Subversion Repositories configs

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
198 - 1
##
2
## Example config file for the Clam AV daemon
3
## Please read the clamd.conf(5) manual before editing this file.
4
##
5
 
6
 
7
# Comment or remove the line below.
8
Example
9
 
10
# Uncomment this option to enable logging.
11
# LogFile must be writable for the user running daemon.
12
# A full path is required.
13
# Default: disabled
14
#LogFile /tmp/clamd.log
15
 
16
# By default the log file is locked for writing - the lock protects against
17
# running clamd multiple times (if want to run another clamd, please
18
# copy the configuration file, change the LogFile variable, and run
19
# the daemon with --config-file option).
20
# This option disables log file locking.
21
# Default: no
22
#LogFileUnlock yes
23
 
24
# Maximum size of the log file.
25
# Value of 0 disables the limit.
26
# You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
27
# and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
28
# in bytes just don't use modifiers. If LogFileMaxSize is enabled, log
29
# rotation (the LogRotate option) will always be enabled.
30
# Default: 1M
31
#LogFileMaxSize 2M
32
 
33
# Log time with each message.
34
# Default: no
35
#LogTime yes
36
 
37
# Also log clean files. Useful in debugging but drastically increases the
38
# log size.
39
# Default: no
40
#LogClean yes
41
 
42
# Use system logger (can work together with LogFile).
43
# Default: no
44
#LogSyslog yes
45
 
46
# Specify the type of syslog messages - please refer to 'man syslog'
47
# for facility names.
48
# Default: LOG_LOCAL6
49
#LogFacility LOG_MAIL
50
 
51
# Enable verbose logging.
52
# Default: no
53
#LogVerbose yes
54
 
55
# Enable log rotation. Always enabled when LogFileMaxSize is enabled.
56
# Default: no
57
#LogRotate yes
58
 
59
# Enable Prelude output.
60
# Default: no
61
#PreludeEnable yes
62
#
63
# Set the name of the analyzer used by prelude-admin.
64
# Default: ClamAV
65
#PreludeAnalyzerName ClamAV
66
 
67
# Log additional information about the infected file, such as its
68
# size and hash, together with the virus name.
69
#ExtendedDetectionInfo yes
70
 
71
# This option allows you to save a process identifier of the listening
72
# daemon (main thread).
73
# This file will be owned by root, as long as clamd was started by root.
74
# It is recommended that the directory where this file is stored is
75
# also owned by root to keep other users from tampering with it.
76
# Default: disabled
77
#PidFile /var/run/clamd.pid
78
 
79
# Optional path to the global temporary directory.
80
# Default: system specific (usually /tmp or /var/tmp).
81
#TemporaryDirectory /var/tmp
82
 
83
# Path to the database directory.
84
# Default: hardcoded (depends on installation options)
85
#DatabaseDirectory /var/lib/clamav
86
 
87
# Only load the official signatures published by the ClamAV project.
88
# Default: no
89
#OfficialDatabaseOnly no
90
 
91
# The daemon can work in local mode, network mode or both.
92
# Due to security reasons we recommend the local mode.
93
 
94
# Path to a local socket file the daemon will listen on.
95
# Default: disabled (must be specified by a user)
96
#LocalSocket /tmp/clamd.socket
97
 
98
# Sets the group ownership on the unix socket.
99
# Default: disabled (the primary group of the user running clamd)
100
#LocalSocketGroup virusgroup
101
 
102
# Sets the permissions on the unix socket to the specified mode.
103
# Default: disabled (socket is world accessible)
104
#LocalSocketMode 660
105
 
106
# Remove stale socket after unclean shutdown.
107
# Default: yes
108
#FixStaleSocket yes
109
 
110
# TCP port address.
111
# Default: no
112
#TCPSocket 3310
113
 
114
# TCP address.
115
# By default we bind to INADDR_ANY, probably not wise.
116
# Enable the following to provide some degree of protection
117
# from the outside world. This option can be specified multiple
118
# times if you want to listen on multiple IPs. IPv6 is now supported.
119
# Default: no
120
#TCPAddr 127.0.0.1
121
 
