Hello ClamAV folks,
I have downloaded ClamAV and verified
the eicar test using clamscan on a Windows VM. It appears that the
following detection capabilities are also enabled by default:
bytecode, scan-mail, phishing-sigs, phishing-scan-urls, scan-pe,
scan-elf, scan-pdf, scan-html. Out of these options, I am able to test
scan-pe, scan-elf, scan-pdf and scan-html using respective files. I
have not been able to test the rest of the options such as bytecode,
scan-mail, phishing-sigs and phishing-scan-urls. Could you please help
with the method of verifying individual options. Also, when a threat
is detected, does ClamAV report the type of the threat i.e. does
ClamAV report that Threat1 is a ‘bytecode’ threat, Threat2 is a
‘phishing-sigs’ threat?
If I am scanning C:\Users\Indranil via
clamscan (with recursive option) then does
‘C:\Users\Indranil\AppData\Local\Microsoft\Outlook’ get tested for
virus only if ‘scan-mail’ option is on?
Thank you,
Indranil
_______________________________________________
clamav-users mailing list
[email protected]
https://lists.clamav.net/mailman/listinfo/clamav-users
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/contact.html#ml