This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

On-Access scanning exclusions being ignored

I work for a company with about a 1000 computers all running Sophos and managed using SEC.  Not all of these computers are attached to the domain, some are in workgroups, but are still registered with SEC for management.

The problem is we utilise a system called FOG to push out software and updates to all of these computers via it's snapin functionality, this on the whole works fine.  The problem is I have a custom written compiled Auto-IT script that makes changes to the system hosts file on the workgroup computers, and updates the dns settings with a call to netsh.  This makes large scale changes much easier.

For reference, the FOG client stores the files it downloads to a temporary folder C:\Program Files\FOG\tmp

However.. Sophos blocks this script from running as either HIPS/FileMod-002 or HIPS/DrvDrop-A.  Since I wrote the script myself, I know exactly what it does and that it is not malicious in the sense I want to run it.  I have tried the following entries in the Windows Exclusions under the on-access scan settings in SEC as follows.

[folder] c:\program files\fog\tmp\

[folder] c:\progra~1\fog\tmp\

[file] c:\program files\fog\tmp\settingsupdate.exe

[file] c:\progra~1\fog\tmp\settin~1.exe

Individually or combinations of these entires do not work.  The update file is blocked and quarantined as soon as it is run.

To further check I compied the Eicar test file to the folder, renamed it, and ran that (obviously all that happens is a cmd window opens and closes) but again, Sophos jumped in and blocked it as Virus/spyware EICAR-AV-TEST even though the folder is supposed to be excluded from on-access scanning!

Any ideas?

:37425


This thread was automatically locked due to age.
Parents
  • Hello Darren,

    I did not mention in my previous post that exclusions might not apply to HIPS detections (i2i-ltd said that EICAR was detected as well and HIPS is not involved at this point). I haven't performed any tests and the docs don't refer to it but I guess the exclusions don't apply to HIPS (as the exclusions are applied by the file system filter driver).

    Furthermore, according to Understanding HIPS HPmal/ and HPsus/ Run-time Detections HPmal cannot be authorized so I suggest to contact Support - both to get an answer whether HIPS should honor the exclusions and to have the file (snmp.exe analyzed).

    Christian 

    :37635
Reply
  • Hello Darren,

    I did not mention in my previous post that exclusions might not apply to HIPS detections (i2i-ltd said that EICAR was detected as well and HIPS is not involved at this point). I haven't performed any tests and the docs don't refer to it but I guess the exclusions don't apply to HIPS (as the exclusions are applied by the file system filter driver).

    Furthermore, according to Understanding HIPS HPmal/ and HPsus/ Run-time Detections HPmal cannot be authorized so I suggest to contact Support - both to get an answer whether HIPS should honor the exclusions and to have the file (snmp.exe analyzed).

    Christian 

    :37635
Children
No Data