FAQs Page

FAQs

Frequently Asked Questions

If you have any other question you can contact us today.

Antivirus for vShield is another Sophos arrangement that works with VMware vShield Endpoint to convey unified, agentless filtering for ESXi/vSphere conditions. As well as being agentless, benefits incorporate programmed insurance of new visitor VMs, end of "check storms" (i.e., weighty utilization of assets because of bunches of visitors filtering at the same time), a solitary framework for every host to keep refreshed, superior execution and low asset use.

Outbound TCP connections to ports 443 and 80 are needed to connect to Sophos Central Admin. Updates happen on port 443 (HTTPS) and fall back to port 80 (HTTP). For more information

All put away information is encoded, and all applications are gotten and running on got working frameworks. The framework is load-adjusted and has failover between three destinations, each running two examples of the product, any of which can offer full support. Correspondence from the customer to the cloud is performed over HTTPS to get the information and to permit the customer to trust the server.

AWS espouses a shared responsibility model, so it is important to understand the difference between security measures AWS implements and manages, versus security measures that you must implement and manage. In a nutshell, while AWS actively manages the security of their cloud, you retain responsibility for managing and maintaining the security of your applications and data in the AWS cloud. You can learn more by visiting the AWS Shared Responsibility page.

I copied your cURL script for authentication directly from your Getting Started Guide in the developer.sophos.com portal but am receiving the following errors:

  • ‘client_id’ is not recognized as in internal or external command
  • Could not resolve host: <XXXX>

Our script contains back slashes “/” to make the command easier to read. These extraneous characters as well as, all returns and line breaks must be removed in order for the script to execute successfully.

Yes, at current the original Alert and Event APIs are still available. At some point in the future we will publish a new API following our current standards and this API will become deprecated.

  • We will not shut off access without publishing a migration plan and allowing sufficient time for our customers to onboard with the new API.

Are you concerned that your computer may have a virus? If your computer is infected, learning how to get rid of a computer virus is vital.

This article teaches you all there is to know about how computer viruses work and computer virus removal.

Read on as we discuss:

  • How to get rid of a computer virus.
  • What a computer virus is.
  • How to tell if your computer has a virus.
  • Whether your computer can become infected with a virus via email.
  • How to protect your computer from viruses.
Even if you aren't a security expert, there are a few basic steps you can take to secure your computer. Read the Secure UD Essentials for computers for more information.

Yes; both IT and your unit's IT staff can help you manage your computer. If you're a faculty or staff member, talk to your local support provider or contact IT for more information about the University's computer management tool, which automates security tasks like patching, anti-virus scanning, and more. It can be administered by either your unit or IT, but your unit may also offer its own computer management solution that is more suited to your particular data needs.

The computer management tool is used only to help secure your computer. It is not used to read or record your personal files or spy on your computing activity.