Skip to main content

Free Linux Antivirus Setup Guide

·451 words·3 mins
Antivirus ClamAV Linux
Table of Contents
software - This article is part of a series.
Part 1: This Article

Although Linux is known for its security and stability, installing antivirus software is still a smart choice—especially when exchanging files with Windows systems or frequently downloading unknown files.

This guide shows how to set up free antivirus software on Linux, focusing on the widely used ClamAV.


🧩 Choosing a Free Antivirus Solution
#

Here are well-known free antivirus options for Linux:

  • ClamAV — Popular open-source antivirus supporting many Linux distros. Detects Linux and Windows malware.
  • Sophos Antivirus for Linux — A commercial security suite with a free version available for Linux.
  • Chkrootkit / Rkhunter — Rootkit detection utilities. Best used together with other antivirus tools.

For this guide, we choose ClamAV because it is open-source, reliable, and easy to configure for both personal and enterprise use.


📦 Installing ClamAV
#

Start by updating your system packages and installing ClamAV.

Ubuntu / Debian
#

sudo apt update
sudo apt install clamav clamav-daemon

CentOS / RHEL
#

sudo yum install epel-release
sudo yum install clamav clamav-update

Arch Linux
#

sudo pacman -S clamav

🔄 Updating the Virus Database
#

After installation, always update the ClamAV virus signature database:

sudo freshclam

Most systems run freshclam automatically, but you can also schedule it using cron.


⚙️ Configuring and Starting ClamAV
#

Enable the background scanning service (clamav-daemon):

sudo systemctl start clamav-daemon
sudo systemctl enable clamav-daemon

Check its status:

sudo systemctl status clamav-daemon

To perform lightweight scans using the running daemon, use:

clamdscan

🔍 Performing Manual Scans
#

ClamAV supports scanning files or directories manually.

Scan the entire system
#

sudo clamscan -r /

Scan a specific directory
#

sudo clamscan -r /path/to/directory

-r means recursive scanning.

Auto-remove infected files (optional)
#

sudo clamscan -r --remove /path/to/directory

Save scan results to a file
#

sudo clamscan -r /path/to/directory > /path/to/report.txt

⏰ Scheduling Automatic Scans
#

Use cron to run scans at scheduled times.

Edit system cron:

sudo crontab -e

Example: scan /home daily at 2AM:

0 2 * * * /usr/bin/clamscan -r /home --log=/var/log/clamav-scan.log

🧱 Additional Security Tools (Optional)
#

Combine ClamAV with rootkit detection for enhanced protection.

Installing chkrootkit
#

sudo apt install chkrootkit
sudo chkrootkit

Installing rkhunter
#

sudo apt install rkhunter
sudo rkhunter --check

These tools complement ClamAV by detecting kernel-level threats.


📁 Monitoring Logs
#

ClamAV logs are stored in:

/var/log/clamav/

View recent logs:

cat /var/log/clamav/clamav.log

Use the logs to analyze potential threats and verify scanning activity.


✅ Conclusion
#

Installing antivirus software—especially ClamAV—adds valuable protection to Linux. While Linux is inherently secure, regular scans and database updates help detect cross-platform threats and ensure safe file sharing.

By following this guide, you can confidently install, configure, and operate ClamAV for daily protection, supplemented with tools like chkrootkit and rkhunter for comprehensive security.

software - This article is part of a series.
Part 1: This Article

Related

Containerd:下一代Linux容器技术
·298 words·2 mins
Linux Linux Containerd Container
VXLAN: Revolutionizing Network Virtualization for Data Centers and Cloud
·720 words·4 mins
Linux Linux VXLAN
8款非常好用的漏洞扫描工具
·756 words·4 mins
Linux Linux Vulnerability Scanning