Subversion Repositories configs

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
192 - 1
##
2
## Example config file for the Clam AV daemon
3
## Please read the clamd.conf(5) manual before editing this file.
4
##
5
 
6
 
7
# Comment or remove the line below.
8
#Example
9
 
10
# Uncomment this option to enable logging.
11
# LogFile must be writable for the user running daemon.
12
# A full path is required.
13
# Default: disabled
14
#LogFile /var/log/clamd.scan
15
 
16
# By default the log file is locked for writing - the lock protects against
17
# running clamd multiple times (if want to run another clamd, please
18
# copy the configuration file, change the LogFile variable, and run
19
# the daemon with --config-file option).
20
# This option disables log file locking.
21
# Default: no
22
#LogFileUnlock yes
23
 
24
# Maximum size of the log file.
25
# Value of 0 disables the limit.
26
# You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
27
# and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
28
# in bytes just don't use modifiers. If LogFileMaxSize is enabled, log
29
# rotation (the LogRotate option) will always be enabled.
30
# Default: 1M
31
#LogFileMaxSize 2M
32
 
33
# Log time with each message.
34
# Default: no
35
#LogTime yes
36
 
37
# Also log clean files. Useful in debugging but drastically increases the
38
# log size.
39
# Default: no
40
#LogClean yes
41
 
42
# Use system logger (can work together with LogFile).
43
# Default: no
44
LogSyslog yes
45
 
46
# Specify the type of syslog messages - please refer to 'man syslog'
47
# for facility names.
48
# Default: LOG_LOCAL6
49
#LogFacility LOG_MAIL
50
 
51
# Enable verbose logging.
52
# Default: no
53
#LogVerbose yes
54
 
55
# Enable log rotation. Always enabled when LogFileMaxSize is enabled.
56
# Default: no
57
#LogRotate yes
58
 
59
# Enable Prelude output.
60
# Default: no
61
#PreludeEnable yes
62
#
63
# Set the name of the analyzer used by prelude-admin.
64
# Default: ClamAV
65
#PreludeAnalyzerName ClamAV
66
 
67
# Log additional information about the infected file, such as its
68
# size and hash, together with the virus name.
69
#ExtendedDetectionInfo yes
70
 
71
# This option allows you to save a process identifier of the listening
72
# daemon (main thread).
73
# Default: disabled
74
#PidFile /run/clamd.scan/clamd.pid
75
 
76
# Optional path to the global temporary directory.
77
# Default: system specific (usually /tmp or /var/tmp).
78
#TemporaryDirectory /var/tmp
79
 
80
# Path to the database directory.
81
# Default: hardcoded (depends on installation options)
82
#DatabaseDirectory /var/lib/clamav
83
 
84
# Only load the official signatures published by the ClamAV project.
85
# Default: no
86
#OfficialDatabaseOnly no
87
 
88
# The daemon can work in local mode, network mode or both.
89
# Due to security reasons we recommend the local mode.
90
 
91
# Path to a local socket file the daemon will listen on.
92
# Default: disabled (must be specified by a user)
93
#LocalSocket /run/clamd.scan/clamd.sock
94
 
95
# Sets the group ownership on the unix socket.
96
# Default: disabled (the primary group of the user running clamd)
97
#LocalSocketGroup virusgroup
98
 
99
# Sets the permissions on the unix socket to the specified mode.
100
# Default: disabled (socket is world accessible)
101
#LocalSocketMode 660
102
 
103
# Remove stale socket after unclean shutdown.
104
# Default: yes
105
#FixStaleSocket yes
106
 
107
# TCP port address.
108
# Default: no
109
#TCPSocket 3310
110
 
111
# TCP address.
112
# By default we bind to INADDR_ANY, probably not wise.
113
# Enable the following to provide some degree of protection
114
# from the outside world. This option can be specified multiple
115
# times if you want to listen on multiple IPs. IPv6 is now supported.
116
# Default: no
117
#TCPAddr 127.0.0.1
118
 
