Moved to Corporate User Assistance as a better spot for attention.
Meanwhile here's the How To for Stinger and note in the FAQ's it says to run Command Line see the Help menu in Stinger itself.
Sorry I can't help further as I'm only a Moderator on the Consumer side.
Thank you very much for moving it for me, hopefully someone gets back to me.
No problem but I'm wondering, although it wouldn't really be the right spot for this kind of enquiry, if ePO wouldn't be a better spot for some answers, if you think so, I can move it again.
You can deploy the stinger epo version and create the stinger scanning task through epo for specific clients or group of clients. You have to verify that stinger can detect and clean botnet. Stinger can detect and clean specific virus infection.
Thank you for getting back to me.
Can you send me or direct me how to do a automated task to run stinger within my network using epo please?
You can download the stinger from be low link. Stinger comes in two types stand alone and epo manager stinger. You need to download epo managed stinger and check in the package in epo Master Reposiotry.
1. Create the epo deployment Task
2. Once EPO is deployed you can create another task to run the stinger scan.
Stinger is a fair approach for a few systems, but for an entire network (more or less), you'll really need to get each and every end point covered with proper AV. From there, you would schedule On-Demand scans across the board. And, then, you need to use Access Protection rules to determine where the reinfections are coming from (and possibly block), and collect the missed samples and submit them to us.
There are a lot of moving parts to the above sentences, and I'm not sure we can get you where you need to be, over a forum. But, we can try, assuming you don't have a support contract. (if you have ePO, I figure you have support)
Let us know how you get on
I have just returned from my visit to the company that had an issue with the Cutwail virus that is randomly appearing on their system and i did the following implementation;
1- deployed VSE patch 7 to machines that did not have a AV installed or systems that were not on the latestest patch
2-Created a ODS full scan and memory scan to run immediately
3- Created a task to launch getsusp when an intrusion is found so that the evidence will be sent to mcafee for analysis
4- Customer memtioned that he has got systems that are been plugged into the network witout any VSE installed so i have deployed 2 rogue sensors within his environment.
After all this, Cutwail is still appearing on the customers network; i have attached a screen shot of what the message says from one of there providers from previous detections