Usage Examples |
This section contains examples of using the Dr.Web Ctl utility (drweb-ctl): •Object Scanning: ▫Scanning of Files Selected by Criteria. ▫Scanning of Additional Objects. •An Example of Operation in the Autonomous Copy Mode. 1. Object Scanning 1.Perform scanning of the /home directory with default parameters:
2.Scan paths listed in the daily_scan file (one path per line):
3.Perform scanning of the boot record on the sda drive:
4.Perform scanning of the running processes:
1.2. Scanning of Files Selected by Criteria Examples for file selection for scanning are listed below and use the result of the find utility operation. The obtained list of files is sent to the drweb-ctl scan command with the --stdin or --stdin0 parameter. 1.Scan listed files returned by the find utility and separated with the NUL (\0) character:
2.Scan all files in all directories, starting from the root directory, on one partition of the file system:
3.Scan all files in all directories, starting from the root directory, with the exception of the /var/log/messages and /var/log/syslog files:
4.Scan all files of the root user in all directories, starting from the root directory:
5.Scan all files of the root and admin users in all directories, starting from the root directory:
6.Scan all files of the users with UID within the range of 1000–1005 in all directories, starting from the root directory:
7.Scan files in all directories, starting from the root directory, with a nesting level of no more than five:
8.Scan files in a root directory while ignoring files in subdirectories:
9.Scan files in all directories, starting from the root directory, while following all symbolic links:
10. Scan files in all directories, starting from the root directory, without following symbolic links:
11. Scan files created no later than May 1, 2017 in all directories, starting from the root directory:
1.3. Scanning of Additional Objects 1.Scanning of objects located in the /tmp directory on the remote host 192.168.0.1 by connecting to it via SSH as the user user with the password passw:
2.Scan an email message saved in the email.eml file, using the default set of rules:
1.Display information about the running components of Dr.Web for Linux:
2.Display all parameters of the [Root] section:
3.Set the Start parameter to No in the [LinuxSpider] section (this will stop the SpIDer Guard file system monitor):
Note that superuser privileges are required to perform this action. To elevate the privileges, you can use the sudo command, as shown in the following example:
4.Force update of anti-virus components of Dr.Web for Linux:
5.Restart the component configuration of Dr.Web for Linux:
Note that superuser privileges are required to perform this action. To elevate the privileges, you can use the sudo command, as shown in the following example:
6.Connect Dr.Web for Linux to the centralized protection server operating on host 192.168.0.1 if a server certificate is located in the /home/user/cscert.pem file:
7.Connect Dr.Web for Linux to the centralized protection server using the install.cfg configuration file:
8.Disconnect Dr.Web for Linux from the centralized protection server:
Note that superuser privileges are required to perform this action. To elevate the privileges, you can use the sudo command, as shown in the following example:
9.View the last log records made by the drweb-update and drweb-configd components in the Dr.Web for Linux log:
1.Display information on detected threats:
2.Quarantine all files containing non-neutralized threats:
3.Display the list of quarantined files:
4.Restore all quarantined files:
4. An Example of Operation in the Autonomous Copy Mode 1.Scan files and process quarantine in the autonomous copy mode:
The first command will scan files in the /home/user directory in the autonomous copy mode. Files containing known viruses will be quarantined. The second command will process quarantine content (in the autonomous copy mode as well) and remove all the objects. In highly secure environments where internet connection is blocked or limited, it is possible to update virus bases offline. You need to download updates to a computer connected to the internet, copy them to a USB drive or local network share and then install them to another computer (which is not connected to the internet). The update procedure must run in the command line. 1.Run the following command on a computer connected to the internet:
2.Copy the downloaded updates to a USB drive or a local network share. 3.Mount the local network share or removable drive on the computer to be updated. If the updates are from the USB drive, run the following commands:
4.Apply the updates with the following command:
|