In the directory where the signatures are stored run the following:
for file in *.cld;do sigtool -i $file;done
for file in *.cvd;do sigtool -i $file;done
Or run freshclam -v.
You can also examine the clamd log files.
dp
On 6/4/19 8:29 AM, Rodney Stratford via clamav-users wrote:
I have
clamscan -V is all they care about.
> -Original Message-
> From: clamav-users On Behalf Of
> Rodney Stratford via clamav-users
> Sent: Tuesday, June 04, 2019 8:29 AM
> To: clamav-users@lists.clamav.net
> Cc: Rodney Stratford
> Subject: [External] [clamav-user
clamconf will show you what you want (with a lot more detail if required):
[graeme@whelk ~]$ clamconf -n | egrep 'version.+sigs'
bytecode.cld: version 328, sigs: 94, built on Wed Jan 2 14:42:37 2019
daily.cld: version 25469, sigs: 1587497, built on Mon Jun 3 08:59:22 2019
main.cvd: version 58,
I have installed ClamAV in my PCF environment. But security team is looking at
how to display the virus signature level is of the AV. Is there a command or a
tool that can display this? Any help is appreciated. Thanks
___
clamav-users mailing