Sophos Quarantine

0 views
Skip to first unread message

Kathy Douds

unread,
Aug 5, 2024, 8:54:52 AM8/5/24
to gensdogmonsle
Alist of your quarantined messages is displayed. The sender, recipient, subject, time and date, and quarantine reason are shown for each message. You can use Advanced Search to filter your messages. See Advanced Search.

If you're waiting for an important email, check your Self Service Portal Quarantine rather than waiting for the quarantine summary message, which may take time to arrive, depending upon the schedule configured by your admin.


Does anyone know how to find the quarantine manager on the Anti-Virus endpoint? Sophos Central (online cloud manager portal) indicates there are files in the quarantine that need to be removed, but we cannot locate the quarantine manager on the workstation.


What steps should I take now to further scan and protect my system, and is there any way of knowing if any harm has been done? Also - Do you have any idea how these programs made it onto my computer in the first place? I have not downloaded anything which would have warranted these new files being on my system.


Please find attached the requested logs. I am including two Malwarebytes logs; one which indicated the two detected malware items, and the second after the two items were quarantined with MWB, with no further detections. Adwcleaner did not detect anything, so no log.


Note: If threats are found in the computer memory, the scan stops. This is because further scanning could enable the threat to spread. You will be asked to click Start Cleanup to remove the threats before continuing the scan.


Please find attached the Sophos log; It didn't find any threats, just a few cookies. I am glad to hear that the one file (security check) seems to be a false positive. Any idea on the other file - what it might be and if it may have done any harm?


That DOES NOT mean the computer is infected. Once the scan has been completed it uploads the log to their Cloud service which then uses Artificial Intelligence to determine if in fact any of the traces are an infection or not.


AWS Infrastructure: The main cost driver is the number of EC2 instances running to scan your files. By default, one m5.large instance is allowed to run. Besides that, you also pay the usual AWS charges for EBS, SNS, SQS, CloudWatch.


S3 API: AWS charges every API call made to the S3 service. Typical API calls are: GetObject, DeleteObject, GetObjectTagging, and PutObjectTagging. Keep in mind that you also pay a monthly fee for every tag.


bucketAV powered by ClamAV can scan files up to 2 GB in size. The file has to fit into memory as well. Our recommended instance type m5.large comes with enough memory to scan files up to 2 GB in size.


bucketAV powered by Sophos is able to scan files up to 5 TB in size, which is the maximum object size limit by S3. Please note, by default the VolumeSize parameter is set to 32 GiB. Make sure to increase the VolumeSize parameter as objects are downloaded to the volume so they can be scanned.


The EICAR Standard Anti-Virus Test File is the gold standard for testing antivirus solutions. Unfortunately, your local antivirus solution on your computer will likely quarantine the EICAR Standard Anti-Virus Test File before you can upload it to S3. The following steps upload an EICAR Standard Anti-Virus Test File outside your local machine.


Instead of configuring S3 to send events to SQS, you can create an SNS topic and configure S3 to publish events to the SNS topic. You can add as many subscribers to this topic as you wish. Each subscriber will get a copy of the events published from S3.


bucketAV powered by ClamAV scans all file types which do not exceed the maximum file size of 2 GB. On top of that, bucketAV looks into more details for some file types like PDF, ZIP, Excel, Word, and many more. Check out ClamAV File Types for more details.


The ClamAV engine uses a signature-based approach and only detects malware that ClamAV includes in the signatures database. If new malware appears, the engine will not detect it until the new signature is added to the database.


The Sophos engine combines a signature-based approach with generic malware detection based on Sophos Behavioural Genotype Detection. Even if a new malware appears, the chances are high that the engine can still detect it.


Sophos Central web console reports a PC with medium severity alert "Malware or potentially unwanted applications in quarantine". The potentially unwanted application (PUA) in question has been since added to the global Sophos whitelist is no longer triggering any new alerts. However, this particular alert got stuck and can not be cleared using normal methods.


The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.


