Re: [clamav-users] Probably something simple but new to ClamAV

2019-06-07 Thread Dennis Peterson
In the directory where the signatures are stored run the following: for file in *.cld;do sigtool -i $file;done for file in *.cvd;do sigtool -i $file;done Or run freshclam -v. You can also examine the clamd log files. dp On 6/4/19 8:29 AM, Rodney Stratford via clamav-users wrote: I have

Re: [clamav-users] Probably something simple but new to ClamAV

2019-06-04 Thread SCOTT PACKARD via clamav-users
clamscan -V is all they care about. > -Original Message- > From: clamav-users On Behalf Of > Rodney Stratford via clamav-users > Sent: Tuesday, June 04, 2019 8:29 AM > To: clamav-users@lists.clamav.net > Cc: Rodney Stratford > Subject: [External] [clamav-user

Re: [clamav-users] Probably something simple but new to ClamAV

2019-06-04 Thread Graeme Fowler via clamav-users
clamconf will show you what you want (with a lot more detail if required): [graeme@whelk ~]$ clamconf -n | egrep 'version.+sigs' bytecode.cld: version 328, sigs: 94, built on Wed Jan 2 14:42:37 2019 daily.cld: version 25469, sigs: 1587497, built on Mon Jun 3 08:59:22 2019 main.cvd: version 58,

[clamav-users] Probably something simple but new to ClamAV

2019-06-04 Thread Rodney Stratford via clamav-users
I have installed ClamAV in my PCF environment. But security team is looking at how to display the virus signature level is of the AV. Is there a command or a tool that can display this? Any help is appreciated. Thanks ___ clamav-users mailing