Microsoft has released the
Microsoft Windows Malicious Software Removal Tool to help you remove specific,
prevalent malicious software from a computer.
Skip the details and download
the tool
For more information about
how to download the tool, go to the following Microsoft webpage:
The information that is
contained in this article is specific to the enterprise deployment of the tool.
We highly recommend that you review the following Microsoft Knowledge Base
article. It contains general information about the tool and about the download
locations.
The tool is primarily
intended for noncorporate users who do not have an existing, up-to-date
antivirus product installed on their computers. However, the tool can also be
deployed in an enterprise environment to enhance existing protection and as
part of a defense-in-depth strategy. To deploy the tool in an enterprise
environment, you can use one or more of the following methods:
- Windows Server Update Services
- Microsoft Systems Management Software (SMS) software package
- Group Policy-based computer startup script
- Group Policy-based user logon script
For more information about
how to deploy the tool through Windows Update and Automatic Updates, click the
following article number to view the article in the Microsoft Knowledge Base:
890830 The Microsoft Windows Malicious
Software Removal Tool helps remove specific, prevalent malicious software from
computers that are running supported versions of Windows
The current version of this
tool does not support the following deployment technologies and techniques:
- Windows Update Catalog
- Execution of the tool against a remote computer
- Software Update Services (SUS)
Additionally, the Microsoft
Baseline Security Analyzer (MBSA) does not detect execution of the tool. This
article includes information about how you can verify execution of the tool as
part of deployment.
Code sample
The script and the steps
that are provided here are meant to be only samples and examples. Customers
must test these sample scripts and example scenarios and modify them
appropriately to work in their environment. You must change
the ServerNameand the ShareName according to the setup in your
environment.
The following code sample
does the following things:
- Runs the tool in silent mode
- Copies the log file to a preconfigured network share
- Prefixes the log the file name with the name of the computer from which the tool is executed and with the user name of the current user. You must set appropriate permissions on the share according to the instructions in the Initial setup and configuration section.
REM In this example, the script is named RunMRT.cmd.
REM The Sleep.exe utility is used to delay the execution of the tool when used as a
REM startup script. See the "Known issues" section for details.
@echo off
call \\ServerName\ShareName\Sleep.exe 5
Start /wait \\ServerName\ShareName\Windows-KB890830-V5.20.exe /q
REM The Sleep.exe utility is used to delay the execution of the tool when used as a
REM startup script. See the "Known issues" section for details.
@echo off
call \\ServerName\ShareName\Sleep.exe 5
Start /wait \\ServerName\ShareName\Windows-KB890830-V5.20.exe /q
copy %windir%\debug\mrt.log \\ServerName\ShareName\Logs\%computername%_%username%_mrt.log
Note In this code sample, ServerName is a
placeholder for the name of your server, and ShareName is a
placeholder for the name of your share.
Initial setup and
configuration
This section is intended
for administrators who are using a startup script or a logon script to deploy
this tool. If you are using SMS, you can continue to the "Deployment
methods" section.
To configure the server and
the share, follow these steps:
- Set up a share on a member server. Then name the share ShareName.
- Copy the tool and the sample script, RunMRT.cmd, to the share. See the Code sample section for details.
- Configure the following share permissions and NTFS file system permissions:
- Share permissions:
- Add the domain user account for the user who is managing this share, and then click Full Control.
- Remove the Everyone group.
- If you use the computer startup script method, add the Domain Computers group together with Change and Read permissions.
- If you use the logon script method, add the Authenticated Users group together with Change and Read permissions.
- NTFS permissions:
- Add the domain user account for the user who is managing this share, and then click Full Control.
- Remove the Everyone group
if it is in the list.
Note If you receive an error message when you remove the Everyone group, click Advanced on the Securitytab, and then click to clear the Allow inheritable permissions from parent to propagate to this objectcheck box. - If you use the computer startup script method, grant the Domain Computers group Read & Execute permissions, List Folder Contents permissions, and Read permissions.
- If you use the logon script method, grant the Authenticated Users group Read & Execute permissions, List Folder Contents permissions, and Read permissions.
- Under the ShareName folder, create a folder
that is named "Logs."
This folder is where the final log files will be collected after the tool runs on the client computers. - To configure the NTFS
permissions on the Logs folder, follow these steps.
Note Do not change the Share permissions in this step. - Add the domain user account for the user who is managing this share, and then click Full Control.
- If you use the computer startup script method, give the Domain Computers group Modify permissions, "Read & Execute" permissions, List Folder Contents permissions, Read permissions, and Write permissions.
