As of April 4, 2019, product release history, user guides, and lifecycle information have been moved to the Malwarebytes Support site. Please go to https://support.malwarebytes.com/ and choose from the Home or Business Solutions for more information.
In order to make sure that users have the best threat protection possible and to focus our development efforts on continuing to protect users from new threats, Malwarebytes has published a lifecycle policy effective December 8, 2016. The purpose of this policy is to establish clear guidance on the expected lifetime of our software and technologies. This usually occurs whenever we release a new version of existing software, when we have brand-new software/a major evolution of existing software, or when we choose not to release any more versions of a product for business or technology reasons.
The Malwarebytes Lifecycle Policy applies to major, minor, and patch/service versions of our software. A version marks an update to our software and/or technologies. Version numbers are generally (but not consistently) differentiated with the nomenclature "X.YY.Z". Typically, a change in "X" indicates a major version update, which represents a large number of new features, bug fixes, and/or major software architectural or technological changes in the release. A change in "YY" indicates a minor version update, usually with a smaller number of new features and bug fixes. A change in (or addition of) "Z" represents a smaller planned patch or service release. Release versions may also be designated by Month and Year of general availability.
Malwarebytes products may include one or more separate software applications, each on their own lifecycle timeline. Furthermore, we may offer the same application in multiple products on separate lifecycle timelines. Please see our Product Lifecycle Matrix for more information on the lifecycles of specific Malwarebytes applications and versions.
When an individual software application is updated, it will be included in the latest version of the product .zip package. To access the update, simply re-download the .zip package from your original purchase document. If you don't have access to your original purchase document, please contact Support and we'll be happy to assist you.
Malwarebytes protection products include several prevention features that make up a layered defense strategy, protecting against daily threats. Each layer is designed to disrupt the attack chain at a different stage. While all Malwarebytes products are highly effective in dealing with attacks, our protection capabilities are most effective when you install all product components and take advantage of the full product suite, allowing each prevention layer to do the job for which it is best suited. While we understand that some customers use individual Malwarebytes standalone clients for remediation or to enhance an existing third-party endpoint security solution, relying only on one or two Malwarebytes standalone components (Anti-Malware, Anti-Exploit, or Anti-Ransomware) is not representative of the true protection capabilities of Malwarebytes when the full protection stack is deployed.
As technology continues to evolve we need to ensure that we focus our efforts on supporting the operating systems and conditions that our users are most frequently using. This helps us improve user experience by making our products widely accessible and yet finely tuned for various system configurations. Accordingly, Malwarebytes reserves the right to drop support for older operating systems, browsers, and other operating conditions with each release of a product or individual application. Generally, Malwarebytes does not recommend continued use of operating systems, browsers, and other operating conditions that are no longer supported by the developer.
What this is | What this means for you | |
---|---|---|
GA date | The date when a new version of our software is available for sale or public download (excluding Beta). | A new software version is available. If you have an older version, you should upgrade as soon as possible to get the latest feature updates. |