119
# Maximum length the queue of pending connections may grow to.
120
# Default: 200
121
#MaxConnectionQueueLength 30
122
 
123
# Clamd uses FTP-like protocol to receive data from remote clients.
124
# If you are using clamav-milter to balance load between remote clamd daemons
125
# on firewall servers you may need to tune the options below.
126
 
127
# Close the connection when the data size limit is exceeded.
128
# The value should match your MTA's limit for a maximum attachment size.
129
# Default: 25M
130
#StreamMaxLength 10M
131
 
132
# Limit port range.
133
# Default: 1024
134
#StreamMinPort 30000
135
# Default: 2048
136
#StreamMaxPort 32000
137
 
138
# Maximum number of threads running at the same time.
139
# Default: 10
140
#MaxThreads 20
141
 
142
# Waiting for data from a client socket will timeout after this time (seconds).
143
# Default: 120
144
#ReadTimeout 300
145
 
146
# This option specifies the time (in seconds) after which clamd should
147
# timeout if a client doesn't provide any initial command after connecting.
148
# Default: 30
149
#CommandReadTimeout 30
150
 
151
# This option specifies how long to wait (in milliseconds) if the send buffer
152
# is full.
153
# Keep this value low to prevent clamd hanging.
154
#
155
# Default: 500
156
#SendBufTimeout 200
157
 
158
# Maximum number of queued items (including those being processed by
159
# MaxThreads threads).
160
# It is recommended to have this value at least twice MaxThreads if possible.
161
# WARNING: you shouldn't increase this too much to avoid running out  of file
162
# descriptors, the following condition should hold:
163
# MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual
164
# max is 1024).
165
#
166
# Default: 100
167
#MaxQueue 200
168
 
169
# Waiting for a new job will timeout after this time (seconds).
170
# Default: 30
171
#IdleTimeout 60
172
 
173
# Don't scan files and directories matching regex
174
# This directive can be used multiple times
175
# Default: scan all
176
#ExcludePath ^/proc/
177
#ExcludePath ^/sys/
178
 
179
# Maximum depth directories are scanned at.
180
# Default: 15
181
#MaxDirectoryRecursion 20
182
 
183
# Follow directory symlinks.
184
# Default: no
185
#FollowDirectorySymlinks yes
186
 
187
# Follow regular file symlinks.
188
# Default: no
189
#FollowFileSymlinks yes
190
 
191
# Scan files and directories on other filesystems.
192
# Default: yes
193
#CrossFilesystems yes
194
 
195
# Perform a database check.
196
# Default: 600 (10 min)
197
#SelfCheck 600
198
 
199
# Execute a command when virus is found. In the command string %v will
200
# be replaced with the virus name.
201
# Default: no
202
#VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v"
203
 
204
# Run as another user (clamd must be started by root for this option to work)
205
# Default: don't drop privileges
206
User clamscan
207
 
208
# Stop daemon when libclamav reports out of memory condition.
209
#ExitOnOOM yes
210
 
211
# Don't fork into background.
212
# Default: no
213
#Foreground yes
214
 
215
# Enable debug messages in libclamav.
216
# Default: no
217
#Debug yes
218
 
219
# Do not remove temporary files (for debug purposes).
220
# Default: no
221
#LeaveTemporaryFiles yes
222
 
223
# Permit use of the ALLMATCHSCAN command. If set to no, clamd will reject
224
# any ALLMATCHSCAN command as invalid.
225
# Default: yes
226
#AllowAllMatchScan no
227
 
228
# Detect Possibly Unwanted Applications.
229
# Default: no
230
#DetectPUA yes
231
 
232
# Exclude a specific PUA category. This directive can be used multiple times.
233
# See https://github.com/vrtadmin/clamav-faq/blob/master/faq/faq-pua.md for
234
# the complete list of PUA categories.
235
# Default: Load all categories (if DetectPUA is activated)
236
#ExcludePUA NetTool
237
#ExcludePUA PWTool
238
 
