Skip to content
VPNshell
Menu
  • Home
  • VPN
  • Cloud
  • Security
  • Contact
  • About
    • Disclaimer
    • Privacy Policy
Menu

How to Install and Use ClamAV on Ubuntu

ClamAV is a powerful, free, and open-source antivirus solution for Unix-like operating systems, designed to protect your system from a wide range of malware threats, including viruses, worms, Trojan horses, and more. Known for its compatibility across platforms, ClamAV is particularly popular on Linux systems, making it an essential tool for users looking to secure their servers or workstations. With a robust virus detection engine and a frequently updated virus database, ClamAV offers reliable protection and is highly regarded by system administrators and cybersecurity professionals alike. ClamAV on Ubuntu is ideal for those managing web servers, personal computers, or networks, as it combines ease of use with extensive functionality to help maintain a safe and secure system environment.

In this tutorial, we’ll dive into the steps to install and use ClamAV on Ubuntu Server versions 22.04, 20.04, and 18.04. We’ll cover essential tasks, from updating the virus database to scanning files, folders, and emails for potential threats. By the end of this guide, you’ll have a solid understanding of how to set up and run ClamAV on Ubuntu Linux, along with tips on configuring automatic scans to keep your system protected on an ongoing basis. Whether you’re securing a personal system or overseeing an entire network, implementing ClamAV on Ubuntu is a critical step in strengthening your defense against malware on Linux.

Why ClamAV

ClamAV is widely regarded as one of the best antivirus solutions for Linux, and it is especially effective for Unix-based operating systems like Ubuntu. As a free and open-source tool, ClamAV provides essential malware protection without the burden of high resource usage, making it perfect for both personal and enterprise environments. It’s particularly appreciated for its lightweight design and extensive customization options, which allow users to tailor the software to meet their specific security needs. ClamAV works seamlessly across a range of Linux distributions and is frequently updated with new virus definitions, enabling it to detect and prevent threats such as viruses, worms, and Trojan horses with impressive reliability. So, is ClamAV good for Linux? Absolutely—its design, efficiency, and ongoing support make it an excellent choice for Linux users.

Another strength of ClamAV for Linux lies in its versatility. It can secure a single machine or handle multiple systems in a large-scale, cloud-based environment, making it invaluable for systems administrators managing complex infrastructures. Additionally, ClamAV’s extensive range of scanning options and custom configurations makes it ideal for tasks like file, directory, and email scanning, which are critical in multi-user systems or web servers. Its compatibility with automation tools also allows users to schedule scans regularly, ensuring continuous protection. For anyone asking, “Is ClamAV good for Linux?” the answer is clear: ClamAV provides a robust, adaptable, and reliable antivirus solution that fits seamlessly into both small and large-scale Linux setups, giving users peace of mind in a world of ever-evolving threats.

Prerequisites

Before jumping in, make sure you have:

  1. A running instance of Ubuntu Server 24.04, 22.04, or 20.04.
  2. A user with sudo privileges.

Ready? Let’s get this antivirus engine roaring!

How to Install ClamAV on Ubuntu Linux

Step 1: Install ClamAV on Ubuntu

First things first: installing ClamAV. Simply open your terminal, and let’s get started.

sudo apt update && sudo apt upgrade && sudo apt install clamav

Running this command installs ClamAV and all the necessary dependencies. Easy, right? But wait, we’re not done yet! Time to grab the latest virus definitions to keep your defenses up-to-date.

Step 2: Update the Virus Database

ClamAV isn’t a mind-reader—it relies on an updated virus database to detect malware. So, let’s update the database to arm ClamAV with the latest in virus-hunting tech.

sudo freshclam

Run this regularly or automate it with a cron job to ensure ClamAV stays sharp and aware of the newest threats.

Step 3: Scan Folders with ClamAV

Time to put ClamAV to work! This command scans public_html folders for any nasties hiding in your website directories. If you’re managing a public-facing website, keeping these folders clean is a must for security and SEO.

clamscan -r /home*/*/public_html

By scanning your public directories, you’re not only protecting visitors but also preventing any malware that could tank your search engine rankings. Talk about a two-birds-one-stone situation!

Make it a habit to scan all directories related to website files regularly. Nothing says “SEO nightmare” like a malware-infected website, right?

