Sophose Standalone Startup Guide
Sophose Standalone Startup Guide
Sophose Standalone Startup Guide
and Control
standalone startup guide
4 Technical support......................................................................................................................................9
5 Legal notices............................................................................................................................................10
2
standalone startup guide
3
Sophos Endpoint Security and Control
1. Using the web address and download credentials supplied by Sophos or by your system
administrator, go to the website and download the standalone installer for your version of
Windows.
2. Locate the installer in the folder where it was downloaded. Double-click the installer. In the
installer window, click Install to start the installation wizard.
3. On the first page of the Sophos Endpoint Security and Control installation wizard, click Next.
4. On the License Agreement page, click I accept the terms in the license agreement if you agree
to the terms and want to continue. Click Next.
5. On the Destination folder page, if necessary, change the folder to which Sophos Endpoint
Security and Control will be installed. Click Next.
6. On the Update source page, enter the location from which the computer will get updates.
Sophos recommends that you do this now.
a) In the Address box, select Sophos or, if your system administrator has given you an address,
enter that address.
b) In the Username and Password boxes, type the username and password that is needed to
access the update source provided by Sophos or by your system administrator.
c) If you access the network or internet via a proxy, select the Access the update source via a
proxy checkbox, click Next to enter the proxy details.
Note: To enter the update source later, select the I will enter these details later check box.
After the installation is complete, open Sophos Endpoint Security and Control and select
Configure updating.
By default, Sophos Endpoint Security and Control will update itself every 60 minutes, provided
the update source details are provided and the computer is connected to the network.
7. On the Select additional components to install page, select the Install Sophos Client Firewall
check box if you want to install firewall and click Next.
Note: Sophos Client Firewall is not currently supported on Windows 8.
8. On the Remove third-party security software page, select the Remove third-party security
software check box if you have a third-party anti-virus or firewall software installed and click
Next.
4
standalone startup guide
9. On the Ready to install Sophos Endpoint Security and Control page, click Next.
You should see the software being installed on your computer.
Important: Third-party security software removal does not, by default, remove the associated
update tools, because other third-party security software might still be using them. However,
if they are not being used, you can remove them via Control Panel.
10. On the last page of the install wizard, choose whether to restart the computer and click Finish.
You need to restart the computer:
To enable the firewall.
To complete the removal of third-party security software.
Installation of Sophos Endpoint Security and Control is complete when the Sophos Endpoint
Security and Control icon is displayed in the notification area, at the far right of the taskbar.
Icon Reason
5
Sophos Endpoint Security and Control
A notification appears along with one of the above icons that explains the cause.
For example, if on-access scanning is not enabled on your computer, the On-access scanning
disabled notification is displayed.
6
standalone startup guide
1. Open the program for which you want to allow network or internet access, such as a browser
or email program.
2. The firewall displays a message informing you that a new or modified application has requested
network access. Click Add the checksum to existing checksums for this application and click
OK.
3. The firewall displays a second message informing you that an application (such as your browser
or email program) has requested network access. Click Create rule for this application using
preset, and ensure you select the appropriate setting for the program (such as Browser, Email
Client) in the box, and click OK.
You can also edit the firewall configuration to enable programs access the network or internet in
any mode. For information, see the Sophos Endpoint Security and Control Help.
7
Sophos Endpoint Security and Control
1. In the notification area, at the far right of the taskbar, right-click the Sophos Endpoint Security
and Control icon to display a menu. Select Open Sophos Endpoint Security and Control.
2. In the Sophos Endpoint Security and Control window, in the Firewall section, click Configure
firewall.
The Firewall configuration dialog box is displayed.
From now on, the firewall does not display a message when it encounters unknown traffic. Instead,
it logs such traffic in its log. To enable balloon messages when firewall detects unauthorized traffic,
you must modify the firewall configuration. For more information, see Sophos Endpoint Security
and Control Help.
Note: You might sometimes need to switch back to interactive mode, for example, to run Windows
Update. After running your chosen program, Sophos recommends that you switch back to
non-interactive mode later.
8
standalone startup guide
4 Technical support
You can find technical support for Sophos products in any of these ways:
Visit the SophosTalk community at community.sophos.com/ and search for other users who are
experiencing the same problem.
Visit the Sophos support knowledgebase at www.sophos.com/en-us/support.aspx.
