Command Line Parameters
Malwarebytes' Anti-Malware supports a variety of command line parameters. Corporate clients may
contact us for additional command line parameters. To start the program
using a command line parameter, simply open a Run prompt and type the following:
mbam.exe <parameters>
(where parameters is one or more of the following)
- /errorsilent: suppresses all critical errors and writes the last error to <root-drive>\mbam-error.txt.
- Examples:
- mbam.exe /errorsilent (will suppress all errors when the progarm is running)
- /proxy <required server> <optional port> <optional username> <optional password>:
allows you to update through a proxy server. Leave blank to remove proxy settings.
- Examples:
- mbam.exe /proxy (will remove the proxy settings)
- mbam.exe /proxy proxy.com 80 (will use proxy.com on port 80 with no credentials)
- mbam.exe /proxy proxy.com 80 admin password (will use proxy.com with the specified credentials)
- /logtofolder <optional path>: allows you to save all log files to the specified folder. If this folder does not exist,
Malwarebytes' Anti-Malware attempts to create it. If the path is blank, changes are reverted to default settings. These logs do not show up
on the Logs tab.
- Examples:
- mbam.exe /logtofolder C:\mbam_log_files (will save all future log files to C:\mbam_log_files)
- /logtofile <optional path>: allows you to save all log files to the specified file. If this file does not exist,
Malwarebytes' Anti-Malware attempts to create it. Newest entries are appended to top of the file. If the path is blank, changes
are reverted to default settings. This log does not show up on the Logs tab.
- Examples:
- mbam.exe /logtofile C:\mbam_log_files\mbam-log.txt (will save all future log files to C:\mbam_log_files\mbam-log.txt)
- Limitations:
- The path, in the above case C:\mbam_log_files, must exist.
- /debug <optional -silent>: allows you to collect information to send as a bug report.
- Examples:
- mbam.exe /debug (will bring up a prompt to save the debug file)
- mbam.exe /debug -silent (will save debug file silently to <root-drive>\mbam-info.txt)
- /register: allows you to register the program without displaying the main dialog.
- Examples:
- mbam.exe /register 12345-67890 AAAA-BBBB-CCCC-DDDD (will register the product using the license key passed in the parameters)
- /developer: this command line parameter is explained in further detail in the false positives section.
- Examples:
- mbam.exe /developer (will start the program with detailed detection information)
- /update <optional -silent>: allows you to update the product and database.
- Examples:
- mbam.exe /update (will attempt to update the database or program, depending on settings)
- mbam.exe /update -silent (will attempt to update the database or program silently)
- Limitations:
- -silent parameter requires product registration.
- /scan <optional -quick or -full or -flash> <optional -silent> <optional -remove> <
optional -terminate> <optional -reboot> <optional -log>: initiates a scan with the selected options.
- Parameters:
- -quick: initiates a quick scan.
- -full: initiates a full scan using saved drives in the registry.
- -flash: initiates a flash scan, memory and heuristics only (requires registration).
- -terminate: closes the program after a scan completes and no threats were found (can not be used with -silent).
- -log: overrides the save log checkmark on the settings tab.
- -silent: hides the GUI while scanning (does not need to be used with -terminate). Requires product registration.
- -reboot: reboots the computer if necessary, only valid if -silent is used. Requires product registration.
- -remove: automatically removes threats and saves a log file. Unless -silent is specified, GUI stays open. Requires product registration.
- Examples:
- mbam.exe /scan (will run a default scan)
- mbam.exe /scan -full (will run a full scan)
- mbam.exe /scan -flash -terminate (will run a flash scan and terminate if no objects are detected)
- mbam.exe /scan -quick -log -silent -remove -reboot (will run a quick scan silently, logs, automatically removes threats, and reboots if necessary)
- Limitations:
- -terminate parameter can not be used with the -silent parameter.
- -reboot parameter is only valid if used with the -silent parameter.
- -flash, -silent, -reboot, and -remove parameters require product registration.