End of Sale | The date when an older version of our software is no longer available for sale, renewal, or public download. | An older version of our product is no longer available to purchase or download. Typically, we release a new version to replace it on the same day. From time to time, we may choose to discontinue software in order to focus on newer iterations of our technologies; if we have chosen not to release any more new versions, we’ll provide instructions on how to migrate to another comparable Malwarebytes product, if available. |
End of Maintenance | The date when we will no longer provide maintenance on an older version of our software. | Bugs happen. From the General Availability date until the End of Maintenance date, if we find a bug in an older version our software, we may choose to fix it as a hotfix or silent update. After the End of Maintenance date, we’ll provide technical support on the existing functionality of that version, and may choose to address bugs in a newer version of the software, if applicable. |
End of Life | The date when we will no longer provide technical support on an older version of our software, exactly 6 months after the End of Maintenance date for Home applications and 12 months after End of Maintenance for Business and Technician applications. Versions that are past their End of Life date are considered “Legacy.” All versions that have not yet reached their End of Life date are considered “Active.” | If you are using an older version of our software that is past its End of Life date, technical support will be limited to help with upgrade to the latest version, or migration to a comparable Malwarebytes product, if applicable. We will continue to answer common product questions, and any existing self-help resources will still be available. You may continue to use the older product version at your own risk, but ongoing protection updates are not guaranteed. This is because we are always looking for more efficient and more advanced detection techniques for our protection updates, which may not be compatible with older versions of our software. Eventually the older techniques used in older versions of our software may become obsolete as the threat landscape changes. |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
November 2018||| | Active | 11/29/2018 | ||||
October 2018ǁ | Legacy | 10/18/2018 | 11/29/2018 | 11/29/2018 | 11/29/2018 | |
September 2018 | Legacy | 9/13/2018 | 10/18/2018 | 10/18/2018 | 10/18/2019 | |
August 2018 | Legacy | 8/16/2018 | 9/13/2018 | 9/13/2018 | 9/13/2019 | |
July 2018‡ | Active | 7/19/2018 | 8/16/2018 |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
October 2018ǁ | Active | 10/18/2018 | ||||
September 2018 | Legacy | 9/13/2018 | 10/18/2018 | 10/18/2018 | 10/18/2019 | |
August 2018 | Legacy | 8/16/2018 | 9/13/2018 | 9/13/2018 | 9/13/2019 | |
July 2018‡ | Active | 7/19/2018 | 8/16/2018 |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
October 2018ǁ | Active | 10/18/2018 | ||||
September 2018 | Legacy | 9/13/2018 | 10/18/2018 | 10/18/2018 | 10/18/2019 | |
August 2018 | Legacy | 8/16/2018 | 9/13/2018 | 9/13/2018 | 9/13/2019 | |
July 2018‡ | Active | 7/19/2018 | 8/16/2018 |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
October 2018ǁ | Active | 10/18/2018 | ||||
September 2018 | Legacy | 9/13/18 | 10/18/2018 | 10/18/2018 | 10/18/2019 | |
August 2018 | Legacy | 8/16/18 | 9/13/2018 | 9/13/2018 | 9/13/2019 | |
July 2018‡ | Active | 7/19/18 | 8/16/2018 |
Upgrade to the latest product/version: Malwarebytes Management Console v1.9 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.9 | Active | 11/20/2018 | ||||
1.8.1 | Legacy | 5/21/2018 | 11/20/2018 | 11/20/2018 | 11/20/2019 | |
1.8 | Legacy | 3/22/17 | 5/21/2018 | 5/21/2018 | 5/21/2019 | |
1.7 | Legacy | 5/26/16 | 3/22/17 | 3/22/17 | 3/22/18 | |
1.6 | Legacy | 9/21/15 | 5/26/16 | 12/8/16† | 12/8/17† | |
1.5.0.2710 | Legacy | 3/9/15 | 9/21/15 | 12/8/16† | 12/8/17† | |
1.4.1.2329 | Legacy | 10/20/14 | 3/9/15 | 12/8/16† | 12/8/17† | |
1.4.0.2268 | Legacy | 6/12/14 | 10/20/14 | 12/8/16† | 12/8/17† |
Upgrade to the latest product/version: Malwarebytes Anti-Malware for Business v1.80.2 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.80.2 | Active | 5/26/16 | ||||
1.80.1 | Legacy | 11/11/15 | 5/26/16 | 12/8/16† | 12/8/17† | |
1.8 | Legacy | 9/21/15 | 11/11/15 | 12/8/16† | 12/8/17† | |
