RSS Feed
Knowledgebase : CSAM Antivirus > CSAM v5 Home/Small Business
   

Question How do I fix a 1904 Error while attempting to install Command Anti-Malware? Answer To fix the 1904 Error, delete your temporary files then reinstall the program.
Some files that are loaded by Windows will be currently used by the system while scanning such as log files, DLL files, driver files and so on. While these files are in use, they will return an Access Denied error because the scan engine simply does not h...
Question What are the advantages of using Galileo to deploy and manage CSAM v5? Answer Using Galileo Enterprise to deploy and manage CSAM allows you to: * _Deploy Command Anti-Malware to one or all workstations_ * _Uninstall Command...
In ADVANCED MODE you can create scheduled tasks and access advanced scan settings. The SETTINGS option is disabled in Basic mode. The TASKS option is replaced by SCAN option in Basic mode. To learn how to create scheduled tasks click here [http://kb.cyr...
You can only install Command Anti-Malware Personal and Small Business version on one computer per license.
Question What are the system requirements for Command Anti-Malware v5? Answer Command Anti-Malware v5 supports the following versions of 32 bit Microsoft Windows. · Microsoft Windows 2000 Service Pack 4 Rollup 1 · Microsoft Windows XP Ser...
You can scan in Safe Mode by downloading CSAMSAFEMODESCAN.BAT (or CSAMSAFEMODESCAN64.BAT if your computer is running Windows 64-bit) located under File Attachments at the bottom of this article. * After downloading and saving CSAMSafeModeScan.bat or CS...
Question How do I configure my proxy server credentials? Answer Step 1. Click the UPDATE button. ------------------------- Step 2. Click the NETWORK button. ------------------------- Step 3. Put a check mark in the USE PROXY box. --...
Question Do I have to pay to upgrade to Command Anti-Malware Version 5? Answer As a current anti-virus customer, you are entitled to a FREE upgrade of Command Anti-Malware 5. Your subscription needs to be up-to-date in order to upgrade. Us...
Question How do I create a print screen snapshot of the error message on my desktop? Answer Step 1. Once the error message is on your desktop, press the PRINT SCREEN key on your keyboard. ------------------------- Step 2. Open up your ...
QUESTION HOW DO I FIX THE DATABASE ACCESS ERROR? ANSWER STEP 1: Browse to the following location. XP: C:\Documents and Settings\All Users\Application Data\Commtouch\CSAM5\Results\cleanup\ VISTA / 7 / 8: C:\ProgramData\Commtouch\CSAM5\Results...
Question How do I delete temp files in Windows? Answer This procedure will assist you in deleting temporary Internet files from your Windows temp directories. ------------------------- TEMPORARY INTERNET FILES: STEP 1: Click Start, th...
Question How do I enable hidden files? Answer * Open Explorer window then press the ALT key. * Navigate to the Tools menu then folder options. * Select the View tab and check Show hidden files and folders.
Question What can I do if the fix button does not correct the issue? Answer The fix button might not be working when it detects a false positive, or the file is no longer there. To correct this issue, we need to clear the database files wi...
Question Why are some folders excluded still being scanned? Answer Folder exclusions only work on local drives. This is due to the fact that it is impossible to predict the internal NT names used by the operating system. The operating syst...
Question Why is the Windows Security Center showing the software is on but is reporting its status in a format that is no longer supported? Answer The Microsoft Windows Security Center is incorrectly reporting the format as no longer suppo...
EXPLANATION When an undocumented issue arises involving Command Anti-Malware, log files are generally requested by technical support. Log files help us reproduce the issue and find a way to resolve it. DETAILS STEP 1. DOWNLOAD, SAVE, AND UNZIP TH...
Question How do I manually collect event viewer logs? Answer NOTE: These logs are automatically gathered when running the Loggatherer.exe tool. ------------------------- STEP 1. Click START . ------------------------- STEP 2. Right-cli...
Question How do I generate a KERNEL MEMORY DUMP? Answer If the computer crashes for any reason while running the software, the support team will need to gather the information of the crash. One way to obtain this information is to generat...
Network traffic log files may be requested to assist with research or troubleshooting for network related issues. Symptoms of network issues can manifest as installation wizard failing/stalling, updates failing/not completing, activations erroring out,...
