McAfee VCLCDE-AA-DA Product Guide - Page 35

Table 3-6, Alphabetic list of options, Option, Description

Page 35 highlights

VirusScan® Command Line 5.20.0 Product Guide 3 Using the Command-Line Scanner Choosing the options Table 3-6 Alphabetic list of options (continued) Option Description See ... /LOAD Load scanning options from the named file, or scanning profile. page 27 /LOCK Halt and lock the computer if a virus is found. page 30 /LOUD Display a progress summary during the scan. page 32 /MAILBOX Scan plain-text mailboxes. page 27 /MANALYSE Same as /MANALYZE. page 27 /MANALYZE Use heuristics analysis to identify potential macro viruses. page 27 /MANY Scan multiple disks consecutively in a single drive. page 27 /MAXFILESIZE Examine only those files that are smaller than the specified size. page 27 /MIME Scan MIME-encoded files. page 27 /MOVE Move any infected files to a quarantine location as specified. page 31 /NOBACKUP Do not prompt for backup of sectors before attempting to clean. page 27 /NOBEEP Do not issue a tone when the scan ends. page 31 /NOBKSEM Prevent scanning of files that are normally protected. page 27 /NOBOOT Do not scan the boot sector. page 27 /NOBREAK Disable Ctrl-C and Ctrl-Break during scans. page 27 /NOCOMP Do not check compressed executables created with the LZEXE or page 28 PkLite file-compression programs. /NOD Scan only the susceptible file types. page 28 /NODDA Do not access disk directly. This prevents the scanner from accessing the boot record. page 28 /NODECRYPT Do not decrypt Microsoft Office compound documents that are page 28 password-protected. /NODOC Do not scan document files. page 28 /NOEXPIRE Disable the "expiration date" message if the scanner's DAT files page 28 are out of date. /NOJOKES Do not report any joke programs. page 28 /NOMEM Do not scan memory for viruses. page 28 /NORECALL Do not move files from remote storage into local storage after page 33 scanning. See also Scanning files in remote storage on page 18. /NORENAME Do not rename an infected file that cannot be cleaned. page 31 /NOSCRIPT Do not scan files that contain HTML, JavaScript, Visual Basic, or page 28 Script Component Type Libraries. /OCMAX= Specify the maximum size of the internal cache for file reads. page 28 /OCRS= Specify a value that represents the size of the internal cache size page 28 for each file read. /PANALYSE Same as /PANALYZE. page 28 /PANALYZE Use heuristic analysis to identify potential new program viruses. page 28 /PAUSE Enable a screen pause. page 31 /PLAD Preserve the last-accessed time and date for files that are scanned. page 31 /PROGRAM Scan for potentially unwanted applications. page 29 /REPORT Create a report of infected files and system errors, and save the page 32 data to the specified file in ASCII text file format. /RPTALL Include the names of all scanned files in the report file. page 32 /RPTCOR Include a list of corrupted files in the report file. page 32 /RPTERR Include system errors in the report file. page 32 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46

35
VirusScan
®
Command Line 5.20.0 Product Guide
Using the Command-Line Scanner
Choosing the options
3
/LOAD <FILENAME>
Load scanning options from the named file, or scanning profile.
page 27
/LOCK
Halt and lock the computer if a virus is found.
page 30
/LOUD
Display a progress summary during the scan.
page 32
/MAILBOX
Scan plain-text mailboxes.
page 27
/MANALYSE
Same as
/MANALYZE
.
page 27
/MANALYZE
Use heuristics analysis to identify potential macro viruses.
page 27
/MANY
Scan multiple disks consecutively in a single drive.
page 27
/MAXFILESIZE <SIZE>
Examine only those files that are smaller than the specified size.
page 27
/MIME
Scan MIME-encoded files.
page 27
/MOVE <DIR>
Move any infected files to a quarantine location as specified.
page 31
/NOBACKUP
Do not prompt for backup of sectors before attempting to clean.
page 27
/NOBEEP
Do not issue a tone when the scan ends.
page 31
/NOBKSEM
Prevent scanning of files that are normally protected.
page 27
/NOBOOT
Do not scan the boot sector.
page 27
/NOBREAK
Disable Ctrl-C and Ctrl-Break during scans.
page 27
/NOCOMP
Do not check compressed executables created with the LZEXE or
PkLite file-compression programs.
page 28
/NOD
Scan only the susceptible file types.
page 28
/NODDA
Do not access disk directly. This prevents the scanner from
accessing the boot record.
page 28
/NODECRYPT
Do not decrypt Microsoft Office compound documents that are
password-protected.
page 28
/NODOC
Do not scan document files.
page 28
/NOEXPIRE
Disable the “expiration date” message if the scanner’s DAT files
are out of date.
page 28
/NOJOKES
Do not report any joke programs.
page 28
/NOMEM
Do not scan memory for viruses.
page 28
/NORECALL
Do not move files from remote storage into local storage after
scanning. See also Scanning files in remote storage on page 18.
page 33
/NORENAME
Do not rename an infected file that cannot be cleaned.
page 31
/NOSCRIPT
Do not scan files that contain HTML, JavaScript, Visual Basic, or
Script Component Type Libraries.
page 28
/OCMAX=<SIZE>
Specify the maximum size of the internal cache for file reads.
page 28
/OCRS=<VALUE>
Specify a value that represents the size of the internal cache size
for each file read.
page 28
/PANALYSE
Same as
/PANALYZE
.
page 28
/PANALYZE
Use heuristic analysis to identify potential new program viruses.
page 28
/PAUSE
Enable a screen pause.
page 31
/PLAD
Preserve the last-accessed time and date for files that are
scanned.
page 31
/PROGRAM
Scan for potentially unwanted applications.
page 29
/REPORT <FILENAME>
Create a report of infected files and system errors, and save the
data to the specified file in ASCII text file format.
page 32
/RPTALL
Include the names of all scanned files in the report file.
page 32
/RPTCOR
Include a list of corrupted files in the report file.
page 32
/RPTERR
Include system errors in the report file.
page 32
Table 3-6
Alphabetic list of options
(continued)
Option
Description
See ...