1.75 | Legacy | 6/12/13 | 9/21/15 | 12/8/16† | 12/8/17† |
Upgrade to the latest product/version: Malwarebytes Anti-Exploit for Business v1.12.2.141 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.12.2.141 | Active | 12/6/2018 | ||||
1.12.2.124 | Active | 9/5/2018 | 12/6/2018 | 12/6/2018 | 12/6/2019 | |
1.12.2.109 | Legacy | 8/13/2018 | 9/5/2018 | 9/5/2018 | 9/5/2019 | |
1.12.2.90 | Legacy | 6/25/2018 | 8/13/2018 | 8/13/2018 | 8/13/2019 | |
1.12.2.81 | Legacy | 5/14/2018 | 6/25/2018 | 6/25/2018 | 6/25/2019 | |
1.12.2.68 | Legacy | 4/19/18 | 5/14/2018 | 5/14/2018 | 5/14/2019 | |
1.12.2.67 | Legacy | 4/17/18 | 4/19/18 | 4/19/18 | 4/19/19 | |
1.11.2.55 | Legacy | 1/9/18 | 4/17/18 | 4/17/18 | 4/17/19 | |
1.10.2.41 | Legacy | 9/20/17 | 1/9/18 | 1/9/18 | 1/9/19 | |
1.09.2.1413 | Legacy | 5/17/17 | 9/20/17 | 9/20/17 | 9/20/18 | |
1.09.2.1384 | Legacy | 4/19/17 | 5/17/17 | 5/17/17 | 5/17/18 | |
1.09.2.1334 | Legacy | 2/15/17 | 4/19/17 | 4/19/17 | 4/19/18 | |
1.09.2.1291 | Legacy | 12/15/16 | 2/15/17 | 2/15/17 | 2/15/18 | |
1.08.2.2572 | Legacy | 8/2/16 | 12/15/16 | 12/15/16 | 12/15/17 | |
1.08.2.2563 | Legacy | 6/29/16 | 8/2/16 | 12/8/16† | 12/8/17† | |
1.08.2.1045 | Legacy | 12/2/15 | 6/29/16 | 12/8/16† | 12/8/17† | |
1.07.2.1015 | Legacy | 7/24/15 | 12/2/16 | 12/8/16† | 12/8/17† | |
1.07.2.1010 | Legacy | 7/1/15 | 7/24/15 | 12/8/16† | 12/8/17† | |
1.06.2.1018 | Legacy | 3/31/15 | 7/1/15 | 12/8/16† | 12/8/17† | |
1.05.2.1016 | Legacy | 12/11/14 | 3/31/15 | 12/8/16† | 12/8/17† | |
1.04.2.1012 | Legacy | 9/4/14 | 12/11/14 | 12/8/16† | 12/8/17† | |
1.03.2.1220 | Legacy | 6/12/14 | 9/4/14 | 12/8/16† | 12/8/17† |
Migrate to the latest product/version: Anti-Ransomware Client v0.9.18 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
0.9.18 | Active | 8/24/17 | ||||
0.9 | Legacy | 9/12/16 | 8/24/17 | 8/24/17 | 8/24/18 |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
3.6.1 | Active | 11/20/2018 |
Upgrade to the latest product/version: Mac Remediation Client v1.3.1 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.3.1 | Active | 10/17/17 | ||||
1.2.6 | Legacy | 1/23/17 | 10/17/17 | 10/17/17 | 10/17/18 | |
1.2.5 | Legacy | 11/2/16 | 1/23/17 | 1/23/17 | 1/23/18 | |
1.2.4 | Legacy | 5/26/16 | 11/2/16 | 12/8/2016† | 12/8/2017† |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
3.6.1 | Active | 11/20/2018 |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
3.4.2 | Active | 11/20/2018 |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
3.5 | Active | 11/20/2018 |
Upgrade to the latest product/version: Malwarebytes Breach Remediation v3.6.1 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
3.6.1 | Active | 10/30/18 | ||||
2.7.2 | Legacy | 6/21/18 ‡§ | 10/30/18 | 10/30/18 | 10/30/19 | |
2.7.1 | Legacy | 11/2/16 | 6/28/17 | 6/21/18 | 6/21/19 | |
2.7 | Legacy | 5/26/16 | 11/2/16 | 12/8/16† | 12/8/17† | |
2.6.2 | Legacy | 5/6/16 | 5/26/16 | 12/8/16† | 12/8/17† | |
2.6.1 | Legacy | 3/8/16 | 5/6/16 | 12/8/16† | 12/8/17† | |
2.6 | Legacy | 2/29/16 | 3/8/16 | 12/8/16† | 12/8/17† |
Upgrade to the latest product/version: Malwarebytes Breach Remediation for Mac v1.3.1 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.3.1 | Active | 10/17/17 | ||||
1.2.6 | Legacy | 1/23/17 | 10/17/17 | 10/17/17 | 10/17/18 | |
1.2.5 | Legacy | 11/2/16 | 1/23/17 | 1/23/17 | 1/23/18 | |
1.2.4 | Legacy | 5/26/16 | 11/2/16 | 12/8/2016† | 12/8/2017† |
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
---|---|---|---|---|---|---|
3.6.1 | Active | 10/30/2018 | ||||
1.0 | Legacy | 5/26/16§ | 10/30/2018 | 10/30/2018 | 10/30/2019 |
‡ This product is Active for renewals only. The Lifecycle Milestone dates shown for this product/version apply only to renewed subscriptions that began before the End of Sale date of the previous version
§ Malwarebytes Breach Remediation 2.7.2 and Malwarebytes Forensic Timeliner 1.0 will be the last versions available to users on Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008 operating systems. There will be no updates for these operating systems, this includes additional product enhancements or features. In order to get access to any protection updates utilizing updated detection technologies or techniques in newer versions, users will need to upgrade to a newer operating system.
