- Unpack tar -xvf antivir-workstation-prof-3.0.2-5.tar.gz
- Change directory: cd antivir-workstation-prof-3.0.2-5.tar.gz
- Execute installation: ./install\
Follow the installation dialog...
The following requests are recommended and should be kept:
- Would you like to setup Engine and Signature updates as cron task ? [y]
- Please, specify the interval to check. Recommended values are daily or 2 hours.
available options: d [2]
- Please specify if boot scripts should be set up.
Set up boot scripts [y]
Please, consider that the installation of the real time protection with Unix needs the
external kernel module Dazuko 3.0.
You find more information on www.dazuko.org.
2
3 Recommended Basic Configuration
# Amount of scanner daemons
NumDaemons 3
# This produces the start of 3 daemons which are enough for a usual use. The
amount can be increased in case of heavy load. But consider that you also need
more free main storage!
# Action in case of detection
AlertAction quarantine
# in case of a detection the file is moved to the quarantine directory and renamed.
Therefore the file can’t be opened anymore by the user. But it is not deleted or
changed because it might be a false positive.
# Default: QuarantineDirectory NONE
QuarantineDirectory /home/quarantine
# In case a file in the /home directory should be moved into quarantine it is
recommended to configure this here for a good performance.
In spite of copying a large file from one partition to another, you can only move the
file and keep it on the same partition.
# Files to be checked
ScanMode all
#This mode scans all files.
# Archive scan
Archive Scan yes
# Activates the scan of small and medium archives. Large archives should be limited
because of the performance. (view underneath)
You can scan large archives e.g. by means of a regular scan.
# Scan in mbox
MailboxScan yes
# This command executes a scan of the mail boxes. We recommend to activate this
option for security reasons.
# Maximum archive size which should be scanned
ArchiveMaxSize 1GB
# You should limit the size of archives which should be scanned to 1 GB for a good
performance.
# Maximum recursion depth
ArchiveMaxRecursion 20
# You shoud limit the recursion depth to 20 level in order to keep a good
performance.
# Maximum compression rate
3
ArchiveMaxRatio 150
# You should limit the compression rate of scanned archives to 150 in order to keep
a good performance.
# Maximum of files which should be scannend
ArchiveMaxCount 0
# Limitation of the amount of files which should be scanned. Usually this is not
necessary.
# Notification level
SuppressNotificationBelow scanner warning
# Sends email notifications for the component “scanner” in case of an event
“warning” and higher. We recommend that in order to be well informed.
# Define the log file
LogFile /var/log/avguard.log
# Defines the log files of the OnAccess scanner. This is the default path.
# Detection of undesired software
DetectPrefixes adspy=yes appl=no bdc=yes dial=yes game=no hiddenext=yes
joke=no pck=no phish=yes spr=no
# Offers a protection against undesired Software like e.g. hidden file extensions,
phishing, dial up programs, backdoor programs and undesired publicity pop-ups.
But you can also configure the detection by means of the following list:
--# ADSPY: Software that displays advertising pop-ups or software, that very
# often, without the user's consent, sends user specific data to
# third parties and might therefore be unwanted.
# APPL: The term APPL/ denotes an application of dubious origin or which
# might be hazardous to use.
# BDC: Is the Control software for backdoors. Control software for
# backdoors are generally harmless.
# DIAL: A Dial-Up program for connections that charge a fee. Its use might
# lead to huge costs for the user.
# GAME: It concerns a game that causes no damage on your computer.
4
# HEUR-DBLEXT: The file has an executable file extension, but hides it behind a
# harmless one.
# JOKE: A harmless joke program is present as file.
# PCK: File has been compressed with an unusual runtime compression tool.
# Please, make sure that this file comes from a trustworthy source.
# PHISH: Faked emails that are supposed to prompt the victim to reveal
# confidential information such as user accounts, passwords or
# online-banking data on certain websites.
# SPR: Software that may be able to compromise the security of your system,
# initiate unwanted program activities, damage your privacy or spy
# out your user behavior and might therefore be unwanted.
---
# Activates the heuristic on medium level
HeuristicsLevel 2
# A good balance between detection and early detection which prevents a lot of
possible false positives.
# Activates the detection of possible macro viruses in office documents
HeuristicsMacro yes
5
4 What can be configured additionally?
4.1 No Real Time Protection
You ca use only the command line scanner without real time protection by setting the
parameter 'OndemandMgmt yes' in the /etc/avguard.conf. In that case Dazuko or
DazukoFS don’t have to be loaded.
4.2 Heavy Load in the System
Depending on the load you can choose a value between 3 and 20 in the parameter
NumDaemons. You should take into consideration the relation between the need ant
the available main storage.
4.3 Exception of Directories
Usually you should exclude data base directories from the scan. They don’t have to
be checked because of the internal structure. A scan of data base directories could
cause a high loss of performance.
You can set the exception with the parameter ExcludePath.
Example:
/etc/avira/avguard.conf
ExcludePath /dbdir
6
5 Particularities - NSS Volumes
The NSS starts very late using e.g. SLES. This causes a malfunction of the already
mounted DafukoFS.
Therefore it is necessary to adjust the run level, so that the concerned shares are
mounted after the start of the NSS with DazukoFS. You find more detailed
information bout the adjustment of the start order in the documentation of the
operating system.
6 Command Line Scanner - avscan
The avscan binary offers the OnDemand scan mode and can be activated beneath
/usr/lib/AntiVir/avscan with the user-defined parameters.
The following activation is similar to the above described guard configuration. The
parameters can be deduced accordingly. The scan is executed in the /home
directory.
The parameter –s stands for a recursive scan in subdirectories. In order to execute
the scan automatically without user interaction, the parameter –batch can be used.
Detections are moved automatically into the quarantine:
This can also be executed automatically by means of cron job. We recommend you
to create the activation in the form of a shell script and to activate it accordingly via
cronjob – e.g. one time a week, on Saturday y at twelve o’clock.:
00 12 * * 6 root /usr/local/bin/virenscan.sh
7
7 Update Configuration
In order to keep your AntiVir installation up-to-date, two kinds of updates are set
during the installation:
It is recommended for internet service providers to download the current signatures
more frequently, e.g. every 15 minutes. Thereby you can make sure to use always
the latest signatures
Furthermore you have the possibility to execute only an engine and VDF update. The
guard product files and the central scanner service (SAVAPI) are not updated.
This can be interesting for you in case you are considering program updates as
especially sensitive. Thereby you have the possibility to proceed an audit on a
separate test system before you implement the new version in the productive
network.
The command has to be entered as follows:
$ /usr/lib/AntiVir/avupdate --product=Signatures
9
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.