Solved

Anybody have experience silent-installing HitmanPro.Alert

Posted on 2014-03-28
3
1,586 Views
Last Modified: 2014-04-08
We are big fans of  HitmanPro.Alert and want to deploy it at all our customer's sites.
Our management portal can script installs but it doesn't seem that the  HitmanPro.Alert installer has a /quiet or /silent switch.  Desktops end up with "System Message" pop-ups.
Anybody know a way around this?
0
Comment
Question by:mattinvt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 63

Expert Comment

by:btan
ID: 39963311
I saw in the pdf for it deploying as GPO and the command reference that can be handy

/quiet - Implies /scan but immediately initiates a silent scan of the computer.

Hitman Pro will be visible only in the system tray and a notification balloon is displayed, notifying the user his computer is scanned for malware. When infections are found, the program will pop up for interaction with the user. The EULA is automatically accepted.
 
Example: HitmanPro35.exe /quiet

/scanonly - Immediately initiates a silent scan of the computer

Hitman Pro will be visible only in the system tray. Does not show a notification balloon.
Program will not be installed on the local computer (implies /noinstall). The EULA is automatically accepted.
 
Example: HitmanPro35.exe /scanonly

/log= - This will instruct Hitman Pro to scan a system silently and export the results to an xml log file to the specified log file folder (typically a network location). No dialogs are displayed to the user.

Examples:
HitmanPro35.exe /scanonly /log="Z:\%USERNAME%.xml"
HitmanPro35.exe /scanonly /log="Z:\%COMPUTERNAME%.xml"
HitmanPro35.exe /scanonly /log="\\Server\Share\Logs\"
 
In these examples Z: is a typical shared folder on a file server. Users (or a user group) must have the write permission on this folder and share.
 
When specifying a folder as logfile it must end with a \ When logging to a folder, the file name is constructed using the computer name and a date/time stamp, example:
 
WORKSTATION14_20100428114347.xml
0
 

Author Comment

by:mattinvt
ID: 39966484
Thanks for your help - This reference is for Hitman Pro, though.
HitmanPro.Alert is a different product
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39966744
Will check it out further but will the option list at command line list out the avilable option such as using /? or something similar...it also has 32 and 64 bit executables and are all services rather than plugin. I suspecting if the hitman pro approach can be adopted though thinking aloud...

I saw in forum stating

command line options like /install /uninstall /quiet. In addition we have a GPO template planned for configuration.

No further details though to dive deeper, another means is to poll the community forum for sharing - I am sure you are not the first
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
svg file 10 125
automated malware analysis of a file 3 61
Help Fixing Zeus Virus Mess 11 70
Windows 8 recovery issue 12 51
It started not too long ago. It was at first annoying. My keystrokes seemed to be randomly generated, not the ones I typed on the keyboard. For some reason this only happened in certain applications (especially browsers such as IE11, Firefox and Chr…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question