Close Menu
Linux All DayLinux All Day
    Facebook Bluesky Mastodon X (Twitter)
    Linux All DayLinux All Day
    • News
    • Operating Systems
      • Linux Distributions
      • Android-based OS
      • ChromeOS Alternatives
    • Software
      • Apps & Tools
      • Desktop Environments
      • Installation & Management
    • Tutorials
      • Linux Basic & Tips
      • System Optimization
      • Security & Privacy
    • Linux Gaming
      • Game News & Reviews
      • Emulators & Retro
      • Performance & Benchmarks
    • Comparisons
    Mastodon Bluesky Facebook
    Linux All DayLinux All Day
    Home - Tutorials - Security & Privacy - How to Install ClamAV on Fedora & Use the ClamTK GUI

    How to Install ClamAV on Fedora & Use the ClamTK GUI

    A simple, step-by-step guide to installing, configuring, and using the ClamAV antivirus engine and the user-friendly ClamTK graphical interface on Fedora Linux.
    By David - DistroDrifter Security & Privacy November 13, 20257 Mins Read
    Share Facebook Bluesky Twitter Threads Reddit LinkedIn Telegram Tumblr Email Copy Link Pinterest
    Follow Us
    Facebook Mastodon Bluesky X (Twitter)
    A Fedora desktop showing the ClamTK GUI scanning for viruses, illustrating how to install ClamAV on Fedora.
    linuxallday.com
    Share
    Facebook Twitter Bluesky Reddit Threads Tumblr Email Copy Link

    Why Bother with an Antivirus on Linux?

    Let’s address the elephant in the room: “Do I really need an antivirus on Linux?” It’s true that Linux is inherently more secure than other operating systems. The risk of a traditional desktop “virus” is extremely low.

    However, “low risk” doesn’t mean “no risk.” More importantly, using an antivirus on Linux isn’t just about protecting your machine. It’s about being a good digital citizen.

    You might need an antivirus to:

    • Scan Email Attachments: Prevent yourself from passing on a Windows-based threat to friends, family, or colleagues.
    • Check Downloads: Ensure that files, scripts, or programs you download aren’t carrying a malicious payload.
    • Protect a File Server: If you run a Samba or network share for other computers (especially Windows machines), scanning those files is critical.
    • Scan Other Partitions: If you dual-boot with Windows, you can scan your Windows partition from the safety of Linux.

    This is where ClamAV shines. It’s the open-source, industry-standard antivirus for Linux. It’s powerful, but it’s a command-line tool. That’s why we’ll also install ClamAV on Fedora along with ClamTK, its user-friendly graphical (GUI) counterpart. This guide will walk you through the complete installation, the critical configuration steps, and the basic setup of the ClamTK interface.

    Part 1: Installing ClamAV & ClamTK on Fedora

    First, we need to install all the necessary components. We won’t just install the scanner; we’ll install the daemon (for faster, on-demand scanning), the updater (to keep virus definitions current), and the GUI.

    Fedora’s repositories make this easy. Open your terminal and run the following command:

    Bash

    sudo dnf install clamav clamd clamav-updater clamtk
    

    Let’s break down what you just installed:

    • clamav: The core ClamAV engine and the clamscan command-line scanner.
    • clamd: The ClamAV daemon. This is a service that runs in the background, keeping the virus database in memory for much faster scanning.
    • clamav-updater: This package provides the freshclam service, which automatically updates your virus definitions.
    • clamtk: The graphical front-end that we will use to manage everything.

    Part 2: The Critical Configuration (Don’t Skip This!)

    A Quick Word of Warning:

    The following steps involve using sudo, editing system configuration files, and changing SELinux policies. While the commands are tested and straightforward, a simple typo can cause services to fail. If you are brand new to the Linux terminal or are not comfortable editing configuration files, please proceed with caution. Double-check every command before you press Enter.

    Out of the box, ClamAV will not work on Fedora. The default configuration files are just samples, and Fedora’s security (SELinux) will block the services from running correctly. This section on how to configure ClamAV Fedora is the most important part of the tutorial.

    Step 2.1: Configure Freshclam (The Updater)

    The freshclam service needs its own configuration file. We must first copy the sample file to a real one.

    1. Copy the sample config:

      Bash

      sudo cp /etc/freshclam.conf.sample /etc/freshclam.conf
      
    2. Now, open the file with a text editor like nano:

      Bash

      sudo nano /etc/freshclam.conf
      
    3. Inside this file, you will see a single line at the top that says Example. You must comment out this line by placing a # symbol in front of it.
      • Change this:Example
      • To this:#Example
    4. Save the file and exit (Ctrl+O, Enter, then Ctrl+X in nano).

    Step 2.2: Configure ClamD (The Daemon)

    This step is Fedora-specific and crucial. We will not be editing the main clamd.conf. Instead, we will create a configuration file for the specific service we intend to use (clamd@scan), which lives in the /etc/clamd.d/ directory.

    1. Copy the sample config to the correct Fedora path:

      Bash

      sudo cp /etc/clamd.conf.sample /etc/clamd.d/scan.conf
      
    2. Now, open the new config file you just created:

      Bash

      sudo nano /etc/clamd.d/scan.conf
      
    3. This file is much larger, but we only need to make two changes:
      • First, just like before, comment out the Example line at the top:#Example
      • Second, clamd needs to know how to communicate with other applications (like ClamTK). Scroll down until you find the line LocalSocket. Uncomment it by removing the #.
      • Change this:#LocalSocket /run/clamd.scan/clamd.sock
      • To this:LocalSocket /run/clamd.scan/clamd.sock
    4. Save and exit the file (Ctrl+O, Ctrl+X).

