Andrew C Aitchison via clamav-users <clamav-users@lists.clamav.net> wrote:
> 
> No. clamD scans data passed to it by clamdscan, usually over a socket or
> pipe.

Ah... I missed INSTREAM in the clamd man page. Locally, though, surely
SCAN/CONTSCAN/etc, are nuch more efficient. And remotely, sending the
entire contents of the system over the net isn't practical at scale.

> That does mean that any malware which is missed in the first run
> will not be detected in subsequent runs.

True. I suppose we'd want to do monthly full scans.

> 3000 machines per week, gives you about 3.36 minutes for each machine to
> send all its local data to the scanning machine.
> Instead I would run a local, mirror, repository of the database
> and use freshclam on each machine to keep its database in sync with your
> mirror, then run clamd and a clamdscan cron? script on each machine.

We've already got a local mirror. Is there a way to get clamd/clamdscan
to work without permission problems beside running clamd as root? Does 
--fdpass get around that?

> I would also look at on-access scanning.

I tried it but got permission errors on anything not world-accessible.
I suspect the overall performance hit would be too high.

> Scanning files as they are used might mean more or less work
> than scanning every file every week.

Except full dumps are going to cause everything to be scanned.

-Dave

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to