sophie.savi 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. ##
  2. ## @l_prefix@/etc/sophie/sophie.cfg
  3. ##
  4. #############################################################################
  5. # Group options automatically activate/deactivate all options that belong #
  6. # to the group. You'll have to figure out what belongs where, sorry :) #
  7. # #
  8. # If you want to deactivate certain feature from a group, just set it to 0 #
  9. # but make sure group definitions do remain at the top of this file #
  10. #############################################################################
  11. # Executable files
  12. GrpExecutable: 1
  13. # All archive and compressed archive file formats (e.g. ZIP, UUE, etc)
  14. GrpArchiveUnpack: 1
  15. # File formats that contain an executable stub that automatically decompresses
  16. # the body of the file
  17. GrpSelfExtract: 1
  18. # File formats commonly in use on the internet
  19. GrpInternet: 1
  20. # Microsoft Office file formats
  21. GrpMSOffice: 1
  22. # File formats that do not fall into any of the above categories
  23. GrpMisc: 1
  24. # Any option that is part of a group is also included in this group
  25. # (NOTE: I have no idea what this really means :)
  26. GrpSuper: 0
  27. # Enables or disables disinfection of all files for which disinfection is
  28. # supported
  29. GrpDisinfect: 0
  30. #########################
  31. # #
  32. # Configuration options #
  33. # #
  34. #########################
  35. # Controls handling of Macintosh resounce and data fork files (on platforms
  36. # where these are supported). Settings are:
  37. #
  38. # 0 = Disabled
  39. # 1 = SOPHOS_DOS_FILES (enable scanning for Mac viruses)
  40. # 2 = SOPHOS_MAC_FILES (scan data fork files for DOS viruses)
  41. # 3 = SOPHOS_DOS_AND_MAC_FILES (mix :)
  42. #NamespaceSupport: 0
  43. # Enables full sweeping, which performs extensive fixed pattern matching as
  44. # well as the standard intelligent virus search. Turning on this option
  45. # might have severe performance implications.
  46. #FullSweep: 0
  47. # Controls the ability to scan inside supported types of dynamically
  48. # compressed executables.
  49. #DynamicDecompression: 1
  50. # Enables a fallback mechanism that has been deployed in the past when new
  51. # file structures are encountered. Sophos recommends that you keep this
  52. # option turned off.
  53. #FullMacroSweep: 0
  54. # Enables the intelligent scanning of OLE2 (Microsoft Office) format
  55. # documents. Sophos recommends that this option should be turned on.
  56. #OLE2Handling: 1
  57. # Microsoft Office documents that contain executable macros will usually have
  58. # a single bit in the file header set to 1 to indicate the presence of
  59. # executable code. Under normal circumstances macros contained in a file that
  60. # does not have this bit set are not able to execute. If this option is
  61. # turned off, the Virus Engine will scan only files with this template bit
  62. # set to 1. Sophos recommends that you keep this option turned on.
  63. #IgnoreTemplateBit: 1
  64. # This option enables the scanning of Microsoft Visual Basic for Applications
  65. # embedded in supported file types, like Office and Visio documents.
  66. #VBA3Handling: 1
  67. # This option enables the scanning of Microsoft Visual Basic for Applications
  68. # embedded in supported file types, like Office and Visio documents.
  69. #VBA5Handling: 1
  70. # Password-protected Office 95 documents are encrypted with a very simple
  71. # algorithm. Enabling this option causes the virus engine to break this
  72. # encryption to search for viruses.
  73. #OF95DecryptHandling: 0
  74. # Enables checking for files embedded in Mirosoft Help files.
  75. #HelpHandling: 1
  76. # Decompresses the text part of a VBA5 project before scanning. This area is
  77. # often corrupted, but can help positive identification of some viruses.
  78. #DecompressVBA5: 1
  79. # Enables the 16-bit x86 emulation engine, which assists in the detection of
  80. # polymorphic executable file viruses. Sophos recommends this option should be
  81. # turned on.
  82. #Emulation: 1
  83. # Enables the intelligent scanning of Win32/PE format files. This is the
  84. # standard format for Windows executable binaries such as .exe and .dll.
  85. #PEHandling: 1
  86. # Enables scanning of Excel formulas for known formula viruses. Formulas
  87. # occupy cells on the worksheet and should not be confused with macros.
  88. #ExcelFormulaHandling: 1
  89. # Enables the scanning of macros in PowerPoint presentations.
  90. #PowerPointMacroHandling: 1
  91. # Enables the scanning of files embedded within PowerPoint presentations.
  92. #PowerPointEmbeddedHandling: 1
  93. # Enables the scanning of VBA macros in Microsoft Project.
  94. #ProjectHandling: 1
  95. # Enables scanning inside ZIP archives.
  96. #ZipDecompression: 1
  97. # Enables decompression of Arj archives.
  98. #ArjDecompression: 1
  99. # Enables decompression of RAR archives.
  100. #RarDecompression: 1
  101. # Enables the virus engine to decode EEUncoded files. The UUEncode portion
  102. # must start within the first 4k of the document.
