Data Control and DLP
Endpoint Security and Control
Full disk encryption
Installer errors & information
Network Access Control (Compliance)
For Mac OS X
For Windows 95/98
For Windows NT
For Windows XP+
Dealing with malware
Sophos UTM 9
Tweets by SophosSupport
How to investigate C2/Generic-C Detection
Created: 13 Dec 2018
This article provides guidance on how to investigate C2/Generic-C detection on a Sophos protected endpoint.
Information on malware known as Poweliks
Created: 5 Sep 2014
Poweliks is the name of a malicious program that hides itself in the Windows registry.
Sophos Endpoint: Unable to remove Malware from the Recycle Bin
Created: 28 Jan 2013
Sophos Endpoint is unable to remove certain types of Malware from the Recycle Bin
Sophos Endpoint Security and Control: tmp.edb detected as malicious on Windows
Created: 19 Sep 2012
To resolve this issue, add the recommended exclusions by Microsoft.
Information on the Flame Worm
Created: 29 May 2012
The Flame worm (aka Flamer, Skywiper, W32/Flame-A) is a piece of malware that is getting a lot of media attention
How to purge the Volume Shadow Copies after a malware infection
Created: 26 Oct 2011
Step by step instructions on how to purge the Volume Shadow Copies after a malware infection.
Sophos Anti-Virus: How to remove Conficker
Created: 8 Mar 2010
This article describes how Conficker can be removed
Sophos Anti-Virus: Tracking and finding Conficker infections
Created: 24 Jul 2009
How to track and find Conficker infections on your network
Sophos Anti-Virus for Windows 2000+: removing W32/Confick and Mal/Conficker with Sophos Anti-Virus
Created: 23 Jan 2009
This article describes the actions of the viruses of the Confick family on your computers and explains how to remove them.
What is a potentially unwanted application (PUA)?
Created: 24 Apr 2006
This article explains what is PUA and its classifications.