Upgrade to the latest Product/Version: Malwarebytes Management Console v1.9 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.8 | Legacy | 3/22/17 | 6/28/17 | 8/28/17 | 8/28/18 | |
1.7 | Legacy | 5/26/16 | 3/22/17 | 3/22/17 | 3/22/18 | |
1.6 | Legacy | 9/21/15 | 5/26/16 | 12/8/16† | 12/8/17† | |
1.5.0.2710 | Legacy | 3/9/15 | 9/21/15 | 12/8/16† | 12/8/17† | |
1.4.1.2329 | Legacy | 10/20/14 | 3/9/15 | 12/8/16† | 12/8/17† | |
1.4.0.2268 | Legacy | 6/12/14 | 10/20/14 | 12/8/16† | 12/8/17† |
Upgrade to the latest Product/Version: Malwarebytes Anti-Malware for Business v1.80.2 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.80.2 | Legacy | 5/26/16 | 6/28/17 | 8/28/17 | 8/28/18 | |
1.80.1 | Legacy | 11/11/15 | 5/26/16 | 12/8/16† | 12/8/17† | |
1.8 | Legacy | 9/21/15 | 11/11/15 | 12/8/16† | 12/8/17† | |
1.75 | Legacy | 6/12/13 | 9/21/15 | 12/8/16† | 12/8/17† |
Upgrade to the latest Product/Version: Malwarebytes Management Console v1.9 | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.8 | Legacy | 3/22/17 | 6/28/17 | 8/28/17 | 8/28/18 | |
1.7 | Legacy | 5/26/16 | 3/22/17 | 3/22/17 | 3/22/18 | |
1.6 | Legacy | 9/21/15 | 5/26/16 | 12/8/16† | 12/8/17† | |
1.5.0.2710 | Legacy | 3/9/15 | 9/21/15 | 12/8/16† | 12/8/17† | |
1.4.1.2329 | Legacy | 10/20/14 | 3/9/15 | 12/8/16† | 12/8/17† | |
1.4.0.2268 | Legacy | 6/12/14 | 10/20/14 | 12/8/16† | 12/8/17† |
Upgrade to the latest Product/Version: Malwarebytes Endpoint Security | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.09.2.1413 | Legacy | 5/17/17 | 6/28/17 | 8/28/17 | 8/28/18 | |
1.09.2.1384 | Legacy | 4/19/17 | 5/17/17 | 5/17/17 | 5/17/18 | |
1.09.2.1334 | Legacy | 2/15/17 | 4/19/17 | 4/19/17 | 4/19/18 | |
1.09.2.1291 | Legacy | 12/15/16 | 2/15/17 | 2/15/17 | 2/15/18 | |
1.08.2.2572 | Legacy | 8/2/16 | 12/15/16 | 12/15/16 | 12/15/17 | |
1.08.2.2563 | Legacy | 6/29/16 | 8/2/16 | 12/8/16† | 12/8/17† | |
1.08.2.1045 | Legacy | 12/2/15 | 6/29/16 | 12/8/16† | 12/8/17† | |
1.07.2.1015 | Legacy | 7/24/15 | 12/2/16 | 12/8/16† | 12/8/17† | |
1.07.2.1010 | Legacy | 7/1/15 | 7/24/15 | 12/8/16† | 12/8/17† | |
1.06.2.1018 | Legacy | 3/31/15 | 7/1/15 | 12/8/16† | 12/8/17† | |
1.05.2.1016 | Legacy | 12/11/14 | 3/31/15 | 12/8/16† | 12/8/17† | |
1.04.2.1012 | Legacy | 9/4/14 | 12/11/14 | 12/8/16† | 12/8/17† | |
1.03.2.1220 | Legacy | 6/12/14 | 9/4/14 | 12/8/16† | 12/8/17† |
Migration information | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
2.5.2 | Legacy | 2/3/16 | 5/26/16 | 5/26/16* | 5/26/17* | |
2.5.1 | Legacy | 11/11/15 | 5/26/16 | 5/26/16* | 5/26/17* | |
2.5 | Legacy | 10/11/15 | 5/26/16 | 5/26/16* | 5/26/17* | |
2.1 | Legacy | 6/24/15 | 5/26/16 | 5/26/16* | 5/26/17* | |
1.75 | Legacy | 6/12/14 | 5/26/16 | 5/26/16* | 5/26/17* |
Migration information | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.75 | Legacy | 4/9/13 | 6/12/14 | 6/12/14* | 6/12/15* | |
1.7 | Legacy | 12/27/12 | 4/9/13 | 4/9/13* | 4/9/14* | |
1.65.1 | Legacy | 10/17/12 | 12/27/12 | 12/27/12* | 12/27/13* | |
1.65 | Legacy | 9/10/12 | 10/17/12 | 10/17/12* | 10/17/13* | |
1.62 | Legacy | 7/11/12 | 9/10/12 | 9/10/12* | 9/10/13* | |
1.61 | Legacy | 4/9/12 | 7/11/12 | 7/11/12* | 7/11/13* |
Migration information | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
1.3.1.1962 | Legacy | 12/12/13 | 6/12/14 | 6/12/14* | 6/12/14* | |
1.3.0.1936 | Legacy | 10/15/13 | 12/12/13 | 6/12/14* | 6/12/14* | |
1.2.1.1665 | Legacy | 5/24/13 | 10/15/13 | 6/12/14* | 6/12/14* | |
1.2.0.1578 | Legacy | 3/6/13 | 5/24/13 | 6/12/14* | 6/12/14* | |
