Managing the application from the command line
April 17, 2024
ID 269475
Kaspersky Virus Removal Tool supports the following management commands:
Command line options
Command | Description |
---|---|
| Display command line syntax help.
|
| Enable trace collection.
|
| Set trace level.
|
| Specify the directory for saving application files (reports, traces, quarantine, etc).
By default, the application saves files in the following directory:
|
| Automatically accept the End User License Agreement, the Privacy Policy, and the KSN Statement.
|
| Scan the computer without GUI (silent mode). To run the scan in silent mode, you must accept the terms and conditions of the End User License Agreement, the Privacy Policy, and the KSN Statement ( By default, the application only detects infected or probably infected objects and logs the corresponding events. The application does not apply any actions to objects. To neutralize detected objects, you must specify the threat level of the objects ( By default, the application scans system memory, startup objects, and boot sectors of the computer. You can design a custom scan scope (for example, The application outputs the scan results to the command line and writes information to a report file.
|
| Automatically disinfect active infection with a computer restart, perform the scan in silent mode. The application does not display a notification if an active threat is detected, and does not start a countdown to let you make a decision. The application attempts to disinfect the active threat immediately and restarts the computer after the disinfection. If this option is not specified, the application attempts to disinfect the active threat in silent mode without a restart. For disinfecting an active threat, we recommend selecting disinfection with a computer restart. After restarting the computer, we recommend running the scan again.
|
| Neutralize detected objects when scanning in silent mode and specify the threat level of objects to be neutralized. The application supports the following threat levels:
Neutralization involves applying actions in the following order:
|
| Disable the encryption of traces, dumps, and reports.
|
| Add all mount points except service and network mount points to the scan scope. By default, the application scans system memory, startup objects, and boot sectors of the computer.
|
| Run a scan of only the defined scope (custom folder scan). With this option, the application excludes the system memory, startup objects, and boot sectors of the computer from scanning. To run a custom folder scan, define a scan scope using the
|
| Add a directory to the scan scope. You can add multiple directories. The application supports full paths. By default, the application scans system memory, startup objects, and boot sectors of the computer.
|
| Add multiple directories, listed in a text file, to the scan scope. Do not enclose paths in the file in quotation marks. Each path must start on a new line. The encoding of the file must be ANSI or UTF8 with BOM. By default, the application scans system memory, startup objects, and boot sectors of the computer.
|
| Exclude a directory or file from the scan scope. You can exclude multiple objects. The application supports full paths. By default, the application scans system memory, startup objects, and boot sectors of the computer.
|
| Exclude multiple directories or files, listed in a text file, from scanning. Do not enclose paths in the file in quotation marks. Each path must start on a new line. The encoding of the file must be ANSI or UTF8 with BOM. By default, the application scans system memory, startup objects, and boot sectors of the computer.
|
| Enable the generation of detailed reports. The detailed report reflects all application events. By default, the application generates standard reports. A standard report includes warning and error events.
|
| Connect to a proxy server with a configuration file. The application only supports absolute paths.
|