На мой взгляд гораздо проще и гибче чем настройка clamav+samba через vscan-clamav как показано сдесь diary.ru
Так как во-первых можно запускать по крону и не тормозить заливку файлов на шары, во вторых не надо править и перекомпилировать исходники самбы
Сам скрипт
#!/bin/bash
recently_accessed=`mktemp /tmp/filelist.XXXXX`
scan_dir='/home/samba/profiles/'
log_filename=/var/log/clamav/`date +%F`
if [ ! -f "$log_filename" ]; then
touch "$log_filename"
fi
find $scan_dir -type f -amin 5 -name '*' > $recently_accessed
echo "[!] Starting new scan at: `date +%Y-%m-%H-%M-%S`" >> $log_filename
clamscan -f $recently_accessed >> $log_filename
rm $recently_accessed
#714958) Однако ClamAV знает все пять полуосных вируса...
[E:\Programs\ANTIVIRAL\ClamAV\bin]clamscan.exe ../os2-viruses
../os2-viruses/Virus.OS2.AEP.a.zip: WIN.AEA FOUND
../os2-viruses/Virus.OS2.HLLP.7200.zip: Virus.DOS.HLLP.7200.Gen FOUND
../os2-viruses/Virus.OS2.Jiskefet.zip: WIN.JISKEFET FOUND
../os2-viruses/Virus.OS2.MyName.a.zip: OS2.MyName.a FOUND
../os2-viruses/Virus.OS2.Rexx.a.zip: OS2.Rexx.Cmp FOUND
----------- SCAN SUMMARY -----------
Known viruses: 775318
Engine version: 0.95.2
Scanned directories: 1
Scanned files: 5
Infected files: 5
Data scanned: 0.05 MB
Data read: 0.02 MB (ratio 2.00:1)
Time: 36.297 sec (0 m 36 s)
(К лучику [E:\Programs\ANTIVIRAL\ClamAV\bin]clamscan.exe ../os2-viruses
../os2-viruses/Virus.OS2.AEP.a.zip: WIN.AEA FOUND
../os2-viruses/Virus.OS2.HLLP.7200.zip: Virus.DOS.HLLP.7200.Gen FOUND
../os2-viruses/Virus.OS2.Jiskefet.zip: WIN.JISKEFET FOUND
../os2-viruses/Virus.OS2.MyName.a.zip: OS2.MyName.a FOUND
../os2-viruses/Virus.OS2.Rexx.a.zip: OS2.Rexx.Cmp FOUND
----------- SCAN SUMMARY -----------
Known viruses: 775318
Engine version: 0.95.2
Scanned directories: 1
Scanned files: 5
Infected files: 5
Data scanned: 0.05 MB
Data read: 0.02 MB (ratio 2.00:1)
Time: 36.297 sec (0 m 36 s)