Outbreak Filters protect your network from large-scale virus outbreaks and smaller, non-viral attacks, such as phishing scams and malware distribution, as they occur. Unlike most anti-malware security software, which cannot detect new outbreaks until data is collected and a software update is published, Cisco gathers data on outbreaks as they spread and sends updated information to your ESA in real-time to prevent these messages from reaching your users.


Cisco uses global traffic patterns to develop rules that determine if an incoming message is safe or part of an outbreak. Messages that may be part of an outbreak are quarantined until they are determined to be safe based on updated outbreak information from Cisco or new anti-virus definitions are published by Sophos and McAfee.


Cisco recommends that you enable Sophos or McAfee Anti-Virus in addition to Outbreak Filters to increase your defense against viral attachments. However, Outbreak Filters can operate independently without requiring Sophos or McAfee Anti-Virus to be enabled.


A message is quarantined when it contains file attachment(s) that meet or exceed the current Outbreak Rules and the thresholds set by mail administrators. Cisco publishes current Outbreak Rules to each ESA that has a valid feature key. Messages that may be part of an outbreak are quarantined until they are determined to be safe based on updated outbreak information from Cisco or new anti-virus definitions are published by Sophos and McAfee.


Outbreak Rules are published by Cisco Security Intelligence Operations (SIO), a security ecosystem that connects global threat information, reputation-based services, and sophisticated analysis of Cisco security appliances to provide stronger protection with faster response times. By default, your appliance checks for and downloads new outbreak rules every 5 minutes as part of the Service Updates.


When a quarantine exceeds the maximum space allocated to it, or if a message exceeds the maximum time setting, messages are automatically pruned from the quarantine to keep it within limits. Messages are removed on a first-in, first-out (FIFO) basis. In other words, the oldest messages are deleted first. You can configure a quarantine to either release (that is, deliver) or delete a message which must be pruned from a quarantine. If you choose to release messages, you may elect to have the subject line tagged with the text you specify which will alert the recipient that the message was forced out of quarantine.


Following release from the Outbreak quarantine, messages are re-scanned by the anti-virus module, and action is taken according to anti-virus policy. Depending on this policy, a message may be delivered, deleted, or delivered with viral attachments stripped. It is expected that viruses will often be found during re-scan after release from the Outbreak quarantine. The ESA mail_logs or message tracking can be consulted to determine if an individual message that was noted in the quarantine was found to be viral, and if and how it was delivered.


Before a system quarantine fills up, an alert is sent when the quarantine reaches 75% full, and another alert is sent when it reaches 95% full. The Outbreak Quarantine has an additional management feature that allows you to delete or release all messages that match a particular virus threat level (VTL). This allows for easy cleaning of the quarantine after an anti-virus update is received which addresses a particular virus threat.


When Outbreak Filters receives new/updates rules to elevate the Quarantine Threat Level for a particular type of message profile, you can be alerted via an email message sent to your configured alert email address. When a threat level falls below your configured threshold, another alert is sent. You can thus monitor the progress of the viral attachment(s). These emails are sent as "Info" emails.


State employees are often on the receiving end of email referred to as spam. These emails are not only a nuisance by cluttering the inbox, but they can also contain phishing attempts to harvest employee credentials or malicious payloads that could infect your PC. While not all spam messages are scams or malicious, it is important for all employees to be vigilant when receiving emails from an unknown source.




IOT has employed several tools to protect user mailboxes from receiving these kinds of messages. Emails detected to have phishing or malicious payloads are blocked and prevented from being delivered into the user mailbox. Messages determined to be general spam will be quarantined to be reviewed by the user.


Sophos PureMessage for Microsoft Exchange provides you with integrated email gateway and Exchange mail store protection. Guard against email-borne threats such as spam, phishing, viruses and spyware. Control information sent and received both internally and externally. Protect your company against the loss of confidential information or inappropriate use of the email system.

3a8082e126
Reply all
Reply to author
Forward
0 new messages