forked from jamf/Jamf-Nation-Scripts
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathrunClamXavScan.sh
More file actions
131 lines (124 loc) · 5.47 KB
/
runClamXavScan.sh
File metadata and controls
131 lines (124 loc) · 5.47 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
#!/bin/sh
####################################################################################################
#
# Copyright (c) 2010, JAMF Software, LLC
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions and the following disclaimer in the
# documentation and/or other materials provided with the distribution.
# * Neither the name of the JAMF Software, LLC nor the
# names of its contributors may be used to endorse or promote products
# derived from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY JAMF SOFTWARE, LLC "AS IS" AND ANY
# EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL JAMF SOFTWARE, LLC BE LIABLE FOR ANY
# DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
# (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
# ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
####################################################################################################
#
# SUPPORT FOR THIS PROGRAM
#
# This program is distributed "as is" by JAMF Software, LLC's Resource Kit team. For more
# information or support for the Resource Kit, please utilize the following resources:
#
# http://list.jamfsoftware.com/mailman/listinfo/resourcekit
#
# http://www.jamfsoftware.com/support/resource-kit
#
# Please reference our SLA for information regarding support of this application:
#
# http://www.jamfsoftware.com/support/resource-kit-sla
#
####################################################################################################
#
# ABOUT THIS PROGRAM
#
# NAME
# runClamXavScan.sh -- Run ClamXav Anti-Virus Scan.
#
# SYNOPSIS
# sudo runClamXavScan.sh
# sudo runClamXavScan.sh <mountPoint> <computerName> <currentUsername> <scanPath> <quarantine>
#
# If there is a hardcoded value specified for the <scanPath> parameter or if there is a value
# passed to <scanPath> by the Casper Suite, only the specified path will be scanned. By
# default, the entire contents of the boot volume will be scanned.
#
# If there is a hardcoded value specified for the <quarantine> parameter, or if there is a
# value passed to <quarantine> from the Casper Suite, files will also be quarantined if they
# are found to be infected. The files will be quarantined only if passed one of the
# following values:
#
# "TRUE"
# "YES"
#
#
# DESCRIPTION
# This script will force sophos to perform a virus scan on the hard drive and will quarantine
# any infected files if desired. The default behavior of the script is to simply perform a
# scan of the drive and report back any infected files in the output of the script.
# Additionally, files can be quarantined if found to be infected with a virus.
#
# Please note that this script was created using the latest version of ClamXav available at the
# time of the script creation (1.1.1). Compatibility with versions of ClamXav created prior to
# and post 1.1.1 is unknown at this time.
#
####################################################################################################
#
# HISTORY
#
# Version: 1.0
#
# - Created by Nick Amundsen on November 5, 2008
#
####################################################################################################
#
# DEFINE VARIABLES & READ IN PARAMETERS
#
####################################################################################################
# HARDCODED VALUES FOR "SCANPATH" AND "QUARANTINE" ARE SET HERE
scanPath=""
quarantine=""
# CHECK TO SEE IF A VALUE WAS PASSED IN PARAMETER 4 AND, IF SO, ASSIGN TO "SCANPATH"
if [ "$4" != "" ] && [ "$scanPath" == "" ];then
scanPath=$4
fi
# CHECK TO SEE IF A VALUE WAS PASSED IN PARAMETER 5 AND, IF SO, ASSIGN TO "QUARANTINE"
if [ "$5" != "" ] && [ "$quarantine" == "" ];then
quarantine=$5
fi
####################################################################################################
#
# SCRIPT CONTENTS - DO NOT MODIFY BELOW THIS LINE
#
####################################################################################################
if [ "$scanPath" == "" ];then
case $quarantine in "true" | "TRUE" | "yes" | "YES")
echo "Performing quarantine ClamXav Anti-Virus scan on the boot volume..."
/usr/local/clamXav/bin/clamscan --infected --move=/Library/Application\ Support/ClamXav/Quarantine/ -r /;;
*)
echo "Perfomining ClamXav Anti-Virus scan on the boot volume..."
/usr/local/clamXav/bin/clamscan --infected -r /;;
esac
fi
if [ "$scanPath" != "" ];then
case $quarantine in "true" | "TRUE" | "yes" | "YES")
echo "Performing quarantine ClamXav Anti-Virus scan on $scanPath..."
/usr/local/clamXav/bin/clamscan --infected --move=/Library/Application\ Support/ClamXav/Quarantine/ -r "$scanPath";;
*)
echo "Perfomining ClamXav Anti-Virus scan on $scanPath..."
/usr/local/clamXav/bin/clamscan --infected -r "$scanPath";;
esac
fi