- 1. Introduction
- 2. Installing
- 2.1. Packages
- 2.2. Docker
- 2.3. Unix from source (v0.104+)
- 2.4. Unix from source (v0.103-)
- 2.5. Windows from source
- 2.6. Community Projects
- 2.7. Add a service user account
- 3. Usage
- 3.1. Configuration
- 3.2. Updating Signature Databases
- 3.3. Scanning
- 3.3.1. On-Access Scanning
- 3.4. Running ClamAV Services
- 3.5. Report a Bug
- 4. Signatures
- 4.1. CVD Info File
- 4.2. Dynamic Configuration Settings
- 4.3. Trusted and Revoked EXE Certificates
- 4.4. File Type Recognition
- 4.5. Allow Lists
- 4.6. Hash-based Signatures
- 4.7. Content-based Signature Format
- 4.7.1. Logical Signatures
- 4.7.2. Extended Signatures
- 4.8. YARA Rules
- 4.9. Phishing Signatures
- 4.10. Bytecode Signatures
- 4.11. Container Metadata Signatures
- 4.12. Archive Passwords (experimental)
- 4.13. Signature Names
- 5. For Developers
- 5.1. Pull Request Basics
- 5.2. ClamAV Git Work Flow
- 5.3. Working with Your Fork
- 5.4. Reviewing Pull Requests
- 5.5. Building for Development
- 5.6. Building the Installer Packages
- 5.7. Dev Tips & Tricks
- 5.8. Performance Profiling
- 5.9. Computing Code Coverage
- 5.10. Fuzzing Sanitizers
- 5.11. libclamav
- 5.12. Contribute
- 6. Frequently Asked Questions
- 6.1. Selecting the Right Version of ClamAV for You
- 6.2. FreshClam (Signature Updater)
- 6.3. Signature Database (CVD)
- 6.4. Malware and False Positive Report
- 6.5. Misc
- 6.6. Mailing Lists
- 6.7. Safe Browsing
- 6.8. Troubleshooting
- 6.9. Interpreting Scan Alerts
- 6.10. Upgrading
- 6.11. Rust
- 6.12. Win32
- 6.13. PUA (Potentially Unwanted Application)
- 6.14. Ignore
- 6.15. Uninstall
- 6.16. ClamAV EOL Policy
- 7. Community Resources
- 8. Appendix
- 8.1. Terminology
- 8.2. Hosting a Private Database Mirror
- 8.3. Microsoft Authenticode Signature Verification
- 8.4. ClamAV File Types and Target Types
- 8.5. ClamAV Versions and Functionality Levels