You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

277 lines
9.0 KiB

##
## @l_prefix@/etc/sophie/sophie.cfg
##
#############################################################################
# Group options automatically activate/deactivate all options that belong #
# to the group. You'll have to figure out what belongs where, sorry :) #
# #
# If you want to deactivate certain feature from a group, just set it to 0 #
# but make sure group definitions do remain at the top of this file #
#############################################################################
# Executable files
GrpExecutable: 1
# All archive and compressed archive file formats (e.g. ZIP, UUE, etc)
GrpArchiveUnpack: 1
# File formats that contain an executable stub that automatically decompresses
# the body of the file
GrpSelfExtract: 1
# File formats commonly in use on the internet
GrpInternet: 1
# Microsoft Office file formats
GrpMSOffice: 1
# File formats that do not fall into any of the above categories
GrpMisc: 1
# Any option that is part of a group is also included in this group
# (NOTE: I have no idea what this really means :)
GrpSuper: 0
# Enables or disables disinfection of all files for which disinfection is
# supported
GrpDisinfect: 0
#########################
# #
# Configuration options #
# #
#########################
# Controls handling of Macintosh resounce and data fork files (on platforms
# where these are supported). Settings are:
#
# 0 = Disabled
# 1 = SOPHOS_DOS_FILES (enable scanning for Mac viruses)
# 2 = SOPHOS_MAC_FILES (scan data fork files for DOS viruses)
# 3 = SOPHOS_DOS_AND_MAC_FILES (mix :)
#NamespaceSupport: 0
# Enables full sweeping, which performs extensive fixed pattern matching as
# well as the standard intelligent virus search. Turning on this option
# might have severe performance implications.
#FullSweep: 0
# Controls the ability to scan inside supported types of dynamically
# compressed executables.
#DynamicDecompression: 1
# Enables a fallback mechanism that has been deployed in the past when new
# file structures are encountered. Sophos recommends that you keep this
# option turned off.
#FullMacroSweep: 0
# Enables the intelligent scanning of OLE2 (Microsoft Office) format
# documents. Sophos recommends that this option should be turned on.
#OLE2Handling: 1
# Microsoft Office documents that contain executable macros will usually have
# a single bit in the file header set to 1 to indicate the presence of
# executable code. Under normal circumstances macros contained in a file that
# does not have this bit set are not able to execute. If this option is
# turned off, the Virus Engine will scan only files with this template bit
# set to 1. Sophos recommends that you keep this option turned on.
#IgnoreTemplateBit: 1
# This option enables the scanning of Microsoft Visual Basic for Applications
# embedded in supported file types, like Office and Visio documents.
#VBA3Handling: 1
# This option enables the scanning of Microsoft Visual Basic for Applications
# embedded in supported file types, like Office and Visio documents.
#VBA5Handling: 1
# Password-protected Office 95 documents are encrypted with a very simple
# algorithm. Enabling this option causes the virus engine to break this
# encryption to search for viruses.
#OF95DecryptHandling: 0
# Enables checking for files embedded in Mirosoft Help files.
#HelpHandling: 1
# Decompresses the text part of a VBA5 project before scanning. This area is
# often corrupted, but can help positive identification of some viruses.
#DecompressVBA5: 1
# Enables the 16-bit x86 emulation engine, which assists in the detection of
# polymorphic executable file viruses. Sophos recommends this option should be
# turned on.
#Emulation: 1
# Enables the intelligent scanning of Win32/PE format files. This is the
# standard format for Windows executable binaries such as .exe and .dll.
#PEHandling: 1
# Enables scanning of Excel formulas for known formula viruses. Formulas
# occupy cells on the worksheet and should not be confused with macros.
#ExcelFormulaHandling: 1
# Enables the scanning of macros in PowerPoint presentations.
#PowerPointMacroHandling: 1
# Enables the scanning of files embedded within PowerPoint presentations.
#PowerPointEmbeddedHandling: 1
# Enables the scanning of VBA macros in Microsoft Project.
#ProjectHandling: 1
# Enables scanning inside ZIP archives.
#ZipDecompression: 1
# Enables decompression of Arj archives.
#ArjDecompression: 1
# Enables decompression of RAR archives.
#RarDecompression: 1
