| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278 |
- ##
- ## @l_prefix@/etc/sophie/sophie.cfg
- ##
- #############################################################################
- # Group options automatically activate/deactivate all options that belong #
- # to the group. You'll have to figure out what belongs where, sorry :) #
- # #
- # If you want to deactivate certain feature from a group, just set it to 0 #
- # but make sure group definitions do remain at the top of this file #
- #############################################################################
- # Executable files
- GrpExecutable: 1
- # All archive and compressed archive file formats (e.g. ZIP, UUE, etc)
- GrpArchiveUnpack: 1
- # File formats that contain an executable stub that automatically decompresses
- # the body of the file
- GrpSelfExtract: 1
- # File formats commonly in use on the internet
- GrpInternet: 1
- # Microsoft Office file formats
- GrpMSOffice: 1
- # File formats that do not fall into any of the above categories
- GrpMisc: 1
- # Any option that is part of a group is also included in this group
- # (NOTE: I have no idea what this really means :)
- GrpSuper: 0
- # Enables or disables disinfection of all files for which disinfection is
- # supported
- GrpDisinfect: 0
- #########################
- # #
- # Configuration options #
- # #
- #########################
- # Controls handling of Macintosh resounce and data fork files (on platforms
- # where these are supported). Settings are:
- #
- # 0 = Disabled
- # 1 = SOPHOS_DOS_FILES (enable scanning for Mac viruses)
- # 2 = SOPHOS_MAC_FILES (scan data fork files for DOS viruses)
- # 3 = SOPHOS_DOS_AND_MAC_FILES (mix :)
- #NamespaceSupport: 0
- # Enables full sweeping, which performs extensive fixed pattern matching as
- # well as the standard intelligent virus search. Turning on this option
- # might have severe performance implications.
- #FullSweep: 0
- # Controls the ability to scan inside supported types of dynamically
- # compressed executables.
- #DynamicDecompression: 1
- # Enables a fallback mechanism that has been deployed in the past when new
- # file structures are encountered. Sophos recommends that you keep this
- # option turned off.
- #FullMacroSweep: 0
- # Enables the intelligent scanning of OLE2 (Microsoft Office) format
- # documents. Sophos recommends that this option should be turned on.
- #OLE2Handling: 1
- # Microsoft Office documents that contain executable macros will usually have
- # a single bit in the file header set to 1 to indicate the presence of
- # executable code. Under normal circumstances macros contained in a file that
- # does not have this bit set are not able to execute. If this option is
- # turned off, the Virus Engine will scan only files with this template bit
- # set to 1. Sophos recommends that you keep this option turned on.
- #IgnoreTemplateBit: 1
- # This option enables the scanning of Microsoft Visual Basic for Applications
- # embedded in supported file types, like Office and Visio documents.
- #VBA3Handling: 1
- # This option enables the scanning of Microsoft Visual Basic for Applications
- # embedded in supported file types, like Office and Visio documents.
- #VBA5Handling: 1
- # Password-protected Office 95 documents are encrypted with a very simple
- # algorithm. Enabling this option causes the virus engine to break this
- # encryption to search for viruses.
- #OF95DecryptHandling: 0
- # Enables checking for files embedded in Mirosoft Help files.
- #HelpHandling: 1
- # Decompresses the text part of a VBA5 project before scanning. This area is
- # often corrupted, but can help positive identification of some viruses.
- #DecompressVBA5: 1
- # Enables the 16-bit x86 emulation engine, which assists in the detection of
- # polymorphic executable file viruses. Sophos recommends this option should be
- # turned on.
- #Emulation: 1
- # Enables the intelligent scanning of Win32/PE format files. This is the
- # standard format for Windows executable binaries such as .exe and .dll.
- #PEHandling: 1
- # Enables scanning of Excel formulas for known formula viruses. Formulas
- # occupy cells on the worksheet and should not be confused with macros.
- #ExcelFormulaHandling: 1
- # Enables the scanning of macros in PowerPoint presentations.
- #PowerPointMacroHandling: 1
- # Enables the scanning of files embedded within PowerPoint presentations.
- #PowerPointEmbeddedHandling: 1
- # Enables the scanning of VBA macros in Microsoft Project.
- #ProjectHandling: 1
- # Enables scanning inside ZIP archives.
- #ZipDecompression: 1
- # Enables decompression of Arj archives.
- #ArjDecompression: 1
- # Enables decompression of RAR archives.
