Last updated on 2/27/2019.
The product is created to protect computers operating under -family OSes against viruses and other malware targeting different platforms. Dr.Web for UNIX File Servers protects enterprise networks that use file servers for -family OSes against viruses and other malware.
This section contains a list of features and other changes that released in the new version.
•Dr.Web solution for OS is no longer distributed;
•Scanning engine for amd64 platform;
•Removed dependency of packages for amd64 platform on 32-bit library;
•The utility for product post-install configuring is added; the post-install script for integration with is removed from distributive;
•Compiled VFS SMB modules for 3.6.0 and older are removed from distributive;
•Anti-virus engine is moved to separated package drweb-engine;
•Dr.Web ConfigD and Dr.Web Ctl components are distributed in separated packages;
•Full version of manuals for all Dr.Web for UNIX products is distributed with installed product.
Upgraded Used Libraries
• (to 1.0.2h);
•, , (to 1.68), (to 3.4.0).
Improved the Installation Program Operation
•The utility support is added in order to check integrity of installation package for OS;
•Improved the method of detection and automatically removing during installation of the installed Dr.Web products;
•Automatically sending of emails with installation results to root@localhost mailbox is added;
•Directory for help pages is changed (for OS only);
•ELF executables are signing for OS;
•Control script for Dr.Web ConfigD is renamed (for OS only).
Improved Operation with Threats and Quarantine
•Information about detected threats is saved when the product is restarted;
•Threat registry stores PID of the component detected the threat;
•Improved the caching information on file scanning;
•Repaired processing of file renaming during threat curing;
•Statistics on detected threats is sent to Dr.Web Cloud;
•Dr.Web Cloud service is used to check files;
•Dr.Web Clamd component supports ALLMATCHSCAN command of ClamAV protocol;
•Restricted the maximum number of tries to cure one file by anti-virus engine;
•The SpIDer Guard component supports blocking access to files until they are not scanned;
•The SpIDer Guard component supports wildcards in list of files and directories to be excluded from monitoring;
•The SpIDer Guard component supports named areas ("protected spaces") for monitoring of files in the file system.
Improved Operation with NSS Volumes
•Threat registry and quarantine for NSS volumes are joined with the general threat registry and quarantine;
•Settings of file names case sensitivity on NSS volumes are taken into account;
•The SpIDer Guard for NSS component supports wildcards in list of files and directories to be excluded from monitoring;
•Operation with NSS volumes quarantine when there is no valid license is supported.
Improved drweb-ctl Command Line Utility Operation
•Setting up the formatted output of threat list is supported for quarantine and threats commands;
•The option --Exclude is added for scan and remotescan commands in order to specify list of files excluded from scan (paths with wildcard are allowed);
•The option --Directory is added for threats command in order to filter list of detected threats on path to original file;
•The remotescan command supports Telnet protocol;
•Feature to specify relative path for restoring file from quarantine is added;
•Feature to out scan command results in JSON format is added;
•Feature to scan stdin stream by the netcheck command is added;
•The log command is added in order to show last records of product's log;
•Feature to get list of installed virus databases by baseinfo command is added;
•The following commands are removed: proxyscan, nss_threats, nss_quarantine.
Improved the Updates Receiving Procedure
•Configuration parameters that store paths to files of update servers list (DRL) are changed;
•Dr.Web Updater component operates in daemon mode;
•New procedure of update virus databases from update servers is supported.
Improved the Interaction with Central Protection Server
•Exchange with the server universal settings of components in the INI format is supported;
•X.509 certificate instead of public key is used during connection with the server;
•Transmit to the server SHA-1 and SHA-256 fingerprints of infected file for each detected threat.
•Improved detection of OS distributive where the product is installed;
•Realized sending information on used OS to Dr.Web Cloud;
•TLS 1.0 and 1.1 are not longer used.
The product can be installed from the official Dr.Web repository at or from universal installation package downloaded at .
Installation of the product will not change or invalidate your installed key file of installed previous version of a Dr.Web product. Settings of the upgraded Dr.Web product will be automatically converted, if it is necessary to support new features.
This section contains a list of known issues found in the new version.
•In the OS, when upgrading a version 11.0 of the product running in a central protection mode, to a new version 11.1, after the connection of the workstation with the server is established, the settings of the components whose settings were set on the central protection server are reset (and the components are stopped). To apply the correct component settings, you need to make changes to any settings for this workstation on the central protection server.
If you encounter any issues installing or using company products, before requesting for the assistance of the technical support, take advantage of the following options:
•Download and review the latest manuals and guides at .
•Read the frequently asked questions at .
•Browse the Dr.Web official forum at .
If you have not found solution for the problem, you can request direct assistance from Doctor Web company technical support by one of the following ways:
•Fill in the web form in the corresponding section at .
•Call by phone in Moscow: +7 (495) 789-45-86.
Refer to the official website at for regional and international office information of Doctor Web company.
© Doctor Web, 2019. All rights reserved
This document is the property of Doctor Web. No part of this document may be reproduced, published or transmitted in any form or by any means for any purpose other than the purchaser's personal use without proper attribution.
Dr.Web, SpIDer Mail, SpIDer Guard, CureIt!, CureNet!, AV-Desk, KATANA and the Dr.WEB logo are trademarks and registered trademarks of Doctor Web in Russia and/or other countries. Other trademarks, registered trademarks and company names used in this document are property of their respective owners.
In no event shall Doctor Web and its resellers or distributors be liable for errors or omissions, or any loss of profit or any other damage caused or alleged to be caused directly or indirectly by this document, the use of or inability to use information contained in this document.