Data Control and DLP
Endpoint Security and Control
Mac Home Edition
Source of infection
Virus Removal Tool
Sophos UTM 9
Tweets by SophosSupport
Instant product alerts with Sophos SMS Mobile Notification Service
Created: 10 Apr 2019
This knowledge base article covers information about SMS Notification Services and how to subscribe to this service.
Sophos Diagnostic Utility (SDU): How to run from Sophos Central
Created: 4 Feb 2019
This knowledge base article provides further information on the process for running and obtaining an SDU when triggered from Sophos Central
How to delete orphaned [Numeric] Emotet windows services
Created: 22 Jan 2019
This article describes the steps to create a PowerShell script which should delete all the orphaned [Numeric] Emotet services left over after an infection.
Sophos Virus Removal Tool: Information about the Vault 7 and Fine Dining DLL hijacks
Created: 13 Mar 2017
There is no evidence that this publication had any material gain. Additional information within this article.
Why does the removal of SAV for Mac fail?
Created: 15 Aug 2015
To locate and troubleshoot why SAV for Mac Home Edition fails to uninstall watch the video below.
How to show all hidden files from Finder on a Mac
Created: 15 Aug 2015
This article describes information on how to find a file that is hidden or is located in a hidden folder.
Sophos Anti-Virus for Linux: Information about the respawn behaviour of savd and sophosmgmtd
Created: 11 Aug 2015
Description of the process respawn behaviour of savd and the controlling RMS process sophosmgmtd.
Sophos Bootable Anti-Virus: How to copy SBAV scan logs to a USB drive while SBAV is running
Created: 26 Jun 2015
This article provides an example of how you can copy a log from the default tmp folder to a mounted USB pen drive.
Free Sophos Anti-Virus for Linux Basic - FAQs
Created: 29 Jan 2015
This article addresses some of the frequently asked questions regarding Free Sophos Anti-Virus for Linux Basic.
Sophos UTM: A guide to recording UTM process usage using atop
Created: 4 Apr 2014
Tracking down what process is responsible for resource consumption or usage spikes