Subversion Repositories configs

Rev

Rev 203 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
200 - 1
##
2
## Example config file for the Clam AV daemon
3
## Please read the clamd.conf(5) manual before editing this file.
4
##
5
 
6
 
7
# Comment or remove the line below.
8
#Example
9
 
10
# Uncomment this option to enable logging.
11
# LogFile must be writable for the user running daemon.
12
# A full path is required.
13
# Default: disabled
14
#LogFile /var/log/clamd.scan
15
 
16
# By default the log file is locked for writing - the lock protects against
17
# running clamd multiple times (if want to run another clamd, please
18
# copy the configuration file, change the LogFile variable, and run
19
# the daemon with --config-file option).
20
# This option disables log file locking.
21
# Default: no
22
#LogFileUnlock yes
23
 
24
# Maximum size of the log file.
25
# Value of 0 disables the limit.
26
# You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
27
# and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
28
# in bytes just don't use modifiers. If LogFileMaxSize is enabled, log
29
# rotation (the LogRotate option) will always be enabled.
30
# Default: 1M
31
#LogFileMaxSize 2M
32
 
33
# Log time with each message.
34
# Default: no
35
#LogTime yes
36
 
37
# Also log clean files. Useful in debugging but drastically increases the
38
# log size.
39
# Default: no
40
#LogClean yes
41
 
42
# Use system logger (can work together with LogFile).
43
# Default: no
44
LogSyslog yes
45
 
46
# Specify the type of syslog messages - please refer to 'man syslog'
47
# for facility names.
48
# Default: LOG_LOCAL6
49
#LogFacility LOG_MAIL
50
 
51
# Enable verbose logging.
52
# Default: no
53
#LogVerbose yes
54
 
55
# Enable log rotation. Always enabled when LogFileMaxSize is enabled.
56
# Default: no
57
#LogRotate yes
58
 
59
# Enable Prelude output.
60
# Default: no
61
#PreludeEnable yes
62
#
63
# Set the name of the analyzer used by prelude-admin.
64
# Default: ClamAV
65
#PreludeAnalyzerName ClamAV
66
 
67
# Log additional information about the infected file, such as its
68
# size and hash, together with the virus name.
69
#ExtendedDetectionInfo yes
70
 
71
# This option allows you to save a process identifier of the listening
72
# daemon (main thread).
73
# This file will be owned by root, as long as clamd was started by root.
74
# It is recommended that the directory where this file is stored is
75
# also owned by root to keep other users from tampering with it.
76
# Default: disabled
77
#PidFile /run/clamd.scan/clamd.pid
78
 
79
# Optional path to the global temporary directory.
80
# Default: system specific (usually /tmp or /var/tmp).
81
#TemporaryDirectory /var/tmp
82
 
83
# Path to the database directory.
84
# Default: hardcoded (depends on installation options)
85
#DatabaseDirectory /var/lib/clamav
86
 
87
# Only load the official signatures published by the ClamAV project.
88
# Default: no
89
#OfficialDatabaseOnly no
90
 
91
# The daemon can work in local mode, network mode or both.
92
# Due to security reasons we recommend the local mode.
93
 
94
# Path to a local socket file the daemon will listen on.
95
# Default: disabled (must be specified by a user)
96
#LocalSocket /run/clamd.scan/clamd.sock
97
 
98
# Sets the group ownership on the unix socket.
99
# Default: disabled (the primary group of the user running clamd)
100
#LocalSocketGroup virusgroup
101
 
102
# Sets the permissions on the unix socket to the specified mode.
103
# Default: disabled (socket is world accessible)
104
#LocalSocketMode 660
105
 
106
# Remove stale socket after unclean shutdown.
107
# Default: yes
108
#FixStaleSocket yes
109
 
110
# TCP port address.
111
# Default: no
112
#TCPSocket 3310
113
 
114
# TCP address.
115
# By default we bind to INADDR_ANY, probably not wise.
116
# Enable the following to provide some degree of protection
117
# from the outside world. This option can be specified multiple
118
# times if you want to listen on multiple IPs. IPv6 is now supported.
119
# Default: no
120
#TCPAddr 127.0.0.1
121
 
122
# Maximum length the queue of pending connections may grow to.
123
# Default: 200
124
#MaxConnectionQueueLength 30
125
 
126
# Clamd uses FTP-like protocol to receive data from remote clients.
127
# If you are using clamav-milter to balance load between remote clamd daemons
128
# on firewall servers you may need to tune the options below.
129
 
130
# Close the connection when the data size limit is exceeded.
131
# The value should match your MTA's limit for a maximum attachment size.
132
# Default: 25M
133
#StreamMaxLength 10M
134
 
135
# Limit port range.
136
# Default: 1024
137
#StreamMinPort 30000
138
# Default: 2048
139
#StreamMaxPort 32000
140
 
141
# Maximum number of threads running at the same time.
142
# Default: 10
143
#MaxThreads 20
144
 
145
# Waiting for data from a client socket will timeout after this time (seconds).
146
# Default: 120
147
#ReadTimeout 300
148
 
149
# This option specifies the time (in seconds) after which clamd should
150
# timeout if a client doesn't provide any initial command after connecting.
151
# Default: 30
152
#CommandReadTimeout 30
153
 
154
# This option specifies how long to wait (in milliseconds) if the send buffer
155
# is full.
156
# Keep this value low to prevent clamd hanging.
157
#
158
# Default: 500
159
#SendBufTimeout 200
160
 
161
# Maximum number of queued items (including those being processed by
162
# MaxThreads threads).
163
# It is recommended to have this value at least twice MaxThreads if possible.
164
# WARNING: you shouldn't increase this too much to avoid running out  of file
165
# descriptors, the following condition should hold:
166
# MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual
167
# max is 1024).
168
#
169
# Default: 100
170
#MaxQueue 200
171
 
172
# Waiting for a new job will timeout after this time (seconds).
173
# Default: 30
174
#IdleTimeout 60
175
 
176
# Don't scan files and directories matching regex
177
# This directive can be used multiple times
178
# Default: scan all
179
#ExcludePath ^/proc/
180
#ExcludePath ^/sys/
181
 
182
# Maximum depth directories are scanned at.
183
# Default: 15
184
#MaxDirectoryRecursion 20
185
 
186
# Follow directory symlinks.
187
# Default: no
188
#FollowDirectorySymlinks yes
189
 
190
# Follow regular file symlinks.
191
# Default: no
192
#FollowFileSymlinks yes
193
 
194
# Scan files and directories on other filesystems.
195
# Default: yes
196
#CrossFilesystems yes
197
 
198
# Perform a database check.
199
# Default: 600 (10 min)
200
#SelfCheck 600
201
 
202
# Enable non-blocking (multi-threaded/concurrent) database reloads.
203
# This feature will temporarily load a second scanning engine while scanning
204
# continues using the first engine. Once loaded, the new engine takes over.
205
# The old engine is removed as soon as all scans using the old engine have
206
# completed.
207
# This feature requires more RAM, so this option is provided in case users are
208
# willing to block scans during reload in exchange for lower RAM requirements.
209
# Default: yes
210
#ConcurrentDatabaseReload no
211
 
212
# Execute a command when virus is found. In the command string %v will
213
# be replaced with the virus name.
214
# Default: no
215
#VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v"
216
 
217
# Run as another user (clamd must be started by root for this option to work)
218
# Default: don't drop privileges
219
User clamscan
220
 
221
# Stop daemon when libclamav reports out of memory condition.
222
#ExitOnOOM yes
223
 
224
# Don't fork into background.
225
# Default: no
226
#Foreground yes
227
 
228
# Enable debug messages in libclamav.
229
# Default: no
230
#Debug yes
231
 
232
# Do not remove temporary files (for debug purposes).
233
# Default: no
234
#LeaveTemporaryFiles yes
235
 
236
# Permit use of the ALLMATCHSCAN command. If set to no, clamd will reject
237
# any ALLMATCHSCAN command as invalid.
238
# Default: yes
239
#AllowAllMatchScan no
240
 
241
# Detect Possibly Unwanted Applications.
242
# Default: no
243
#DetectPUA yes
244
 
245
# Exclude a specific PUA category. This directive can be used multiple times.
246
# See https://github.com/vrtadmin/clamav-faq/blob/master/faq/faq-pua.md for
247
# the complete list of PUA categories.
248
# Default: Load all categories (if DetectPUA is activated)
249
#ExcludePUA NetTool
250
#ExcludePUA PWTool
251
 
252
# Only include a specific PUA category. This directive can be used multiple
253
# times.
254
# Default: Load all categories (if DetectPUA is activated)
255
#IncludePUA Spy
256
#IncludePUA Scanner
257
#IncludePUA RAT
258
 
259
# This option causes memory or nested map scans to dump the content to disk.
260
# If you turn on this option, more data is written to disk and is available
261
# when the LeaveTemporaryFiles option is enabled.
262
#ForceToDisk yes
263
 
264
# This option allows you to disable the caching feature of the engine. By
265
# default, the engine will store an MD5 in a cache of any files that are
266
# not flagged as virus or that hit limits checks. Disabling the cache will
267
# have a negative performance impact on large scans.
268
# Default: no
269
#DisableCache yes
270
 
271
# In some cases (eg. complex malware, exploits in graphic files, and others),
272
# ClamAV uses special algorithms to detect abnormal patterns and behaviors that
273
# may be malicious.  This option enables alerting on such heuristically
274
# detected potential threats.
275
# Default: yes
276
#HeuristicAlerts yes
277
 
278
# Allow heuristic alerts to take precedence.
279
# When enabled, if a heuristic scan (such as phishingScan) detects
280
# a possible virus/phish it will stop scan immediately. Recommended, saves CPU
281
# scan-time.
282
# When disabled, virus/phish detected by heuristic scans will be reported only
283
# at the end of a scan. If an archive contains both a heuristically detected
284
# virus/phish, and a real malware, the real malware will be reported
285
#
204 - 286
# Keep this disabled if you intend to handle "Heuristics.*" viruses
200 - 287
# differently from "real" malware.
288
# If a non-heuristically-detected virus (signature-based) is found first,
289
# the scan is interrupted immediately, regardless of this config option.
290
#
291
# Default: no
292
#HeuristicScanPrecedence yes
293
 
294
 
295
##
296
## Heuristic Alerts
297
##
298
 
299
# With this option clamav will try to detect broken executables (both PE and
300
# ELF) and alert on them with the Broken.Executable heuristic signature.
301
# Default: no
302
#AlertBrokenExecutables yes
303
 
304
# With this option clamav will try to detect broken media file (JPEG,
305
# TIFF, PNG, GIF) and alert on them with a Broken.Media heuristic signature.
306
# Default: no
307
#AlertBrokenMedia yes
308
 
309
# Alert on encrypted archives _and_ documents with heuristic signature
310
# (encrypted .zip, .7zip, .rar, .pdf).
311
# Default: no
312
#AlertEncrypted yes
313
 
314
# Alert on encrypted archives with heuristic signature (encrypted .zip, .7zip,
315
# .rar).
316
# Default: no
317
#AlertEncryptedArchive yes
318
 
319
# Alert on encrypted archives with heuristic signature (encrypted .pdf).
320
# Default: no
321
#AlertEncryptedDoc yes
322
 
323
# With this option enabled OLE2 files containing VBA macros, which were not
324
# detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
325
# Default: no
326
#AlertOLE2Macros yes
327
 
328
# Alert on SSL mismatches in URLs, even if the URL isn't in the database.
329
# This can lead to false positives.
330
# Default: no
331
#AlertPhishingSSLMismatch yes
332
 
333
# Alert on cloaked URLs, even if URL isn't in database.
334
# This can lead to false positives.
335
# Default: no
336
#AlertPhishingCloak yes
337
 
338
# Alert on raw DMG image files containing partition intersections
339
# Default: no
340
#AlertPartitionIntersection yes
341
 
342
 
343
##
344
## Executable files
345
##
346
 
347
# PE stands for Portable Executable - it's an executable file format used
348
# in all 32 and 64-bit versions of Windows operating systems. This option
349
# allows ClamAV to perform a deeper analysis of executable files and it's also
350
# required for decompression of popular executable packers such as UPX, FSG,
351
# and Petite. If you turn off this option, the original files will still be
352
# scanned, but without additional processing.
353
# Default: yes
354
#ScanPE yes
355
 
