How to disable Tamper Protection when managed from the Sophos Cloud
Disable tamper protection so local configuration changes can be made, or the software can be successfully uninstalled.
View ArticleThe number of 'Current' users is incorrect
The number of licensed users may be incorrect for a short time before syncing with the number listed in Reports and Manage Users.
View ArticleHow to resolve 'Potentially unwanted application detected' alerts in Sophos...
This article explains what to do next if there are alerts in the SophosCloud dashboard or you receive emails regarding 'Potentially unwanted application detected'.
View ArticleAutomatically created users consuming Sophos Cloud licences
In a workgroup environment or where local accounts are used to perform administrative tasks, to avoid Sophos Cloud licences being used on these account, it is recommended to create a single...
View ArticleRemoving Sophos Anti-Virus for Mac OS X
This article describes how to remove Sophos Anti-Virus for Mac.
View ArticleConfiguring HTTP/HTTPS proxy access with AD SSO with a Sophos UTM
This article explains how to HTTP/HTTPS proxy access with Active Directory Single Sign-on (AD SSO) with a Sophos UTM.
View ArticleHow To: Create an MST (Microsoft Transform) file
How To: Create an MST (Microsoft Transform) file
View ArticleUTM: Confd storage format version
This is a complete table of all Confd storage format version numbers since Astaro Security Gateway 7.0 GA up to the latest Sophos UTM product.
View ArticlePossible upgrade paths for Sophos Enterprise Console
Details on possible upgrade paths to the latest version of Sophos Enterprise Console
View ArticlePossible interactions between third-party products and the Web Protection...
Possible interactions between third-party products and the Web Protection feature in Endpoint Protection v. 10.0
View ArticleHow to deploy Sophos Endpoint Security and Control via Citrix Receiver
This article provides links to the documentation and scripts that you will need for creating the Sophos plug-in which Citrix Receiver requires for the delivery and deployment of Sophos Endpoint...
View ArticleAdvisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
This article provides details of Sophos support for Windows 8.1 and Windows Server 2012 R2
View ArticleRunning Sophos Endpoint Security and Control on Windows 8
This article describes support for Sophos Endpoint Security and Control on Windows 8. For information about Enterprise Console support on Windows Server 2012 see knowledgebase article 118312.
View ArticleAdvisory: Shh/Updater-B False positives
Numerous binaries are falsely detected as Shh/Updater-B.
View ArticleShh/Updater-B false positive: Recovery instructions for Sophos Enterprise...
You may have seen many false alerts on your computer or network. These false alerts also prevented the updating of Sophos products and some other products.
View ArticleSophos Anti-Virus for Linux: Using a custom built or unsupported kernel
The on-access scanning component of Sophos Anti-Virus for Linux requires several kernel modules to be installed and loaded.
View ArticleBest practice: designing sub-estates and role-based administration
This best practice article explains the relationship between sub-estates and roles. It also provides a starting point to designing sub-estates for your network. This article applies to Endpoint...
View ArticleOverview of Sophos device control in Endpoint Security and Control
This article describes the enhanced functionality available with Sophos device control in Endpoint Security and Control
View Article