ubuntu:anti_virus:install_clamav
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ubuntu:anti_virus:install_clamav [2020/06/09 20:51] – [Scan for a virus] peter | ubuntu:anti_virus:install_clamav [2022/06/13 10:10] (current) – peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Ubuntu - Anti Virus - Install ClamAV ====== | ====== Ubuntu - Anti Virus - Install ClamAV ====== | ||
- | clamav is an anti-virus application. | + | **clamav** is an anti-virus application. |
The clamav-daemon package creates a ' | The clamav-daemon package creates a ' | ||
Line 9: | Line 9: | ||
===== Install ClamAV ===== | ===== Install ClamAV ===== | ||
- | First we update the package repository: | + | First, update the package repository: |
<code bash> | <code bash> | ||
Line 15: | Line 15: | ||
</ | </ | ||
- | Now we install the clamav scanner, the daemon and the database updater. | + | Now install the clamav scanner, the daemon and the database updater. |
<code bash> | <code bash> | ||
sudo apt install clamav clamav-daemon clamav-freshclam | sudo apt install clamav clamav-daemon clamav-freshclam | ||
</ | </ | ||
- | |||
- | You can also install the **clamav-data** package, but the clamav-freshclam package is another (easier) way to update your virus definitions. | ||
<WRAP info> | <WRAP info> | ||
+ | **NOTE: | ||
+ | |||
On RHEL, CentOS or Scientific Linux, you only need to install the clamav package: | On RHEL, CentOS or Scientific Linux, you only need to install the clamav package: | ||
Line 63: | Line 63: | ||
===== The daily scan ===== | ===== The daily scan ===== | ||
- | The below cronjob will run a virus database definition update (so that the scan always has the most recent definitions) and afterwards run a full scan which will only report when there are infected files on the system. | + | The below cronjob will run a virus database definition update (so that the scan always has the most recent definitions) and afterwards run a full scan which will only report when there are infected files on the system. |
+ | |||
+ | It also does not remove the infected files automatically, | ||
<code bash> | <code bash> | ||
Line 70: | Line 72: | ||
</ | </ | ||
- | The **2>/ | + | <WRAP info> |
+ | **NOTE: | ||
+ | |||
+ | The infected files however are still found and reported. | ||
+ | |||
+ | </ | ||
Also make sure that your cron is configured so that it mails you the output of the cronjobs. | Also make sure that your cron is configured so that it mails you the output of the cronjobs. | ||
Line 85: | Line 92: | ||
===== Extra: the targeted scan ===== | ===== Extra: the targeted scan ===== | ||
- | The below cronjob is an example and you should adapt it as required. | + | The below cronjob is an example and you should adapt it as required. |
+ | |||
+ | * It updates the virus definitions and scans the folder / | ||
<code bash> | <code bash> | ||
Line 102: | Line 111: | ||
---- | ---- | ||
+ | |||
+ | |||
+ | ===== Possible finds ===== | ||
+ | |||
+ | The scan can detect these " | ||
+ | |||
+ | * PUA.Script.Packed-1 FOUND | ||
+ | * PUA.Script.Packed-2 FOUND | ||
+ | |||
+ | In fact, this is not a virus. | ||
+ | |||
+ | * PUA - Possibly Unwanted Applications. | ||
+ | * Script.Packed - The script is packed (archived). | ||
+ | |||
+ | |||
+ | To disable detection of PUA use an additional parameter: | ||
+ | |||
+ | <code bash> | ||
+ | --detect-pua=no | ||
+ | </ | ||
+ | |||
+ | And to enable detection of PUA: | ||
+ | |||
+ | <code bash> | ||
+ | --detect-pua=yes | ||
+ | </ | ||
+ | |||
+ | Example: | ||
+ | |||
+ | <code bash> | ||
+ | sudo clamscan -r -i --detect-pua=yes / | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Possible errors ===== | ||
+ | |||
+ | ==== ERROR 1 ==== | ||
+ | |||
+ | When you update the virus signature database, it can return this error message: | ||
+ | |||
+ | <code bash> | ||
+ | freshclam | ||
+ | </ | ||
+ | |||
+ | returns: | ||
+ | |||
+ | <code bash> | ||
+ | ERROR: Can't open / | ||
+ | ERROR: Problem with internal logger (UpdateLogFile = / | ||
+ | </ | ||
+ | |||
+ | This is because the user was running freshclam without certain rights. | ||
+ | |||
+ | This is solved by running freshclam with sudo: | ||
+ | |||
+ | <code bash> | ||
+ | sudo freshclam | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== ERROR 2 ==== | ||
+ | |||
+ | Scanning can return this error message: | ||
+ | |||
+ | <code bash> | ||
+ | LibClamAV Warning: fmap_readpage: | ||
+ | LibClamAV Warning: fmap_readpage: | ||
+ | LibClamAV Warning: fmap_readpage: | ||
+ | LibClamAV Error: fmap_readpage: | ||
+ | </ | ||
+ | |||
+ | For this to not happen, you must to exclude from scanning several directories, | ||
+ | |||
+ | <code bash> | ||
+ | sudo clamscan -ir --exclude-dir=^/ | ||
+ | </ | ||
+ | |||
+ |
ubuntu/anti_virus/install_clamav.1591735866.txt.gz · Last modified: 2020/07/15 09:30 (external edit)