239
# Only include a specific PUA category. This directive can be used multiple
240
# times.
241
# Default: Load all categories (if DetectPUA is activated)
242
#IncludePUA Spy
243
#IncludePUA Scanner
244
#IncludePUA RAT
245
 
246
# This option causes memory or nested map scans to dump the content to disk.
247
# If you turn on this option, more data is written to disk and is available
248
# when the LeaveTemporaryFiles option is enabled.
249
#ForceToDisk yes
250
 
251
# This option allows you to disable the caching feature of the engine. By
252
# default, the engine will store an MD5 in a cache of any files that are
253
# not flagged as virus or that hit limits checks. Disabling the cache will
254
# have a negative performance impact on large scans.
255
# Default: no
256
#DisableCache yes
257
 
258
# In some cases (eg. complex malware, exploits in graphic files, and others),
259
# ClamAV uses special algorithms to detect abnormal patterns and behaviors that
260
# may be malicious.  This option enables alerting on such heuristically
261
# detected potential threats.
262
# Default: yes
263
#HeuristicAlerts yes
264
 
265
# Allow heuristic alerts to take precedence.
266
# When enabled, if a heuristic scan (such as phishingScan) detects
267
# a possible virus/phish it will stop scan immediately. Recommended, saves CPU
268
# scan-time.
269
# When disabled, virus/phish detected by heuristic scans will be reported only
270
# at the end of a scan. If an archive contains both a heuristically detected
271
# virus/phish, and a real malware, the real malware will be reported
272
#
273
# Keep this disabled if you intend to handle "*.Heuristics.*" viruses
274
# differently from "real" malware.
275
# If a non-heuristically-detected virus (signature-based) is found first,
276
# the scan is interrupted immediately, regardless of this config option.
277
#
278
# Default: no
279
#HeuristicScanPrecedence yes
280
 
281
 
282
##
283
## Heuristic Alerts
284
##
285
 
286
# With this option clamav will try to detect broken executables (both PE and
287
# ELF) and alert on them with the Broken.Executable heuristic signature.
288
# Default: no
289
#AlertBrokenExecutables yes
290
 
291
# Alert on encrypted archives _and_ documents with heuristic signature
292
# (encrypted .zip, .7zip, .rar, .pdf).
293
# Default: no
294
#AlertEncrypted yes
295
 
296
# Alert on encrypted archives with heuristic signature (encrypted .zip, .7zip,
297
# .rar).
298
# Default: no
299
#AlertEncryptedArchive yes
300
 
301
# Alert on encrypted archives with heuristic signature (encrypted .pdf).
302
# Default: no
303
#AlertEncryptedDoc yes
304
 
305
# With this option enabled OLE2 files containing VBA macros, which were not
306
# detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
307
# Default: no
308
#AlertOLE2Macros yes
309
 
310
# Alert on SSL mismatches in URLs, even if the URL isn't in the database.
311
# This can lead to false positives.
312
# Default: no
313
#AlertPhishingSSLMismatch yes
314
 
315
# Alert on cloaked URLs, even if URL isn't in database.
316
# This can lead to false positives.
317
# Default: no
318
#AlertPhishingCloak yes
319
 
320
# Alert on raw DMG image files containing partition intersections
321
# Default: no
322
#AlertPartitionIntersection yes
323
 
324
 
325
##
326
## Executable files
327
##
328
 
329
# PE stands for Portable Executable - it's an executable file format used
330
# in all 32 and 64-bit versions of Windows operating systems. This option
331
# allows ClamAV to perform a deeper analysis of executable files and it's also
332
# required for decompression of popular executable packers such as UPX, FSG,
333
# and Petite. If you turn off this option, the original files will still be
334
# scanned, but without additional processing.
335
# Default: yes
336
#ScanPE yes
337
 
