The recommended Anti-Virus and HIPS settings, which are also set as the default for a new policy in a fresh installation of the console, are configured to provide the best protection as recommended by SophosLabs.
In regular use, Sophos recommends you run Anti-Virus and HIPS with the default settings. If additional on-access scanning is enabled, more system resources may be consumed, which could increase CPU usage when starting up.
The following sections are covered:
Applies to the following Sophos product(s) and version(s) Sophos Endpoint Security and Control 10.0Enterprise Console
How to enable Sophos On-access Scanning
How to configure Sophos On-access Scanning
How to enable Behavior Monitoring (HIPS)
How to configure Behavior Monitoring (HIPS)
This should be switched on in practically all circumstances. On-access scanning provides virus checking for your workstations. All files that are opened by the computer are checked before they are run.
On-write scanning is useful when tracking the source of infection on your network or if infected files are being written from over the internet. Files are written to your hard drive by your computer, or another computer will be checked when they are created. This will prevent a virus from spreading infected files over all open shares on your network.
On-write scanning is particularly useful in tracing a virus that is spreading across network shares, but you should also check the use of file sharing on your network, particularly the security of administrative shares.
On-rename scanning can be useful in similar circumstances to on-write scanning, except that the file involved will have been written as if it were a non-executable file, then renamed to make it executable. You should use on-rename scanning in the same circumstances as on-write scanning.
On-access scanning of archived files consumes a lot of memory. If on-access scanning of archived files is in use, every time such a file is viewed in Windows Explorer the contents of that file will be thoroughly checked. If the file is a self-extracting archive, the self-extractor component will be checked with the default on-access scanning settings. So checking the whole file, every time, with on-access scanning is unnecessary.
The increased memory and CPU usage caused by scanning archived files are wasted if the file is not then accessed. You should not need to use on-access scanning of archives on a workstation.
On-access scanning of archived files could be useful where a server is checking files before forwarding them to client workstations, for example, as part of through traffic. It should not be part of a standard network setup.
Potentially unwanted applications (PUAs) are programs whose use should be carefully managed. Some of them (for example, network access tools or instant messaging clients) may be useful to certain workers. If such a program is already in use on your network and Sophos then add it to the list of potentially unwanted applications, it will be blocked immediately.
Use scheduled scans to manage PUAs in an office environment. You can then decide which applications to allow, and which ones to block, without disrupting activity on your network.
An All files scan should be used to check that all components of a virus have been removed after disinfection, but it is not necessary for general use.
The standard Executables only scan checks all files with executable file extensions (for example, .DOC, .EXE, .LNK, .PIF). It also quickly checks the structure of all files and scans them if their format is that of an executable file.
When scanning all files on a computer, bear in mind:
In Endpoint 10 the setting Automatically clean up items that contain a virus/spyware for on-access scanning is enabled by default. Having this option enabled means there is less administrative work in dealing with malware reported to the console. This option also means you will not see items alerted in the Dashboard and/ or against the client computer's name in the console as the item of malware has been successfully dealt with. The alert history and reporting will include all events of malware detection though.
Note: Sophos strongly recommends leaving the follow-up action as Deny access only.
Malicious behavior has to be enabled for HIPs protection and is the parent option to suspicious behavior. Disabling malicious behavior switches HIPs off completely. Sophos recommends keeping this option checked.
Suspicious behavior detects items that behave like malware but can be authorized if you recognize the file/ program. By default, the option is enabled but the pass-through option of Alert only means the files will not be blocked.
Buffer overflow attacks can be a risk. However, as with suspicious behavior, if you recognize the file/ process that is running, then you can authorize the item.
Sophos Live Protection improves detection of new malware without the risk of unwanted detections. This is achieved by doing an instant lookup against the very latest known malware. When new malware is identified, Sophos can send out updates within seconds. To get this high level of protection, you should retain the default setting of Enabled.
For more information, see article Sophos Live Protection.
If you've spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article. This is invaluable for us to ensure that we continually strive to give our customers the best information possible.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. For technical support post a question to the community. Or click here for new feature/product improvements. Alternatively for paid/licensed products open a support ticket.