discovers new and undetected malware and rapidly remediates it. Uses Malwarebytes behavioral rules and heuristics to detect zero-day malware. Accesses indicators of compromise (IOCs) from third-party breach detection tools and repositories for comprehensive detection.

Malwarebytes Remediates malware thoroughly

Remediates malware thoroughly

Removes all traces of infections and related artifacts, not just the primary payload or infector. Eliminates risk of new attacks or lateral movements that capitalize on leftover malware traces. Malwarebytes is the de facto industry leader in malware remediation—trusted by millions and proven by

Malwarebytes Reduces threat dwell time

Reduces threat dwell time

Detects advanced threats that your other security layers have missed, closing the window between discovery and remediation. Reduces exposure to malicious activity.

Malwarebytes Records threat events for later analysis

Records threat events for later analysis

Tracks forensic analytics using the proprietary Forensic Timeliner feature so your team can address security gaps or unsafe user behavior. Gathers system events prior to and during an infection and presents data in a timeline for comprehensive analysis of vector and attack chain.

Malwarebytes Works within your stack

Works within your stack

Integrates easily with existing security infrastructure such as SIEM, breach detection systems, and endpoint management platforms. Enables you to trigger deployment and remediation through your endpoint management platform based on alerts received from your SIEM and automatically feed resolution details back into your SIEM.

Malwarebytes Closes Apple security gap

Closes Apple security gap

Removes malware and adware quickly from Mac endpoints. Cleans OS X systems in less than a minute. Separate GUI and command line programs enable flexible deployment using popular Mac management solutions. Allows remote, automated operation using shell, or AppleScript commands.

Breach Remediation features

  • Advanced malware remediation with anti-rootkit scanning [ PC ] [ Mac ]
  • Intelligent proprietary scanning engine [ PC ] [ Mac ]
  • Automated remote malware discovery and remediation [ PC ] [ Mac ]
  • Behavioral forensic analytics [ PC ]
  • Command-line interface [ PC ] [ Mac ]
  • Graphical user interface [ Mac ]
  • Custom OpenIOC threat indicators (XML format) [ PC ]
  • Four system scan types (Full, Threat, Hyper, Path) [ PC ]
  • Optional scan-and-remediate or scan-only modes [ PC ] [ Mac ]
  • Quarantine management of detected threats [ PC ] [ Mac ]
  • Event logging to central location (CEF format) [ PC ]
  • No lasting footprint on endpoint [ PC ] [ Mac ]
  • Extensible platform supports flexible deployment options [ PC ] [ Mac ]

Breach Remediation in action (Mac version)

The Mac version deploys using popular management solutions and offers both GUI and command line interface (CLI) options.

Tech specs

These are the minimum requirements for a computer on which Malwarebytes Breach Remediation is deployed. Please note that these requirements do not include other functionality that the computer is responsible for.

Breach Remediation More

Click here to view our full business history.

Languages Available

Included Components
Windows CLI program
Windows Forensic Timeliner program
Mac GUI program
Mac CLI program

Hardware Requirements
256MB of RAM (512MB or more recommended)
800MHz CPU or faster
20MB of free hard disk space
800x600 or greater screen resolution
Active Internet Connection, for license validation and threat signature updates
USB Port (optional, depending on deployment method)

Supported Operating Systems
Windows 10® (32-bit, 64-bit)
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (Service Pack 3 or later, 32-bit only)
Windows Server 2012®/2012 R2® (32-bit, 64-bit)
Windows Server 2008®/2008 R2® (32-bit, 64-bit)
Windows Server 2003® (32-bit only)
Mac OS X (10.9 and newer)

Please note that Windows servers using the Server Core installation process are specifically excluded.

Want to prevent cyberthreats?

Check out Malwarebytes Endpoint Security.

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language

Cybersecurity basics

Your intro to everything relating to cyberthreats, and how to stop them.