Command lines
We are pleased to provide you with a comprehensive set of command-line tools designed to enhance the flexibility and efficiency of our software. These tools enable users to script and automate various functionalities, tailoring the software to meet their specific needs and workflows.
Explore the possibilities and optimize your experience with our command-line options.
You only have to run the following command lines as an elevated Administrator. As a reminder, TSplus-Security.exe is located in the following folder C:\Program Files (x86)\TSplus-Security by default.
Table of contents
- Configure proxy server
- Backup data and settings
- Restore data and settings
- Remove and Unblock all blocked IP addresses
- Remove and Unblock specified blocked IP addresses
- Block specified IP addresses
- Add IP addresses to Whitelist
- Add a program or directory to Ransomware Protection auhorized list
- Refresh hacker IP Protection
- Set Log Level
- Add trusted devices
- Enable configured trusted devices
- Disable all trusted devices
- Install Ransomware Protection driver
- Uninstall Ransomware Protection driver
License Management
To perform operation on licenses, please replace the program AdminTool.exe presented in the following documentation by the TSplus-Security.exe program located in Advanced Security setup directory (usually C:\Program Files (x86)\TSplus-Security ).
- License activation
- License reset following cloning of a VM
- Volume license activation
- Enabling and disabling Volume license
- Volume license update
- Display remaining license credits for a Volume License key
- Display remaining support credits for a Volume License key
Configure proxy server:
/proxy /set
Syntax:
TSplus-Security.exe /proxy /set [parameters]
Description:
Command
/proxy /set
is used to configure a proxy server for Internet access.
Parameters:
-
/host
: the destination host can be a predefined value (“ie” or “none”) or a user-defined value (e.g: 127.0.0.1 or proxy.company.org). This parameter is mandatory -
/port
: the port number used to connect to the proxy server. Required if the hostname value is a custom user-defined value. -
/username
: the username to connect to the proxy server. This setting is optional -
/password
: the user’s password must be supplied if a username has been defined. However, its value can be empty
Examples:
TSplus-Security.exe /proxy /set /host proxy.company.org /port 80 /username dummy /password pass@word1
TSplus-Security.exe /proxy /set /host ie
For more information, please go to How to configure a Proxy Server for Internet Access?
Backup data and settings:
/backup
Syntax:
TSplus-Security.exe /backup [DestinationDirectoryPath]
Description:
Command
/backup
is used to backup TSplus Advanced Security data and settings.
By default, the backup will be created in the archives directory located in Advanced Security setup directory (e.g.: C:\Program Files (x86)\TSplus-Security\archives).
Parameters:
-
DestinationDirectoryPath
: to backup in another directory than the default one. Relative and absolute paths are allowed.
Examples:
TSplus-Security.exe /backup TSplus-Security.exe /backup “C:\Users\admin\mycustomfolder”
For more information, please go to Advanced - Backup and Restore
Restore data and settings:
/restore
Syntax:
TSplus-Security.exe /restore [Backup Directory Path]
Description:
Command
/restore
is used to restore TSplus Advanced Security data and settings.
The specified backup directory path must be created by the /backup command or from the Backup feature from the aplication.
Parameters:
-
Backup Directory Path
: the path where is located the backup directory to restore.
Examples:
TSplus-Security.exe /restore “C:\Program Files (x86)\TSplus-Security\archives\backup-2025-03-11_21-45-51-setup” /silent
For more information, please go to Advanced - Backup and Restore
Remove and unblock all blocked IP addresses:
/unblockall
Syntax:
TSplus-Security.exe /unblockall
Description:
Command
/unblockall
is used to remove all blocked IP addresses from TSplus Advanced Security’s firewall and unblock them from Microsoft Windows Defender firewall if required.
Examples:
TSplus-Security.exe /unblockall
For more information, please go to Firewall
Remove and unblock specified IP addresses:
/unblockips
Syntax:
TSplus-Security.exe /unblockips [IP addresses]
Description:
Command
/unblockips
is used to remove all specified blocked IP addresses from TSplus Advanced Security’s firewall and unblock them from Microsoft Windows Defender firewall if required.
This command has no effect on IP addresses already blocked by Hacker IP protection. If you still want to unblock one of these addresses, please use the whitelist command.
Parameters:
-
IP addresses
: the list of ip addresses or ip ranges to unblock (coma or semicolon separated).
Examples:
TSplus-Security.exe /unblockips 1.1.1.1;2.2.2.2;3.3.3.1-3.3.6.12;5.5.5.5
For more information, please go to Firewall
Block specified IP addresses:
/blockips
Syntax:
TSplus-Security.exe /blockips [IP addresses] [Optional Description]
Description:
Command
/blockips
is used to block all specified IP addresses using TSplus Advanced Security’s firewall and block them using Microsoft Windows Defender firewall if configured.
Parameters:
-
IP addresses
: the list of ip addresses or ip ranges to block (coma or semicolon separated). -
Optional Description
: an optional description which will be added for each entry.
Examples:
TSplus-Security.exe /blockips 1.1.1.1;2.2.2.2;3.3.3.1-3.3.6.12;5.5.5.5 “John’s workplaces”
For more information, please go to Firewall
Add IP addresses to whitelist:
/addwhitelistedip
Syntax:
TSplus-Security.exe /addwhitelistedip [IP addresses] [Optional Description]
Description:
Command
/addwhitelistedip
is used to add specified IP addresses to the authorized IP addresses of TSplus Advanced Security’s firewall and unblock them from Microsoft Windows Defender firewall if required.
Parameters:
-
IP addresses
: the list of ip addresses or ip ranges to whitelist (coma or semicolon separated). -
Optional Description
: an optional description which will be added for each entry.
Examples:
TSplus-Security.exe /addwhitelistedip 1.1.1.1;2.2.2.2;3.3.3.1-3.3.6.12;5.5.5.5 “John’s workplaces”
For more information, please go to Firewall
Add a program or directory to Ransomware Protection auhorized list:
/whitelist
Syntax:
TSplus-Security.exe /whitelist add [Authorized Paths]
Description:
Command
/whitelist add
is used to add specified program paths and directory paths to the authorized list of TSplus Advanced Security’s Ransomware Protection.
Parameters:
-
Authorized Paths
: the list of program paths and directory paths to add to TSplus Advanced Security’s Ransomware Protection authoriaztion list (semicolon separated).
Examples:
TSplus-Security.exe /whitelist add “C:\Windows\notepad.exe;C:\Program Files (x86)\Tsplus\Client\webserver”
For more information, please go to Ransomware Protection Action
Refresh Hacker IP Protection:
/refreshipprotection
Syntax:
TSplus-Security.exe /refreshipprotection
Description:
Command
/refreshipprotection
is used to refresh the list of blocked IP ranges for the Hacker IP protection feature. Support and Updates Services subscription is required.
Examples:
TSplus-Security.exe /refreshipprotection
For more information, please go to Hacker IP Protection
Set log level:
/setloglevel
Syntax:
TSplus-Security.exe /setloglevel [Log Level]
Description:
Command
/setloglevel
is used to set the log level for all Advanced Security’s components.
Parameters:
-
Log Level
: the log level among the following values : ALL, DEBUG, INFO, WARN, ERROR, FATAL, OFF
Examples:
TSplus-Security.exe /setloglevel ALL
For more information, please go to Advanced > Logs
Add trusted devices:
/addtrusteddevices
Syntax:
TSplus-Security.exe /addtrusteddevices [Trusted Devices Configuration]
Description:
Command
/addtrusteddevices
is used to add trusted devices programmatically. Requires Ultimate edition.
Parameters:
-
Trusted Devices Configuration
: The argument is composed of a list of trusted devices (semicolon separated), structured as follows:
Username and Devices are separated by the colon character (,).
Username Details:
User Type and Full Username are separated by the colon character (:). Accepted user types are “user” and “group”.
Optional Keyword “disabled”: if included, the trusted devices will be created, but restrictions will be disabled for this user. If not mentioned, restrictions are enabled by default.
Device Details:
Device Name and Optional Comment: separated by the equal sign character (=).
Devices are separated by the colon character (:).
Examples:
TSplus-Security.exe /addtrusteddevices “user:WIN-A1BCDE23FGH\admin:disabled,device1name=this is a comment for device 1:device2name:device3name;user:DESKTOP-A1BCDE23FGH\johndoe,device1name:device4name=another comment;group:DESKTOP-A1BCDE23FGH\Administrators:disabled,device5name”
For more information, please go to Trusted Devices
Enable configured trusted devices:
/enabletrusteddevices
Syntax:
TSplus-Security.exe /enabletrusteddevices [User or Groups]
Description:
Command
/enabletrusteddevices
is used to enable all configured trusted devices for the specified users and groups.
Parameters:
-
User or Groups
: The argument is a list of users and groups (semicolon separated). Within the username, the separation between the user type (“user” and “group” are the only accepted values) and the full username is done by a colon.
Examples:
TSplus-Security.exe /enabletrusteddevices “user:WIN-A1BCDE23FGH\admin;user:DESKTOP-A1BCDE23FGH\johndoe;group:DESKTOP-A1BCDE23FGH\Administrators”
For more information, please go to Trusted Devices
Disable all trusted devices:
/disabletrusteddevices
Syntax:
TSplus-Security.exe /disabletrusteddevices [User or Groups]
Description:
Command
/disabletrusteddevices
is used to disable all configured trusted devices for the specified users and groups.
Parameters:
-
User or Groups
: The argument is a list of users and groups (semicolon separated). Within the username, the separation between the user type (“user” and “group” are the only accepted values) and the full username is done by a colon.
Examples:
TSplus-Security.exe /disabletrusteddevices “user:WIN-A1BCDE23FGH\admin;user:DESKTOP-A1BCDE23FGH\johndoe;group:DESKTOP-A1BCDE23FGH\Administrators”
For more information, please go to Trusted Devices
Setup Ransomware Protection driver:
/setup-driver
Syntax:
TSplus-Security.exe /setup-driver
Description:
Command
/setup-driver
installs the Ransomware Protection driver. This operation is normally perfomed during installation.
Examples:
TSplus-Security.exe /setup-driver
For more information, please go to Ransomware Protection
Uninstall Ransomware Protection driver:
/uninstalldriver
Syntax:
TSplus-Security.exe /uninstalldriver
Description:
Command
/uninstalldriver
uninstall the Ransomware Protection driver. This operation is normally perfomed during Advanced Security uninstallation.
Examples:
TSplus-Security.exe /uninstalldriver
For more information, please go to Ransomware Protection