Estimated reading time: 4 minutes Updated: 3/6/2026 Created by: Botmaker Team

How does antivirus protection work in Botmaker?

In this article, you will learn how Botmaker's Malware protection operates, what protection it offers, and how it helps keep channels secure when working with files.



Malware protection automatically analyzes all files sent or received through a channel. Its purpose is to block the download of malicious files and reduce security risks for equipment and operations.



What does Malware protection do?


Every time a file, URLs or image is transmitted through a channel, regardless of the direction, the system executes an automatic scan before enabling its download. This allows for:

  • Blocking files, URLs and images that contain malware or known threats.
  • Preventing agents or users from downloading potentially harmful content.
  • Maintaining a security standard aligned with industry best practices.


If the file contains malware, you will not be able to download it and you will see a visual indicator alerting you about the detection.



How does the scan work?

The scan utilizes detection engines and malware signatures widely adopted in the market. The service is based on:

  • The updated version of ClamAV, a detection engine recommended by leading sector providers.
  • Additional security signatures, which significantly expand the threat detection rate.


These resources allow for maintaining over 99% coverage on known malware, ensuring a robust level of protection in enterprise messaging environments.


For technical reference, you can consult:

ClamAV:

https://docs.cloud.google.com/architecture/automate-malware-scanning-for-documents-uploaded-to-cloud-storage/deployment

Additional signatures:

https://github.com/extremeshok/clamav-unofficial-sigs

https://www.securiteinfo.com/



usage and cost within Botmaker

Malware protection is activated automatically, and you can track its usage under products and usage within Botmaker. There, you will find the cost related to file scanning. It works automatically and requires no additional actions. The analysis applies to:

  • Files, URLs and images sent by users.
  • Files, URLs and images sent by agents.
  • Files, URLs and images sent by bots.


The process is immediate and does not interfere with the flow of the conversation.

Here you can see a graphic demonstration of the scanning and virus detection results.


Example of analysis process:


Example of an approved file:


Example of a disapproved file:


What happens when a file is detected as malicious? When the system identifies a risky file:

  • The download is blocked.
  • The file is not shown as available.
  • An icon appears indicating that the content contains a threat.




Remember to visit our Help Center for further information.