docs.clamav.net
Open in
urlscan Pro
2606:4700::6810:db54
Public Scan
Submitted URL: http://docs.clamav.net/
Effective URL: https://docs.clamav.net/
Submission: On April 06 via api from US — Scanned from DE
Effective URL: https://docs.clamav.net/
Submission: On April 06 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form id="searchbar-outer" class="searchbar-outer">
<input type="search" id="searchbar" name="searchbar" placeholder="Search this book ..." aria-controls="searchresults-outer" aria-describedby="searchresults-header">
</form>
Text Content
1. 1. Introduction 2. 2. Installing 3. 1. 2.1. Packages 2. 2.2. Docker 3. 2.3. Unix from source (v0.104+) 4. 2.4. Unix from source (v0.103-) 5. 2.5. Windows from source 6. 2.6. Community Projects 7. 2.7. Add a service user account 4. 3. Usage 5. 1. 3.1. Configuration 2. 3.2. Updating Signature Databases 3. 3.3. Scanning 4. 1. 3.3.1. On-Access Scanning 5. 3.4. Running ClamAV Services 6. 3.5. Report a Bug 6. 4. Signatures 7. 1. 4.1. CVD Info File 2. 4.2. Dynamic Configuration Settings 3. 4.3. Trusted and Revoked EXE Certificates 4. 4.4. File Type Recognition 5. 4.5. Allow Lists 6. 4.6. Hash-based Signatures 7. 4.7. Content-based Signature Format 8. 1. 4.7.1. Logical Signatures 2. 4.7.2. Extended Signatures 9. 4.8. YARA Rules 10. 4.9. Phishing Signatures 11. 4.10. Bytecode Signatures 12. 4.11. Container Metadata Signatures 13. 4.12. Archive Passwords (experimental) 14. 4.13. Signature Names 8. 5. For Developers 9. 1. 5.1. Pull Request Basics 2. 5.2. ClamAV Git Work Flow 3. 5.3. Working with Your Fork 4. 5.4. Reviewing Pull Requests 5. 5.5. Building for Development 6. 5.6. Building the Installer Packages 7. 5.7. Dev Tips & Tricks 8. 5.8. Performance Profiling 9. 5.9. Computing Code Coverage 10. 5.10. Fuzzing Sanitizers 11. 5.11. libclamav 12. 5.12. Contribute 10. 6. Frequently Asked Questions 11. 1. 6.1. Selecting the Right Version of ClamAV for You 2. 6.2. FreshClam (Signature Updater) 3. 6.3. Signature Database (CVD) 4. 6.4. Malware and False Positive Report 5. 6.5. Misc 6. 6.6. Mailing Lists 7. 6.7. Safe Browsing 8. 6.8. Troubleshooting 9. 6.9. Interpreting Scan Alerts 10. 6.10. Upgrading 11. 6.11. Rust 12. 6.12. Win32 13. 6.13. PUA (Potentially Unwanted Application) 14. 6.14. Ignore 15. 6.15. Uninstall 16. 6.16. ClamAV EOL Policy 17. 12. 7. Community Resources 13. 14. 8. Appendix 15. 1. 8.1. Terminology 2. 8.2. Hosting a Private Database Mirror 3. 8.3. Microsoft Authenticode Signature Verification 4. 8.4. ClamAV File Types and Target Types 5. 8.5. ClamAV Versions and Functionality Levels * Dark * Light CLAMAV DOCUMENTATION CLAMAV ClamAV is an open source (GPLv2) anti-virus toolkit, designed especially for e-mail scanning on mail gateways. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates. The core of the package is an anti-virus engine available in a form of shared library. > Tip: ClamAV is not a traditional anti-virus or endpoint security suite. For a > fully featured modern endpoint security suite, check out Cisco Secure > Endpoint. See "related products", below, for more details. ClamAV is brought to you by Cisco Systems, Inc. COMMUNITY PROJECTS ClamAV has a diverse ecosystem of community projects, products, and other tools that either depend on ClamAV to provide malware detection capabilities or supplement ClamAV with new features such as improved support for 3rd party signature databases, graphical user interfaces (GUI), and more. FEATURES * ClamAV is designed to scan files quickly. * Real time protection (Linux only). The ClamOnAcc client for the ClamD scanning daemon provides on-access scanning on modern versions of Linux. This includes an optional capability to block file access until a file has been scanned (on-access prevention). * ClamAV detects millions of viruses, worms, trojans, and other malware, including Microsoft