Download the product documentation at www.sophos.com/en-us/support/documentation/.
Send an email to [email protected], including your Sophos software version number(s),
operating system(s) and patch level(s), and the text of any error messages.
9
Sophos Endpoint Security and Control
5 Legal notices
Copyright 2012 Sophos Limited. All rights reserved. No part of this publication may be
reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording or otherwise unless you are either a valid licensee where the
documentation can be reproduced in accordance with the license terms or you otherwise have
the prior permission in writing of the copyright owner.
Sophos, Sophos Anti-Virus and SafeGuard are registered trademarks of Sophos Limited, Sophos
Group and Utimaco Safeware AG, as applicable. All other product and company names mentioned
are trademarks or registered trademarks of their respective owners.
ConvertUTF
Copyright 20012004 Unicode, Inc.
This source code is provided as is by Unicode, Inc. No claims are made as to fitness for any
particular purpose. No warranties of any kind are expressed or implied. The recipient agrees to
determine applicability of information provided. If this file has been purchased on magnetic or
optical media from Unicode, Inc., the sole remedy for any claim will be exchange of defective
media within 90 days of receipt.
Unicode, Inc. hereby grants the right to freely use the information supplied in this file in the
creation of products supporting the Unicode Standard, and to make copies of this file in any form
for internal or external distribution as long as this notice remains attached.
dtoa.c
The author of this software is David M. Gay.
Copyright 1991, 2000 by Lucent Technologies.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby
granted, provided that this entire notice is included in all copies of any software which is or includes
a copy or modification of this software and in all copies of the supporting documentation for such
software.
10
standalone startup guide
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED
WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR LUCENT MAKES ANY
REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY
OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
ICU
ICU version 1.8.1 or later
COPYRIGHT AND PERMISSION NOTICE
Copyright 19952008 International Business Machines Corporation and others
All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction,
including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or
sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
provided that the above copyright notice(s) and this permission notice appear in all copies of the
Software and that both the above copyright notice(s) and this permission notice appear in
supporting documentation.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS
INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT
OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM
LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE
OR PERFORMANCE OF THIS SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising
or otherwise to promote the sale, use or other dealings in this Software without prior written
authorization of the copyright holder.
All trademarks and registered trademarks mentioned herein are the property of their respective
owners.
Info-ZIP
Copyright 19902005 Info-ZIP. All rights reserved.
For the purposes of this copyright and license, Info-ZIP is defined as the following set of
individuals:
Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois, Jean-loup Gailly, Hunter
Goatley, Ed Gordon, Ian Gorman, Chris Herborth, Dirk Haase, Greg Hartwig, Robert Heath,
Jonathan Hudson, Paul Kienitz, David Kirschbaum, Johnny Lee, Onno van der Linden, Igor
Mandrichenko, Steve P. Miller, Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai
11
Sophos Endpoint Security and Control
Uwe Rommel, Steve Salisbury, Dave Smith, Steven M. Schweda, Christian Spieler, Cosmin Truta,
Antoine Verheijen, Paul von Behren, Rich Wales, Mike White
This software is provided as is, without warranty of any kind, express or implied. In no event
shall Info-ZIP or its contributors be held liable for any direct, indirect, incidental, special or
consequential damages arising out of the use of or inability to use this software.
Permission is granted to anyone to use this software for any purpose, including commercial
applications, and to alter it and redistribute it freely, subject to the following restrictions:
1. Redistributions of source code must retain the above copyright notice, definition, disclaimer,
and this list of conditions.
2. Redistributions in binary form (compiled executables) must reproduce the above copyright
notice, definition, disclaimer, and this list of conditions in documentation and/or other materials
provided with the distribution. The sole exception to this condition is redistribution of a
standard UnZipSFX binary (including SFXWiz) as part of a self-extracting archive; that is
permitted without inclusion of this license, as long as the normal SFX banner has not been
removed from the binary or disabled.
3. Altered versionsincluding, but not limited to, ports to new operating systems, existing ports
with new graphical interfaces, and dynamic, shared, or static library versionsmust be plainly
marked as such and must not be misrepresented as being the original source. Such altered
versions also must not be misrepresented as being Info-ZIP releasesincluding, but not limited
to, labeling of the altered versions with the names Info- ZIP (or any variation thereof,
including, but not limited to, different capitalizations), Pocket UnZip, WiZ or MacZip
without the explicit permission of Info-ZIP. Such altered versions are further prohibited from
misrepresentative use of the Zip-Bugs or Info-ZIP e-mail addresses or of the Info-ZIP URL(s).
