1. Introduction
  2. Installing
    1. Packages
    2. Docker
    3. Unix from source (v0.104+)
    4. Unix from source (v0.103-)
    5. Windows from source
    6. Community Projects
    7. Add a service user account
  3. Usage
    1. Configuration
    2. Updating Signature Databases
    3. Scanning
      1. On-Access Scanning
    4. Running ClamAV Services
    5. Report a Bug
  4. Signatures
    1. CVD Info File
    2. Dynamic Configuration Settings
    3. Trusted and Revoked EXE Certificates
    4. File Type Recognition
    5. Allow Lists
    6. Hash-based Signatures
    7. Content-based Signature Format
      1. Logical Signatures
      2. Extended Signatures
    8. YARA Rules
    9. Phishing Signatures
    10. Bytecode Signatures
    11. Container Metadata Signatures
    12. Archive Passwords (experimental)
    13. Signature Names
  5. For Developers
    1. Pull Request Basics
    2. ClamAV Git Work Flow
    3. Working with Your Fork
    4. Reviewing Pull Requests
    5. Building for Development
    6. Building the Installer Packages
    7. Dev Tips & Tricks
    8. Performance Profiling
    9. Computing Code Coverage
    10. Fuzzing Sanitizers
    11. libclamav
    12. Contribute
  6. Frequently Asked Questions
    1. Selecting the Right Version of ClamAV for You
    2. FreshClam (Signature Updater)
    3. Signature Database (CVD)
    4. Malware and False Positive Report
    5. Misc
    6. Mailing Lists
    7. Safe Browsing
    8. Troubleshooting
    9. Interpreting Scan Alerts
    10. Upgrading
    11. Rust
    12. Win32
    13. PUA (Potentially Unwanted Application)
    14. Ignore
    15. Uninstall
    16. ClamAV EOL Policy
  7. Community Resources
  8. Appendix
    1. Terminology
    2. Hosting a Private Database Mirror
    3. Microsoft Authenticode Signature Verification
    4. ClamAV File Types and Target Types
    5. ClamAV Versions and Functionality Levels