356
# Certain PE files contain an authenticode signature. By default, we check
357
# the signature chain in the PE file against a database of trusted and
358
# revoked certificates if the file being scanned is marked as a virus.
359
# If any certificate in the chain validates against any trusted root, but
360
# does not match any revoked certificate, the file is marked as whitelisted.
361
# If the file does match a revoked certificate, the file is marked as virus.
362
# The following setting completely turns off authenticode verification.
363
# Default: no
364
#DisableCertCheck yes
365
 
366
# Executable and Linking Format is a standard format for UN*X executables.
367
# This option allows you to control the scanning of ELF files.
368
# If you turn off this option, the original files will still be scanned, but
369
# without additional processing.
370
# Default: yes
371
#ScanELF yes
372
 
373
 
374
##
375
## Documents
376
##
377
 
378
# This option enables scanning of OLE2 files, such as Microsoft Office
379
# documents and .msi files.
380
# If you turn off this option, the original files will still be scanned, but
381
# without additional processing.
382
# Default: yes
383
#ScanOLE2 yes
384
 
385
# This option enables scanning within PDF files.
386
# If you turn off this option, the original files will still be scanned, but
387
# without decoding and additional processing.
388
# Default: yes
389
#ScanPDF yes
390
 
391
# This option enables scanning within SWF files.
392
# If you turn off this option, the original files will still be scanned, but
393
# without decoding and additional processing.
394
# Default: yes
395
#ScanSWF yes
396
 
397
# This option enables scanning xml-based document files supported by libclamav.
398
# If you turn off this option, the original files will still be scanned, but
399
# without additional processing.
400
# Default: yes
401
#ScanXMLDOCS yes
402
 
403
# This option enables scanning of HWP3 files.
404
# If you turn off this option, the original files will still be scanned, but
405
# without additional processing.
406
# Default: yes
407
#ScanHWP3 yes
408
 
409
 
410
##
411
## Mail files
412
##
413
 
414
# Enable internal e-mail scanner.
415
# If you turn off this option, the original files will still be scanned, but
416
# without parsing individual messages/attachments.
417
# Default: yes
418
#ScanMail yes
419
 
420
# Scan RFC1341 messages split over many emails.
421
# You will need to periodically clean up $TemporaryDirectory/clamav-partial
422
# directory.
423
# WARNING: This option may open your system to a DoS attack.
424
#	   Never use it on loaded servers.
425
# Default: no
426
#ScanPartialMessages yes
427
 
428
# With this option enabled ClamAV will try to detect phishing attempts by using
429
# HTML.Phishing and Email.Phishing NDB signatures.
430
# Default: yes
431
#PhishingSignatures no
432
 
433
# With this option enabled ClamAV will try to detect phishing attempts by
434
# analyzing URLs found in emails using WDB and PDB signature databases.
435
# Default: yes
436
#PhishingScanURLs no
437
 
438
 
439
##
440
## Data Loss Prevention (DLP)
441
##
442
 
443
# Enable the DLP module
444
# Default: No
445
#StructuredDataDetection yes
446
 
447
# This option sets the lowest number of Credit Card numbers found in a file
448
# to generate a detect.
449
# Default: 3
450
#StructuredMinCreditCardCount 5
451
 
452
# With this option enabled the DLP module will search for valid Credit Card
453
# numbers only. Debit and Private Label cards will not be searched.
454
# Default: no
455
#StructuredCCOnly yes
456
 
457
# This option sets the lowest number of Social Security Numbers found
458
# in a file to generate a detect.
459
# Default: 3
460
#StructuredMinSSNCount 5
461
 
462
# With this option enabled the DLP module will search for valid
463
# SSNs formatted as xxx-yy-zzzz
464
# Default: yes
465
#StructuredSSNFormatNormal yes
466
 
467
# With this option enabled the DLP module will search for valid
468
# SSNs formatted as xxxyyzzzz
469
# Default: no
470
#StructuredSSNFormatStripped yes
471
 
472
 
473
##
474
## HTML
475
##
476
 
477
# Perform HTML normalisation and decryption of MS Script Encoder code.
478
# Default: yes
479
# If you turn off this option, the original files will still be scanned, but
480
# without additional processing.
481
#ScanHTML yes
482
 
483
 
484
##
485
## Archives
486
##
487
 
488
# ClamAV can scan within archives and compressed files.
489
# If you turn off this option, the original files will still be scanned, but
490
# without unpacking and additional processing.
491
# Default: yes
492
#ScanArchive yes
493
 
494
 
495
##
496
## Limits
497
##
498
 
499
# The options below protect your system against Denial of Service attacks
500
# using archive bombs.
501
 
502
# This option sets the maximum amount of time to a scan may take.
503
# In this version, this field only affects the scan time of ZIP archives.
504
# Value of 0 disables the limit.
505
# Note: disabling this limit or setting it too high may result allow scanning
506
# of certain files to lock up the scanning process/threads resulting in a
507
# Denial of Service.
508
# Time is in milliseconds.
509
# Default: 120000
510
#MaxScanTime 300000
511
 
512
# This option sets the maximum amount of data to be scanned for each input
513
# file. Archives and other containers are recursively extracted and scanned
514
# up to this value.
515
# Value of 0 disables the limit
516
# Note: disabling this limit or setting it too high may result in severe damage
517
# to the system.
518
# Default: 100M
519
#MaxScanSize 150M
520
 
521
# Files larger than this limit won't be scanned. Affects the input file itself
522
# as well as files contained inside it (when the input file is an archive, a
523
# document or some other kind of container).
524
# Value of 0 disables the limit.
525
# Note: disabling this limit or setting it too high may result in severe damage
526
# to the system.
203 - 527
# Technical design limitations prevent ClamAV from scanning files greater than
528
# 2 GB at this time.
200 - 529
# Default: 25M
530
#MaxFileSize 30M
531
 
532
# Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
533
# file, all files within it will also be scanned. This options specifies how
534
# deeply the process should be continued.
535
# Note: setting this limit too high may result in severe damage to the system.
204 - 536
# Default: 17
200 - 537
#MaxRecursion 10
538
 
539
# Number of files to be scanned within an archive, a document, or any other
540
# container file.
541
# Value of 0 disables the limit.
542
# Note: disabling this limit or setting it too high may result in severe damage
543
# to the system.
544
# Default: 10000
545
#MaxFiles 15000
546
 
547
# Maximum size of a file to check for embedded PE. Files larger than this value
548
# will skip the additional analysis step.
549
# Note: disabling this limit or setting it too high may result in severe damage
550
# to the system.
551
# Default: 10M
552
#MaxEmbeddedPE 10M
553
 
554
# Maximum size of a HTML file to normalize. HTML files larger than this value
555
# will not be normalized or scanned.
556
# Note: disabling this limit or setting it too high may result in severe damage
557
# to the system.
558
# Default: 10M
559
#MaxHTMLNormalize 10M
560
 
561
# Maximum size of a normalized HTML file to scan. HTML files larger than this
562
# value after normalization will not be scanned.
563
# Note: disabling this limit or setting it too high may result in severe damage
564
# to the system.
565
# Default: 2M
566
#MaxHTMLNoTags 2M
567
 
568
# Maximum size of a script file to normalize. Script content larger than this
569
# value will not be normalized or scanned.
570
# Note: disabling this limit or setting it too high may result in severe damage
571
# to the system.
572
# Default: 5M
573
#MaxScriptNormalize 5M
574
 
575
# Maximum size of a ZIP file to reanalyze type recognition. ZIP files larger
576
# than this value will skip the step to potentially reanalyze as PE.
577
# Note: disabling this limit or setting it too high may result in severe damage
578
# to the system.
579
# Default: 1M
580
#MaxZipTypeRcg 1M
581
 
582
# This option sets the maximum number of partitions of a raw disk image to be
583
# scanned.
584
# Raw disk images with more partitions than this value will have up to
585
# the value number partitions scanned. Negative values are not allowed.
586
# Note: setting this limit too high may result in severe damage or impact
587
# performance.
588
# Default: 50
589
#MaxPartitions 128
590
 
