It's been a long time since I had to use this, but due to some recent cracker activity I reinstalled it via WHM on CentOS 6.
I expected to get an email report on anything it found, but so far haven't gotten anything. Since it takes up a lot of space and makes the server run slow, I'd like to manually run a scan via SSH. Then if I'm all clear I could just remove it.
I tried the instructions I found here, but running "freshclam" or "clamscan -r /home" just returned an error:
upcloud.com
I don't see any files with these names under /usr/ or /usr/bin/, either, so I'm not even sure if it's really installed.
Any suggestions on how to see if it's installed and running, how to run a manual scan, or how to configure it to get a regular report?
I expected to get an email report on anything it found, but so far haven't gotten anything. Since it takes up a lot of space and makes the server run slow, I'd like to manually run a scan via SSH. Then if I'm all clear I could just remove it.
I tried the instructions I found here, but running "freshclam" or "clamscan -r /home" just returned an error:

How to scan CentOS server for malware
Any system connected to the internet can become a target of malware and Linux cloud servers are subject to constant threat. Scanning your system for different types of unwanted programs can help identify issues, or at least give you the peace of mind for having a clean server. This guide goes...

I don't see any files with these names under /usr/ or /usr/bin/, either, so I'm not even sure if it's really installed.
Any suggestions on how to see if it's installed and running, how to run a manual scan, or how to configure it to get a regular report?