Question How do I collect a network trace? Answer Network traffic log files may be requested to assist with research or troubleshooting for network related issues. Symptoms of network issues can manifest as installation wizard failing/stal...
Question How do I collect a network trace? Answer Network traffic log files may be requested to assist with research or troubleshooting for network related issues. Symptoms of network issues can manifest as installation wizard failing/stal...
Question How do I purchase licenses for CSAM (Command Anti-Malware for Home/Small Business)? Answer Command Anti-Malware (CSAM) is available online through many of our resellers listed in the link below. http://www.commtouch.com/CSAM-res...
Question How do I receive a trial version of Command Anti-Malware? Answer In order to receive a trial of Command Anti-Malware please fill out the appropriate information as reqested in the forms in the link below. http://www.commtouch.com/...
Question How do I turn User Access Control (UAC) off? Answer To turn off or limit the User Access Control (UAC) within Windows Vista and Windows 7: Windows Vista The following instructions are for Windows Vista operating systems. Win...
Question How to exclude files and folders? Answer There are three ways to exclude in Command Anti-Malware; FILES, FILE TYPES(Extensions), and FOLDERS. 1. Open CSAM by double clicking on the System Tray ICON. _ _ 2. Click the BASIC/A...
Question I have Iolo Antivirus and Authentium is being detected on my computer. How to do remove Authentium from my computer? Answer Iolo Antivirus, personal firewall or Internet security suite uses the Authentium's SDK (software developme...
Question How do I resolve the License Failure error when updating? Answer Enter your username and password in the License page of the Updater. 1. Open COMMAND ANTI-MALWARE. ------------------------- 2. Click the UPDATE button. -----...
Question I have a LINKSYS ROUTER (MODEL: BEFW11S4), and I am unable to download or update the product. How do I resolve this issue? Answer This issue may be caused by an improper MTU setting and the system is unable to communicate with our...
Question How do I manually remove infected files? Answer You should be able to remove an infected file by deleting it. Our programs will give the path of the infected file when it is detected. If our programs detect the file but can ...
HOW TO MANUALLY REMOVE COMMAND ANTI-MALWARE? 1. Please attempt first to uninstall Command Anti-Malware through the Control Panel. 2. If you have not rebooted after uninstalling Command, reboot the system before continuing. 3. Check for - and uninsta...
Question How to manually remove Command Antivirus? Answer To manually remove CSAV from a workstation in which the .msi file no longer exists or if the program doesn't uninstall, follow these instructions: Step 1. Install the Windows Ins...
This article describes how to manually update the definitions for CSAM and other products using the Commtouch SDK technology. VERSIONS 5.1.21 AND NEWER (ENGINE 5.4.X) STEP 1 - DOWNLOAD THE DEFINITION FILES TO DISK OR REMOVABLE MEDIA. * Download ht...
While performing an on-demand scan on your computer, it may be necessary to adjust the power options to prevent the computer from automatically going to sleep mode after being idle for some time. Here is how it is done on Windows 7. Power Options co...
Question How do I do a quiet uninstall of Command Anti-Malware? Answer Step 1. Click START THEN RUN. ------------------------- Step 2. Type "C:\PROGRAM FILES\AUTHENTIUM\CSAM5\\SETUP.EXE\" REMOVE=ALL /Q" . ------------------------- St...
Question How do I recover from browser hijacking? Answer A symptom of browser hijacking occurs when you launch your browser and it is being redirected to other sites. Browser hijacks attach themselves to your computer via tracking cooki...
The CYREN Antivirus solution delivers unprecedented virus protection detection. However, no solution is perfect and sometimes messages contain viruses but are sent to the end-users (false negatives) or legitimate business and personal correspondence may b...
The command line scanner for version 5 is aiscan.exe. Aiscan.exe is located in C:\Program Files\Common Files\Authentium\AntiVirus5\aiscan.exe. You can run the command line scanner by running the appropriate file at the bottom of this article under File...
Question Can I schedule CSAM v5 to download and install the updates automatically? Answer Yes, you can schedule CSAM v5 to download and install the updates automatically. To schedule the Dat (definition) files to update automatically, please ...
Question How to set scan options for the Active Malware Protection? Answer Step 1. Open CSAM by double clicking on the System Tray icon. ------------------------- Step 2. Move the switch to Advanced. ------------------------- Step 3....