- If you use the logon script method, give the Authenticated Users group Modify permissions, "Read & Execute" permissions, List Folder Contents permissions, Read permissions, and Write permissions.
Deployment methods
Note To run this tool, you must have Administrator
permissions or System permissions, regardless of the deployment option that you
choose.
How to use
the SMS software package
The following example
provides step-by-step instructions for using SMS 2003. The steps for using SMS
2.0 resemble these steps.
- Extract the Mrt.exe file from the package that is named Windows-KB890830-V1.34-ENU.exe /x.
- Create a .bat
file to start Mrt.exe and to capture the return code by using
ISMIF32.exe.
The following is an example.
@echo off
Start /wait Mrt.exe /q
If errorlevel 13 goto error13
If errorlevel 12 goto error12
Goto end
:error13
Ismif32.exe –f MIFFILE –p MIFNAME –d ”text about error 13”
Goto end
:error12
Ismif32.exe –f MIFFILE –p MIFNAME –d “text about error 12”
Goto end
:end
For more information about Ismif32.exe, click the following article numbers to view the articles in the Microsoft Knowledge Base:
268791 How a status Management Information Format (MIF) file produced by the ISMIF32.exe file is processed in SMS 2.0
186415 Status MIF creator, Ismif32.exe is available - To create a package in the SMS 2003 console, follow these steps:
- Open the SMS Administrator Console.
- Right-click the Packages node, click New, and then click Package.
The Package Properties dialog box is displayed. - On the General tab, name the package.
- On the Data Source tab, click to select the This package contains source files check box.
- Click Set, and then choose a source directory that contains the tool.
- On the Distribution Settings tab, set the Sending priority to High.
- On the Reporting tab, click Use these
fields for status MIF matching, and then specify a name for the MIF file
name field
and for the Name field.
Version and Publisher are optional. - Click OK to create the package.
- To specify a Distribution Point (DP) to the package, follow these steps:
- In the SMS 2003 console, locate the new package under the Packages node.
- Expand the package. Right-click Distribution Points, point to New, and then click Distribution Points.
- Start the New Distribution Points Wizard. Select an existing Distribution Point.
- Click Finish to exit the wizard.
- To add the batch file that was previously created to the new package, follow these steps:
- Under the new package node, click the Programs node.
- Right-click Programs, point to New, and then click Program.
- Click the General tab, and then enter a valid name.
- At the Command line, click Browse to select the batch file that you created to start Mrt.exe.
- Change Run to Hidden. Change After to No action required.
- Click the Requirements tab, and then click This program can run only on specified client operating systems.
- Click All x86 Windows Server 2003, and All x86 Windows XP.
- Click the Environment tab, click Whether a user is logged in the Program can run list. Set the Run mode to Run with administrative rights.
- Click OK to close the dialog box.
- To create an advertisement to advertise the program to clients, follow these steps:
- Right-click the Advertisement node, click New, and then click Advertisement.
- On the General tab, enter a name for the advertisement. In the Package field, select the package that you previously created. In the Program field, select the program that you previously created. Click Browse, and then click the All System collection or select a collection of computers that only includes Windows XP and later versions.
- On the Schedule tab, leave the default options if you want the program to only run one time. To run the program on a schedule, assign a schedule interval.
- Set the Priority to High.
- Click OK to create the advertisement.
How to use
a Group Policy-based computer startup script
This method requires you to
restart the client computer after you set up the script and after you apply the
Group Policy setting.
- Set up the shares. To do this, follow the steps in the Initial setup and configuration section.
- Set up the startup script. To do this, follow these steps:
- In the Active Directory Users and Computers MMC snap-in, right-click the domain name, and then clickProperties.
- Click the Group Policy tab.
- Click New to create a new Group Policy Object (GPO), and type MRT Deployment for the name of the policy.
- Click the new policy, and then click Edit.
- Expand Windows Settings for Computer Configuration, and then click Scripts.
- Double-click Logon, and then click Add.
The Add a Script dialog box is displayed. - In the Script Name box, type \\ServerName\ShareName\RunMRT.cmd.
- Click OK, and then click Apply.
- Restart the client computers that are members of this domain.
How to use
a Group Policy-based user logon script
This method requires that
the logon user account is a domain account and is a member of the local
administrator's group on the client computer.
- Set up the shares. To do this, follow the steps in the Initial setup and configuration section.
- Set up the logon script. To do this, follow these steps:
- In the Active Directory Users and Computers MMC snap-in, right-click the domain name, and then clickProperties.
- Click the Group Policy tab.
- Click New to create a new GPO, and then type MRT Deployment for the name.
- Click the new policy, and then click Edit.
- Expand Windows Settings for User Configuration, and then click Scripts.
