This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

On-Access scanning exclusions being ignored

I work for a company with about a 1000 computers all running Sophos and managed using SEC.  Not all of these computers are attached to the domain, some are in workgroups, but are still registered with SEC for management.

The problem is we utilise a system called FOG to push out software and updates to all of these computers via it's snapin functionality, this on the whole works fine.  The problem is I have a custom written compiled Auto-IT script that makes changes to the system hosts file on the workgroup computers, and updates the dns settings with a call to netsh.  This makes large scale changes much easier.

For reference, the FOG client stores the files it downloads to a temporary folder C:\Program Files\FOG\tmp

However.. Sophos blocks this script from running as either HIPS/FileMod-002 or HIPS/DrvDrop-A.  Since I wrote the script myself, I know exactly what it does and that it is not malicious in the sense I want to run it.  I have tried the following entries in the Windows Exclusions under the on-access scan settings in SEC as follows.

[folder] c:\program files\fog\tmp\

[folder] c:\progra~1\fog\tmp\

[file] c:\program files\fog\tmp\settingsupdate.exe

[file] c:\progra~1\fog\tmp\settin~1.exe

Individually or combinations of these entires do not work.  The update file is blocked and quarantined as soon as it is run.

To further check I compied the Eicar test file to the folder, renamed it, and ran that (obviously all that happens is a cmd window opens and closes) but again, Sophos jumped in and blocked it as Virus/spyware EICAR-AV-TEST even though the folder is supposed to be excluded from on-access scanning!

Any ideas?

:37425


This thread was automatically locked due to age.
Parents
  • Hi

    Sorry for the delay in responding here.

    Yes I have confirmed the exclusions have been applied to the client.  The path is correct, all deployed files are initially downloaded to the excluded folder before being run from there.  I've also tried applying the exclusions locally on a client to verify they are there.  Yes the full path appears in the log file.

    I'll look into the HPmal and HPsus ideas, in fact I'll bring it up in the next technical call I have with Sophos and update here.

    @DarrenS

    No I have not had a resolution to this as yet, If I ever do I will post it on here for future reference (good or bad).

    Thanks both for the input, appreciated :smileyhappy:

    :37977
Reply
  • Hi

    Sorry for the delay in responding here.

    Yes I have confirmed the exclusions have been applied to the client.  The path is correct, all deployed files are initially downloaded to the excluded folder before being run from there.  I've also tried applying the exclusions locally on a client to verify they are there.  Yes the full path appears in the log file.

    I'll look into the HPmal and HPsus ideas, in fact I'll bring it up in the next technical call I have with Sophos and update here.

    @DarrenS

    No I have not had a resolution to this as yet, If I ever do I will post it on here for future reference (good or bad).

    Thanks both for the input, appreciated :smileyhappy:

    :37977
Children
No Data