338
# Certain PE files contain an authenticode signature. By default, we check
339
# the signature chain in the PE file against a database of trusted and
340
# revoked certificates if the file being scanned is marked as a virus.
341
# If any certificate in the chain validates against any trusted root, but
342
# does not match any revoked certificate, the file is marked as whitelisted.
343
# If the file does match a revoked certificate, the file is marked as virus.
344
# The following setting completely turns off authenticode verification.
345
# Default: no
346
#DisableCertCheck yes
347
 
348
# Executable and Linking Format is a standard format for UN*X executables.
349
# This option allows you to control the scanning of ELF files.
350
# If you turn off this option, the original files will still be scanned, but
351
# without additional processing.
352
# Default: yes
353
#ScanELF yes
354
 
355
 
356
##
357
## Documents
358
##
359
 
360
# This option enables scanning of OLE2 files, such as Microsoft Office
361
# documents and .msi files.
362
# If you turn off this option, the original files will still be scanned, but
363
# without additional processing.
364
# Default: yes
365
#ScanOLE2 yes
366
 
367
# This option enables scanning within PDF files.
368
# If you turn off this option, the original files will still be scanned, but
369
# without decoding and additional processing.
370
# Default: yes
371
#ScanPDF yes
372
 
373
# This option enables scanning within SWF files.
374
# If you turn off this option, the original files will still be scanned, but
375
# without decoding and additional processing.
376
# Default: yes
377
#ScanSWF yes
378
 
379
# This option enables scanning xml-based document files supported by libclamav.
380
# If you turn off this option, the original files will still be scanned, but
381
# without additional processing.
382
# Default: yes
383
#ScanXMLDOCS yes
384
 
385
# This option enables scanning of HWP3 files.
386
# If you turn off this option, the original files will still be scanned, but
387
# without additional processing.
388
# Default: yes
389
#ScanHWP3 yes
390
 
391
 
392
##
393
## Mail files
394
##
395
 
396
# Enable internal e-mail scanner.
397
# If you turn off this option, the original files will still be scanned, but
398
# without parsing individual messages/attachments.
399
# Default: yes
400
#ScanMail yes
401
 
402
# Scan RFC1341 messages split over many emails.
403
# You will need to periodically clean up $TemporaryDirectory/clamav-partial
404
# directory.
405
# WARNING: This option may open your system to a DoS attack.
406
#	   Never use it on loaded servers.
407
# Default: no
408
#ScanPartialMessages yes
409
 
410
# With this option enabled ClamAV will try to detect phishing attempts by using
411
# HTML.Phishing and Email.Phishing NDB signatures.
412
# Default: yes
413
#PhishingSignatures no
414
 
415
# With this option enabled ClamAV will try to detect phishing attempts by
416
# analyzing URLs found in emails using WDB and PDB signature databases.
417
# Default: yes
418
#PhishingScanURLs no
419
 
420
 
421
##
422
## Data Loss Prevention (DLP)
423
##
424
 
425
# Enable the DLP module
426
# Default: No
427
#StructuredDataDetection yes
428
 
429
# This option sets the lowest number of Credit Card numbers found in a file
430
# to generate a detect.
431
# Default: 3
432
#StructuredMinCreditCardCount 5
433
 
434
# This option sets the lowest number of Social Security Numbers found
435
# in a file to generate a detect.
436
# Default: 3
437
#StructuredMinSSNCount 5
438
 
439
# With this option enabled the DLP module will search for valid
440
# SSNs formatted as xxx-yy-zzzz
441
# Default: yes
442
#StructuredSSNFormatNormal yes
443
 
444
# With this option enabled the DLP module will search for valid
445
# SSNs formatted as xxxyyzzzz
446
# Default: no
447
#StructuredSSNFormatStripped yes
448
 
449
 
450
##
451
## HTML
452
##
453
 
454
# Perform HTML normalisation and decryption of MS Script Encoder code.
455
# Default: yes
456
# If you turn off this option, the original files will still be scanned, but
457
# without additional processing.
458
#ScanHTML yes
459
 
