Content that is created within Cloud CMS can be automatically checked for viruses. The Cloud CMS virus scanner hooks in prior to your content be written or modified within the system so that detection can filter out any bad content ahead of write. As such, nothing malicious will be written into Cloud CMS (and therefore, nothing malicious can be retrieved from Cloud CMS).
The Cloud CMS antivirus support is disabled by default but can be enabled at the platform level if you are a manager or administrator of your content platform.
Simply go under Platform > Platform Settings and then select the checkbox for "Enable Antivirus" checks. Save your changes and from that point forward, all content that you upload to Cloud CMS will have an antivirus check performed.
Bear in mind that your upload performance will be impacted when Antivirus checking is enabled. Cloud CMS performs the check ahead of write to the DB so there is some extra time incurred with every upload.
The Hosted or SaaS version of Cloud CMS includes Antivirus with all of its subscriptions. Simply follow the steps above to enable Antivirus for your platform.
On-premise installations have the option to configure and launch their own Cloud CMS Antivirus Server. This is a container that Cloud CMS ships which provides an HTTP endpoint for virus scanning. Files submitted to the Antivirus Server are checked for viruses and a status message is returned.
A separate server is used for this so as to provide a few advantages:
- It reduces the runtime CPU demand on the API servers, allowing them to focus on their primary objective (which is to service incoming requests and/or process background jobs)
- It allows you to scale your Antivirus Servers according to demand for that specific function. You may opt to run a single Antivirus server or many servers, depending on your need.
The Cloud CMS Antivirus Server runs Clam AV behind the scenes. A daemon process runs that is automatically kept up to date with the latest virus definitions (as they become available).
We recommend further reading on the following: