Dr.Web Ctl |
You can manage operation of Dr.Web for UNIX Mail Servers from the command line of the operating system. For that, you can use the special Dr.Web Ctl utility (drweb-ctl). You can use it to perform the following operations: •Start scanning file system objects including boot records. •Launch of scanning of files on remote network hosts (see note below). •Start updating anti-virus components (virus databases, the scan engine, and so on depending on the distribution). •View and change parameters of the Dr.Web for UNIX Mail Servers configuration. •View the status of the Dr.Web for UNIX Mail Servers components and statistics on detected threats. •Connect to the centralized protection server or disconnect from it. •View quarantine and manage quarantined objects (via the Dr.Web File Checker component). •Connect to the centralized protection server or disconnect from it. User commands to control Dr.Web for UNIX Mail Servers will only take effect if the Dr.Web ConfigD configuration daemon is running (by default, it is automatically run on system startup).
The drweb-ctl tool supports auto-completion of commands for managing Dr.Web for UNIX Mail Servers operation if this option is enabled your command shell. If the command shell does not allow auto-completion, you can configure this option. For that purpose, refer to the instruction manual for the used OS distribution.
Dr.Web for UNIX Mail Servers allows you to scan files located on remote network hosts for threats. Such hosts can be not only fully-featured computing machines, such as workstations and servers, but also routers, set-top boxes, and other smart devices of the Internet of Things. To perform the remote scanning, the remote host has to provide a remote terminal access via SSH (Secure Shell) or Telnet. To access the device, you need to know an IP address and a domain name of the remote host, as well as the credentials of the user that can remotely access the system via SSH or Telnet. This user must have access rights to the scanned files (at least the reading rights). This function can be used only for detection of malicious and suspicious files on a remote host. Elimination of threats (i.e. isolation in the quarantine, removal, and cure of malicious objects) using remote scanning is impossible. To eliminate the detected threats on the remote host, use administration tools provided directly by this host. For example, for routers and other smart devices, update the firmware; for computing machines, establish a connection (in a remote terminal mode, as one of the options) and perform the respective operations in the file system (remove or move files, etc.), or run the anti-virus software installed on them. Remote scanning is only performed via the command-line tool drweb-ctl (using the command remotescan).
Details: |