It has been recognised that there is a performance issue when accessing .pst files on remote network shares whilst Cryptoguard is active on the machine. Unfortunately at this time it has been defined that this setup is unsupported and unfortunately the only "Sophos" workaround is to exclude Microsoft Outlook from Cryptoguard's protection.
It is worth noting at this point that Microsoft themselves do not support or recommend storing .pst files on network shares as per the below Microsoft and Dell community and knowledgebase pages:
To this end Sophos can also not support an action that an Operating System vendor has requested against and therefore we must define that this is unsupported.
This article explains how to apply the workaround.
Applies to the following Sophos products and versions Central Windows Endpoint Intercept X 2.0.8Central Server Intercept X 2.0.3Exploit Prevention
You can exclude Outlook from exploit monitoring using the below steps:
Once the policy is received this will exclude Outlook from exploit monitoring.
An Alternative workaround is to store the .pst files locally as this should not cause any performance issues.
If you've spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article. This is invaluable to us to ensure that we continually strive to give our customers the best information possible.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. For technical support post a question to the community. Or click here for new feature/product improvements. Alternatively for paid/licensed products open a support ticket.