?
Solved

Anybody have experience silent-installing HitmanPro.Alert

Posted on 2014-03-28
3
Medium Priority
?
1,648 Views
Last Modified: 2014-04-08
We are big fans of  HitmanPro.Alert and want to deploy it at all our customer's sites.
Our management portal can script installs but it doesn't seem that the  HitmanPro.Alert installer has a /quiet or /silent switch.  Desktops end up with "System Message" pop-ups.
Anybody know a way around this?
0
Comment
Question by:mattinvt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 64

Expert Comment

by:btan
ID: 39963311
I saw in the pdf for it deploying as GPO and the command reference that can be handy

/quiet - Implies /scan but immediately initiates a silent scan of the computer.

Hitman Pro will be visible only in the system tray and a notification balloon is displayed, notifying the user his computer is scanned for malware. When infections are found, the program will pop up for interaction with the user. The EULA is automatically accepted.
 
Example: HitmanPro35.exe /quiet

/scanonly - Immediately initiates a silent scan of the computer

Hitman Pro will be visible only in the system tray. Does not show a notification balloon.
Program will not be installed on the local computer (implies /noinstall). The EULA is automatically accepted.
 
Example: HitmanPro35.exe /scanonly

/log= - This will instruct Hitman Pro to scan a system silently and export the results to an xml log file to the specified log file folder (typically a network location). No dialogs are displayed to the user.

Examples:
HitmanPro35.exe /scanonly /log="Z:\%USERNAME%.xml"
HitmanPro35.exe /scanonly /log="Z:\%COMPUTERNAME%.xml"
HitmanPro35.exe /scanonly /log="\\Server\Share\Logs\"
 
In these examples Z: is a typical shared folder on a file server. Users (or a user group) must have the write permission on this folder and share.
 
When specifying a folder as logfile it must end with a \ When logging to a folder, the file name is constructed using the computer name and a date/time stamp, example:
 
WORKSTATION14_20100428114347.xml
0
 

Author Comment

by:mattinvt
ID: 39966484
Thanks for your help - This reference is for Hitman Pro, though.
HitmanPro.Alert is a different product
0
 
LVL 64

Accepted Solution

by:
btan earned 1500 total points
ID: 39966744
Will check it out further but will the option list at command line list out the avilable option such as using /? or something similar...it also has 32 and 64 bit executables and are all services rather than plugin. I suspecting if the hitman pro approach can be adopted though thinking aloud...

I saw in forum stating

command line options like /install /uninstall /quiet. In addition we have a GPO template planned for configuration.

No further details though to dive deeper, another means is to poll the community forum for sharing - I am sure you are not the first
0

Featured Post

Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Some of the most commonly posted questions in the "Virus & Malware" Zones are related to the family of rogue malware with the date "2012" somewhere in the title. Examples: XP Antispyware 2012 XP Antivirus 2012 XP Security 2012   XP Home Sec…
HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

741 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question