--- Begin Message ---
Hi there,

On Tue, 15 May 2018, Stefan Schumacher wrote:

I would like to use clamdscan to scan an entire server but exclude
sys, proc and dev.

mail6:~$ >>> cat testfile
/etc/perl/
mail6:~$ >>> clamdscan -f testfile
/etc/perl: OK

----------- SCAN SUMMARY -----------
Infected files: 0
Time: 0.020 sec (0 m 0 s)

8<----------------------------------------------------------------------
Log extract:
8<----------------------------------------------------------------------
May 15 17:21:22 mail6 clamd[670]: /etc/perl/sitecustomize.pl: OK
May 15 17:21:22 mail6 clamd[670]: /etc/perl/Net/libnet.cfg: OK
May 15 17:21:22 mail6 clamd[670]: /etc/perl/XML/SAX/ParserDetails.ini: OK
May 15 17:22:03 mail6 clamd[670]: /etc/perl/sitecustomize.pl: OK
May 15 17:22:03 mail6 clamd[670]: /etc/perl/Net/libnet.cfg: OK
May 15 17:22:03 mail6 clamd[670]: /etc/perl/XML/SAX/ParserDetails.ini: OK
8<----------------------------------------------------------------------

--

73,
Ged.

--- End Message ---
_______________________________________________
clamav-users mailing list
[email protected]
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to