Solved

Anti Virus/Maleware softwares used in business environment (cleaning client machines)

Posted on 2010-08-25
5
584 Views
Last Modified: 2013-12-09
For the guys who run their own business and have clients bring in machines that are infected with spyware/virus etc...

What software do you guys use? I assume you dont just slap on a copy of symantec or panda or malewarebyes, scan then machine then remove? network scan?

are there software's specifically for this type of requirement or is there no difference?

Thank you
0
Comment
Question by:tti-admin
5 Comments
 
LVL 29

Accepted Solution

by:
Sudeep Sharma earned 250 total points
ID: 33523972
I would use
1. HitmanPro - which is free to use for 30 days
2. Malwarebytes - to scan for malware and spyware which might be left out by Hitmanpro
3. Combofix - For everything else or just to make sure that nothing else is left behind.

Sudeep
0
 
LVL 87

Assisted Solution

by:rindi
rindi earned 250 total points
ID: 33523984
First I usually image the HD. Then I scan it and do cleaning  using malwarebytes (usually more than once), then I remove the installed AV tool, then scan it using an online scanner like Trendmicro's housecall. If After that the system is fine, and if it is a home user's PC, I install either Avast! home (free version), or Panda Cloud AV (also free), and then scan the PC again with those. Depending on the type of infection I also run other tools. I also make sure Windoze is completely up-to-date.

If the system is in too bad a state, I do a new installation and open the image files I made to recover data.

In some cases I also use the UBCD4Win so I can scan the system without it's windows running.

http://ubcd4win.com
0
 
LVL 4

Expert Comment

by:Bordeaux0113
ID: 33524024
AVG, Malwarebytes, CCleaner, etc.
Work like charms :)
0
 

Author Comment

by:tti-admin
ID: 33524037
okay so more times than none, you install, scan then remove. like Sharma mentioned above, Hitmanpro can be used from a cd/usb drive so you do not need to install any software.
0
 
LVL 4

Expert Comment

by:Bordeaux0113
ID: 33524082
You got it :)
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Locky virus 9 75
McAfee antivirus exclusions latest doc for DCs 1 49
Ransom.CRYPTXXX Activity 2 9 91
How to remove Odin ransomware ? 11 157
As more computers now shipped with 64-bit version of Windows, more users are now using this Operating System.  So it's important to be aware how some 32-bit diagnostic tool works on these systems, so we know what to expect when analyzing the logs an…
PREFACE The purpose of this guide is to provide information to successfully add specific IIS 7.0 role services for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technol…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now