Office macro viruses, mobile malware, and other threats. * ClamAV's bytecode signature runtime, powered by either LLVM or our custom bytecode interpreter, allows the ClamAV signature writers to create and distribute very complex detection routines and remotely enhance the scanner’s functionality. * Signed signature databases ensure that ClamAV will only execute trusted signature definitions. * ClamAV scans within archives and compressed files but also protects against archive bombs. Built-in archive extraction capabilities include: * Zip (including SFX, excluding some newer or more complex extensions) * RAR (including SFX, most versions) * 7Zip * ARJ (including SFX) * Tar * CPIO * Gzip * Bzip2 * DMG * IMG * ISO 9660 * PKG * HFS+ partition * HFSX partition * APM disk image * GPT disk image * MBR disk image * XAR * XZ * Microsoft OLE2 (Office documments) * Microsoft OOXML (Office documments) * Microsoft Cabinet Files (including SFX) * Microsoft CHM (Compiled HTML) * Microsoft SZDD compression format * HWP (Hangul Word Processor documents) * BinHex * SIS (SymbianOS packages) * AutoIt * InstallShield * ESTsoft EGG * Supports Windows executable file parsing, also known as Portable Executables (PE) both 32/64-bit, including PE files that are compressed or obfuscated with: * AsPack * UPX * FSG * Petite * PeSpin * NsPack * wwpack32 * MEW * Upack * Y0da Cryptor * Supports ELF and Mach-O files (both 32 and 64-bit) * Supports almost all mail file formats * Support for other special files/formats includes: * HTML * RTF * PDF * Files encrypted with CryptFF and ScrEnc * uuencode * TNEF (winmail.dat) * Advanced database updater with support for scripted updates, digital signatures and DNS based database version queries > Disclaimer: Many of the above file formats continue to evolve. Executable > packing and obfuscation tools in particular are constantly changing. We cannot > guarantee that we can unpack or extract every version or variant of the listed > formats. LICENSE ClamAV is licensed under the GNU General Public License, Version 2. SUPPORTED PLATFORMS Clam AntiVirus is highly cross-platform. The development team cannot test every OS, so we have chosen to test ClamAV using the two most recent Long Term Support (LTS) versions of each of the most popular desktop operating systems. Our regularly tested operating systems include: * GNU/Linux * Alpine * 3.17 (x86_64) * Ubuntu * 18.04 (x86_64, i386) * 20.04 (x86_64) * Debian * 10 (x86_64, i386) * 11 (x86_64, i386) * CentOS * 7 (x86_64, i386) * Fedora * 31 (x86_64) * 33 (x86_64) * openSUSE * 15 Leap (x86_64) * UNIX * FreeBSD * 12 (x86_64) * 13 (x86_64) * macOS * 10.13 High Sierra (Intel x86_64) * 10.15 Catalina (Intel x86_64) * 11.5 Big Sur (Intel x86_64, arm64 Apple M1) * Windows * 7 (x86_64, i386) * 10 (x86_64, i386) > Disclaimer: Platforms and operating systems other than the ones above are not > as well tested by the ClamAV development team. In particular, uncommon > operating systems such as HP-UX and Solaris, and uncommon processor > architectures such as sparc64, armhf, pp64le, etc. are not supported. > > You are welcome to report bugs and contribute bug fixes for unsupported > platforms. We may be unable to verify that a platform-specific bug-fix is > resolves an issue. But provided that a contributed fix appears technically > sound, and does not cause other issues, we will be happy to merge it. RECOMMENDED SYSTEM REQUIREMENTS The following minimum recommended system requirements are for using ClamScan or ClamD applications with the standard ClamAV signature database provided by Cisco. Minimum recommended RAM for ClamAV: * FreeBSD and Linux server edition: 3 GiB+ * Linux non-server edition: 3 GiB+ * Windows 7 & 10 32-bit: 3 GiB+ * Windows 7 & 10 64-bit: 3 GiB+ * macOS: 3 GiB+ > Tip: Server environments, like Docker, as well as and embedded