- Double-click Logon, and then click Add. The Add a Script dialog box is displayed.
- In the Script Name box, type \\ServerName\ShareName\RunMRT.cmd.
- Click OK, and then click Apply.
- Log off and then log on to the client computers.
In this scenario, the
script and the tool will run under the context of the logged-on user. If this
user does not belong to the local administrators group or does not have
sufficient permissions, the tool will not run and will not return the
appropriate return code. For more information about how to use startup scripts
and logon scripts, click the following article numbers to view the articles in
the Microsoft Knowledge Base:
The following list
contains the valid return codes.
0
|
=
|
No infection found
|
1
|
=
|
OS Environment
Error
|
2
|
=
|
Not running as an
Administrator
|
3
|
=
|
Not a supported OS
|
4
|
=
|
Error Initializing
the scanner. (Download a new copy of the tool)
|
5
|
=
|
Not used
|
6
|
=
|
At least one
infection detected. No errors.
|
7
|
=
|
At least one
infection was detected, but errors were encountered.
|
8
|
=
|
At least one
infection was detected and removed, but manual steps are required for a
complete removal.
|
9
|
=
|
At least one
infection was detected and removed, but manual steps are required for
complete removal and errors were encountered.
|
10
|
=
|
At least one
infection was detected and removed, but a restart is required for complete
removal
|
11
|
=
|
At least one
infection was detected and removed, but a restart is required for complete
removal and errors were encountered
|
12
|
=
|
At least one
infection was detected and removed, but both manual steps and a restart is
required for complete removal.
|
13
|
=
|
At least one
infection was detected and removed, but a restart is required. No errors were
encountered.
|
Q2. How do I verify that the removal
tool has run on a client computer?
A2. You can examine
the value data for the following registry entry to verify the execution of the
tool. You can implement such an examination as part of a startup script or a
logon script. This process prevents the tool from running multiple times.
Subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemovalTools\MRT
Entry name: Version
Every time that the
tool is run, the tool records a GUID in the registry to indicate that it has
been executed. This occurs regardless of the results of the execution. The
following table lists the GUID that corresponds to each release.
Release
|
Value data
|
January 2005
|
E5DD9936-C147-4CD1-86D3-FED80FAADA6C
|
February 2005
|
805647C6-E5ED-4F07-9E21-327592D40E83
|
March 2005
|
F8327EEF-52AA-439A-9950-CE33CF0D4FDD
|
April 2005
|
D89EBFD1-262C-4990-9927-5185FED1F261
|
May 2005
|
08112F4F-11BF-4129-A90A-9C8DD0104005
|
June 2005
|
63C08887-00BE-4C9B-9EFC-4B9407EF0C4C
|
July 2005
|
2EEAB848-93EB-46AE-A3BF-9F1A55F54833
|
August 2005
|
3752278B-57D3-4D44-8F30-A98F957EC3C8
|
August 2005 A
|
4066DA74-2DDE-4752-8186-101A7C543C5F
|
September 2005
|
33B662A4-4514-4581-8DD7-544021441C89
|
October 2005
|
08FFB7EB-5453-4563-A016-7DBC4FED4935
|
November 2005
|
1F5BA617-240A-42FF-BE3B-14B88D004E43
|
December 2005
|
F8FEC144-AA00-48B8-9910-C2AE9CCE014A
|
January 2006
|
250985ee-62e6-4560-b141-997fc6377fe2
|
February 2006
|
99cb494b-98bf-4814-bff0-cf551ac8e205
|
March 2006
|
b5784f56-32ca-4756-a521-ca57816391ca
|
April 2006
|
d0f3ea76-76c8-4287-8cdf-bdfee5e446ec
|
May 2006
|
ce818d5b-8a25-47c0-a9cd-7169da3f9b99
|
June 2006
|
7cf4b321-c0dd-42d9-afdf-edbb85e59767
|
July 2006
|
5df61377-4916-440f-b23f-321933b0afd3
|
August 2006
|
37949d24-63f1-4fdc-ad24-5dc3eb3ad265
|
September 2006
|
ac3fa517-20f0-4a42-95ca-6383f04773c8
|
October 2006
|
79e385d0-5d28-4743-aeb3-ed101c828abd
|
November 2006
|
1d21fa19-c296-4020-a7c2-c5a9ba4f2356
|
December 2006
|
621498ca-889b-48ef-872b-84b519365c76
|
January 2007
|
2F9BC264-1980-42b6-9EE3-2BE36088BB57
|
February 2007
|
FFCBCFA5-4EA1-4d66-A3DC-224C8006ACAE
|
March 2007
|
5ABA0A63-8B4C-4197-A6AB-A1035539234D
|
April 2007
|
57FA0F48-B94C-49ea-894B-10FDA39A7A64
|
May 2007
|
15D8C246-6090-450f-8261-4BA8CA012D3C
|
June 2007
|
234C3382-3B87-41ca-98D1-277C2F5161CC
|
July 2007
|
4AD02E69-ACFE-475C-9106-8FB3D3695CF8
|
August 2007
|
0CEFC17E-9325-4810-A979-159E53529F47
|
September 2007
|
A72DDD48-8356-4D06-A8E0-8D9C24A20A9A
|
October 2007
|
52168AD3-127E-416C-B7F6-068D1254C3A4
|
November 2007
|
EFC91BC1-FD0D-42EE-AA86-62F59254147F
|
December 2007
|
73D860EC-4829-44DD-A064-2E36FCC21D40
|
January 2008
|
330FCFD4-F1AA-41D3-B2DC-127E699EEF7D
|
February 2008
|
0E918EC4-EE5F-4118-866A-93f32EC73ED6
|
March 2008
|
24A92A45-15B3-412D-9088-A3226987A476
|
April 2008
|
F01687B5-E3A4-4EB6-B4F7-37D8F7E173FA
|
May 2008
|
0A1A070A-25AA-4482-85DD-DF69FF53DF37
|
June 2008
|
0D9785CC-AEEC-49F7-81A8-07B225E890F1
|
July 2008
|
BC308029-4E38-4D89-85C0-8A04FC9AD976
|
August 2008
|
F3889559-68D7-4AFB-835E-E7A82E4CE818
|
September 2008
|
7974CF06-BE58-43D5-B635-974BD92029E2
|
October 2008
|
131437DE-87D3-4801-96F0-A2CB7EB98572
|
November 2008
|
F036AE17-CD74-4FA5-81FC-4FA4EC826837
|
December 2008
|
9BF57AAA-6CE6-4FC4-AEC7-1B288F067467
|
December 2008
|
9BF57AAA-6CE6-4FC4-AEC7-1B288F067467
|
January 2009
|
2B730A83-F3A6-44F5-83FF-D9F51AF84EA0
|
February 2009
|
C5E3D402-61D9-4DDF-A8F5-0685FA165CE8
|
March 2009
|
BDEB63D0-4CEC-4D5B-A360-FB1985418E61
|
April 2009
|
276F1693-D132-44EF-911B-3327198F838B
|
May 2009
|
AC36AF73-B1E8-4CC1-9FF3-5A52ABB90F96
|
June 2009
|
8BD71447-AAE4-4B46-B652-484001424290
|
July 2009
|
F530D09B-F688-43D1-A3D5-49DC1A8C9AF0
|
August 2009
|
91590177-69E5-4651-854D-9C95935867CE
|
September 2009
|
B279661B-5861-4315-ABE9-92A3E26C1FF4
|
October 2009
|
4C64200A-6786-490B-9A0C-DEF64AA03934
|
November 2009
|
78070A38-A2A9-44CE-BAB1-304D4BA06F49
|
December 2009
|
A9A7C96D-908E-413C-A540-C43C47941BE4
|
January 2010
|
ED3205FC-FC48-4A39-9FBD-B0035979DDFF
|
February 2010
|
76D836AA-5D94-4374-BCBF-17F825177898
|
March 2010
|
076DF31D-E151-4CC3-8E0A-7A21E35CF679
|
April 2010
|
D4232D7D-0DB6-4E8B-AD19-456E8D286D67
|
May 2010
|
18C7629E-5F96-4BA8-A2C8-31810A54F5B8
|
June 2010
|
308738D5-18B0-4CB8-95FD-CDD9A5F49B62
|
July 2010
|
A1A3C5AF-108A-45FD-ABEC-5B75DF31736D
|
August 2010
|
E39537F7-D4B8-4042-930C-191A2EF18C73
|
September 2010
|
0916C369-02A8-4C3D-9AD0-E72AF7C46025
|
October 2010
|
32F1A453-65D6-41F0-A36F-D9837A868534
|
November 2010
|
5800D663-13EA-457C-8CFD-632149D0AEDD
|
December 2010
|
4E28B496-DD95-4300-82A6-53809E0F9CDA
|
January 2011
|
258FD3CF-9C82-4112-B1B0-18EC1ECFED37
|
February 2011
|
B3458687-D7E4-4068-8A57-3028D15A7408
|
March 2011
|
AF70C509-22C8-4369-AEC6-81AEB02A59B7
|
April 2011
|
0CB525D5-8593-436C-9EB0-68C6D549994D
|
May 2011
|
852F70C7-9C9E-4093-9184-D89D5CE069F0
|
June 2011
|
DDE7C7DD-E76A-4672-A166-159DA2110CE5
|
July 2011
|
3C009D0B-2C32-4635-9B34-FFA7F4CB42E7
|
August 2011
|
F14DDEA8-3541-40C6-AAC7-5A0024C928A8
|
September 2011
|
E775644E-B0FF-44FA-9F8B-F731E231B507
|
October 2011
|
C0177BCC-8925-431B-AC98-9AC87B8E9699
|
November 2011
|
BEB9D90D-ED88-42D7-BD71-AE30E89BBDC9
|
December 2011
|
79B9D6F6-2990-4C15-8914-7801AD90B4D7
|
January 2012
|
634F47CA-D7D7-448E-A7BE-0371D029EB32
|
February 2012
|
23B13CB9-1784-4DD3-9504-7E58427307A7
|
March 2012
|
84C44DD1-20C8-4542-A1AF-C3BA2A191E25
|
April 2012
|
3C1A9787-5E87-45E3-9B0B-21A6AB25BF4A
|
May 2012
|
D0082A21-13E4-49F7-A31D-7F752F059DE9
|
June 2012
|
4B83319E-E2A4-4CD0-9AAC-A0AB62CE3384
|
July 2012
|
3E9B6E28-8A74-4432-AD2A-46133BDED728
|
August 2012
|
C1156343-36C9-44FB-BED9-75151586227B
|
September 2012
|
02A84536-D000-45FF-B71E-9203EFD2FE04
|
October 2012
|
8C1ACB58-FEE7-4FF0-972C-A09A058667F8
|
November 2012
|
7D0B34BB-97EB-40CE-8513-4B11EB4C1BD6
|
December 2012
|
AD64315C-1421-4A96-89F4-464124776078
|
January 2013
|
A769BB72-28FC-43C7-BA14-2E44725FED20
|
February 2013
|
ED5E6E45-F92A-4096-BF7F-F84ECF59F0DB
|
March 2013
|
147152D2-DFFC-4181-A837-11CB9211D091
|
April 2013
|
7A6917B5-082B-48BA-9DFC-9B7034906FDC
|
May 2013
|
3DAA6951-E853-47E4-B288-257DCDE1A45A
|
June 2013
|
4A25C1F5-EA3D-4840-8E14-692DD6A57508
|
July 2013
|
9326E352-E4F2-4BF7-AF54-3C06425F28A6
|
August 2013
|
B6345F3A-AFA9-42FF-A5E7-DFC6C57B7EF8
|
September 2013
|
462BE659-C07A-433A-874F-2362F01E07EA
|
October 2013
|
21063288-61F8-4060-9629-9DBDD77E3242
|
November 2013
|
BA6D0F21-C17B-418A-8ADD-B18289A02461
|
December 2013
|
AFAFB7C5-798B-453D-891C-6765E4545CCC
|
January 2014
|
7BC20D37-A4C7-4B84-BA08-8EC32EBF781C
|
February 2014
|
FC5CF920-B37A-457B-9AB9-36ECC218A003
|
March 2014
|
254C09FA-7763-4C39-8241-76517EF78744
|
April 2014
|
54788934-6031-4F7A-ACED-5D055175AF71
|
May 2014
|
91EFE48B-7F85-4A74-9F33-26952DA55C80
|
June 2014
|
07C5D15E-5547-4A58-A94D-5642040F60A2
|
July 2014
|
43E0374E-D98E-4266-AB02-AE415EC8E119
|
August 2014
|
53B5DBC4-54C7-46E4-B056-C6F17947DBDC
|
September 2014
|
98CB657B-9051-439D-9A5D-8D4EDF851D94
|
October 2014
|
5612279E-542C-454D-87FE-92E7CBFDCF0F
|
November 2014
|
7F08663E-6A54-4F86-A6B5-805ADDE50113
|
December 2014
|
386A84B2-5559-41C1-AC7F-33E0D5DE0DF6
|
January 2015
|
677022D4-7EC2-4F65-A906-10FD5BBCB34C
|
Deployment Of The Microsoft Windows Malicious Software Removal Tool In An Enterprise Environment >>>>> Download Now
ReplyDelete>>>>> Download Full
Deployment Of The Microsoft Windows Malicious Software Removal Tool In An Enterprise Environment >>>>> Download LINK
>>>>> Download Now
Deployment Of The Microsoft Windows Malicious Software Removal Tool In An Enterprise Environment >>>>> Download Full
>>>>> Download LINK da