Requirements to Install and Search Remote Systems

Following are the requirements to install and run Malicious File Hunter software.


The software is installed on one machine, but used to search and entire network of computers without deploying additional software.
Following are installation requirements:


  • A PC with at least 1 GHz speed Pentium processor
  • Minimum 512 MB of RAM (memory) or higher
  • Hard disk drive with at least 100MB of free disk space
  • SVGA monitor with absolute screen resolution of 1024x768 and colour settings at a minimum of 24-bit true colour.
  • Compatible mouse or pointing device and keyboard.

Operating system:

  • Microsoft Windows XP Professional with Service Pack 3 or later
  • Microsoft Windows XP Home Edition with Service Pack 3 or later
  • Microsoft Windows Vista SP1 or higher
  • Microsoft Windows 7 SP1 or higher
  • Microsoft Windows 8 and Windows 8.1
  • Excluding Windows 8 and 8.1 RT tablet edition


Note: MFH installer software automatically checks, download and install .NET 4 and Visual C++ x86 if not already installed.

Account Rights:

  • Administrative rights to install software
  • An account with sufficient WMI rights (Local and Domain Administrators already have these rights but can be assigned using GPO to other users)

Internet Connection:

An unrestricted internet connection is required for product licensing.

On Remote Computers

Malicious File Hunter needs access to WMI on remote computers. There are a few things to check and configure to allow this access

  • Any support Operating Systems from the list above. You can also run searches on Windows 2000 SP4.
  • Enabled and running WMI - Windows Management Instrumentation service
  • Firewall rule on Network (if needed) and on remote computers allowing WMI access.
  • Rights on remote computers; Local or Domain Administrators have these rights, but WMI rights can be assigned to any user without having Admin priviliges.

The software has built in checks for WMI access. "Accounts and Computers" popup can check WMI access rights and will report an error if there is a problem. "Search Log" also checks and reports errors related to access rights and other issues when running searches.