Solved

Anybody have experience silent-installing HitmanPro.Alert

Posted on 2014-03-28
3
1,532 Views
Last Modified: 2014-04-08
We are big fans of  HitmanPro.Alert and want to deploy it at all our customer's sites.
Our management portal can script installs but it doesn't seem that the  HitmanPro.Alert installer has a /quiet or /silent switch.  Desktops end up with "System Message" pop-ups.
Anybody know a way around this?
0
Comment
Question by:mattinvt
  • 2
3 Comments
 
LVL 63

Expert Comment

by:btan
ID: 39963311
I saw in the pdf for it deploying as GPO and the command reference that can be handy

/quiet - Implies /scan but immediately initiates a silent scan of the computer.

Hitman Pro will be visible only in the system tray and a notification balloon is displayed, notifying the user his computer is scanned for malware. When infections are found, the program will pop up for interaction with the user. The EULA is automatically accepted.
 
Example: HitmanPro35.exe /quiet

/scanonly - Immediately initiates a silent scan of the computer

Hitman Pro will be visible only in the system tray. Does not show a notification balloon.
Program will not be installed on the local computer (implies /noinstall). The EULA is automatically accepted.
 
Example: HitmanPro35.exe /scanonly

/log= - This will instruct Hitman Pro to scan a system silently and export the results to an xml log file to the specified log file folder (typically a network location). No dialogs are displayed to the user.

Examples:
HitmanPro35.exe /scanonly /log="Z:\%USERNAME%.xml"
HitmanPro35.exe /scanonly /log="Z:\%COMPUTERNAME%.xml"
HitmanPro35.exe /scanonly /log="\\Server\Share\Logs\"
 
In these examples Z: is a typical shared folder on a file server. Users (or a user group) must have the write permission on this folder and share.
 
When specifying a folder as logfile it must end with a \ When logging to a folder, the file name is constructed using the computer name and a date/time stamp, example:
 
WORKSTATION14_20100428114347.xml
0
 

Author Comment

by:mattinvt
ID: 39966484
Thanks for your help - This reference is for Hitman Pro, though.
HitmanPro.Alert is a different product
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39966744
Will check it out further but will the option list at command line list out the avilable option such as using /? or something similar...it also has 32 and 64 bit executables and are all services rather than plugin. I suspecting if the hitman pro approach can be adopted though thinking aloud...

I saw in forum stating

command line options like /install /uninstall /quiet. In addition we have a GPO template planned for configuration.

No further details though to dive deeper, another means is to poll the community forum for sharing - I am sure you are not the first
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

UPDATE - 6/15/2011 Added support for Release Update 6 Maintenance Patch 2 Point Patch 1 (RU6 MP2 PP1). Fixed a defect in the username field that was hard-coded to look for a specific domain (left over code from testing). This release will be the …
There are many reasons malware will stay around and continue to grow as a business.  The biggest reason is the expanding customer base.  More than 40% of people who are infected with ransomware, pay the ransom.  That makes ransomware a multi-million…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question