Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

McAfee Scan32 command line logging

Posted on 2006-06-22
3
Medium Priority
?
6,236 Views
Last Modified: 2012-05-05
I'm running McAfee VirusScan Enterprise 8.0.0 Scan32.exe with command line parameters but I can't get logging to work.

The following parameters are available but how do I specify the log file/path?
The log settings in the VirusScan Console don't appear to be used either.

LOG - Log infection reports to previously specified log file.
LOGFORMAT <value> - Use the specified format for the log file. Valid values are ANSI,UTF8, or UTF16.
LOGSETTINGS - Log the configuration settings of a scan task.
LOGSUMMARY - Log a summary of scan task results.
LOGUSER - Log identifying information about the user who executes ascan task.

My current command looks like this:

scan32.exe C:\ PRIORITY=1 /ALLOLE /MOVE ^
/ALWAYSEXIT /AUTOEXIT /APPLYNVP /CONTINUE /CONTINUE2 ^
/CONTINUEA /CONTINUEA2 /LOGSUMMARY /LOG ^
/NOESTIMATE /START
0
Comment
Question by:tpgriffin
  • 2
3 Comments
 
LVL 32

Accepted Solution

by:
r-k earned 2000 total points
ID: 16964234
I don't have McAfee but I think it is just /LOGFILE <filename>

e.g.

/LOG=C:\VirusScanLog.txt

At least worth a try.



***Edited by rpggamergirl, Page Editor***(06/23/2006 07:08AM CST)
(edited to replace with the correct answer thanks to David S. and tpgriffin)
0
 

Author Comment

by:tpgriffin
ID: 16964465
You're right. The manual only implied the filename parameter.
Thanks!
tg
0
 
LVL 32

Expert Comment

by:r-k
ID: 16964613
Excellent. Happy scanning!
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever tried to find someone you know on Facebook and searched to find more than one result with the same picture? Perhaps someone you know has told you that they have a 'facebook stalker' or someone who is 'posing as them' online and ta…
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

876 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question