Step 4: Get to know the –infected, –remove, and –recursive wwitches

ClamAV comes with a handy set of switches that let you customize each scan. Here’s a rundown of the most useful ones:

  • --infected: Reports only infected files (no cleaning up here—just a status check).
  • --remove: Deletes infected files on the spot. Great for cleaning house but use with caution!
  • --recursive: Scans all subdirectories as well. Ideal for large, complex folder structures.

Here’s how to use these commands:

To scan and report infected files in the current directory:

clamscan --infected .

To scan and remove infected files:

clamscan --remove .

Want to go deeper? Use --recursive:

clamscan --recursive --infected .

Be careful with the --remove switch, especially if you’re not quite sure which files are infected. Trust us—there’s nothing worse than accidentally deleting important data.

Step 5: Use Regex to Scan Specific Files

If you’re only interested in certain file types, regex is your friend! Use --include to scan specific file extensions, or --exclude to avoid certain files.

To scan only .txt files:

clamscan --include='.*\.txt$' /path/to/scan

Or, exclude .log files from your scan:

clamscan --exclude='.*\.log$' /path/to/scan

Using regular expressions like these can save you time and make sure ClamAV is only targeting the files you care about.

Step 6: Schedule Automatic Scans with ClamAV

Security isn’t a “one-and-done” deal—it requires ongoing effort! To keep your system constantly protected, set ClamAV to run automatic scans at regular intervals.

  1. Open the configuration file:

    sudo nano /etc/clamav/clamd.conf

  2. Look for the ScanInterval directive. Set it to your desired frequency in seconds. For example, to scan every 15 minutes, set it to 900.
  3. Save your changes, exit the editor, and restart ClamAV:

    sudo service clamav-freshclam restart

Step 7: Manually Scanning Specific Directories

Need a quick scan of a particular directory? ClamAV makes it easy to run one-off scans on any folder.

clamscan [OPTIONS] PATH

For example, to scan the current directory:

clamscan .

Use --recursive if you want ClamAV to check all subdirectories as well:

clamscan --recursive .

This flexibility is ideal for those times when you want to target a specific folder.

Step 8: Configure ClamAV

ClamAV comes with many configuration options for fine-tuning performance and security. Open the configuration file to explore more:

sudo nano /etc/clamav/clamd.conf

Experiment with these settings to find what works best for your server environment.

Step 9: Scanning Incoming Emails

If your server handles incoming emails, you can configure it to scan every message before it hits your inbox. For example, with Postfix, add these lines to your main.cf:

smtpd_virus_scan_incoming = yes
smtpd_virus_quarantine_enable = yes
smtpd_recipient_restrictions =
permit_mynetworks
[other restrictions]
check_policy_service unix:private/clamav-clamd

Every email will now be checked, with infected messages being quarantined for safe-keeping.

Troubleshooting ClamAV

Stuck? You can troubleshoot ClamAV using the logs stored at /var/log/clamav/clamd.log. From configuration issues to virus scanning activity, this file has your back.

Conclusion

ClamAV is a fantastic, free, and open-source option for keeping your Ubuntu system malware-free. From scanning website files to monitoring incoming emails, ClamAV covers a lot of ground. With regular updates, scans, and automatic schedules, you can sleep easy knowing your server is secure.

Remember, the key to robust system security is consistency. Set up a schedule, keep ClamAV updated, and scan frequently. Also, don’t forget to scan incoming emails for an extra layer of protection.

With ClamAV, you’re well on your way to keeping your Linux systems clean, fast, and virus-free. So, keep those defenses strong, and happy scanning!

FAQ

1. What is ClamAV, and why should I use it on Ubuntu?

ClamAV is a free and open-source antivirus tool tailored for Unix-based systems like Ubuntu. It’s widely used to detect malware, viruses, and Trojans, making it essential for system security and performance.

2. How often should I update the ClamAV database?

Ideally, update the ClamAV virus database daily, as new virus definitions are frequently added to keep up with emerging threats.

3. Can I automate ClamAV scans on Ubuntu?

Yes! You can schedule ClamAV to scan at regular intervals by editing the ClamAV configuration file and setting a ScanInterval.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • How to Get Your VPN Name on macOS
  • How to install CSF in Ubuntu 20.04 / 22.04 / 24.04
  • How to Set a Permanent MTU Size for VPN on Ubuntu
  • Why You Need a VPN for Macs: Boost Security, Privacy, and Access Everywhere
  • Securing Your Data on Public Wi-Fi: Why VPNs Are Essential in Today’s Digital World
©2025 VPNshell | Design: Newspaperly WordPress Theme