This article provides instructions on how to configure malicious and suspicious behavior monitoring.
The following sections are covered:
Applies to the following Sophos product(s) and version(s)
Not product specific
If you use role-based administration* then, take note of the following before starting the procedure:
For more information, see Designing sub-estates and role-based administration.
To change the settings for detecting and reporting malicious behavior:
Check which anti-virus and HIPS policy is used by the group or groups of computers you want to configure.
If you've spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article. This is invaluable for us to ensure that we continually strive to give our customers the best information possible.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. For technical support post a question to the community. Or click here for new feature/product improvements. Alternatively for paid/licensed products open a support ticket.