591
# This option sets the maximum number of icons within a PE to be scanned.
592
# PE files with more icons than this value will have up to the value number
593
# icons scanned.
594
# Negative values are not allowed.
595
# WARNING: setting this limit too high may result in severe damage or impact
596
# performance.
597
# Default: 100
598
#MaxIconsPE 200
599
 
600
# This option sets the maximum recursive calls for HWP3 parsing during
601
# scanning. HWP3 files using more than this limit will be terminated and
602
# alert the user.
603
# Scans will be unable to scan any HWP3 attachments if the recursive limit
604
# is reached.
605
# Negative values are not allowed.
606
# WARNING: setting this limit too high may result in severe damage or impact
607
# performance.
608
# Default: 16
609
#MaxRecHWP3 16
610
 
611
# This option sets the maximum calls to the PCRE match function during
612
# an instance of regex matching.
613
# Instances using more than this limit will be terminated and alert the user
614
# but the scan will continue.
615
# For more information on match_limit, see the PCRE documentation.
616
# Negative values are not allowed.
617
# WARNING: setting this limit too high may severely impact performance.
618
# Default: 100000
619
#PCREMatchLimit 20000
620
 
621
# This option sets the maximum recursive calls to the PCRE match function
622
# during an instance of regex matching.
623
# Instances using more than this limit will be terminated and alert the user
624
# but the scan will continue.
625
# For more information on match_limit_recursion, see the PCRE documentation.
626
# Negative values are not allowed and values > PCREMatchLimit are superfluous.
627
# WARNING: setting this limit too high may severely impact performance.
628
# Default: 2000
629
#PCRERecMatchLimit 10000
630
 
631
# This option sets the maximum filesize for which PCRE subsigs will be
632
# executed. Files exceeding this limit will not have PCRE subsigs executed
633
# unless a subsig is encompassed to a smaller buffer.
634
# Negative values are not allowed.
635
# Setting this value to zero disables the limit.
636
# WARNING: setting this limit too high or disabling it may severely impact
637
# performance.
638
# Default: 25M
639
#PCREMaxFileSize 100M
640
 
641
# When AlertExceedsMax is set, files exceeding the MaxFileSize, MaxScanSize, or
204 - 642
# MaxRecursion limit will be flagged with the virus name starting with
200 - 643
# "Heuristics.Limits.Exceeded".
644
# Default: no
645
#AlertExceedsMax yes
646
 
647
##
648
## On-access Scan Settings
649
##
650
 
651
# Don't scan files larger than OnAccessMaxFileSize
652
# Value of 0 disables the limit.
653
# Default: 5M
654
#OnAccessMaxFileSize 10M
655
 
656
# Max number of scanning threads to allocate to the OnAccess thread pool at
657
# startup. These threads are the ones responsible for creating a connection
658
# with the daemon and kicking off scanning after an event has been processed.
659
# To prevent clamonacc from consuming all clamd's resources keep this lower
660
# than clamd's max threads.
661
# Default: 5
662
#OnAccessMaxThreads 10
663
 
664
# Max amount of time (in milliseconds) that the OnAccess client should spend
665
# for every connect, send, and recieve attempt when communicating with clamd
666
# via curl.
667
# Default: 5000 (5 seconds)
668
# OnAccessCurlTimeout 10000
669
 
670
# Toggles dynamic directory determination. Allows for recursively watching
671
# include paths.
672
# Default: no
673
#OnAccessDisableDDD yes
674
 
675
# Set the include paths (all files inside them will be scanned). You can have
676
# multiple OnAccessIncludePath directives but each directory must be added
677
# in a separate line.
678
# Default: disabled
679
#OnAccessIncludePath /home
680
#OnAccessIncludePath /students
681
 
682
# Set the exclude paths. All subdirectories are also excluded.
683
# Default: disabled
684
#OnAccessExcludePath /home/user
685
 
686
# Modifies fanotify blocking behaviour when handling permission events.
687
# If off, fanotify will only notify if the file scanned is a virus,
688
# and not perform any blocking.
689
# Default: no
690
#OnAccessPrevention yes
691
 
692
# When using prevention, if this option is turned on, any errors that occur
693
# during scanning will result in the event attempt being denied. This could
694
# potentially lead to unwanted system behaviour with certain configurations,
695
# so the client defaults this to off and prefers allowing access events in
696
# case of scan or connection error.
697
# Default: no
698
#OnAccessDenyOnError yes
699
 