122
# Maximum length the queue of pending connections may grow to.
123
# Default: 200
124
#MaxConnectionQueueLength 30
125
 
126
# Clamd uses FTP-like protocol to receive data from remote clients.
127
# If you are using clamav-milter to balance load between remote clamd daemons
128
# on firewall servers you may need to tune the options below.
129
 
130
# Close the connection when the data size limit is exceeded.
131
# The value should match your MTA's limit for a maximum attachment size.
132
# Default: 25M
133
#StreamMaxLength 10M
134
 
135
# Limit port range.
136
# Default: 1024
137
#StreamMinPort 30000
138
# Default: 2048
139
#StreamMaxPort 32000
140
 
141
# Maximum number of threads running at the same time.
142
# Default: 10
143
#MaxThreads 20
144
 
145
# Waiting for data from a client socket will timeout after this time (seconds).
146
# Default: 120
147
#ReadTimeout 300
148
 
149
# This option specifies the time (in seconds) after which clamd should
150
# timeout if a client doesn't provide any initial command after connecting.
151
# Default: 30
152
#CommandReadTimeout 30
153
 
154
# This option specifies how long to wait (in milliseconds) if the send buffer
155
# is full.
156
# Keep this value low to prevent clamd hanging.
157
#
158
# Default: 500
159
#SendBufTimeout 200
160
 
161
# Maximum number of queued items (including those being processed by
162
# MaxThreads threads).
163
# It is recommended to have this value at least twice MaxThreads if possible.
164
# WARNING: you shouldn't increase this too much to avoid running out  of file
165
# descriptors, the following condition should hold:
166
# MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual
167
# max is 1024).
168
#
169
# Default: 100
170
#MaxQueue 200
171
 
172
# Waiting for a new job will timeout after this time (seconds).
173
# Default: 30
174
#IdleTimeout 60
175
 
176
# Don't scan files and directories matching regex
177
# This directive can be used multiple times
178
# Default: scan all
179
#ExcludePath ^/proc/
180
#ExcludePath ^/sys/
181
 
182
# Maximum depth directories are scanned at.
183
# Default: 15
184
#MaxDirectoryRecursion 20
185
 
186
# Follow directory symlinks.
187
# Default: no
188
#FollowDirectorySymlinks yes
189
 
190
# Follow regular file symlinks.
191
# Default: no
192
#FollowFileSymlinks yes
193
 
194
# Scan files and directories on other filesystems.
195
# Default: yes
196
#CrossFilesystems yes
197
 
198
# Perform a database check.
199
# Default: 600 (10 min)
200
#SelfCheck 600
201
 
202
# Enable non-blocking (multi-threaded/concurrent) database reloads.
203
# This feature will temporarily load a second scanning engine while scanning
204
# continues using the first engine. Once loaded, the new engine takes over.
205
# The old engine is removed as soon as all scans using the old engine have
206
# completed.
207
# This feature requires more RAM, so this option is provided in case users are
208
# willing to block scans during reload in exchange for lower RAM requirements.
209
# Default: yes
210
#ConcurrentDatabaseReload no
211
 
212
# Execute a command when virus is found. In the command string %v will
213
# be replaced with the virus name.
214
# Default: no
215
#VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v"
216
 
217
# Run as another user (clamd must be started by root for this option to work)
218
# Default: don't drop privileges
219
#User clamav
220
 
221
# Stop daemon when libclamav reports out of memory condition.
222
#ExitOnOOM yes
223
 
224
# Don't fork into background.
225
# Default: no
226
#Foreground yes
227
 
228
# Enable debug messages in libclamav.
229
# Default: no
230
#Debug yes
231
 
232
# Do not remove temporary files (for debug purposes).
233
# Default: no
234
#LeaveTemporaryFiles yes
235
 
236
# Permit use of the ALLMATCHSCAN command. If set to no, clamd will reject
237
# any ALLMATCHSCAN command as invalid.
238
# Default: yes
239
#AllowAllMatchScan no
240
 
241
# Detect Possibly Unwanted Applications.
242
# Default: no
243
#DetectPUA yes
244
 
