-
Command Line Parameters (Premium Only Feature):
- /undo
Remove protections but leave whitelists - /undoall
Remove protections and all whitelists - /l=#
Set a specific plan level set of protections
Note: l is a lowercase L
#=0 for None Protection Plan
=1 for Minimal Protection Plan
=2 for Default Protection Plan
=3 for Maximum Protection Plan
=5 for Extreme Protection Plan
=a for Custom Plan (This won’t actually apply any new settings it will just reapply current settings) - /whitelist
Whitelist all EXEs in protected locations - /enablesidebar
Enable Sidebar and Gadgets - /disablesidebar
Disable Sidebar and GadgetsFor the following protections a “=0” can be added to disable protection. Enabling the protection would not require additional parameters.
You may also want to run “/apply” to ensure settings have been fully applied. - /bcdedit
Prevent bcdedit from execution on the system - /syskey
Prevent syskey from execution on the system - /cipher
Prevent cipher from execution on the system - /vssadmin
Prevent vssadmin from execution on the system - /known
Enable Prevent known malware from starting on Protection Settings->Software Restriction Policies->Default Plan - /programdata
Enable %programdata% on Protection Settings->Software Restriction Policies->Default Plan - /userprofile
Enable %userprofile% on Protection Settings->Software Restriction Policies->Default Plan - /startup
Enable Startup Folders on Protection Settings->Software Restriction Policies->Default Plan - /bin
Enable Recycle Bin on Protection Settings->Software Restriction Policies->Minimum Plan - /appdata
Enable %appdata% on Protection Settings->Software Restriction Policies->Minimum Plan - /appdatadeep
Enable %appdata%\* on Protection Settings->Software Restriction Policies->Minimum Plan - /localappdata
Enable %localappdata% on Protection Settings->Software Restriction Policies->Minimum Plan - /localappdatadeep
Enable %localappdata%\* on Protection Settings->Software Restriction Policies->Maximum Plan - /fakeexts
Enable Double File Extensions on Protection Settings->Software Restriction Policies->Minimum Plan - /tempexes
Enable Block Executables Temporarily Extracted from Archives on Protection Settings->Software Restriction Policies->Maximum Plan - /w=[filename.ext]
Whitelist a specific executable in %appdata% - /p=[filename.ext]
Whitelist a specific executable in %programdata% - /u=[filename.ext]
Whitelist a specific executable in %userprofile% - /s=[filename.ext]
Whitelist a specific executable in Startup Folder - /a=[custom allow policy rule]
Custom allow rule; full file/path NO WILDCARDS - /b=[custom block policy rule]
Custom block rule; wildcards supportedYou can add multiple entries by separating values with “,”(comma) - /enablefiltermodule
Enable the filter module based on the current settings - /disableenablefiltermodule
Disables the filter module (regardless of current settings) - /noallowprompt
Disable allowing applications from running when blocked by filter module - /sg=[type] (separate values with a ‘,’ comma) * Requires v21.07.07 or later!
Enable ‘ShadowGuard’ protection; valid types include “powershell”, “wmic”, and “vssadmin” - /disablesg=[type] (separate values with a ‘,’ comma) * Requires v21.07.07 or later!
Disable ‘ShadowGuard’ protection; valid types include “powershell”, “wmic”, and “vssadmin” - /fs=[extensionType] (separate values with ‘,’ comma)
Add suspicious filter module for CPL, SCR, or PIF - /fc=[extensionType] (separate values with ‘,’ comma)
Add constant filter module for CPL, SCR, or PIF - /disablefs=[extensionType] (separate values with ‘,’ comma)
Remove supsicious filter moduel for CPL, SCR, or PIF - /disablefc=[extensionType] (separate values with ‘,’ comma)
Remove constant filter module for CPL, SCR, or PIF - /exefilter
Enable EXE/COM program filter - /disableexefilter
Disable EXE/COM program filter - /enablefolderwatch
Enable FolderWatch Protection - /disablefolderwatch
Disable FolderWatch protection - /enablehoneypot
Enable FolderWatch HoneyPot Detection (note: FolderWatch Protection must also be enabled) - /disablehoneypot
Disable FolderWatch HoneyPot Detection - /enableemail
Enable email alerts (uses already defined settings) - /disableemail
Disable email alerts - /enabletray
Enable tray icon autostart - /disabletray
Disable tray icon autostart - /enableupdates
Enable scheduled updates (uses existing hour) - /disableupdates
Disable schedule updates - /updatehour=[XX] or Random
Defines update hours for scheduled updates
(XX should be between 00 and 23)
(Assumes /enableupdates command as well) - /killemall
Kills all non-essential running processes - /test + /silent
Writes a file w/ text 0 or 1 to show protections status - /test
Displays a form to show protection status - /silent
Silent Mode - /reboot
Reboots the system (final operation if other parameters are defined) - /nogpupdate
Skip the group policy update after changes - /apply
Apply protection and alert when completed - /logging or /debug
Enable logging output to logs folder
- /emailusername=”user@addy.com”
- /emailsamesendtofromaddy
- or use the following together:
- /emailfromaddy=”user@addy.com”
- /emailsendtoaddy=”user@addy.com”
- or use the following together:
- /emailpassword=”password”
- /emailserver=”serverAddress”
- /emailport=”portNumber”
- /emailauthenable
- (Add =0 to disable)
- /emailstarttlsenable
- (Add =0 to disable)
- /emailsslenable
- (Add =0 to disable)
- /clientemailid=”Client ID to be added to Email Subject”
- /emaillocksettings
-
- (Add =0 to disable)
- Only applies to Bulk or White-Label Editions
-
- /ProxyUpdateEnabled (add ‘=0’ to disable)
Enables proxy for update operations - /ProxyUpdateAddress=[domain]
Set proxy address to specified domain or IP for update operations - /ProxyUpdatePort=[Port#]
Set proxy port number for update operations - /ProxyUpdateUser=[userName]
Set proxy username for update operations - /ProxyUpdatePassword=[password]
Set proxy password for update operations - /ProxyUpdateSocksEnabled (add ‘=0’ to disable)
Set proxy to be SOCKS proxy instead of HTTP proxy for update operations - /ProxyEmailEnabled (add ‘=0’ to disable)
Enables proxy for email operations - /ProxyEmailAddress=[domain]
Set proxy address to specified domain or IP for email operations - /ProxyEmailPort=[Port#]
Set proxy port number for email operations - /ProxyEmailUser=[userName]
Set proxy username for email operations - /ProxyEmailPassword=[password]
Set proxy password for email operations - /ProxyEmailSocksEnabled (add ‘=0’ to disable)
Set proxy to be SOCKS proxy instead of HTTP proxy for email operations - /ProxySame (add ‘=0’ to disable)
Apply the same proxy settings for email as are applied for updates - /ProxyFromFile=[ini file location]
Applies proxy settings from an INI file format
Example Proxy INI File contents:
[Proxy] UpdateSameEmail=1 or 0
UpdateEnabled=1 or 0
ProxyAddressU=testAddress
ProxyPortU=1234
ProxyAuthU=1 or 0
ProxyUserU=userName
ProxyPassU==password
ProxySocksU=1 or 0
EmailEnabled=1 or 0
ProxyAddressE=testAddress
ProxyPortE=1234
ProxyAuthE=1 or 0
ProxyUserE=userName
ProxyPassE==password
ProxySocksE=1 or 0