460
 
461
##
462
## Archives
463
##
464
 
465
# ClamAV can scan within archives and compressed files.
466
# If you turn off this option, the original files will still be scanned, but
467
# without unpacking and additional processing.
468
# Default: yes
469
#ScanArchive yes
470
 
471
 
472
##
473
## Limits
474
##
475
 
476
# The options below protect your system against Denial of Service attacks
477
# using archive bombs.
478
 
479
# This option sets the maximum amount of time to a scan may take.
480
# In this version, this field only affects the scan time of ZIP archives.
481
# Value of 0 disables the limit.
482
# Note: disabling this limit or setting it too high may result allow scanning
483
# of certain files to lock up the scanning process/threads resulting in a
484
# Denial of Service.
485
# Time is in milliseconds.
486
# Default: 120000
487
#MaxScanTime 300000
488
 
489
# This option sets the maximum amount of data to be scanned for each input
490
# file. Archives and other containers are recursively extracted and scanned
491
# up to this value.
492
# Value of 0 disables the limit
493
# Note: disabling this limit or setting it too high may result in severe damage
494
# to the system.
495
# Default: 100M
496
#MaxScanSize 150M
497
 
498
# Files larger than this limit won't be scanned. Affects the input file itself
499
# as well as files contained inside it (when the input file is an archive, a
500
# document or some other kind of container).
501
# Value of 0 disables the limit.
502
# Note: disabling this limit or setting it too high may result in severe damage
503
# to the system.
504
# Default: 25M
505
#MaxFileSize 30M
506
 
507
# Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
508
# file, all files within it will also be scanned. This options specifies how
509
# deeply the process should be continued.
510
# Note: setting this limit too high may result in severe damage to the system.
511
# Default: 16
512
#MaxRecursion 10
513
 
514
# Number of files to be scanned within an archive, a document, or any other
515
# container file.
516
# Value of 0 disables the limit.
517
# Note: disabling this limit or setting it too high may result in severe damage
518
# to the system.
519
# Default: 10000
520
#MaxFiles 15000
521
 
522
# Maximum size of a file to check for embedded PE. Files larger than this value
523
# will skip the additional analysis step.
524
# Note: disabling this limit or setting it too high may result in severe damage
525
# to the system.
526
# Default: 10M
527
#MaxEmbeddedPE 10M
528
 
529
# Maximum size of a HTML file to normalize. HTML files larger than this value
530
# will not be normalized or scanned.
531
# Note: disabling this limit or setting it too high may result in severe damage
532
# to the system.
533
# Default: 10M
534
#MaxHTMLNormalize 10M
535
 
536
# Maximum size of a normalized HTML file to scan. HTML files larger than this
537
# value after normalization will not be scanned.
538
# Note: disabling this limit or setting it too high may result in severe damage
539
# to the system.
540
# Default: 2M
541
#MaxHTMLNoTags 2M
542
 
543
# Maximum size of a script file to normalize. Script content larger than this
544
# value will not be normalized or scanned.
545
# Note: disabling this limit or setting it too high may result in severe damage
546
# to the system.
547
# Default: 5M
548
#MaxScriptNormalize 5M
549
 
550
# Maximum size of a ZIP file to reanalyze type recognition. ZIP files larger
551
# than this value will skip the step to potentially reanalyze as PE.
552
# Note: disabling this limit or setting it too high may result in severe damage
553
# to the system.
554
# Default: 1M
555
#MaxZipTypeRcg 1M
556
 
557
# This option sets the maximum number of partitions of a raw disk image to be
558
# scanned.
559
# Raw disk images with more partitions than this value will have up to
560
# the value number partitions scanned. Negative values are not allowed.
561
# Note: setting this limit too high may result in severe damage or impact
562
# performance.
563
# Default: 50
564
#MaxPartitions 128
565
 
566
# This option sets the maximum number of icons within a PE to be scanned.
567
# PE files with more icons than this value will have up to the value number
568
# icons scanned.
569
# Negative values are not allowed.
570
# WARNING: setting this limit too high may result in severe damage or impact
571
# performance.
572
# Default: 100
573
#MaxIconsPE 200
574
 