245
# Exclude a specific PUA category. This directive can be used multiple times.
246
# See https://github.com/vrtadmin/clamav-faq/blob/master/faq/faq-pua.md for
247
# the complete list of PUA categories.
248
# Default: Load all categories (if DetectPUA is activated)
249
#ExcludePUA NetTool
250
#ExcludePUA PWTool
251
 
252
# Only include a specific PUA category. This directive can be used multiple
253
# times.
254
# Default: Load all categories (if DetectPUA is activated)
255
#IncludePUA Spy
256
#IncludePUA Scanner
257
#IncludePUA RAT
258
 
259
# This option causes memory or nested map scans to dump the content to disk.
260
# If you turn on this option, more data is written to disk and is available
261
# when the LeaveTemporaryFiles option is enabled.
262
#ForceToDisk yes
263
 
264
# This option allows you to disable the caching feature of the engine. By
265
# default, the engine will store an MD5 in a cache of any files that are
266
# not flagged as virus or that hit limits checks. Disabling the cache will
267
# have a negative performance impact on large scans.
268
# Default: no
269
#DisableCache yes
270
 
271
# In some cases (eg. complex malware, exploits in graphic files, and others),
272
# ClamAV uses special algorithms to detect abnormal patterns and behaviors that
273
# may be malicious.  This option enables alerting on such heuristically
274
# detected potential threats.
275
# Default: yes
276
#HeuristicAlerts yes
277
 
278
# Allow heuristic alerts to take precedence.
279
# When enabled, if a heuristic scan (such as phishingScan) detects
280
# a possible virus/phish it will stop scan immediately. Recommended, saves CPU
281
# scan-time.
282
# When disabled, virus/phish detected by heuristic scans will be reported only
283
# at the end of a scan. If an archive contains both a heuristically detected
284
# virus/phish, and a real malware, the real malware will be reported
285
#
286
# Keep this disabled if you intend to handle "*.Heuristics.*" viruses
287
# differently from "real" malware.
288
# If a non-heuristically-detected virus (signature-based) is found first,
289
# the scan is interrupted immediately, regardless of this config option.
290
#
291
# Default: no
292
#HeuristicScanPrecedence yes
293
 
294
 
295
##
296
## Heuristic Alerts
297
##
298
 
299
# With this option clamav will try to detect broken executables (both PE and
300
# ELF) and alert on them with the Broken.Executable heuristic signature.
301
# Default: no
302
#AlertBrokenExecutables yes
303
 
304
# Alert on encrypted archives _and_ documents with heuristic signature
305
# (encrypted .zip, .7zip, .rar, .pdf).
306
# Default: no
307
#AlertEncrypted yes
308
 
309
# Alert on encrypted archives with heuristic signature (encrypted .zip, .7zip,
310
# .rar).
311
# Default: no
312
#AlertEncryptedArchive yes
313
 
314
# Alert on encrypted archives with heuristic signature (encrypted .pdf).
315
# Default: no
316
#AlertEncryptedDoc yes
317
 
318
# With this option enabled OLE2 files containing VBA macros, which were not
319
# detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
320
# Default: no
321
#AlertOLE2Macros yes
322
 
323
# Alert on SSL mismatches in URLs, even if the URL isn't in the database.
324
# This can lead to false positives.
325
# Default: no
326
#AlertPhishingSSLMismatch yes
327
 
328
# Alert on cloaked URLs, even if URL isn't in database.
329
# This can lead to false positives.
330
# Default: no
331
#AlertPhishingCloak yes
332
 
333
# Alert on raw DMG image files containing partition intersections
334
# Default: no
335
#AlertPartitionIntersection yes
336
 
337
 
338
##
339
## Executable files
340
##
341
 
342
# PE stands for Portable Executable - it's an executable file format used
343
# in all 32 and 64-bit versions of Windows operating systems. This option
344
# allows ClamAV to perform a deeper analysis of executable files and it's also
345
# required for decompression of popular executable packers such as UPX, FSG,
346
# and Petite. If you turn off this option, the original files will still be
347
# scanned, but without additional processing.
348
# Default: yes
349
#ScanPE yes
350
 
