The recommended Anti-Virus and HIPS settings, which are also set as the default for a new policy in a fresh installation of the console, are configured to provide best protection as recommended by SophosLabs.
In normal use, Sophos recommends you run Anti-Virus and HIPS with the default settings. If additional on-access scanning is enabled, more system resources may be consumed, which could increase CPU usage when starting up.
Applies to the following Sophos product(s) and version(s) Sophos Endpoint Security and Control 10.0Enterprise Console
How to enable Sophos On-access Scanning
How to configure Sophos On-access Scanning
How to enable Behavior Monitoring (HIPS)
How to configure Behavior Monitoring (HIPS)
Important: Please refer to Knowledgebase article Default Anti-virus and HIPS policy and settings for full details of our latest recommended protection settings. These are set by default for all fresh installs.
The information below is provided to explain the main settings.
This should be switched on in practically all circumstances. On-access scanning provides virus checking for your workstations. All files that are opened by the computer are checked before they are run.
On-write scanning is useful when tracking the source of infection on your network, or if infected files are being written from over the internet. Files written to your hard drive by your computer, or another computer, will be checked when they are created. This will prevent a virus from spreading infected files over all open shares on your network.
On-write scanning is particularly useful in tracing a virus that is spreading across network shares, but you should also check the use of file sharing on your network, particularly the security of administrative shares.
On-rename scanning can be useful in similar circumstances to on-write scanning, except that the file involved will have been written as if it were a non-executable file, then renamed to make it executable. You should use on-rename scanning in the same circumstances as on-write scanning.
On-access scanning of archived files consumes a lot of memory. If on-access scanning of archived files is in use, every time such a file is viewed in Windows Explorer the contents of that file will be fully checked. If the file is a self-extracting archive, the self-extractor component will be checked with the default on-access scanning settings. So checking the whole file, every time, with on-access scanning is unnecessary.
The increased memory and CPU usage caused by scanning archived files is wasted if the file is not then accessed. You should not need to use on-access scanning of archives on a workstation.
On-access scanning of archived files could be useful where a server is checking files before forwarding them to client workstations, e.g. as part of through traffic. It should not be part of a standard network setup.
Potentially unwanted applications (PUAs) are programs whose use should be carefully managed. Some of them (e.g. network access tools or instant messaging clients) may be useful to certain workers. If such a program is already in use on your network, and it is then added by Sophos to the list of potentially unwanted applications, it will be blocked immediately.
Use scheduled scans to manage PUAs in an office environment. You can then decide which applications to allow, and which ones to block, without disrupting activity on your network.
An 'All files' scan should be used to check that all components of a virus have been removed after disinfection, but it is not necessary in general use.
The standard 'Executables only' scan checks all files with executable file extensions (e.g. '.DOC', '.EXE', '.LNK', '.PIF'). It also quickly checks the structure of all files, and scans them if their format is that of an executable file.
When scanning all files on a computer, bear in mind:
In Endpoint 10 the setting 'Automatically clean up items that contain a virus/spyware' for on-access scanning is enabled by default. Having this option enabled means there is less administrative work in dealing with malware reported to the console. This option also means you will not see items alerted in the Dashboard and/ or against the client computer's name in the console as the item of malware has been successfully dealt with. The alert history and reporting will include all events of malware detection though.
We strongly recommend that you leave the follow up action as 'Deny access only'.
Malicious behavior has to be enabled for HIPs protection and is the parent option to suspicious behavior. Disabling malicious behavior switches HIPs off completely. We recommend you keep this option checked.
Suspicious behavior detects items that behave like malware but can be authorized if you recognize the file/ program. By default the option is enabled but the pass-through option of 'Alert only' means the files will not be blocked.
If you are upgrading to Endpoint 10 and would like to know more about how your settings are migrated please see article 114528.
Buffer overflow attacks can be a risk. However, as with suspicious behavior, if you recognize the file/ process that is running, then you can authorize the item.
Sophos Live Protection improves detection of new malware without the risk of unwanted detections. This is achieved by doing an instant lookup against the very latest known malware. When new malware is identified, Sophos can send out updates within seconds. In order to get this high level of protection, you should retain the default setting of 'Enabled'.
For more information, see article 110921.
The following best protection settings have also been included in version 10.0.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. If you need technical support please post a question to our community. Alternatively for licensed products open a support ticket.