Before creating the Portable Scanner, make sure that there is no running Portable Scanner database update process.
How to create a Portable Scanner using the Portable Scanner setup wizard
A New Portable Scanner Wizard window opens at the welcome step.
To proceed to the next step of the wizard, click Next.
The Scan settings window opens.
The following options are available:
The following options are available:
Click the Browse button to specify the folder for temporary files that will be created during the scan. By default, temporary files are created on the USB drive.
Select the following option if applicable.
Entirely remove the compound file that cannot be modified by the application in case of embedded object detection.
Rules collect the following host data:
Kaspersky ICS CERT vulnerabilities database for SCADA, Rules for collecting host configuration data, and Compliance and security configurations for operating systems are provided with the Portable Scanner databases. Therefore, before starting the Portable Scanner with at least one of the listed rule sources selected, make sure that the Portable Scanner databases are up to date.
This feature verifies the Portable Scanner data. For example, if you are planning to create several Portable Scanners in a row with the same settings, verifying data for the very first Portable Scanner and discovering the discrepancies at an early stage saves time.
To have the Rutoken removable drive displayed in the list of connected removable media on a computer running Windows Server 2022, you must replace the UMDF2 driver for USB card readers with the WUDF driver.
A wizard window opens containing a description of the Portable Scanner configuration.
The portable scanner will be written to the selected removable drive. A Kavscan folder will appear on the removable drive, containing the files and folders required for the Portable Scanner to work.
If there is already a Portable Scanner on the removable drive, the wizard overwrites its files, except for reports.
If you decide to abort writing, the installation wizard terminates write operation without rolling back the changes made.
After you complete the setup, the wizard prompts you to create another Portable Scanner.
How to create a Portable Scanner on the command line
cd command, navigate to the folder where the kavshell.exe file is located.For example: cd C:\Program Files (x86)\Kaspersky Lab\Kaspersky Industrial CyberSecurity for Nodes 4.5.0
You can also add the executable file path to the %PATH% system variable and run the command without navigating to the application folder.
KAVSHELL PORTABLESCANNER /drive=<Name of the removable drive or serial number of the Rutoken removable drive> /license=<path to the license key file> [/tokenpin=<password> [/newtokenpin=<password>]] [/verify] [/av <settings of the scan for viruses and other threatening programs>] [/traffic <settings for recording of incoming and outgoing traffic on the scanned device>] [/oval <settings of the security audit task>]
Command parameters for creating a Portable Scanner
Parameter |
Description |
|
Required argument. Initiates the creation of a Portable Scanner. |
|
Required argument. Select the removable drive on which you want to generate a Portable Scanner: If the Portable scanner is to be written to a Rutoken removable drive, you must enter a ten-digit serial number of the Rutoken drive. |
|
Required argument. Specifies the path to the key file that is necessary for creating a Portable Scanner. |
|
Optional argument. Sets an administrator password for access to the Rutoken drive. |
|
Optional argument. Sets a new administrator password for access to the Rutoken drive. |
|
Optional argument. Verifies the Portable Scanner after it is written to the removable drive. |
|
Optional argument. Scans for viruses and other threatening programs. |
|
Optional argument. Records incoming and outgoing traffic on the scanned device. |
|
Optional argument. Enables the security audit task. |
At least one of the /av, /oval, or /traffic arguments must be specified.
Settings of the scan for viruses and other threatening programs |
|
|
Space-delimited list of files, folders, network paths, or predefined scan scopes. |
|
Path to file with a list of scan scopes. The file must be created manually and saved in TXT format. The file must be saved with UTF-8 encoding without BOM. |
|
Starts scanning all memory processes. |
|
Starts scanning the shared folders. |
|
Starts scanning the startup objects. |
|
Starts scanning all removable drives. |
|
Starts scanning all fixed drives. |
|
Starts scanning the entire computer. |
|
Scan all files If this setting is enabled, the application checks all files without exception (all formats and extensions). |
|
Scan objects by format. The application scans only objects whose formats are included in the list of formats of infectable objects. |
|
Scan objects by extension. The application scans only objects with extensions included into the list of extensions of infectable objects. |
|
Action to be applied to a detected infected object. Possible values:
|
|
Exclude the specified object types. Possible values:
|
|
Files that match the file mask are excluded from the scan scope. For example:
|
|
Files that take longer to scan than the specified time limit (in seconds) are excluded from the scan scope. |
|
Files that are larger than the specified size limit (in megabytes) are excluded from the scan scope. |
|
Scan files without copying to disk (if possible). |
|
Disable iChecker. |
|
Path and name of the scan log file. |
Settings for recording of incoming and outgoing traffic on the scanned device |
|
|
Specifies for how long you want traffic to be recorded. Accepts values from 1 to 1800. |
Settings of the security audit task |
|
|
Specifies the source of rules required by the Security Audit. Possible parameter values:
|
|
This parameter passes the path to the files with rules for the Custom rule base from file source (/ Initiates a security audit task according to the rules inside the specified ZIP archive. The ZIP archive must contain an XML file with rules in the OVAL language. You need to provide the complete path to the ZIP file, including its name. OVAL rules must be saved in the UTF-8 encoding without BOM. |
|
This parameter defines the vulnerability scan mode. Possible parameter values:
Used together with the |
|
Semicolon-separated list of vulnerability types that must be scanned or must be excluded from being scanned. For example: Used together with the |
Example:
|