STEP 1 - OPEN THE COMMAND ANTI-MALWARE VERSION 5 CONSOLE: * Double click the Command Anti-Malware Version 5 system tray icon ------------------------- STEP 2 - OPENING THE SCHEDULED SCAN DIALOG SCREEN: * Click the ADVANCED button to switch to AD...
Question Do I need to manually start the software every time I restart my computer? Answer No. The software loads automatically when your computer starts up.
Question How do I stop a process from running? Answer Step 1. Press Ctrl+Alt+Del. ------------------------- Step 2. Choose TASK MANAGER and select the PROCESSES tab. ------------------------- Step 3. Select the PROCESS you desire to te...
Question How do I submit a virus sample? Answer STEP 1. Locate the file on your computer. Do not attempt to open or run the infected file. Winzip is necessary to Zip and Encrypt (password protect) the file. If you do not have Winzip instal...
Question Why does my system tray icon turn different colors? Answer - Green indicates the program is up to date and free of any notifications or tasks running. - Yellow indicates there are alerts. Click the icon to Fix it. - Red indica...
Question Scenario: The CSAM program icon is not visible in the system tray. Answer If you installed CSAM and the program icon is not in your system tray try the following steps. This issue is related to the Operating System and is not a bu...
Question How do I troubleshoot scheduled tasks? Answer Ensure the task scheduler service is running and configured for the proper account. Scheduled tasks maintains a generic log file in c:\windows\schedlgu.txt. Additionally, you open c:\w...
Step 1. Open Command Anti-Malware by double clicking the system tray icon. Step 2. Switch to Advanced mode. Step 3. Click the Settings button. Step 4. Click the drop down box next to Action on Detected Infection and select Off. Step 5. Click the S...
Question How do I fix "unable to connect to update server" error? Answer This error appears when Command Anti-Malware (CSAM) is unable to detect a connection to the Internet. This is generally caused by one of two issues. First, see if ...
Question When I try to start my computer in Safe Mode in Windows XP, the options menu does not appear. What should I do? Answer If you are unable to access the Advanced Startup Options menu by holding the F8 key on startup, you can configu...
Question How do I uninstall Command Anti-Malware Version 5 from my computer? Answer Step 1. Open ADD OR REMOVE PROGRAMS from the Control Panel, (PROGRAMS AND FEATURES for VISTA users) Step 2. Highlight COMMAND ANTI-MALWARE in the list ...
Question Why am I getting the "Update check failed" error message? Answer Update check failed means that your account has expired or the username and password entered is invalid. Please ensure you are using the correct username and passwor...
Question How do I resolve updates hanging? Answer This may occur in some scenarios if you have installed the Outlook scanner component with your installation and Outlook is open. If you close Outlook the update should complete with no furt...
Question How do I update Command Anti-Malware definition files? Answer Command Anti-Malware Version 5 will update its Dat files automatically at 3:00 AM and at Login. To update Command Anti-Malware, please follow the steps bellow: 1....
Question Is there a fee to upgrade from version 4 to version 5? Answer If you already have a paid subscription to Galileo Version 4 with Command Antivirus or version 4 Command Antivirus and your account is in good standing, it is a free upg...
Question My username and password are not being accepted when trying to download the program or the updates. Answer You may not be able to download the program or the updates due to one or more of the following issues: Issue 1. You may ...
Question What is a Scheduled Scan? Answer Scheduled scans occur at a scheduled time of the day, week, or month. Scheduled scans allow you to check for viruses and spyware according to a predetermined date or time. Note: Active Malware P...
Command Anti-Malware will stay on detecting status if its services are not started correctly. Please follow the instructions below to make sure the services are started automatically: Step 1. Click on the START button, go to RUN and type SERVICES.MSC. T...
Question Is Windows 2000 compatible with Galileo version 5 software? Answer CSAM 5 can be installed on Windows 2000, or pushed from Galileo v5, but Galileo v5 cannot be installed on Windows 2000. MMC 3.0 is required for the install of Gali...
This page used to contain the various Windows version numbers. Instead, we now refer to the following pages for updated listings: * Microsoft: Operating System Version (Windows) [http://msdn.microsoft.com/en-us/library/windows/desktop/ms724832(v=vs.85...
F-PROT Antivirus and Command Anti-Malware are products of CYREN