351
# Certain PE files contain an authenticode signature. By default, we check
352
# the signature chain in the PE file against a database of trusted and
353
# revoked certificates if the file being scanned is marked as a virus.
354
# If any certificate in the chain validates against any trusted root, but
355
# does not match any revoked certificate, the file is marked as whitelisted.
356
# If the file does match a revoked certificate, the file is marked as virus.
357
# The following setting completely turns off authenticode verification.
358
# Default: no
359
#DisableCertCheck yes
360
 
361
# Executable and Linking Format is a standard format for UN*X executables.
362
# This option allows you to control the scanning of ELF files.
363
# If you turn off this option, the original files will still be scanned, but
364
# without additional processing.
365
# Default: yes
366
#ScanELF yes
367
 
368
 
369
##
370
## Documents
371
##
372
 
373
# This option enables scanning of OLE2 files, such as Microsoft Office
374
# documents and .msi files.
375
# If you turn off this option, the original files will still be scanned, but
376
# without additional processing.
377
# Default: yes
378
#ScanOLE2 yes
379
 
380
# This option enables scanning within PDF files.
381
# If you turn off this option, the original files will still be scanned, but
382
# without decoding and additional processing.
383
# Default: yes
384
#ScanPDF yes
385
 
386
# This option enables scanning within SWF files.
387
# If you turn off this option, the original files will still be scanned, but
388
# without decoding and additional processing.
389
# Default: yes
390
#ScanSWF yes
391
 
392
# This option enables scanning xml-based document files supported by libclamav.
393
# If you turn off this option, the original files will still be scanned, but
394
# without additional processing.
395
# Default: yes
396
#ScanXMLDOCS yes
397
 
398
# This option enables scanning of HWP3 files.
399
# If you turn off this option, the original files will still be scanned, but
400
# without additional processing.
401
# Default: yes
402
#ScanHWP3 yes
403
 
404
 
405
##
406
## Mail files
407
##
408
 
409
# Enable internal e-mail scanner.
410
# If you turn off this option, the original files will still be scanned, but
411
# without parsing individual messages/attachments.
412
# Default: yes
413
#ScanMail yes
414
 
415
# Scan RFC1341 messages split over many emails.
416
# You will need to periodically clean up $TemporaryDirectory/clamav-partial
417
# directory.
418
# WARNING: This option may open your system to a DoS attack.
419
#	   Never use it on loaded servers.
420
# Default: no
421
#ScanPartialMessages yes
422
 
423
# With this option enabled ClamAV will try to detect phishing attempts by using
424
# HTML.Phishing and Email.Phishing NDB signatures.
425
# Default: yes
426
#PhishingSignatures no
427
 
428
# With this option enabled ClamAV will try to detect phishing attempts by
429
# analyzing URLs found in emails using WDB and PDB signature databases.
430
# Default: yes
431
#PhishingScanURLs no
432
 
433
 
434
##
435
## Data Loss Prevention (DLP)
436
##
437
 
438
# Enable the DLP module
439
# Default: No
440
#StructuredDataDetection yes
441
 
442
# This option sets the lowest number of Credit Card numbers found in a file
443
# to generate a detect.
444
# Default: 3
445
#StructuredMinCreditCardCount 5
446
 
447
# With this option enabled the DLP module will search for valid Credit Card
448
# numbers only. Debit and Private Label cards will not be searched.
449
# Default: no
450
#StructuredCCOnly yes
451
 
452
# This option sets the lowest number of Social Security Numbers found
453
# in a file to generate a detect.
454
# Default: 3
455
#StructuredMinSSNCount 5
456
 
457
# With this option enabled the DLP module will search for valid
458
# SSNs formatted as xxx-yy-zzzz
459
# Default: yes
460
#StructuredSSNFormatNormal yes
461
 
462
# With this option enabled the DLP module will search for valid
463
# SSNs formatted as xxxyyzzzz
464
# Default: no
465
#StructuredSSNFormatStripped yes
466
 
467
 
468
##
469
## HTML
470
##
471
 
472
# Perform HTML normalisation and decryption of MS Script Encoder code.
473
# Default: yes
474
# If you turn off this option, the original files will still be scanned, but
475
# without additional processing.
476
#ScanHTML yes
477
 
