Malwarebytes is an American internet security company that was officially established in 2008. Today it has offices operating from all over the United States and its products are well-known and well-trusted globally. Malwarebytes was one of the first companies in combat when the ransomware attacks started taking place all over the world. Malwarebytes firewall is considered an extremely reliable and trustworthy security measure. However, when it comes to online privacy and online freedom, users still need a reliable and trustworthy virtual private network or VPN service. The only problem is that if you use a VPN application with the Malwarebytes firewall, it might cause a software conflict in the sense that the Malwarebytes firewall will treat the VPN application as a threat and block it or prevent it from operating normally. In order to avoid this conflict from taking place we need to add an exception rule within the Malwarebytes firewall for the VPN application to inform it that it is not a threat and allow it through. In this tutorial we will show you, step-by-step, how to add an exception rule, in the Malwarebytes firewall, for your VPN application.
Adding a VPN Exception Rule to Malwarebytes Firewall
1- Open your Malwarebytes software
2- At the top of the main window, click to open the tab labeled “Settings”
3- From the panel on the left side of the “Settings” window, click on “Malware Exclusions”
4- At the bottom of the window, click on “Add File”
5- From the file browsing window, browse through your computer files to the location of where you saved your VPN application when you installed it
6- Select the VPN application and click on “Open”
7- The name of the VPN application should appear now in the list under “Malware Excursions”
8- Close the Malwarebytes software
From now on there should not be any software conflict between your VPN and the Malwarebytes firewall as now it has become acquainted with your VPN application and hence will no longer treat it as a threat and block it or prevent it from operating normally. These steps can be applied to any program or application as long as it is trustworthy enough.