1.2.0.1517 | Legacy | 12/1/12 | 3/6/13 | 6/12/14* | 6/12/14* | |
1.0 | Legacy | 9/19/12 | 12/1/12 | 6/12/14* | 6/12/14* |
Migration information | ||||||
---|---|---|---|---|---|---|
Version | Status | GA Date | End of Sale | End of
Maintenance |
End of Life | |
2.00.0.1400 | Legacy | 10/1/13 | 12/31/15 | 12/31/15* | 12/31/16* |
* The Lifecycle Milestone dates shown for this product/version have been communicated publicly by Malwarebytes prior to the Lifecycle Policy effective date. The originally communicated dates will continue to be honored. If the product/version has already reached its End of Life Date, it is considered "Legacy" and is no longer supported or maintained.
† The End of Maintenance and End of Life Milestone dates for this product/version were not communicated publicly prior to the Lifecycle Policy effective date. End of Maintenance for this version will coincide with the Effective Date of the Lifecycle Policy. End of Life will be exactly 6 months from the End of Maintenance Date for Home applications, and 12 months from the End of Maintenance Date for Business and Technician applications.
‡ Malwarebytes Cloud Console and associated Windows Endpoint Agent released on July 2018 (affecting Malwarebytes Incident Response, Malwarebytes Endpoint Protection and Malwarebytes Endpoint Protection & Response) will be the last version available to users on Windows XP, Windows Vista, and Windows Server 2008 operating systems. There will be no updates for these operating systems, this includes additional product enhancements or features. In order to get access to any protection updates utilizing updated detection technologies or techniques in newer versions, users will need to upgrade to a newer operating system. Please note, we do not intend to declare End of Maintenance for these platforms immediately upon the release of the next version, but will make such declaration at a later date. We may release bug fixes, stability improvements, and other upgrades for the aforementioned platforms on an as needed basis. Users on these operating systems will continue to receive any available protection updates that are supported in the July 2018 update until its respective End of Maintenance date.
ǁ As of October 18, 2018, Malwarebytes will no longer be supporting Windows Server 2003 or Windows Server 2003 R2.
||| Malwarebytes Cloud Console and associated Mac Endpoint Agent released on November 2018 (affecting Malwarebytes Incident Response, Malwarebytes Endpoint Protection, and Malwarebytes Endpoint Protection and Response) will be the last version available to users on MacOS 10.10. There will be no updates for this operating system, this includes additional product enhancements or features. In order to get access to any protection updates utilizing updated detection technologies or techniques in newer versions, users will need to upgrade to a newer operating system. Please note, we do not intend to declare End of Maintenance for the platform immediately upon the release of the next version, but will make such declaration at a later date. We may release bug fixes, stability improvements, and other upgrades for the platform on an as needed basis. Users on these operating systems will continue to receive any available protection updates that are supported in the November 2018 update until its respective End of Maintenance date.
Select your language
Your intro to everything relating to cyberthreats, and how to stop them.