McAfee Stinger is a standalone utility used to detect and remove certain viruses. It is not a substitute for full antivirus protection, however, also a technical instrument to assist administrators and users when dealing with infected system. It finds and removes threats identified under the”Threat List” option under Advanced menu options in the Stinger application.
McAfee Stinger now detects and eliminates GameOver Zeus and CryptoLocker.
How do you use Stinger?
Q: I understand I have a virus, but Stinger didn’t find one. What’s this?
An: Stinger isn’t a substitute for an entire anti-virus scanner. It’s just designed to detect and remove specific threats.
Q: Stinger found a virus that it couldn’t repair. Why is this?
A: This is probably because of Windows System Restore performance having a lock on the infected file. Windows/XP/Vista/7 users must disable system restore prior to scanning.
Q: How Where is your scanning log stored and how can I see them?
Within Stinger, navigate into the log TAB along with the logs are all displayed as record with the time stamp, clicking onto the log file name opens the file in the HTML format.
Q: How Where are the Quarantine files saved?
A: The Threat List provides a listing of malware that Stinger is configured to discover. This listing doesn’t include the results from running a scan.
Q: Why Are there any command-line parameters accessible when running Stinger?
A: Yes, even the command-line parameters have been exhibited by going to the help menu inside Stinger.
Q: I conducted Stinger and now have a Stinger.opt file, what is that?
A: When Stinger conducts it creates the Stinger.opt record that saves the existing Stinger configuration. When you run Stinger the second time, your prior configuration is utilized provided that the Stinger.opt file is in precisely the same directory as Stinger.
Q: Stinger updated parts of VirusScan. Is this expected behaviour?
A: whenever the Rootkit scanning option is chosen within Stinger preferences — VSCore files (mfehidk.sys & mferkdet.sys) on a McAfee endpoint is going to be updated to 15.x. These files are installed only if newer than what’s on the system and is needed to scan for the current generation of newer rootkits. If the rootkit scanning option is disabled inside Stinger — the VSCore update won’t occur.
Q: How Can Stinger work rootkit scanning when deployed through ePO?
A: We’ve disabled rootkit scanning in the Stinger-ePO bundle to set a limit on the vehicle upgrade of VSCore parts as soon as an admin deploys Stinger to thousands of machines. To enable rootkit scanning in ePO manner, please use the following parameters while assessing in the Stinger bundle in ePO:
–reportpath=%yolk% –rootkit
Q: How What versions of Windows are backed by Stinger?
A: Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7, 8, 10, 10, 2012, 2016, RS1, RS2, RS3, RS4, RS5, 19H1, 19H2. Furthermore, Stinger requires the system to get Web Explorer 8 or above.
Q: Which are the prerequisites for Stinger to perform in a Win PE surroundings?
A: when creating a custom Windows PE picture, add support for HTML Application parts utilizing the instructions offered within this walkthrough.
Q: How How do I obtain service for Stinger?
A: Stinger isn’t a supported application. McAfee Labs makes no warranties relating to this product.
Q: How can I add custom made detections to Stinger?
A: Stinger has the choice where a user can input upto 1000 MD5 hashes as a custom blacklist. During a system scan, if any files match the habit blacklisted hashes – that the documents will get deleted and detected. This feature is provided to assist power users who have isolated an malware sample(s) for which no detection is available yet in the DAT files or GTI File Reputation.
Read more mcafee labs stinger (64 bit) At website Articles
Q: How can conduct Stinger with no Actual Protect component becoming installed?
A: The Stinger-ePO bundle does not execute Real Protect. In order to operate Stinger without Real Protect getting installed, execute Stinger.exe –ePO
Leave a reply