McAfee Stinger is a standalone utility used to detect and remove certain viruses. It is not a substitute for full antivirus protection, however, an specialized tool to assist administrators and users when dealing with contaminated system. It finds and removes threats identified under the”Threat List” option under Advanced menu options in the Stinger application.
McAfee Stinger now detects and removes GameOver Zeus and CryptoLocker.
How can you utilize Stinger?
- Download the most recent version of Stinger.
- Once prompted, choose to save the file to a suitable location in your hard diskdrive, such as your Desktop folder.
- Once the downloading is complete, browse to the folder that comprises the downloaded Stinger record, and run it.
- The Stinger interface will be displayed.
- By default, Stinger scans for conducting processes, loaded modules, registry, WMI and directory places known to be used by malware onto a machine to maintain scan times minimal. If necessary, click on the”Customize my scanning” link to add extra drives/directories to your scan.
- Stinger has the capacity to scan targets of Rootkits, which isn’t allowed by default.
- Click on the Scan button to begin scanning the specified drives/directories.
- By default, Stinger will repair any infected files it finds.
- Stinger leverages GTI File Reputation and conducts system heuristics at Medium level by default. If you select”High” or”Very High,” McAfee Labs recommends that you place the”On hazard detection” actions to”Report” only for the first scan.Read here antivir chip 64 bit At our site
Q: I know I have a virus, however, Stinger did not find one. What’s this?
An: Stinger isn’t a replacement for a full anti virus scanner. It’s only supposed to detect and remove certain threats.
Q: Stinger found a virus that it couldn’t fix. Why is this?
A: That is most likely because of Windows System Restore functionality using a lock to the infected file. Windows/XP/Vista/7 consumers should disable system restore before scanning.
Q: how Where is your scanning log saved and how can I see them?
A: By default the log file is saved in where Stinger.exe is conducted. Inside Stinger, navigate into the log TAB along with the logs are all displayed as record with time stamp, clicking on the log file name opens the file in the HTML format.
Q: How Which would be the Quarantine files stored?
A: The quarantine documents are saved under C:\Quarantine\Stinger.
A: The Threat List provides a list of malware that Stinger has been configured to detect. This list doesn’t comprise the results of running a scan.
Q: Why Are there some command-line parameters accessible when conducting Stinger?
A: Yes, the command-line parameters have been displayed by going to the help menu inside Stinger.
Q: I ran Stinger and now have a Stinger.opt file, what is that?
A: When Stinger conducts it generates the Stinger.opt file which saves the current Stinger configuration. When you conduct Stinger the next time, your prior configuration is used provided that the Stinger.opt document is in exactly the exact same directory as Stinger.
Is this expected behavior?
A: whenever the Rootkit scanning option is selected within Stinger preferences — VSCore files (mfehidk.sys & mferkdet.sys) to a McAfee endpoint is going to be upgraded to 15.x. These files are installed only if newer than what’s about the machine and is required to scan for today’s generation of newer rootkits. If the rootkit scanning option is disabled within Stinger — that the VSCore upgrade will not happen.
Q: Can Stinger perform rootkit scanning when installed through ePO?
A: We’ve disabled rootkit scanning in the Stinger-ePO package to limit the vehicle upgrade of VSCore parts when an admin deploys Stinger to tens of thousands of machines. To Allow rootkit scanning in ePO mode, please use the following parameters while checking in the Stinger bundle in ePO:
For detailed directions, please refer to KB 77981
Q: How What versions of Windows are backed by Stinger?
Moreover, Stinger requires the machine to get Internet Explorer 8 or over.
Q: What are the requirements for Stinger to do at a Win PE surroundings?
A: when creating a custom Windows PE picture, add support to HTML Application components using the instructions provided in this walkthrough.
Q: How do I obtain assistance for Stinger?
An: Stinger isn’t a supported application. McAfee Labs makes no warranties about this product.
Q: How How can I add custom made detections into Stinger?
A: Stinger has the option where a user may enter upto 1000 MD5 hashes as a customized blacklist. During a system scan, even if any files fit the custom blacklisted hashes – the documents will get deleted and detected. This feature is provided to help power users that have isolated a malware sample(s) for which no detection is available however from the DAT documents or GTI File Reputation. To leverage this attribute:
- In the Stinger port goto the Advanced –> Blacklist tab.
- During a scan, all documents that match the hash will have a detection name of Stinger! . Total dat repair is used on the detected file.
- Documents that are digitally signed using a valid certificate or those hashes that are already marked as clean from GTI File Reputation won’t be detected as part of their custom blacklist. This is a security feature to prevent customers from accidentally deleting documents.
Q: How do run Stinger with no Real Protect component getting installed?
A: The Stinger-ePO package does not execute Real Protect. In order to conduct Stinger without Real Protect getting installed, do Stinger.exe –ePO