  103. #UueDecompression: 1
  104. # Enables decompression of Gzipped archives.
  105. #GZipDecompression: 1
  106. # Enables scanning inside UNIX tar archives.
  107. #TarDecompression: 1
  108. # Enables decompression of Cmz archives.
  109. #CmzDecompression: 1
  110. # Contols the ability to extract files from BinHex archives.
  111. #HqxDecompression: 1
  112. # Controls the ability to look inside MacBinary archives.
  113. #MbinDecompression: 1
  114. # Controls SAVI's ability to scan inside certain types of container file.
  115. # Sophos recommends that this options should be turned on.
  116. #LoopBackEnabled: 1
  117. # Contols the maximum number of times the engine will recurse into archives
  118. # when they are found (e.g. when a zip file is compressed within another zip
  119. # file). The maximum value is 100, but SAVI internally has some extra levels
  120. # of recursion to cover internal data streams found within some file types.
  121. #MaxRecursionDepth: 16
  122. # Enables decompression of Lha archives.
  123. #Lha: 1
  124. # Enables the virus engine to search in supported types of self-extracting
  125. # archive.
  126. #SfxArchives: 1
  127. # Enables decoding of files encoded with the Microsoft TNEF format, used by
  128. # some mail client applications.
  129. #TnefAttachmentHandling: 1
  130. # Controls the ability to scan inside files compressed with the Microsoft
  131. # compression utility.
  132. #MSCompress: 1
  133. # Enables decompression of Microsoft Cabinet files (.cab) (Partial files at
  134. # the beginning and end of multi-part cabinet files will not be fully
  135. # scanned
  136. #MSCabinet: 1
  137. # Applies to Microsoft Office and other OLE2 format files. When this option is
  138. # enabled, calls to DisinfectFile() all macros present in the document are
  139. # deleted, regardless of whether or not they are viral.
  140. #DeleteAllMacros: 0
  141. # Enables the scanning of encoded VBScript files.
  142. #Vbe: 1
  143. # Some executable file viruses can be removed from files fairly safely. This
  144. # option enables that process. Sophos recommends that infected executables are
  145. # replaced from the original installation disks as soon as possible.
  146. #ExecFileDisinfection: 0
  147. # Enables the scanning of Microsoft Visio files.
  148. #VisioFileHandling: 1
  149. # Enables decoding and scanning inside a MIME encoded message block.
  150. #Mime: 1
  151. # Enables the detection of macro viruses within Microsoft Office documents
  152. # saved in ActiveMime document format.
  153. #ActiveMimeHandling: 1
  154. # Causes the entire project containing any viral macros to be removed during
  155. # disinfection.
  156. #DelVBA5Project: 0
  157. # Enables the handling of scrap objects that are used in the transfer of data
  158. # between certain applications.
  159. #ScrapObjectHandling: 1
  160. # Deals with another type of data within Office documents.
  161. #SrpStreamHandling: 1
  162. # Controls the ability of the engine to understand Microsoft Office 2001
  163. # files (Macintosh only)
  164. #Office2001Handling: 1
  165. # Enables scanning inside UPX-compressed self-extracting executable archives.
  166. #Upx: 1
  167. # Enables the scanning of Palm Pilot format files (.prc).
  168. #PalmPilotHandling: 1
  169. # Controls the PDF file interpretation module.
  170. #Pdf: 1
  171. # Enables scanning for objects that may be embedded inside Rich Text FOrmat
  172. # files.
  173. #Rtf: 1
  174. # Controls the module that optimises scanning in HTML files.
  175. #Html: 1
  176. # Controls the module that interprets ELF binary files. This format is used
  177. # for many Linux and FreeBSD executable files.
  178. #Elf: 1
  179. # Enables the scanning of WordBasic.
  180. #WordB: 1
  181. # Enables scanning of files contained within Outlook Express mailboxes.
  182. #OutlookExpress: 1
  183. # FIXME: Well, I have some idea...
  184. #Java: 1
  185. # FIXME: Well, I have some idea...
  186. #Access: 1
  187. # FIXME: No idea what this is used for
  188. #AppleSingle: 0
  189. # FIXME: No idea what this is used for
  190. #VbFiltering: 1
  191. #######################################################
  192. # #
  193. # DO NO SET/USE ANY OF THESE CONFIGURATION OPTIONS!!! #
  194. # #
  195. #######################################################
  196. # The passed string defines the full path name of the directory in which the
  197. # main virus data file is located. The name should not have a trailing
  198. # directory separator character.
  199. #VirusDataDir:
  200. # The passed string defines the name of the virus data file. This name should
  201. # not include a directory component (this is defined by the VirusDataDir
  202. # setting) or a file extension. For example, if the main virus data file name
  203. # is vdl.dat then this string should be passed as vdl.
  204. #VirusDataName:
  205. # The passed string defines the full path name of the directory in which SAVI
  206. # should search for IDE files.
  207. #IdeDir: