Page History
Add_workflow_for_techpubs | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Panel | ||||||
---|---|---|---|---|---|---|
In this section:
|
Warning | ||||
---|---|---|---|---|
This page does not apply to
|
Overview
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
- Sophos® Server Protection for Virtualization, Windows and Linux
- Sophos Endpoint Exploit Prevention
Note that these are Sophos marketing titles. Depending on the country and partner/reseller, the orderable product names may differ. For example, one partner website shows the product names as Sophos Server Protection for Windows, Linux and vShield.
Sophos antimalware software contains a Management Interface (Console+Server+Update Manager) that runs in a separate Windows Server and Antivirus (Agent) software that runs in the ASM/SBA.
Prerequisites
Info |
---|
We recommend running the Management Interface and Antivirus separately to conserve CPU processing in ASM/SBA. |
requires a separate off-board server (distinct and separate from theSpacevars 0 company
ASM) to be the execution platform of the Sophos Management Interface. This deployment model provides the following benefits:Spacevars 0 longproduct - A single management interface can manage multiple
's with the SBA.Spacevars 0 longproduct - The Sophos Agent minimizes the extra processing load on the
's ASM.Spacevars 0 longproduct
- A single management interface can manage multiple
Warning | ||||
---|---|---|---|---|
The deployment of the Sophos management interface on the
|
- Server is reachable to the ASM node, and ready to manage the antivirus installation.
- This document assumes installation on the ASM/SBA running on Windows Server 2008 R2 and Windows Server 2012 R2.
Supported Versions
Supported Versions
Name | Version | Supported |
---|---|---|
Sophos AutoUpdate | 5.7.220 | Sophos Limited |
Sophos Remote Management System | 4.1.0 | Sophos Limited |
Sophos Anti-Virus | 10.7.2.49 | Sophos Limited |
HitmanPro.Alert 3 (managed by Sophos) | 3.6.5.593 | |
Sophos CryptoGuard | 1.0.4.70 | Sophos Limited |
Sophos System Protection | 1.3.1 | Sophos Limited |
Sophos Endpoint Defense | 1.0.0.265 | Sophos Limited |
Installing the Approved Sophos Anti-Malware Solution to Protect
Spacevars | ||
---|---|---|
|
Note |
---|
You do not need to configure or modify the ASM in order to install Sophos. |
Info | ||||
---|---|---|---|---|
| ||||
The deployment of the approved Sophos anti-malware solution occurs almost entirely on a third party server, and is largely related to configuration settings on the management interface. For installation instructions not covered in this article, refer to Sophos documentation at https://docs.sophos.com/esg/enterprise-console/tools/deployment_guide/en-us/index.html. |
Here are the key steps performed when installing:
Task | Installation Instructions Covered in Sophos Deployment Guide | Installation Instructions unique to the
covered in this WIKI article | ||||
---|---|---|---|---|---|---|
Download the Enterprise Console installer | ||||||
Check the system requirements | ||||||
Create the accounts you need | ||||||
Prepare for installation | ||||||
Install the Enterprise Console | ||||||
Download security software | ||||||
Create computer groups | ||||||
Set up security policies | ||||||
Search for computers | ||||||
Prepare to protect computers | ||||||
Protect computers | ||||||
Check the health of your network | ||||||
Add Exclusions | ||||||
Activate Exploit Prevention | ||||||
Protect the ASM |
Installation Instructions Unique to the
Spacevars | ||
---|---|---|
|
The following are the steps to protect the
Spacevars | ||
---|---|---|
|
- Activating Exploit Prevention.
Protecting the ASM.
Adding Exclusions (AntiVirus File/Folder Scan Exclusion List)
Create the antivirus and Host Intrusion Prevention System (HIPS) policy with the file and folder exclusions recommended by Microsoft SBA deployments.
On-Access Scan Settings
C:\windows\SoftwareDistribution\Datastore\
C:\windows\SoftwareDistribution\Datastore\Logs\
C:\Windows\security\database\*.edb
C:\Windows\security\database\*.sdb
C:\Windows\security\database\*.log
C:\Windows\security\database\*.chk
C:\Windows\security\database\*.jrs
C:\Windows\System32\LogFiles\
C:\Windows\Microsoft.NET\assembly\GAC_MSIL\
- C:\UX\PUBLIC\LOGS\
- C:\Program Files\Microsoft Lync Server 2010\
- C:\Program Files\Microsoft Lync Server 2013\
C:\Program Files\Skype for Business Server 2015\
C:\Program Files\Common Files\Microsoft Lync Server 2010\
C:\Program Files\Common Files\Microsoft Lync Server 2013\
C:\Program Files\Common Files\Skype for Business Server 2015\
C:\Program Files\Microsoft SQL Server\MSSQL11.LYNCLOCAL\MSSQL\Binn\SQLServr.exe
C:\Program Files\Microsoft SQL Server\MSSQL12.LYNCLOCAL\MSSQL\Binn\SQLServr.exe
C:\Program Files\Microsoft SQL Server\MSSQL11.RTCLOCAL\MSSQL\Binn\SQLServr.exe
C:\Program Files\Microsoft SQL Server\MSSQL12.RTCLOCAL\MSSQL\Binn\SQLServr.exe
ABServer.exe
- UXSBA.exe
ClsAgent.exe
LysSvc.exe
MediationServerSvc.exe
ReplicaReplicatorAgent.exe
ReplicationApp.exe
RtcHost.exe
RTCSrv.exe
Fabric.exe
FabricDCA.exe
FabricHost.exe
Note that the preceding list of items can be saved in a file using a third party simple text editor and imported into exclusions.
Activating Exploit Prevention
Enter the Exploit Prevention credentials and activate it by performing the following steps:
Step | Action | ||||
---|---|---|---|---|---|
1 | Open the console and click View and then Update Managers. Caption | 0 | Figure | Select Update Managers | |
2 | In the Update managers pane, click the appropriate computer name and then View/Edit Configuration. Caption | 0 | Figure | 1 | Select View/Edit Configuration |
3 | Click Sources > Edit. When the Source Details dialog box opens, apply the credentials and then click OK. Caption | Figure | 1 | Enter Your Credentials | |
4 | In the Sophos Enterprise Console - Protect Computers Wizard, select Exploit Prevention, Sophos Clean and then click Next. Caption | 0 | Figure | 1 | Select Features |
Protecting the ASM
Step | Action | |||||||
---|---|---|---|---|---|---|---|---|
1 | Create a group. | |||||||
2 | Add the ASM node into the group. Note: Make sure to choose the Exclusion policy for the group and select Exploit prevent only. This will install the Agent software with Exploit Prevention and also apply the exclusions.caption 0 | Figure | 1 | Discover With Active Directory Caption | 0 | Figure | 1 | Discover Computers |
3 | To verify the installation, log on to the ASM node by establishing a Remote Desktop Connection. | |||||||
4 | Find and open the installed Sophos program and then navigate to Configure antivirus > On-access scanning > Exclusion to verify the exclusions you added in Adding Exclusions (AntiVirus File/Folder Scan Exclusion List). | |||||||
5 | Confirm that the Exploit prevention is active on the Agent by viewing its listing on View Product Information. |
Sophos Anti-Malware Operation Modes
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Continuous Operation:
Full-Scan Operation
|
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
https://docs.sophos.com/esg/enterprise-console/5-5/help/en-us/pdf/sec_55_qsgeng.pdf https://docs.sophos.com/esg/enterprise-console/5-5/help/en-us/pdf/sec_55_asgeng.pdf https://www.sophos.com/en-us/medialibrary/PDFs/documentation/sesc_10_ibpgeng.pdf?la=en |