Optional Feature Commands Parent topic

Configure optional security features using the Command Line Interface by typing your command in the following format:
SLCmd.exe -p <admin_password> <command>   <parameter> <value>
The following table lists the available abbreviated forms of parameters.

Abbreviations and Uses

Parameter
Abbreviation
Use
apihookingprevention
api
Manage API Hooking Prevention
customaction
ca
Manage actions taken when Safe Lock blocks specific types of events
dlldriverlockdown
dd
Manage DLL/Driver Lockdown
dllinjectionprevention
dll
Manage DLL Injection Prevention
exceptionpath
ep
Manage exceptions to Application Lockdown
integritymonitoring
in
Manage Integrity Monitoring
memoryrandomization
mr
Manage Memory Randomization
networkvirusprotection
net
Manage Network Virus Protection
script
scr
Manage Script Lockdown
storagedeviceblocking
sto
Allows or blocks storage devices (CD/DVD drives, floppy disks, and network drives) from accessing the managed endpoint.
usbmalwareprotection
usb
Manage USB Malware Protection
writeprotection
wp
Manage Write Protection
writeprotection-includes-approvedlist
wpal
Manage Write Protection includes Approved List
The following table lists the commands, parameters, and values available.

Optional Feature Commands

Command
Parameter
Description
set apihookingprevention
enable
Enable API Hooking Prevention
For example, type:
SLCmd.exe -p <admin_password> set apihookingprevention enable
Note
Note
The default status is Disabled.
disable
Disable API Hooking Prevention
For example, type:
SLCmd.exe -p <admin_password> set apihookingprevention disable
Display the current status of API Hooking Prevention
For example, type:
SLCmd.exe -p <admin_password> set apihookingprevention
set customaction
Display the current setting for actions taken when Safe Lock blocks specific types of events
Note
Note
The default setting is Ask.
ignore
Ignore blocked files or processes when Application Lockdown blocks any of the following events:
  • Process launch
  • DLL loading
  • Script file access
For example, type:
SLCmd.exe -p <admin_password> set customaction ignore
quarantine
Quarantine blocked files or processes when Application Lockdown blocks any of the following events:
  • Process launch
  • DLL loading
  • Script file access
For example, type:
SLCmd.exe -p <admin_password> set customaction qurantine
Note
Note
Safe Lock does not support a custom action of quarantine on Windows XP.
ask
Ask what to do for blocked files or processes when Application Lockdown blocks any of the following events:
  • Process launch
  • DLL loading
  • Script file access
For example, type:
SLCmd.exe -p <admin_password> set customaction ask
set dlldriverlockdown
 
Display the current status of DLL/Driver Lockdown
For example, type:
SLCmd.exe -p <admin_password> set dlldriverlockdown
Note
Note
The default status is Enabled.
enable
Enable DLL/Driver Lockdown
For example, type:
SLCmd.exe -p <admin_password> set dlldriverlockdown enable
disable
Disable DLL/Driver Lockdown
For example, type:
SLCmd.exe -p <admin_password> set dlldriverlockdown disable
set dllinjectionprevention
 
Display the current status of DLL Injection Prevention
For example, type:
SLCmd.exe -p <admin_password> set dllinjectionprevention
Note
Note
The default status is Disabled.
enable
Enable DLL Injection Prevention
For example, type:
SLCmd.exe -p <admin_password> set dllinjectionprevention enable
disable
Disable DLL Injection Prevention
For example, type:
SLCmd.exe -p <admin_password> set dllinjectionprevention disable
set exceptionpath
 
Display current setting for using exceptions to Application Lockdown
For example, type:
SLCmd.exe -p <admin_password> set exceptionpath
Note
Note
The default setting is Disabled.
enable
Enable exceptions to Application Lockdown
For example, type:
SLCmd.exe -p <admin_password> set exceptionpath enable
disable
Disable exceptions to Application Lockdown
For example, type:
SLCmd.exe -p <admin_password> set exceptionpath disable
set integritymonitoring
 
Display the current status of Integrity Monitoring
For example, type:
SLCmd.exe -p <admin_password> set integritymonitoring
Note
Note
The default status is Disabled.
enable
Enable Integrity Monitoring
For example, type:
SLCmd.exe -p <admin_password> set integritymonitoring enable
disable
Disable Integrity Monitoring
For example, type:
SLCmd.exe -p <admin_password> set integritymonitoring disable
set memoryrandomization
 
Display the current status of Memory Randomization
For example, type:
SLCmd.exe -p <admin_password> set memoryrandomization
Note
Note
The default status is Disabled.
enable
Enable Memory Randomization
For example, type:
SLCmd.exe -p <admin_password> set memoryrandomization enable
disable
Disable Memory Randomization
For example, type:
SLCmd.exe -p <admin_password> set memoryrandomization disable
set networkvirusprotection
 
Display the current status of Network Virus Protection
For example, type:
SLCmd.exe -p <admin_password> set networkvirusprotection
Note
Note
The default status is Enabled.
enable
Enable Network Virus Protection
For example, type:
SLCmd.exe -p <admin_password> set networkvirusprotection enable
disable
Disable Network Virus Protection
For example, type:
SLCmd.exe -p <admin_password> set networkvirusprotection disable
set script
 
Display the current status of Script Lockdown
For example, type:
SLCmd.exe -p <admin_password> set script
Note
Note
The default status is Enabled.
enable
Enable Script Lockdown
For example, type:
SLCmd.exe -p <admin_password> set script enable
disable
Disable Script Lockdown
For example, type:
SLCmd.exe -p <admin_password> set script disable
set storagedeviceblocking
 
Display the current status of Storage Device Blocking
For example, type:
SLCmd.exe -p <admin_password> set storagedeviceblocking
Note
Note
The default status is Disabled.
enable
Enable Storage Device Blocking
For example, type:
SLCmd.exe -p <admin_password> set storagedeviceblocking enable
disable
Disable Storage Device Blocking
For example, type:
SLCmd.exe -p <admin_password> set storagedeviceblocking disable
set usbmalwareprotection
 
Display the current status of USB Malware Protection
For example, type:
SLCmd.exe -p <admin_password> set usbmalwareprotection
Note
Note
The default status is Disabled.
enable
Enable USB Malware Protection
For example, type:
SLCmd.exe -p <admin_password> set usbmalwareprotection enable
disable
Disable USB Malware Protection
For example, type:
SLCmd.exe -p <admin_password> set usbmalwareprotection disable
set writeprotection
 
Display the current status of Write Protection
For example, type:
SLCmd.exe -p <admin_password> set writeprotection
Note
Note
The default status is Disabled.
enable
Enable Write Protection
For example, type:
SLCmd.exe -p <admin_password> set writeprotection enable
disable
Disable Write Protection
For example, type:
SLCmd.exe -p <admin_password> set writeprotection disable
set writeprotection-includes-approvedlist
 
Display the current status of Write Protection includes Approved List
For example, type:
SLCmd.exe -p <admin_password> set writeprotection-includes-approvedlist
Note
Note
The default status is Disabled. However, the status changes to Enabled if Write Protection is enabled.
enable
Enable protection of the Approved List (in addition to the Write Protection List) when Write Protection is enabled
For example, type:
SLCmd.exe -p <admin_password> set writeprotection-includes-approvedlist enable
disable
Disable protection of the Approved List (in addition to the Write Protection List) when Write Protection is enabled
For example, type:
SLCmd.exe -p <admin_password> set writeprotection-includes-approvedlist disable