diff --git a/install/tpl/rspamd_antivirus.conf.master b/install/tpl/rspamd_antivirus.conf.master
index aa3d2cc9f252970ad246a6cafdefea639438f36e..8cbf404bad2d079d289e463169c630b39d01c771 100644
--- a/install/tpl/rspamd_antivirus.conf.master
+++ b/install/tpl/rspamd_antivirus.conf.master
@@ -1,27 +1,36 @@
 clamav {
     # If set force this action if any virus is found (default unset: no action is forced)
     #action = "reject";
+
     # Scan mime_parts separately - otherwise the complete mail will be transferred to AV Scanner 
     scan_mime_parts = true;
+
     # Scanning Text is suitable for some av scanner databases (e.g. Sanesecurity)
     scan_text_mime = true;
     scan_image_mime = true;
+    
     # If `max_size` is set, messages > n bytes in size are not scanned
     #max_size = 20000000;
+    
     # symbol to add (add it to metric if you want non-zero weight)
     symbol = "CLAM_VIRUS";
+    
     # type of scanner: "clamav", "fprot", "sophos" or "savapi"
     type = "clamav";
+    
     # For "savapi" you must also specify the following variable
     #product_id = 12345;
+
     # You can enable logging for clean messages
     #log_clean = true;
+
     # servers to query (if port is unspecified, scanner-specific default is used)
     # can be specified multiple times to pool servers
     # can be set to a path to a unix socket
     # Enable this in local.d/antivirus.conf
     #servers = "127.0.0.1:3310";
     servers = "/var/run/clamav/clamd.ctl";
+    
     # if `patterns` is specified virus name will be matched against provided regexes and the related
     # symbol will be yielded if a match is found. If no match is found, default symbol is yielded.
     patterns {
@@ -32,6 +41,7 @@ clamav {
       # symbol_name = "pattern";
       CLAM_PROTOCOL_ERROR = '^unhandled response';
     }
+    
     # `whitelist` points to a map of IP addresses. Mail from these addresses is not scanned.
     whitelist = "/etc/rspamd/antivirus.wl";
 }