Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Anybody have experience silent-installing HitmanPro.Alert

Posted on 2014-03-28
3
Medium Priority
?
1,680 Views
Last Modified: 2014-04-08
We are big fans of  HitmanPro.Alert and want to deploy it at all our customer's sites.
Our management portal can script installs but it doesn't seem that the  HitmanPro.Alert installer has a /quiet or /silent switch.  Desktops end up with "System Message" pop-ups.
Anybody know a way around this?
0
Comment
Question by:mattinvt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 65

Expert Comment

by:btan
ID: 39963311
I saw in the pdf for it deploying as GPO and the command reference that can be handy

/quiet - Implies /scan but immediately initiates a silent scan of the computer.

Hitman Pro will be visible only in the system tray and a notification balloon is displayed, notifying the user his computer is scanned for malware. When infections are found, the program will pop up for interaction with the user. The EULA is automatically accepted.
 
Example: HitmanPro35.exe /quiet

/scanonly - Immediately initiates a silent scan of the computer

Hitman Pro will be visible only in the system tray. Does not show a notification balloon.
Program will not be installed on the local computer (implies /noinstall). The EULA is automatically accepted.
 
Example: HitmanPro35.exe /scanonly

/log= - This will instruct Hitman Pro to scan a system silently and export the results to an xml log file to the specified log file folder (typically a network location). No dialogs are displayed to the user.

Examples:
HitmanPro35.exe /scanonly /log="Z:\%USERNAME%.xml"
HitmanPro35.exe /scanonly /log="Z:\%COMPUTERNAME%.xml"
HitmanPro35.exe /scanonly /log="\\Server\Share\Logs\"
 
In these examples Z: is a typical shared folder on a file server. Users (or a user group) must have the write permission on this folder and share.
 
When specifying a folder as logfile it must end with a \ When logging to a folder, the file name is constructed using the computer name and a date/time stamp, example:
 
WORKSTATION14_20100428114347.xml
0
 

Author Comment

by:mattinvt
ID: 39966484
Thanks for your help - This reference is for Hitman Pro, though.
HitmanPro.Alert is a different product
0
 
LVL 65

Accepted Solution

by:
btan earned 1500 total points
ID: 39966744
Will check it out further but will the option list at command line list out the avilable option such as using /? or something similar...it also has 32 and 64 bit executables and are all services rather than plugin. I suspecting if the hitman pro approach can be adopted though thinking aloud...

I saw in forum stating

command line options like /install /uninstall /quiet. In addition we have a GPO template planned for configuration.

No further details though to dive deeper, another means is to poll the community forum for sharing - I am sure you are not the first
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question