Table of contents
- About Sophos Endpoint Security and Control
- About the Home page
- Sophos groups
-
Sophos Anti-Virus
- About on-access and on-demand scanning
-
On-access scanning
- About on-access scanning best practice
- Configure on-access scanning
- Temporarily disable on-access scanning
- Configure on-access cleanup
- Reset scanned file checksums
- Specify on-access scanning file extensions
- Add, edit, or delete on-access scanning exclusions
- Specifying file names and paths of scanning exclusion items
- On-demand scanning
- Sophos Behavior Monitoring
- Sophos Live Protection
- Sophos Web Protection
- Sophos Application Control
- Authorizing items for use
- Managing quarantine items
- Cleaning up
- Configuring alerts
- Scanning log
- Sophos Application Control
- Sophos Device Control
- Sophos Data Control
- Sophos Web Control
-
Sophos Client Firewall
- Getting started with the firewall
-
Configuring the firewall
- About configuring the firewall
- Temporarily disable the firewall
- Allow email
- Allow the use of a web browser
- Allow FTP downloads
- Allow all traffic on a LAN
- Allow all file and printer sharing on a LAN
- Allow flexible control of file and printer sharing
- Block unwanted file and printer sharing
- Allow an application
- Block an application
- Block IPv6
- Turn the use of checksums on or off
- Turn blocking of modified processes on or off
- Filter ICMP messages
- Explanation of ICMP message types
- Restore the firewall default settings
- Working in interactive mode
- Firewall configuration files
-
Firewall rules
- About firewall rules
- About the order in which rules are applied
- About local network detection
- Global rules
-
Application rules
- Apply preset application rules
- Create an application rule
- Edit an application rule
- Copy an application rule
- Delete an application rule
- Change the order in which application rules are applied
- Allow applications to launch hidden processes
- Allow applications to use rawsockets
- Use checksums to authenticate applications
- Location awareness
- Firewall reporting
-
Firewall logging
- About the firewall log viewer
- Open the firewall log viewer
- Configure firewall logging
- Change how the firewall log viewer looks
- Customize the data format
- Hide or display columns in the firewall log viewer
- Reorder columns in the firewall log viewer
- Filter records in a firewall log
- Export all records from a firewall log
- Export selected records from a firewall log
- Sophos AutoUpdate
-
Sophos Tamper Protection
- About tamper protection on this computer
- Enable tamper protection
- Disable tamper protection
- Re-enable tamper protection
- About the tamper protection password
- Enter the tamper protection password to configure the software
- Change the tamper protection password
- Uninstall Sophos security software
- View the tamper protection log
-
Troubleshooting
- Updating has failed
- Threat not cleaned
- Virus/spyware fragment reported
- Threat partially detected
- Adware or PUA disappeared from quarantine
- Computer becomes slow
- Allow access to drives with infected boot sectors
- Unable to access areas of Sophos Endpoint Security and Control
- Recovering from virus side-effects
- Recovering from adware and PUA side-effects
- Password error reported
- "Service failure" error message
- Firewall log database is corrupted
- Glossary
- Technical support
- Legal notices