Thanks for the response. If you allow some further comments ...
our antivirus solution is managed by our managed service provider [...] They claim that the malware is / was undetectable by our antivirus
Sounds like they don't like Sophos :smileytongue: - or are at least indifferent.
Can't really guess what's included in managed. If I would find some (alleged) infection I'd take it to Sophos Support immediately and (perhaps with their help) assess the situation. If there's an active component I'd try to obtain a sample and send it in. Most of the time Often you don't know how you contracted this something. Thus if your AV is from vendor A and you used a tool from vendor B to remove this something you are still unprotected against this threat (unless someone else sends a sample to A or A happens to acquire it by other means - not all vendors exchange samples).
Maybe I'm misunderstanding what you've said, but you've had something, your solution didn't catch it, we've taken care of it sounds a little bit, err, dogmatic. If they think another solution (perhaps the one they use) is better or preferable and they only reluctantly support "others" they should say so. As I said, I might be wrong - but I've seen/heard "we usually do A, B and C, or if you insist we can also do D (but actually we like A best)" more than once. Long term it doesn't really turn out all right for any party.
Just my two cents
Christian
Thanks for the response. If you allow some further comments ...
our antivirus solution is managed by our managed service provider [...] They claim that the malware is / was undetectable by our antivirus
Sounds like they don't like Sophos :smileytongue: - or are at least indifferent.
Can't really guess what's included in managed. If I would find some (alleged) infection I'd take it to Sophos Support immediately and (perhaps with their help) assess the situation. If there's an active component I'd try to obtain a sample and send it in. Most of the time Often you don't know how you contracted this something. Thus if your AV is from vendor A and you used a tool from vendor B to remove this something you are still unprotected against this threat (unless someone else sends a sample to A or A happens to acquire it by other means - not all vendors exchange samples).
Maybe I'm misunderstanding what you've said, but you've had something, your solution didn't catch it, we've taken care of it sounds a little bit, err, dogmatic. If they think another solution (perhaps the one they use) is better or preferable and they only reluctantly support "others" they should say so. As I said, I might be wrong - but I've seen/heard "we usually do A, B and C, or if you insist we can also do D (but actually we like A best)" more than once. Long term it doesn't really turn out all right for any party.
Just my two cents
Christian