478
 
479
##
480
## Archives
481
##
482
 
483
# ClamAV can scan within archives and compressed files.
484
# If you turn off this option, the original files will still be scanned, but
485
# without unpacking and additional processing.
486
# Default: yes
487
#ScanArchive yes
488
 
489
 
490
##
491
## Limits
492
##
493
 
494
# The options below protect your system against Denial of Service attacks
495
# using archive bombs.
496
 
497
# This option sets the maximum amount of time to a scan may take.
498
# In this version, this field only affects the scan time of ZIP archives.
499
# Value of 0 disables the limit.
500
# Note: disabling this limit or setting it too high may result allow scanning
501
# of certain files to lock up the scanning process/threads resulting in a
502
# Denial of Service.
503
# Time is in milliseconds.
504
# Default: 120000
505
#MaxScanTime 300000
506
 
507
# This option sets the maximum amount of data to be scanned for each input
508
# file. Archives and other containers are recursively extracted and scanned
509
# up to this value.
510
# Value of 0 disables the limit
511
# Note: disabling this limit or setting it too high may result in severe damage
512
# to the system.
513
# Default: 100M
514
#MaxScanSize 150M
515
 
516
# Files larger than this limit won't be scanned. Affects the input file itself
517
# as well as files contained inside it (when the input file is an archive, a
518
# document or some other kind of container).
519
# Value of 0 disables the limit.
520
# Note: disabling this limit or setting it too high may result in severe damage
521
# to the system.
522
# Default: 25M
523
#MaxFileSize 30M
524
 
525
# Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
526
# file, all files within it will also be scanned. This options specifies how
527
# deeply the process should be continued.
528
# Note: setting this limit too high may result in severe damage to the system.
529
# Default: 16
530
#MaxRecursion 10
531
 
532
# Number of files to be scanned within an archive, a document, or any other
533
# container file.
534
# Value of 0 disables the limit.
535
# Note: disabling this limit or setting it too high may result in severe damage
536
# to the system.
537
# Default: 10000
538
#MaxFiles 15000
539
 
540
# Maximum size of a file to check for embedded PE. Files larger than this value
541
# will skip the additional analysis step.
542
# Note: disabling this limit or setting it too high may result in severe damage
543
# to the system.
544
# Default: 10M
545
#MaxEmbeddedPE 10M
546
 
547
# Maximum size of a HTML file to normalize. HTML files larger than this value
548
# will not be normalized or scanned.
549
# Note: disabling this limit or setting it too high may result in severe damage
550
# to the system.
551
# Default: 10M
552
#MaxHTMLNormalize 10M
553
 
554
# Maximum size of a normalized HTML file to scan. HTML files larger than this
555
# value after normalization will not be scanned.
556
# Note: disabling this limit or setting it too high may result in severe damage
557
# to the system.
558
# Default: 2M
559
#MaxHTMLNoTags 2M
560
 
561
# Maximum size of a script file to normalize. Script content larger than this
562
# value will not be normalized or scanned.
563
# Note: disabling this limit or setting it too high may result in severe damage
564
# to the system.
565
# Default: 5M
566
#MaxScriptNormalize 5M
567
 
568
# Maximum size of a ZIP file to reanalyze type recognition. ZIP files larger
569
# than this value will skip the step to potentially reanalyze as PE.
570
# Note: disabling this limit or setting it too high may result in severe damage
571
# to the system.
572
# Default: 1M
573
#MaxZipTypeRcg 1M
574
 
575
# This option sets the maximum number of partitions of a raw disk image to be
576
# scanned.
577
# Raw disk images with more partitions than this value will have up to
578
# the value number partitions scanned. Negative values are not allowed.
579
# Note: setting this limit too high may result in severe damage or impact
580
# performance.
581
# Default: 50
582
#MaxPartitions 128
583
 
584
# This option sets the maximum number of icons within a PE to be scanned.
585
# PE files with more icons than this value will have up to the value number
586
# icons scanned.
587
# Negative values are not allowed.
588
# WARNING: setting this limit too high may result in severe damage or impact
589
# performance.
590
# Default: 100
591
#MaxIconsPE 200
592
 
