summaryrefslogtreecommitdiff
path: root/antivirusDetection.vbs
blob: ad22e267343d22f2eef65b41544b3c74a736f0e4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
On Error Resume Next
Set objWMIService = GetObject("winmgmts:{impersonationLevel=impersonate}!\\.\root\SecurityCenter2")
If objWMIService is Nothing Then
    Wscript.StdOut.Write "NULL"
Else
    Set installedAntiviruses = objWMIService.ExecQuery("Select * from AntivirusProduct")
'Iterates through all the antivirus software,retrieved by the WMI query,present on the system and prints only the ones that are active
'this is done by checking the 12th bit of the productState property of the antivirus
'if 12th bit is on then it means that the antivirus is in active state
'if 12th bit is off then it is inactive.
'see http://neophob.com/2010/03/wmi-query-windows-securitycenter2/
    count=0
    list=""
    For Each antivirus in installedAntiviruses
        If  antivirus.productState And &h01000 Then 'checking the state of the 12th bit of productState property of the antivirus
            count=count+1
            list=list & VBNewLine & VBtab & "*" & antivirus.displayName
        End if
    Next
    If count = 0 Then
        Wscript.StdOut.Write "NOT_FOUND"
    Else
        Wscript.Echo list
    End if
End if
core/commit/TEMPLATE.SOURCECODE.HEADER?id=e40e42ffeaa56c2f66b71c58190774cc70d20343'>update header template to MPLv2 cf. ESC minutes.Michael Meeks 2012-01-05Bump year.Stephan Bergmann 2011-10-26add emacs + vim modelines to the MPL license templateMichael Meeks 2011-08-18Simplified license header template.Lubos Lunak 2011-01-11Licencing filesWol