575
# This option sets the maximum recursive calls for HWP3 parsing during
576
# scanning. HWP3 files using more than this limit will be terminated and
577
# alert the user.
578
# Scans will be unable to scan any HWP3 attachments if the recursive limit
579
# is reached.
580
# Negative values are not allowed.
581
# WARNING: setting this limit too high may result in severe damage or impact
582
# performance.
583
# Default: 16
584
#MaxRecHWP3 16
585
 
586
# This option sets the maximum calls to the PCRE match function during
587
# an instance of regex matching.
588
# Instances using more than this limit will be terminated and alert the user
589
# but the scan will continue.
590
# For more information on match_limit, see the PCRE documentation.
591
# Negative values are not allowed.
592
# WARNING: setting this limit too high may severely impact performance.
593
# Default: 100000
594
#PCREMatchLimit 20000
595
 
596
# This option sets the maximum recursive calls to the PCRE match function
597
# during an instance of regex matching.
598
# Instances using more than this limit will be terminated and alert the user
599
# but the scan will continue.
600
# For more information on match_limit_recursion, see the PCRE documentation.
601
# Negative values are not allowed and values > PCREMatchLimit are superfluous.
602
# WARNING: setting this limit too high may severely impact performance.
603
# Default: 2000
604
#PCRERecMatchLimit 10000
605
 
606
# This option sets the maximum filesize for which PCRE subsigs will be
607
# executed. Files exceeding this limit will not have PCRE subsigs executed
608
# unless a subsig is encompassed to a smaller buffer.
609
# Negative values are not allowed.
610
# Setting this value to zero disables the limit.
611
# WARNING: setting this limit too high or disabling it may severely impact
612
# performance.
613
# Default: 25M
614
#PCREMaxFileSize 100M
615
 
616
# When AlertExceedsMax is set, files exceeding the MaxFileSize, MaxScanSize, or
617
# MaxRecursion limit will be flagged with the virus
618
# "Heuristics.Limits.Exceeded".
619
# Default: no
620
#AlertExceedsMax yes
621
 
622
##
623
## On-access Scan Settings
624
##
625
 
626
# Don't scan files larger than OnAccessMaxFileSize
627
# Value of 0 disables the limit.
628
# Default: 5M
629
#OnAccessMaxFileSize 10M
630
 
631
# Max number of scanning threads to allocate to the OnAccess thread pool at
632
# startup. These threads are the ones responsible for creating a connection
633
# with the daemon and kicking off scanning after an event has been processed.
634
# To prevent clamonacc from consuming all clamd's resources keep this lower
635
# than clamd's max threads.
636
# Default: 5
637
#OnAccessMaxThreads 10
638
 
639
# Max amount of time (in milliseconds) that the OnAccess client should spend
640
# for every connect, send, and recieve attempt when communicating with clamd
641
# via curl.
642
# Default: 5000 (5 seconds)
643
# OnAccessCurlTimeout 10000
644
 
645
# Toggles dynamic directory determination. Allows for recursively watching
646
# include paths.
647
# Default: no
648
#OnAccessDisableDDD yes
649
 
650
# Set the include paths (all files inside them will be scanned). You can have
651
# multiple OnAccessIncludePath directives but each directory must be added
652
# in a separate line.
653
# Default: disabled
654
#OnAccessIncludePath /home
655
#OnAccessIncludePath /students
656
 
657
# Set the exclude paths. All subdirectories are also excluded.
658
# Default: disabled
659
#OnAccessExcludePath /home/user
660
 
661
# Modifies fanotify blocking behaviour when handling permission events.
662
# If off, fanotify will only notify if the file scanned is a virus,
663
# and not perform any blocking.
664
# Default: no
665
#OnAccessPrevention yes
666
 
667
# When using prevention, if this option is turned on, any errors that occur
668
# during scanning will result in the event attempt being denied. This could
669
# potentially lead to unwanted system behaviour with certain configurations,
670
# so the client defaults this to off and prefers allowing access events in
671
# case of scan or connection error.
672
# Default: no
673
#OnAccessDenyOnError yes
674
 