593
# This option sets the maximum recursive calls for HWP3 parsing during
594
# scanning. HWP3 files using more than this limit will be terminated and
595
# alert the user.
596
# Scans will be unable to scan any HWP3 attachments if the recursive limit
597
# is reached.
598
# Negative values are not allowed.
599
# WARNING: setting this limit too high may result in severe damage or impact
600
# performance.
601
# Default: 16
602
#MaxRecHWP3 16
603
 
604
# This option sets the maximum calls to the PCRE match function during
605
# an instance of regex matching.
606
# Instances using more than this limit will be terminated and alert the user
607
# but the scan will continue.
608
# For more information on match_limit, see the PCRE documentation.
609
# Negative values are not allowed.
610
# WARNING: setting this limit too high may severely impact performance.
611
# Default: 100000
612
#PCREMatchLimit 20000
613
 
614
# This option sets the maximum recursive calls to the PCRE match function
615
# during an instance of regex matching.
616
# Instances using more than this limit will be terminated and alert the user
617
# but the scan will continue.
618
# For more information on match_limit_recursion, see the PCRE documentation.
619
# Negative values are not allowed and values > PCREMatchLimit are superfluous.
620
# WARNING: setting this limit too high may severely impact performance.
621
# Default: 2000
622
#PCRERecMatchLimit 10000
623
 
624
# This option sets the maximum filesize for which PCRE subsigs will be
625
# executed. Files exceeding this limit will not have PCRE subsigs executed
626
# unless a subsig is encompassed to a smaller buffer.
627
# Negative values are not allowed.
628
# Setting this value to zero disables the limit.
629
# WARNING: setting this limit too high or disabling it may severely impact
630
# performance.
631
# Default: 25M
632
#PCREMaxFileSize 100M
633
 
634
# When AlertExceedsMax is set, files exceeding the MaxFileSize, MaxScanSize, or
635
# MaxRecursion limit will be flagged with the virus
636
# "Heuristics.Limits.Exceeded".
637
# Default: no
638
#AlertExceedsMax yes
639
 
640
##
641
## On-access Scan Settings
642
##
643
 
644
# Don't scan files larger than OnAccessMaxFileSize
645
# Value of 0 disables the limit.
646
# Default: 5M
647
#OnAccessMaxFileSize 10M
648
 
649
# Max number of scanning threads to allocate to the OnAccess thread pool at
650
# startup. These threads are the ones responsible for creating a connection
651
# with the daemon and kicking off scanning after an event has been processed.
652
# To prevent clamonacc from consuming all clamd's resources keep this lower
653
# than clamd's max threads.
654
# Default: 5
655
#OnAccessMaxThreads 10
656
 
657
# Max amount of time (in milliseconds) that the OnAccess client should spend
658
# for every connect, send, and recieve attempt when communicating with clamd
659
# via curl.
660
# Default: 5000 (5 seconds)
661
# OnAccessCurlTimeout 10000
662
 
663
# Toggles dynamic directory determination. Allows for recursively watching
664
# include paths.
665
# Default: no
666
#OnAccessDisableDDD yes
667
 
668
# Set the include paths (all files inside them will be scanned). You can have
669
# multiple OnAccessIncludePath directives but each directory must be added
670
# in a separate line.
671
# Default: disabled
672
#OnAccessIncludePath /home
673
#OnAccessIncludePath /students
674
 
675
# Set the exclude paths. All subdirectories are also excluded.
676
# Default: disabled
677
#OnAccessExcludePath /home/user
678
 
679
# Modifies fanotify blocking behaviour when handling permission events.
680
# If off, fanotify will only notify if the file scanned is a virus,
681
# and not perform any blocking.
682
# Default: no
683
#OnAccessPrevention yes
684
 
685
# When using prevention, if this option is turned on, any errors that occur
686
# during scanning will result in the event attempt being denied. This could
687
# potentially lead to unwanted system behaviour with certain configurations,
688
# so the client defaults this to off and prefers allowing access events in
689
# case of scan or connection error.
690
# Default: no
691
#OnAccessDenyOnError yes
692
 