4. Info-ZIP retains the right to use the names Info-ZIP, Zip, UnZip, UnZipSFX, WiZ,
Pocket UnZip, Pocket Zip, and MacZip for its own source and binary releases.
mt19937ar.c
Copyright (c) 19972002 Makoto Matsumoto and Takuji Nishimura. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. The names of its contributors may not be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
12
standalone startup guide
13
Sophos Endpoint Security and Control
14
standalone startup guide
strcasestr.c
Copyright 1990, 1993 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Chris Torek.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
15
Sophos Endpoint Security and Control
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Unicode
UNICODE, INC. LICENSE AGREEMENT DATA FILES AND SOFTWARE
Unicode Data Files include all data files under the directories http://www.unicode.org/Public/,
http://www.unicode.org/reports/, and http://www.unicode.org/cldr/data/. Unicode Software
includes any source code published in the Unicode Standard or under the directories
http://www.unicode.org/Public/, http://www.unicode.org/reports/, and
http://www.unicode.org/cldr/data/.
NOTICE TO USER: Carefully read the following legal agreement. BY DOWNLOADING,
INSTALLING, COPYING OR OTHERWISE USING UNICODE INC.'S DATA FILES ("DATA
FILES"), AND/OR SOFTWARE ("SOFTWARE"), YOU UNEQUIVOCALLY ACCEPT, AND
AGREE TO BE BOUND BY, ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT.
IF YOU DO NOT AGREE, DO NOT DOWNLOAD, INSTALL, COPY, DISTRIBUTE OR USE
THE DATA FILES OR SOFTWARE.
COPYRIGHT AND PERMISSION NOTICE
Copyright 19912007 Unicode, Inc. All rights reserved. Distributed under the Terms of Use in
http://www.unicode.org/copyright.html.
Permission is hereby granted, free of charge, to any person obtaining a copy of the Unicode data
files and any associated documentation (the "Data Files") or Unicode software and any associated
documentation (the "Software") to deal in the Data Files or Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies
of the Data Files or Software, and to permit persons to whom the Data Files or Software are
furnished to do so, provided that (a) the above copyright notice(s) and this permission notice
appear with all copies of the Data Files or Software, (b) both the above copyright notice(s) and
this permission notice appear in associated documentation, and (c) there is clear notice in each
16
standalone startup guide
modified Data File or in the Software as well as in the documentation associated with the Data
File(s) or Software that the data or software has been modified.
THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT
HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR
ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THE DATA FILES OR
SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising
or otherwise to promote the sale, use or other dealings in these Data Files or Software without
prior written authorization of the copyright holder.
UnRAR
The source code of UnRAR utility is freeware. This means:
1. All copyrights to RAR and the utility UnRAR are exclusively owned by the author - Alexander
Roshal.
2. The UnRAR sources may be used in any software to handle RAR archives without limitations
free of charge, but cannot be used to re-create the RAR compression algorithm, which is
proprietary. Distribution of modified UnRAR sources in separate form or as a part of other
software is permitted, provided that it is clearly stated in the documentation and source
comments that the code may not be used to develop a RAR (WinRAR) compatible archiver.
3. The UnRAR utility may be freely distributed. It is allowed to distribute UnRAR inside of other
software packages.
4. THE RAR ARCHIVER AND THE UnRAR UTILITY ARE DISTRIBUTED AS IS. NO
WARRANTY OF ANY KIND IS EXPRESSED OR IMPLIED. YOU USE AT YOUR OWN RISK.
THE AUTHOR WILL NOT BE LIABLE FOR DATA LOSS, DAMAGES, LOSS OF PROFITS
OR ANY OTHER KIND OF LOSS WHILE USING OR MISUSING THIS SOFTWARE.
5. Installing and using the UnRAR utility signifies acceptance of these terms and conditions of
the license.
6. If you dont agree with terms of the license you must remove UnRAR files from your storage
devices and cease to use the utility.
Thank you for your interest in RAR and UnRAR.
Alexander L. Roshal
17