Unisar 1.24.1867 manual Report, Using the log file

Page 56

09

Using

Real life usage

BitDefender

 

BitDefender Antivirus Scanner v7.60124 Linux-i686

Copyright (C) 1996-2006 Softwin SRL. All rights reserved.

This program is licensed for commercial use.

Default action upon detecting an infected file: ignore action

Default action upon detecting a suspected file: ignore action

/tmp/mail.mbox ok

 

 

/tmp/mail.mbox=>(message 0)

ok <- mbox.xmd

 

/tmp/mail.mbox=>(message 1)

ok <- mbox.xmd

 

/tmp/mail.mbox=>(messag ...

00 (EEST)]=>(MIME part)

ok <- mime.xmd

/tmp/mail.mbox=>(messag ...

E part)=>(message body)

ok <- mime.xmd

/tmp/mail.mbox=>(messag ...

00 (EEST)]=>(MIME part)

ok <- mime.xmd

/tmp/mail.mbox=>(messag ...

IME part)=>EICAR.COM.gz

ok <- mime.xmd

/t ... OM infected: EICAR-Test-File (not a virus) <- cevakrnl.xmd /tmp/mail.mbox=>(messag ... 00 (EEST)]=>(MIME part) ok <- mime.xmd

Results:

 

Folders

:0

Files

:9

Packed

:0

Archives

:6

Infected files

:1

Suspect files

:0

Warnings

:0

Identified

viruses:1

I/O errors

:0

9.2. Report

You can ask BitDefender to show various kind of information regarding its activity, status, known viruses or version.

9.2.1. Using the log file

BitDefender can run in background with no user intervention, can display an enormous quantity of information or you would like to keep its activity reports for a later use. In these cases, the best way is to use the log facility.

To specify some name for the log file, you have to pass the --log=logfile.logcommand line option. If the file already exists, it will be appended. You may use --log-overwriteoption to replace the old log file.

56

Image 56
Contents Users Guide Users Guide As every cat owner knows, nobody owns a cat BitDefender Antivirus Scanner for Unices Table of Contents Uninstall Configuration file Testing BitDefenderReal life usage BitDefender integrationUpdates Frequently Asked Questions SupportProduct registration Best practicesBitDefender Antivirus Scanner for Unices Viii End User Software License Agreement End User Software License Agreement End User Software License Agreement Xii Typographical conventions PrefaceConventions used in this book Command AdmonitionsBook structure Request for Comments Description and features Description and features Why BitDefender? OverviewData Security Division Softwin Description Product features BitDefender Antivirus Scanner for UnicesKey Features Scanning mechanism More in the manualFeatures Installation Installation Hardware system requirements PrerequisitesSystem requirements Package naming convention Software system requirementsLinux convention Linux requirementsFreeBSD convention Installation Test the rpm and deb packages Package installationTest the package for integrity Test the self-extractable archive Test the FreeBSD tbz packageInstall the package Install the rpm packageInstall the deb package Install the self-extractable archiveAdditional parameters Installer Install the FreeBSD packageConfigures the quarantine directory Uninstall Uninstall the rpm packageUninstall the deb package Uninstall using the self-extractable archiveUninstall from the ports collection Uninstall the FreeBSD packageUninstall a package downloaded locally Using BitDefender Using BitDefender Configuration file System versus User configurationMore about triggered update Key DescriptionUsing07 BitDefender Regular users and quarantineUsing BitDefender Product registrationEicar online resources Testing BitDefenderScan an executable file Command output will be the following Scan an archiveScan a mailbox Tmp/mail.mbox Scan a regular file Real life usageVirus scanning Scan a directory Scan the entire system Scan the archives Actions on archivesScan the mailbox Using the log file ReportGet more information Display the virus listVirus submission Display the product versionDesktop integration Midnight CommanderBitDefender integration Do not break the last line Different installation pathKDE Konqueror Krusader Action on file in KonquerorROX-Filer Krusaders User ActionsPine Pine Information CenterWhat to do with infected emails This is how the screen should look likeExit Status Interval 1,254 Evolution BitDefender pipe bdscanpipeKMail Server integration Filter actions in KMailMailScanner Qmail-Scanner installationMailScanner installation Amavisd-new Change it to the following formAmavisd-new installation Using Updates Triggered updateRun the triggered update Regular updatesEdit the cron table Manual update Http proxyOrder to extract the updates Check the expiration date Product registrationTrial License License for home or personal use License for commercial use Best practices Best practices Getting help Getting help Frequently Asked Questions Getting help BitDefender Knowledge Base SupportSupport department Contact information Web addressesAddress Softwin GmbHRomania BitDefender LLCGetting help Manual Pages Manual Pages Options SynopsisDescription Manual Pages Actions Examples FilesBugs See alsoManual Pages Glossary Command line CookieDisk drive DownloadEvents False positiveFilename extension HeuristicMacro virus Mail clientNon-heuristic Packed programsPort Report fileScript Startup itemsUpdate VirusVirus definition Worm