
Your LTS Computing Consultant will manage these authorizations.

To get Malwarebytes on your Windows 7 PC, you must log into Lehigh’s Active Directory (AD) and your machine must be authorized, or be part of an authorized Active Directory Group. Installation is performed automatically via our Active Directory group policies. Our license does not extend to personally owned computers. Malwarebytes Anti-Malware is licensed for use on Lehigh owned faculty/staff PCs only. While we are rolling out the software in small groups for now, it is the intent of LTS that eventually all Windows PC will have this configuration as a standard. Each utilizes slightly different security methods to help protect your PC. Lehigh’s preferred security software configuration for Windows PCs includes both Avast Business Security Antivirus AND Malwarebytes Anti-Malware. It is not available for Mac or Linux operating systems. It is designed to run with other security software to enhance the safety of your Windows desktop or laptop PC. It’s not just for rootkits, but also any kind of Mac viruses or malware.Malwarebytes Anti-Malware software guards Windows PCs against viruses, Trojans, spyware, ransomware, adware, and rootkits. The most user-friendly program you can use to remove any rootkits from your Mac is Malwarebytes for Mac. Since this blog is geared towards beginners, I’m going to try to stick to the easiest tools that you can use to detect rootkits on your Mac. It’s also worth mentioning that since OS X is based on UNIX, a lot of the scanners use the command line and require quite a bit of technical know-how. If a rootkit is found, it’s up to you to decide whether the removal was successful or whether you should just start from a clean slate. If nothing comes up using multiple tools, you’re probably OK. If you’re not sure if you have a rootkit, it’s best to use the following tools in the hopes of discovering the rootkit.

This is obviously easier said than done and it’s not something I recommend everyone do. For me, if I even suspect there is a rootkit installed on a client computer, I immediately back up the data and perform a clean install of the operating system.