693
# Toggles extra scanning and notifications when a file or directory is
694
# created or moved.
695
# Requires the  DDD system to kick-off extra scans.
696
# Default: no
697
#OnAccessExtraScanning yes
698
 
699
# Set the  mount point to be scanned. The mount point specified, or the mount
700
# point containing the specified directory will be watched. If any directories
701
# are specified, this option will preempt (disable and ignore all options
702
# related to) the DDD system. This option will result in verdicts only.
703
# Note that prevention is explicitly disallowed to prevent common, fatal
704
# misconfigurations. (e.g. watching "/" with prevention on and no exclusions
705
# made on vital system directories)
706
# It can be used multiple times.
707
# Default: disabled
708
#OnAccessMountPath /
709
#OnAccessMountPath /home/user
710
 
711
# With this option you can whitelist the root UID (0). Processes run under
712
# root with be able to access all files without triggering scans or
713
# permission denied events.
714
# Note that if clamd cannot check the uid of the process that generated an
715
# on-access scan event (e.g., because OnAccessPrevention was not enabled, and
716
# the process already exited), clamd will perform a scan.  Thus, setting
717
# OnAccessExcludeRootUID is not *guaranteed* to prevent every access by the
718
# root user from triggering a scan (unless OnAccessPrevention is enabled).
719
# Default: no
720
#OnAccessExcludeRootUID no
721
 
722
# With this option you can whitelist specific UIDs. Processes with these UIDs
723
# will be able to access all files without triggering scans or permission
724
# denied events.
725
# This option can be used multiple times (one per line).
726
# Using a value of 0 on any line will disable this option entirely.
727
# To whitelist the root UID (0) please enable the OnAccessExcludeRootUID
728
# option.
729
# Also note that if clamd cannot check the uid of the process that generated an
730
# on-access scan event (e.g., because OnAccessPrevention was not enabled, and
731
# the process already exited), clamd will perform a scan.  Thus, setting
732
# OnAccessExcludeUID is not *guaranteed* to prevent every access by the
733
# specified uid from triggering a scan (unless OnAccessPrevention is enabled).
734
# Default: disabled
735
#OnAccessExcludeUID -1
736
 
737
# This option allows exclusions via user names when using the on-access
738
# scanning client. It can be used multiple times.
739
# It has the same potential race condition limitations of the
740
# OnAccessExcludeUID option.
741
# Default: disabled
742
#OnAccessExcludeUname clamav
743
 
744
# Number of times the OnAccess client will retry a failed scan due to
745
# connection problems (or other issues).
746
# Default: 0
747
#OnAccessRetryAttempts 3
748
 
749
##
750
## Bytecode
751
##
752
 
753
# With this option enabled ClamAV will load bytecode from the database.
754
# It is highly recommended you keep this option on, otherwise you'll miss
755
# detections for many new viruses.
756
# Default: yes
757
#Bytecode yes
758
 
759
# Set bytecode security level.
760
# Possible values:
761
#   None -      No security at all, meant for debugging.
762
#               DO NOT USE THIS ON PRODUCTION SYSTEMS.
763
#               This value is only available if clamav was built
764
#               with --enable-debug!
765
#   TrustSigned - Trust bytecode loaded from signed .c[lv]d files, insert
766
#               runtime safety checks for bytecode loaded from other sources.
767
#   Paranoid -  Don't trust any bytecode, insert runtime checks for all.
768
# Recommended: TrustSigned, because bytecode in .cvd files already has these
769
# checks.
770
# Note that by default only signed bytecode is loaded, currently you can only
771
# load unsigned bytecode in --enable-debug mode.
772
#
773
# Default: TrustSigned
774
#BytecodeSecurity TrustSigned
775
 
776
# Allow loading bytecode from outside digitally signed .c[lv]d files.
777
# **Caution**: You should NEVER run bytecode signatures from untrusted sources.
778
# Doing so may result in arbitrary code execution.
779
# Default: no
780
#BytecodeUnsigned yes
781
 
782
# Set bytecode timeout in milliseconds.
783
#
784
# Default: 5000
785
# BytecodeTimeout 1000
786