Usage Examples |
Example usage of the command: 1. Object scanning 1.Perform scanning of the /home directory with default parameters:
2.Scan paths listed in the daily_scan file (one path per line):
3.Perform scanning of the boot record on the sda drive:
4.Perform scanning of the running processes:
1.2. Scanning of files selected by criteria Examples for selection of files for scanning are listed below and use the result of the operation of the utility . The obtained list of files is sent to the command scan with the parameter --stdin or --stdin0. 1.Scan listed files returned by the utility and separated with the NUL ('\0') character:
2.Scan all files in all directories, starting from the root directory, on one partition of the file system:
3.Scan all files in all directories, starting from the root directory, with the exception of the /var/log/messages and /var/log/syslog files:
4.Scan all files of the root user in all directories, starting from the root directory:
5.Scan files of the root and admin users in all directories, starting from the root directory:
6.Scan files of users with UID in the range 1000–1005 in all directories, starting from the root directory:
7.Scan files in all directories, starting from the root directory, with a nesting level not more than five:
8.Scan files in a root directory ignoring files in subdirectories:
9.Scan files in all directories, starting from the root directory, with following all symbolic links:
10.Scan files in all directories, starting from the root directory, without following symbolic links:
11.Scan files created not later than May 1, 2017 in all directories, starting with the root directory:
1.3. Scanning of additional objects 1.Scanning of objects located in the directory /tmp on the remote server 192.168.0.1 by connecting to it via SSH as a user user with the password passw:
2.Scanning of files in the directory /home/user/Downloads via request to Dr.Web Cloud:
3.Check of categories of the URL www.google.com via request to Dr.Web Cloud:
4.Scanning of a mail message saved in the file email.eml, using the default set of rules:
2. Configuration management 1.Display information on a current program package, including information about running processes:
2.Output all parameters from the [Root] section of the active configuration:
3.Set 'No' as the value of the Start parameter in the [LinuxSpider] section of the active configuration (this will disable the file system monitor SpIDer Guard):
Note that superuser privileges are required to perform this action. To elevate the privileges, you can use the command, as shown in the following example:
4.Perform force update of anti-virus components of the product:
5.Restart the configuration of components of the installed Dr.Web program package:
Note that superuser privileges are required to perform this action. To elevate the privileges, you can use the command, as shown in the following example:
6.Connect the product to the server of central protection, operating on server 192.168.0.1 under the condition that a public key of the server is located in file /home/user/cskey.pub:
7.Disconnect the product from Anti-Virus Network:
Note that superuser privileges are required to perform this action. To elevate the privileges, you can use the command, as shown in the following example:
3. Threats Management 1.Display information on detected threats:
2.Move all files containing threats which were not neutralized to quarantine:
3.Display list of files moved to quarantine:
4.Restore all files from quarantine:
|