Hello ClamAV folks,

                                 I have downloaded ClamAV and verified
the eicar test using clamscan on a Windows VM.  It appears that the
following detection capabilities are also enabled by default:
bytecode, scan-mail, phishing-sigs, phishing-scan-urls, scan-pe,
scan-elf, scan-pdf, scan-html. Out of these options, I am able to test
scan-pe, scan-elf, scan-pdf and scan-html using respective files. I
have not been able to test the rest of the options such as bytecode,
scan-mail, phishing-sigs and phishing-scan-urls. Could you please help
with the method of verifying individual options. Also, when a threat
is detected, does ClamAV report the type of the threat i.e. does
ClamAV report that Threat1 is a ‘bytecode’ threat, Threat2 is a
‘phishing-sigs’ threat?

                                If I am scanning C:\Users\Indranil via
clamscan (with recursive option) then does
‘C:\Users\Indranil\AppData\Local\Microsoft\Outlook’ get tested for
virus only if ‘scan-mail’ option is on?

Thank you,
   Indranil

_______________________________________________

clamav-users mailing list
[email protected]
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to