700
# Toggles extra scanning and notifications when a file or directory is
701
# created or moved.
702
# Requires the  DDD system to kick-off extra scans.
703
# Default: no
704
#OnAccessExtraScanning yes
705
 
706
# Set the  mount point to be scanned. The mount point specified, or the mount
707
# point containing the specified directory will be watched. If any directories
708
# are specified, this option will preempt (disable and ignore all options
709
# related to) the DDD system. This option will result in verdicts only.
710
# Note that prevention is explicitly disallowed to prevent common, fatal
711
# misconfigurations. (e.g. watching "/" with prevention on and no exclusions
712
# made on vital system directories)
713
# It can be used multiple times.
714
# Default: disabled
715
#OnAccessMountPath /
716
#OnAccessMountPath /home/user
717
 
718
# With this option you can whitelist the root UID (0). Processes run under
719
# root with be able to access all files without triggering scans or
720
# permission denied events.
721
# Note that if clamd cannot check the uid of the process that generated an
722
# on-access scan event (e.g., because OnAccessPrevention was not enabled, and
723
# the process already exited), clamd will perform a scan.  Thus, setting
724
# OnAccessExcludeRootUID is not *guaranteed* to prevent every access by the
725
# root user from triggering a scan (unless OnAccessPrevention is enabled).
726
# Default: no
727
#OnAccessExcludeRootUID no
728
 
729
# With this option you can whitelist specific UIDs. Processes with these UIDs
730
# will be able to access all files without triggering scans or permission
731
# denied events.
732
# This option can be used multiple times (one per line).
733
# Using a value of 0 on any line will disable this option entirely.
734
# To whitelist the root UID (0) please enable the OnAccessExcludeRootUID
735
# option.
736
# Also note that if clamd cannot check the uid of the process that generated an
737
# on-access scan event (e.g., because OnAccessPrevention was not enabled, and
738
# the process already exited), clamd will perform a scan.  Thus, setting
739
# OnAccessExcludeUID is not *guaranteed* to prevent every access by the
740
# specified uid from triggering a scan (unless OnAccessPrevention is enabled).
741
# Default: disabled
742
#OnAccessExcludeUID -1
743
 
744
# This option allows exclusions via user names when using the on-access
745
# scanning client. It can be used multiple times.
746
# It has the same potential race condition limitations of the
747
# OnAccessExcludeUID option.
748
# Default: disabled
749
#OnAccessExcludeUname clamav
750
 
751
# Number of times the OnAccess client will retry a failed scan due to
752
# connection problems (or other issues).
753
# Default: 0
754
#OnAccessRetryAttempts 3
755
 
756
##
757
## Bytecode
758
##
759
 
760
# With this option enabled ClamAV will load bytecode from the database.
761
# It is highly recommended you keep this option on, otherwise you'll miss
762
# detections for many new viruses.
763
# Default: yes
764
#Bytecode yes
765
 
766
# Set bytecode security level.
767
# Possible values:
768
#   None -      No security at all, meant for debugging.
769
#               DO NOT USE THIS ON PRODUCTION SYSTEMS.
770
#               This value is only available if clamav was built
771
#               with --enable-debug!
772
#   TrustSigned - Trust bytecode loaded from signed .c[lv]d files, insert
773
#               runtime safety checks for bytecode loaded from other sources.
774
#   Paranoid -  Don't trust any bytecode, insert runtime checks for all.
775
# Recommended: TrustSigned, because bytecode in .cvd files already has these
776
# checks.
777
# Note that by default only signed bytecode is loaded, currently you can only
778
# load unsigned bytecode in --enable-debug mode.
779
#
780
# Default: TrustSigned
781
#BytecodeSecurity TrustSigned
782
 
783
# Allow loading bytecode from outside digitally signed .c[lv]d files.
784
# **Caution**: You should NEVER run bytecode signatures from untrusted sources.
785
# Doing so may result in arbitrary code execution.
786
# Default: no
787
#BytecodeUnsigned yes
788
 
789
# Set bytecode timeout in milliseconds.
790
#
791
# Default: 5000
792
# BytecodeTimeout 1000