<object
scanned> - this parameter gives the list of objects that will be scanned for malicious code.
The parameter can include several values from the list provided, separated by spaces.
|
<files>
|
List of paths to the files and/or folders to be scanned. You can enter absolute or relative paths. Items on the list are separated by a space.
Notes:
- If the object name contains a space, it must be placed in quotation marks;
- If you specify a concrete folder, all the files in it are scanned.
|
/MEMORY
|
RAM objects
|
/STARTUP
|
Startup objects
|
/MAIL
|
E-mail databases
|
/REMDRIVES
|
All removable media drives
|
/FIXDRIVES
|
All internal drives
|
/NETDRIVES
|
All network drives
|
/QUARANTINE
|
Quarantined objects
|
/ALL
|
Complete scan
|
/@:<filelist.lst>
|
Path to the file with a list of objects and catalogs included in the scan. The file should be in a text format and each scan object must start a new line.
You can enter an absolute or relative path to the file. The path must be placed in quotation marks if it contains a space.
|
<action> - this parameter determines actions on malicious objects detected during the scan. If this parameter is not defined, the default action is the one with the value for
/i2.
|
/i0
|
take no actions on the object; simply record information about it in the report.
|
/i1
|
Treat infected objects, and if disinfection is impossible, skip
|
/i2
|
Treat infected objects, and if disinfection fails, delete, but do not delete infected objects from compound objects, and delete compound objects with executable headers (sfx archives) (this is the default setting).
|
/i3
|
Treat infected objects, and if disinfection fails, delete and delete all compound objects completely if the infected attachments cannot be deleted.
|
/i4
|
Delete infected objects, and if disinfection fails, delete and delete all compound objects completely if the infected attachments cannot be deleted.
|
<prompt for action> - this parameter defines which actions will ask the user for a response during the scan. If the parameter is not defined, the action is requested by default at the end of the scan.
|
/a0
|
Do not prompt for action
|
/a1
|
Prompt for action if an infected object is detected
|
/a2
|
Prompt for action when the scan is complete
|
<file types> - this parameter defines the file types that will be subject to anti-virus scan. By default, if this parameter is not defined, only infected files
by contents will be scanned.
|
/fe
|
Scan only infected files by extension
|
/fi
|
Scan only infected files by contents
|
/fa
|
Scan all files
|
<exclusions> - this parameter defines objects that are excluded from the scan.
The parameter can include several values from the list provided, separated by spaces.
|
/e : a
|
Do not scan archives
|
/e : b
|
Do not scan e-mail databases
|
/e : m
|
Do not scan plain text e-mails
|
/e : <mask>
|
Do not scan objects by mask
|
/e : <seconds>
|
Skip objects that are scanned for longer that the time specified in the <seconds>
parameter
|
<configuration file> - defines the path to the configuration file that contains the program settings for the scan.
You can enter an absolute or relative path to the file. If this parameter is not defined, the values set in the Active Virus Shield interface are used.
|
/C:<settings_file>
|
Use the settings values assigned in the file <settings_file>.
|
<report settings> - this parameter determines the format of the report on scan results.
You can use an absolute or relative path to the file. If the parameter is not defined, the scan results are displayed on screen, and all events are displayed.
|
/R:<report_file>
|
Only log important events in this file
|
/RA:<report_file>
|
Log all events in this file
|