

How do I collect process core file in a container?.How to configure abrt to automatically generate an application core.How to report an application crash in RHEL6 and above.How to collect core dump file of a program on RHEL6 and above.There is a graphical frontend for the ClamAV antivirus called ClamTk. To scan for viruses regularly, you can configure a cron job with the settings you want. # clamscan -i -recursive -move=/tmp/clamscan -log=/var/log/clamscan.log -exclude-dir="/var/www/administrator" /var/www If you want to exclude some of the directories from scanning, use the -exclude-dir parameter:

You can also add the -log=/var/log/clamscan.log parameter to write all information about the scanning process in the log file you have specified: This command will scan all contents of the specified directory and move suspicious files to /tmp/clamscan.Īs we can see, the infected file has been moved to the specified directory:

# clamscan -infected -recursive -move=/tmp/clamscan /var/www

If you want to move suspicious files to a separate directory, run the scan using the -move parameter: With these parameters, the antivirus will immediately delete the infected files. # clamscan -infected -remove -recursive /var/www/ To scan the specified directory for viruses, use the following command: Then you can run the antivirus service or enable it:Īfter you have configured the ClamAV antivirus service, you can scan any server directory for viruses (scanner mode). To make it more convenient, we have deleted change the configuration in the file: Īfter = syslog.target nss-lookup.target network.targetĮxecStart = /usr/sbin/clamd -c /etc/clamd.d/nf The configuration file already exists, but you will have to change its name: Like you did for freshclam, create a service for ClamAV. Then you can start your service and add it to startup: # nano /usr/lib/systemd/system/rviceĪnd add the following contents to it:
