The current version works in a passive mode only - ClamAV will log the detection but won't block access to the infected file. However, it's possible to perform special actions (eg. quarantine files) with the VirusEvent directive of clamd.
1. Run ClamAuth_load to load the kernel extension (you can edit the script to change or add more paths that will be monitored).
2. Add "ClamAuth yes" to your clamd.conf (ClamAV 0.97.4) or "ScanOnAccess yes" (ClamAV-devel)
3. Start clamd with root privileges ('sudo /usr/local/sbin/clamd')
If clamd properly connects to the driver, you should see a line like this in the log file:
ClamAuth: Driver version: 0.3, protocol version: 2
ClamAV is now monitoring the paths specified in ClamAuth_load.
If you have any questions or feedback about this module please send it to the ClamAV mailing list here: