bigdude
2010-09-21, 20:49
Hello,
First of all let me thank all of you for your excellent work on SpyBot. It is a great program. I use it at an non-profit office with about 100 employees (and yes we have donated several times to support Spybot).
I like the protection Teatimer provides, but when I need to deploy software throughout the office I often have to go around and fix the things my users answer incorrectly after the install (even when they are 'told' ahead of time).
What I was wondering it this:
Is there a way to 'whitelist' an application before installing it,
or to export whitelists from one system to import the list on others,
or to disable TeaTimers scan so that all changes while disabled are sliently allowed (and remembered) until it is re-enabled ??
If not I would suggest a script tool or command line tool to do these things would be a good addition (although limiting it to administrators, the localsystem account, or requiring a settable password for it would probably be necessary to prevent it from becoming a back-door for malware).
First of all let me thank all of you for your excellent work on SpyBot. It is a great program. I use it at an non-profit office with about 100 employees (and yes we have donated several times to support Spybot).
I like the protection Teatimer provides, but when I need to deploy software throughout the office I often have to go around and fix the things my users answer incorrectly after the install (even when they are 'told' ahead of time).
What I was wondering it this:
Is there a way to 'whitelist' an application before installing it,
or to export whitelists from one system to import the list on others,
or to disable TeaTimers scan so that all changes while disabled are sliently allowed (and remembered) until it is re-enabled ??
If not I would suggest a script tool or command line tool to do these things would be a good addition (although limiting it to administrators, the localsystem account, or requiring a settable password for it would probably be necessary to prevent it from becoming a back-door for malware).