- #RarDecompression: 1
- # Enables the virus engine to decode EEUncoded files. The UUEncode portion
- # must start within the first 4k of the document.
- #UueDecompression: 1
- # Enables decompression of Gzipped archives.
- #GZipDecompression: 1
- # Enables scanning inside UNIX tar archives.
- #TarDecompression: 1
- # Enables decompression of Cmz archives.
- #CmzDecompression: 1
- # Contols the ability to extract files from BinHex archives.
- #HqxDecompression: 1
- # Controls the ability to look inside MacBinary archives.
- #MbinDecompression: 1
- # Controls SAVI's ability to scan inside certain types of container file.
- # Sophos recommends that this options should be turned on.
- #LoopBackEnabled: 1
- # Contols the maximum number of times the engine will recurse into archives
- # when they are found (e.g. when a zip file is compressed within another zip
- # file). The maximum value is 100, but SAVI internally has some extra levels
- # of recursion to cover internal data streams found within some file types.
- #MaxRecursionDepth: 16
- # Enables decompression of Lha archives.
- #Lha: 1
- # Enables the virus engine to search in supported types of self-extracting
- # archive.
- #SfxArchives: 1
- # Enables decoding of files encoded with the Microsoft TNEF format, used by
- # some mail client applications.
- #TnefAttachmentHandling: 1
- # Controls the ability to scan inside files compressed with the Microsoft
- # compression utility.
- #MSCompress: 1
- # Enables decompression of Microsoft Cabinet files (.cab) (Partial files at
- # the beginning and end of multi-part cabinet files will not be fully
- # scanned
- #MSCabinet: 1
- # Applies to Microsoft Office and other OLE2 format files. When this option is
- # enabled, calls to DisinfectFile() all macros present in the document are
- # deleted, regardless of whether or not they are viral.
- #DeleteAllMacros: 0
- # Enables the scanning of encoded VBScript files.
- #Vbe: 1
- # Some executable file viruses can be removed from files fairly safely. This
- # option enables that process. Sophos recommends that infected executables are
- # replaced from the original installation disks as soon as possible.
- #ExecFileDisinfection: 0
- # Enables the scanning of Microsoft Visio files.
- #VisioFileHandling: 1
- # Enables decoding and scanning inside a MIME encoded message block.
- #Mime: 1
- # Enables the detection of macro viruses within Microsoft Office documents
- # saved in ActiveMime document format.
- #ActiveMimeHandling: 1
- # Causes the entire project containing any viral macros to be removed during
- # disinfection.
- #DelVBA5Project: 0
- # Enables the handling of scrap objects that are used in the transfer of data
- # between certain applications.
- #ScrapObjectHandling: 1
- # Deals with another type of data within Office documents.
- #SrpStreamHandling: 1
- # Controls the ability of the engine to understand Microsoft Office 2001
- # files (Macintosh only)
- #Office2001Handling: 1
- # Enables scanning inside UPX-compressed self-extracting executable archives.
- #Upx: 1
- # Enables the scanning of Palm Pilot format files (.prc).
- #PalmPilotHandling: 1
- # Controls the PDF file interpretation module.
- #Pdf: 1
- # Enables scanning for objects that may be embedded inside Rich Text FOrmat
- # files.
- #Rtf: 1
- # Controls the module that optimises scanning in HTML files.
- #Html: 1
- # Controls the module that interprets ELF binary files. This format is used
- # for many Linux and FreeBSD executable files.
- #Elf: 1
- # Enables the scanning of WordBasic.
- #WordB: 1
- # Enables scanning of files contained within Outlook Express mailboxes.
- #OutlookExpress: 1
- # FIXME: Well, I have some idea...
- #Java: 1
- # FIXME: Well, I have some idea...
- #Access: 1
- # FIXME: No idea what this is used for
- #AppleSingle: 0
- # FIXME: No idea what this is used for
- #VbFiltering: 1
- #######################################################
- # #
- # DO NO SET/USE ANY OF THESE CONFIGURATION OPTIONS!!! #
- # #
- #######################################################
- # The passed string defines the full path name of the directory in which the
- # main virus data file is located. The name should not have a trailing
- # directory separator character.
- #VirusDataDir:
- # The passed string defines the name of the virus data file. This name should
- # not include a directory component (this is defined by the VirusDataDir
- # setting) or a file extension. For example, if the main virus data file name
- # is vdl.dat then this string should be passed as vdl.
- #VirusDataName:
- # The passed string defines the full path name of the directory in which SAVI
- # should search for IDE files.
- #IdeDir:
|