Steps to install ClamAV Antivirus Software on Ubuntu 20.04 LTS

ClamAV is a free & open-source antivirus software. It is used for detection of viruses, trojans, and many other types of malware. We can scan the files, directories, emails, personal info,& any kind of malicious files.

There are few steps to install ClamAV on ubuntu:

Step 1: Update the System.

apt-get update

Step 2: Install ClamAV on system.

apt-get install clamav clamav-daemon

  • Check the ClamAV version.

clamscan -V

  • Here is the command output.

Step 3: Start the ClamAV .

systemctl start clamav-freshclam

  • Check the ClamAV status.

systemctl status clamav-freshclam

  • Here is the command output.

Step 4: Stop & Update the ClamAV database.Before updating the ClamAV database,we need to stop the ClamAV.

  • Stop the ClamAV.

systemctl stop clamav-freshclam

  • Download the latest version of ClamAV.

freshclam

  • Here is the command output.

  • Start & Enable the ClamAV.

systemctl start clamav-freshclam
systemctl enable clamav-freshclam

  • List all the database files.

ls /var/lib/clamav/

  • Here is the command output.

Step 5: ClamAV syntax & Examples.

clamscan [options] [files-or-directories]

  • We can use the following options when scanning the system.

–infected : To display a list of all infected files.
–remove : To removes all infected files from system.
–recursive : To scan all directories and sub-directories.

  • For example, scan the /etc directory.

clamscan --infected --remove --recursive /etc

  • Here is the command output.

  • Run the following command to list all the available options.

clamscan -h

  • Here is the command output.

  • To Scan the files & show infected files.

clamscan -r -i /[path-to-folder]

  • Here is the command output.

  • To scan specific directory recursively and then remove the infected files.

clamscan --infected --remove --recursive /usr/bin

  • Here is the command output.

  • To scan the infected files and copy infected files to a different directory path.

clamscan -r --move=/[path-to-folder] /[path-to-quarantine-folder]

  • To scan the infected files & only send outputs of infected files to a new text file.

clamscan -r /[path-to-folder] | grep FOUND >> /[path-folder]/[file].txt.

Step 6: Test the ClamAV.Download a test virus & scan the virus using ClamAV software.

cd /tmp
wget http://www.eicar.org/download/eicar.com

  • Here is the command output.

clamscan --infected --remove eicar.com

  • Here is the command output.

Step 7: Setup a Daily Schedule scanning & send a scan report to mail address.

  • Create a bash script.

vim vim /usr/local/bin/clamscan_daily.sh

  • Add the following lines:

#!/bin/bash
LOGFILE="/var/log/clamav/clamav-$(date +'%Y-%m-%d').log";
EMAIL_MSG="Please see the log file attached";
EMAIL_FROM="[email protected]";
EMAIL_TO="[email protected]";
DIRTOSCAN="/var/www/html";
for S in ${DIRTOSCAN}; do
DIRSIZE=$(du -sh "$S" 2>/dev/null | cut -f1);
echo "Starting scan of "$S" directory.
Directory size: "$DIRSIZE".";
clamscan -ri --remove --detect-pua=yes "$S" >> "$LOGFILE";
#find /var/log/clamav/ -type f -mtime +30 -exec rm {} \;
MALWARE=$(tail "$LOGFILE"|grep Infected|cut -d" " -f3);
if [ "$MALWARE" -ne "0" ];then
echo "$EMAIL_MSG"|mail -a "$LOGFILE" -s "Malware Found" -r "$EMAIL_FROM" "$EMAIL_TO";
fi
done
exit 0

  • Here is the command output.

  • Provide the following permission to created bash file.

chmod u+x /usr/local/bin/clamscan_daily.sh

  • Create a Cron job.

crontab -e

  • Add the following lines:

1 1 * * * /usrlocal/bin/clamscan_daily.sh > /dev/null 2>&1

  • Create a another bash script for daily scanning purpose.

vim /etc/cron.daily/clamscan_daily

  • Add the following lines:

#!/usr/bin/env bash
clamscan -r /usr/bin

  • Provide the following permission to created bash file.

chmod +x /etc/cron.daily/clamscan_daily

Step 8: Install ClamTK web interface.

apt-get install clamtk

 

 

Leave a Reply