675
# Toggles extra scanning and notifications when a file or directory is
676
# created or moved.
677
# Requires the  DDD system to kick-off extra scans.
678
# Default: no
679
#OnAccessExtraScanning yes
680
 
681
# Set the  mount point to be scanned. The mount point specified, or the mount
682
# point containing the specified directory will be watched. If any directories
683
# are specified, this option will preempt (disable and ignore all options
684
# related to) the DDD system. This option will result in verdicts only.
685
# Note that prevention is explicitly disallowed to prevent common, fatal
686
# misconfigurations. (e.g. watching "/" with prevention on and no exclusions
687
# made on vital system directories)
688
# It can be used multiple times.
689
# Default: disabled
690
#OnAccessMountPath /
691
#OnAccessMountPath /home/user
692
 
693
# With this option you can whitelist the root UID (0). Processes run under
694
# root with be able to access all files without triggering scans or
695
# permission denied events.
696
# Note that if clamd cannot check the uid of the process that generated an
697
# on-access scan event (e.g., because OnAccessPrevention was not enabled, and
698
# the process already exited), clamd will perform a scan.  Thus, setting
699
# OnAccessExcludeRootUID is not *guaranteed* to prevent every access by the
700
# root user from triggering a scan (unless OnAccessPrevention is enabled).
701
# Default: no
702
#OnAccessExcludeRootUID no
703
 
704
# With this option you can whitelist specific UIDs. Processes with these UIDs
705
# will be able to access all files without triggering scans or permission
706
# denied events.
707
# This option can be used multiple times (one per line).
708
# Using a value of 0 on any line will disable this option entirely.
709
# To whitelist the root UID (0) please enable the OnAccessExcludeRootUID
710
# option.
711
# Also note that if clamd cannot check the uid of the process that generated an
712
# on-access scan event (e.g., because OnAccessPrevention was not enabled, and
713
# the process already exited), clamd will perform a scan.  Thus, setting
714
# OnAccessExcludeUID is not *guaranteed* to prevent every access by the
715
# specified uid from triggering a scan (unless OnAccessPrevention is enabled).
716
# Default: disabled
717
#OnAccessExcludeUID -1
718
 
719
# This option allows exclusions via user names when using the on-access
720
# scanning client. It can be used multiple times.
721
# It has the same potential race condition limitations of the
722
# OnAccessExcludeUID option.
723
# Default: disabled
724
#OnAccessExcludeUname clamav
725
 
726
# Number of times the OnAccess client will retry a failed scan due to
727
# connection problems (or other issues).
728
# Default: 0
729
#OnAccessRetryAttempts 3
730
 
731
##
732
## Bytecode
733
##
734
 
735
# With this option enabled ClamAV will load bytecode from the database.
736
# It is highly recommended you keep this option on, otherwise you'll miss
737
# detections for many new viruses.
738
# Default: yes
739
#Bytecode yes
740
 
741
# Set bytecode security level.
742
# Possible values:
743
#   None -      No security at all, meant for debugging.
744
#               DO NOT USE THIS ON PRODUCTION SYSTEMS.
745
#               This value is only available if clamav was built
746
#               with --enable-debug!
747
#   TrustSigned - Trust bytecode loaded from signed .c[lv]d files, insert
748
#               runtime safety checks for bytecode loaded from other sources.
749
#   Paranoid -  Don't trust any bytecode, insert runtime checks for all.
750
# Recommended: TrustSigned, because bytecode in .cvd files already has these
751
# checks.
752
# Note that by default only signed bytecode is loaded, currently you can only
753
# load unsigned bytecode in --enable-debug mode.
754
#
755
# Default: TrustSigned
756
#BytecodeSecurity TrustSigned
757
 
758
# Set bytecode timeout in milliseconds.
759
#
760
# Default: 5000
761
# BytecodeTimeout 1000
762