    Step 2.3: The Fedora SELinux Hurdle

    This is the step that trips up everyone. By default, Fedora’s powerful SELinux security system will prevent ClamAV from scanning your files, even after you’ve configured it. We must tell SELinux that this is allowed.

    Run the following command to set the correct SELinux boolean (this may take a few seconds):

    Bash

    sudo setsebool -P antivirus_can_scan_system 1
    

    The -P flag makes this change persistent, so it will survive a reboot. Without this command, your services will fail to start.

    Part 3: First Update & Starting the Services

    Now that everything is configured, we can bring it all online.

    Step 3.1: Run the First Manual Update

    Let’s manually run freshclam for the first time to download the entire virus definition database. This can be over 150MB, so it may take a minute.

    Bash

    sudo freshclam
    

    You should see it downloading main.cvd, daily.cvd, and bytecode.cvd.

    Step 3.2: Enable and Start the ClamAV Services

    We need to enable two services: the freshclam service (for auto-updating) and the clamd service (for scanning).

    1. For the auto-updater:

      Bash

      sudo systemctl enable clamav-freshclam.service
      sudo systemctl start clamav-freshclam.service
      
    2. For the scanning daemon:

      Bash

      sudo systemctl enable clamd@scan.service
      sudo systemctl start clamd@scan.service
      

      (Note: We use clamd@scan.service, not clamd.service. This is the service that corresponds to the /etc/clamd.d/scan.conf file we just created.)

    3. You can verify they are running with the status command:
      Bash
      sudo systemctl status clamav-freshclam.service
      sudo systemctl status clamd@scan.service
      

      You should see active (running) in green for both.

    Part 4: Basic Setup: How to Use ClamTK (The Easy Way)

    With all the hard command-line work done, we can now switch to the simple graphical interface. Go to your application launcher and open ClamTK.

    You’ll be greeted with a very clean interface. Here’s how to get started.

    Step 4.1: Configure Basic Settings

    1. In the ClamTK window, click the “Settings” icon (or go to File > Preferences).
    2. This is where you’ll fine-tune the scanner. I highly recommend checking the following boxes:
      • Scan for PUA (Potentially Unwanted Applications): This expands the search beyond just viruses to include adware, “junkware,” and other annoying software.
      • Scan files larger than 20MB: By default, ClamAV skips large files to save time. It’s safer to scan everything.
      • Scan directories recursively: This is essential. It tells ClamTK to scan not just a folder, but every file and folder inside that folder.

    Step 4.2: Set Up Scheduled Scans

    The best antivirus is one you don’t have to think about.

    1. In the main ClamTK window, click the “Scheduler” icon.
    2. Schedule Definitions Updates: Click the “+” button under “Update your virus definitions” to set up a daily update. This is a good backup in case the freshclam service ever fails.
    3. Schedule a Scan: Click the “+” button under “Scan your home directory.” Set this to run “Weekly.” This will automatically scan your personal files (/home/username) for any threats every week.

    Step 4.3: How to Run a Manual Scan

    This is the easiest part and what you’ll do most often.

    • To scan a single file: Click “Scan a file” and choose the file (e.g., a .exe you downloaded).
    • To scan a directory: Click “Scan a directory”. This is perfect for checking your entire Downloads folder.
    • Check History: You can click the “History” icon to see a log of all past scans and their results.

    For more information on the project, you can visit the official CLAMAV HOMEPAGE or the CLAMTK PROJECT PAGE.

    You may also read :

      • How to Install ClamAV on Debian/Ubuntu & Use the ClamTK GUI

      • How to Install ClamAV on Arch Linux & Use the ClamTK GUI

      • How to Install ClamAV on openSUSE (Leap & Tumbleweed)

    Conclusion

    You now have a fully functional, auto-updating antivirus system running on your Fedora machine. The CLAMAV ENGINE (powered by clamd) provides fast, powerful scanning in the background, while ClamTK gives you an easy-to-use graphical interface to manage it.

    While you should always remain vigilant online, you’ve added a robust layer of security to your system, helping protect both yourself and others in your digital life.

    Disclaimer: This guide provides the tools and steps for installation. Always be cautious when removing files identified as threats. If in doubt, quarantine them first.


    What other security tools do you rely on in Fedora? Have you ever found a threat on your Linux machine with ClamAV? Let us know in the comments below!

    Follow on Mastodon Follow on Bluesky
    Share. Facebook Twitter Bluesky Reddit Threads Telegram Email Copy Link

    Related post

    How to Install ClamAV on openSUSE (Leap & Tumbleweed)

    November 13, 2025

    How to Install ClamAV on Arch Linux & Use the ClamTK GUI

    November 13, 2025

    How to Install ClamAV on Debian/Ubuntu & Use the ClamTK GUI

    November 13, 2025
    Leave A Reply Cancel Reply

    → Switch to Linux Today
    • Facebook
    • Twitter
    • Mastodon
    • Bluesky
    More From Linuxallday
    Beyond the Grid: Mastering the Zen Flow of Bryce Tiles
    Mozilla Confirms Full “AI Kill Switch” for Firefox, Arriving in Early 2026
    Rescuezilla Review 2025: The ‘Undo Button’ for Your Entire PC
    Tails OS Review 2025: The Ultimate Amnesic System for Total Privacy
    Facebook X (Twitter) Mastodon Bluesky Threads RSS
    • About Us
    • Cookie Policy
    • Terms & Conditions
    • Privacy Policy
    • Disclosure & Disclaimer
    • Contact
    • Our Authors
    • Cookie Policy (EU)
    © 2026 Designed by FeedCrux

    Type above and press Enter to search. Press Esc to cancel.

    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}