runtime > environments are often resource constrained. We recommend at 3-4 GiB of RAM, > but you may get by with less if you're willing to accept some limitations. You > can find more information here. Minimum recommended CPU for ClamAV: * 1 CPU at 2.0 Ghz+ Minimum available hard disk space required: For the ClamAV application we recommend having 5 GiB of free space available. This recommendation is in addition to the recommended disk space for each OS. > Note: The tests to determine these minimum requirements were performed on > systems that were not running other applications. If other applications are > being run on the system, additional resources will be required in addition to > our recommended minimums. MAILING LISTS AND CHAT MAILING LISTS If you have a trouble installing or using ClamAV try asking on our mailing lists. There are four lists available: * clamav-announce (at) lists.clamav.net * info about new versions, moderated. * Subscribers are not allowed to post to this mailing list. * clamav-users (at) lists.clamav.net * user questions * clamav-devel (at) lists.clamav.net * technical discussions * clamav-virusdb (at) lists.clamav.net * database update announcements, moderated You can subscribe and search the mailing list archives here. To unsubscribe: Use the same form page that you used when you subscribed. Search at the bottom for "unsubscribe". IMPORTANT: When you subscribe or unsubscribe, you will receive a confirmation email with a link that you must click on or else no action will occur. If you did not receive the confirmation email, check your spam folder. CHAT You can join the community on our ClamAV Discord chat server. SUBMITTING NEW OR OTHERWISE UNDETECTED MALWARE If you've got a virus which is not detected by the current version of ClamAV using the latest signature databases, please submit the sample for review at our website: https://www.clamav.net/reports/malware Likewise, if you have a benign file that is flagging as a virus and you wish to report a False Positive, please submit the sample for review at our website: https://www.clamav.net/reports/fp If you have questions about the submission process, please read the Malware and False Positive Report FAQ How long does it take for a signature change after submitting new malware or submitting a false positive report? > In most cases, it takes at least 48 hours from initial submission before any > change will be published in the official ClamAV signature databases. Who analyzes malware and false positive file uploads? > Given the volume of submissions, the vast majority of files are handled by > automation. Who has access to the uploaded files? > All engineers and analysts within Cisco's Talos organization have access to > the files. Are malware or false positive file uploads shared with other companies? > No. Files that are submitted for review through the ClamAV Malware and False > Positive web forms (or the clamsubmit tool), are not shared outside of Cisco. > However, sample sharing is fair game if we've already received the same file > from a different source (VirusTotal, Cisco SMA, various feeds, etc.). Are the files deleted after the analysis? > No. Uploaded files are kept indefinitely. Is the file accessible using a public URL at any point in this process? > No. Uploaded files are not accessible using a public URL. They are processed > internally and kept internal to Cisco Talos. RELATED PRODUCTS Cisco Secure Endpoint (formerly AMP for Endpoints) is Cisco's cloud-based security suite for commercial and enterprise customers. Secure Endpoint is available for Windows, Linux, and macOS and provides superior malware detection capabilities, behavioral monitoring, dynamic file analysis, endpoint isolation, analytics, and threat hunting. Secure Endpoint sports a modern administrative web interface (dashboard).