# Enables the virus engine to decode EEUncoded files. The UUEncode portion
# must start within the first 4k of the document.
#UueDecompression: 1
# Enables decompression of Gzipped archives.
#GZipDecompression: 1
# Enables scanning inside UNIX tar archives.
#TarDecompression: 1
# Enables decompression of Cmz archives.
#CmzDecompression: 1
# Contols the ability to extract files from BinHex archives.
#HqxDecompression: 1
# Controls the ability to look inside MacBinary archives.
#MbinDecompression: 1
# Controls SAVI's ability to scan inside certain types of container file.
# Sophos recommends that this options should be turned on.
#LoopBackEnabled: 1
# Contols the maximum number of times the engine will recurse into archives
# when they are found (e.g. when a zip file is compressed within another zip
# file). The maximum value is 100, but SAVI internally has some extra levels
# of recursion to cover internal data streams found within some file types.
#MaxRecursionDepth: 16
# Enables decompression of Lha archives.
#Lha: 1
# Enables the virus engine to search in supported types of self-extracting
# archive.
#SfxArchives: 1
# Enables decoding of files encoded with the Microsoft TNEF format, used by
# some mail client applications.
#TnefAttachmentHandling: 1
# Controls the ability to scan inside files compressed with the Microsoft
# compression utility.
#MSCompress: 1
# Enables decompression of Microsoft Cabinet files (.cab) (Partial files at
# the beginning and end of multi-part cabinet files will not be fully
# scanned
#MSCabinet: 1
# Applies to Microsoft Office and other OLE2 format files. When this option is
# enabled, calls to DisinfectFile() all macros present in the document are
# deleted, regardless of whether or not they are viral.
#DeleteAllMacros: 0
# Enables the scanning of encoded VBScript files.
#Vbe: 1
# Some executable file viruses can be removed from files fairly safely. This
# option enables that process. Sophos recommends that infected executables are
# replaced from the original installation disks as soon as possible.
#ExecFileDisinfection: 0
# Enables the scanning of Microsoft Visio files.
#VisioFileHandling: 1
# Enables decoding and scanning inside a MIME encoded message block.
#Mime: 1
# Enables the detection of macro viruses within Microsoft Office documents
# saved in ActiveMime document format.
#ActiveMimeHandling: 1
# Causes the entire project containing any viral macros to be removed during
# disinfection.
#DelVBA5Project: 0
# Enables the handling of scrap objects that are used in the transfer of data
# between certain applications.
#ScrapObjectHandling: 1
# Deals with another type of data within Office documents.
#SrpStreamHandling: 1
# Controls the ability of the engine to understand Microsoft Office 2001
# files (Macintosh only)
#Office2001Handling: 1
# Enables scanning inside UPX-compressed self-extracting executable archives.
#Upx: 1
# Enables the scanning of Palm Pilot format files (.prc).
#PalmPilotHandling: 1
# Controls the PDF file interpretation module.
#Pdf: 1
# Enables scanning for objects that may be embedded inside Rich Text FOrmat
# files.
#Rtf: 1
# Controls the module that optimises scanning in HTML files.
#Html: 1
# Controls the module that interprets ELF binary files. This format is used
# for many Linux and FreeBSD executable files.
#Elf: 1
# Enables the scanning of WordBasic.
#WordB: 1
# Enables scanning of files contained within Outlook Express mailboxes.
#OutlookExpress: 1
# FIXME: Well, I have some idea...
#Java: 1
# FIXME: Well, I have some idea...
#Access: 1
# FIXME: No idea what this is used for
#AppleSingle: 0
# FIXME: No idea what this is used for
#VbFiltering: 1
#######################################################
# #
# DO NO SET/USE ANY OF THESE CONFIGURATION OPTIONS!!! #
# #
#######################################################
# The passed string defines the full path name of the directory in which the
# main virus data file is located. The name should not have a trailing
# directory separator character.
#VirusDataDir:
# The passed string defines the name of the virus data file. This name should
# not include a directory component (this is defined by the VirusDataDir
# setting) or a file extension. For example, if the main virus data file name
# is vdl.dat then this string should be passed as vdl.
#VirusDataName:
# The passed string defines the full path name of the directory in which SAVI
# should search for IDE files.
#IdeDir: