Thanks Dave for your confidence.
Actually, any program that can receive command line parameters can be run this way from a batch file. I often do this even with CCleaner to clean my machine every Friday night.

However, here is a description for other command line parameters for Malware. I just copied and pasted it here for anyone who may be interested in running this program from the command line:

Command Line Parameters
Malwarebytes' Anti-Malware supports a variety of command line parameters. Corporate clients may contact us for additional command line parameters. To start the program using a command line parameter, simply open a Run prompt and type the following:

mbam.exe <parameters>
(where parameters is one or more of the following)

a.. /errorsilent: suppresses all critical errors and writes the last error to <root-drive>\mbam-error.txt.
   a.. Examples:
1.. mbam.exe /errorsilent (will suppress all errors when the progarm is running) b.. /proxy <required server> <optional port> <optional username> <optional password>: allows you to update through a proxy server. Leave blank to remove proxy settings.
   a.. Examples:
     1.. mbam.exe /proxy (will remove the proxy settings)
2.. mbam.exe /proxy proxy.com 80 (will use proxy.com on port 80 with no credentials) 3.. mbam.exe /proxy proxy.com 80 admin password (will use proxy.com with the specified credentials) c.. /logtofolder <optional path>: allows you to save all log files to the specified folder. If this folder does not exist, Malwarebytes' Anti-Malware attempts to create it. If the path is blank, changes are reverted to default settings. These logs do not show up on the Logs tab.
   a.. Examples:
1.. mbam.exe /logtofolder C:\mbam_log_files (will save all future log files to C:\mbam_log_files) d.. /logtofile <optional path>: allows you to save all log files to the specified file. If this file does not exist, Malwarebytes' Anti-Malware attempts to create it. Newest entries are appended to top of the file. If the path is blank, changes are reverted to default settings. This log does not show up on the Logs tab.
   a.. Examples:
1.. mbam.exe /logtofile C:\mbam_log_files\mbam-log.txt (will save all future log files to C:\mbam_log_files\mbam-log.txt)
   b.. Limitations:
     1.. The path, in the above case C:\mbam_log_files, must exist.
e.. /debug <optional -silent>: allows you to collect information to send as a bug report.
   a.. Examples:
     1.. mbam.exe /debug (will bring up a prompt to save the debug file)
2.. mbam.exe /debug -silent (will save debug file silently to <root-drive>\mbam-info.txt) f.. /register: allows you to register the program without displaying the main dialog.
   a.. Examples:
1.. mbam.exe /register 12345-67890 AAAA-BBBB-CCCC-DDDD (will register the product using the license key passed in the parameters) g.. /developer: this command line parameter is explained in further detail in the false positives section.
   a.. Examples:
1.. mbam.exe /developer (will start the program with detailed detection information) h.. /update <optional -silent>: allows you to update the product and database.
   a.. Examples:
1.. mbam.exe /update (will attempt to update the database or program, depending on settings) 2.. mbam.exe /update -silent (will attempt to update the database or program silently)
   b.. Limitations:
     1.. -silent parameter requires product registration.
i.. /scan <optional -quick or -full or -flash> <optional -silent> <optional -remove> < optional -terminate> <optional -reboot> <optional -log>: initiates a scan with the selected options.
   a.. Parameters:
     1.. -quick: initiates a quick scan.
     2.. -full: initiates a full scan using saved drives in the registry.
3.. -flash: initiates a flash scan, memory and heuristics only (requires registration).


4.. -terminate: closes the program after a scan completes and no threats were found (can not be used with -silent).
     5.. -log: overrides the save log checkmark on the settings tab.


6.. -silent: hides the GUI while scanning (does not need to be used with -terminate). Requires product registration. 7.. -reboot: reboots the computer if necessary, only valid if -silent is used. Requires product registration. 8.. -remove: automatically removes threats and saves a log file. Unless -silent is specified, GUI stays open. Requires product registration.
   b.. Examples:
     1.. mbam.exe /scan (will run a default scan)
     2.. mbam.exe /scan -full (will run a full scan)
3.. mbam.exe /scan -flash -terminate (will run a flash scan and terminate if no objects are detected) 4.. mbam.exe /scan -quick -log -silent -remove -reboot (will run a quick scan silently, logs, automatically removes threats, and reboots if necessary)
   c.. Limitations:
     1.. -terminate parameter can not be used with the -silent parameter.
2.. -reboot parameter is only valid if used with the -silent parameter. 3.. -flash, -silent, -reboot, and -remove parameters require product registration.


Cheers,

Ishe

We all have the right to be wrong in our opinions but not in our facts.

----- Original Message ----- From: "David Ferrin" <[email protected]>
To: <[email protected]>
Sent: Friday, August 20, 2010 5:17 PM
Subject: Re: [Blind-Computing] malware


Good stuff right here, I'm keeping this message for possible posting on tips
and tricks, thanks.
David Ferrin
[email protected]
----- Original Message ----- From: "Ishe Chinyoka" <[email protected]>
To: <[email protected]>
Sent: Friday, August 20, 2010 10:06 AM
Subject: Re: [Blind-Computing] malware


Hi Yvonne,

Sure, Chris is right there -- the free version refuses to be scheduled. But
what I find is that you schedule it using the Scheduled Tasks applet.
However, you do not schedule the MalwareBytes executable directly because it
will refuse to be scheduled. Instead, you should use a batch file like:

@ECHO OFF
CD %PROGRAMFILES%\Malwarebytes' Anti-Malware\
mbam.exe /scan -full

You can save this batch script somewhere and then go to Scheduled Tasks.
When the Wizard requires you to provide the name of the program to be run,
simply browse to where you saved the batch script and add it. The rest is
simple: provide the time to be run and when the time comes, your scheduler
will run this batch script which will in turn fire off your Malware
antivirus.

Obviously, since this is a quick response, you may need to fine tune this
script to provide for eventualities like errors, but I believe you can even pass the logging option to Malware such as /log then the name of the file to
be logged all errors.
If you need any help, you are free to seek clarification offline especially
other command line options for Malware.

Hope this helps,

Ishe

We all have the right to be wrong in our opinions but not in our facts.

----- Original Message ----- From: "yvonne oliver" <[email protected]>
To: <[email protected]>
Sent: Thursday, August 19, 2010 8:39 PM
Subject: Re: [Blind-Computing] malware


hello
thank you for that
gave it a try but told i do not have permission to do this task

Yvonne
----- Original Message ----- From: "Ishe Chinyoka" <[email protected]>
To: <[email protected]>
Sent: Thursday, August 19, 2010 7:21 PM
Subject: Re: [Blind-Computing] malware


You can add it on a scheduled task list from the control panel.

Ishe
We all have the right to be wrong in our opinions but not in our facts.

----- Original Message ----- From: "yvonne oliver" <[email protected]>
To: <[email protected]>
Sent: Thursday, August 19, 2010 7:41 PM
Subject: [Blind-Computing] malware


hello
i have had malwarebytes downloaded and installed.
it works very well indeed but i wonder is it possible to configure
malwarebytes to do a scheduled scan?
i know this is possible using m s e because i have this set to 2 in the
morning.
but i can find no way to set up a scheduled request for malwarebytes to
automatically scan at a set time
so i am wondering if this is able to be done or is it just manually done
each time i want to use it
thank you
Yvonne
For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/


For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/


For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/


For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/


For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/


For answers to frequently asked questions about this list visit:
http://www.jaws-users.com/help/

Reply via email to