Notes on the Use of an Antivirus Program at the KU

What is Sophos Anitvirus? (User groups)

Under a Bavarian state licensing agreement, all Bavarian universities and colleges of applied sciences are currently supplied with the anti-virus program Sophos.

Antivirus software detects and removes malicious software on your computer. Current antivirus programs are an essential part of IT security on all your devices, including computers, smartphones, and tablets.

Antivirus software vendors are constantly updating them to better protect themselves from new and emerging threats.

On all of the Kath. The University Data Centre provides the Sophos program to the University Data Centre and integrated into the university network with PCs and notebooks (PC pools and office workstations at the Eichstätt and Ingolstadt locations) and ensures that it is always up-to-date via automated update mechanisms. The installation of Sophos Antivirus on the service PCs and service notebooks is performed by the University Data Center.

In addition, the Sophos Terms of Use allow all members of the University (staff and students) to use sophos on their home computers, provided they are used privately or for study purposes (i.e. NOT commercially!). Access to the private download of the Sophos program package can be obtained with your user ID and LDAP password at

www.ku.de/urz/sophos/

For the installation of Sophos Antivirus on private computers, a self-installation video is available (see bolow),

The University Data Center strongly recommends that the members of the Kath. University of Eichstätt-Ingolstadt make use of this free possibility for them to use an antivirus program on their private computers.

Video instructions for self installation of Sophos

Please note: By clicking on the image area, you give your consent for video content to be reloaded from Vimeo, for Vimeo cookies to be stored on your IT system and for personal data such as your IP address to be passed on to Vimeo. If you click on another video after having finished watching the video content, Vimeo will open in a new tab of your browser and will collect more data from you. Further information is provided in our data protection notice and under Vimeo Privacy .

User interface Sophos Antivirus

Performing on-demand virus scans

The installation just performed (see video) ensures that all file operations (reading, writing, copying, etc.) protect a constantly active "virus monitor" from virus attacks in the background.

Irrespective of this, you have the option to request your own request ("On Demand")

entire computer or a sub-area (hard drive, USB stick) of a virus scan

to undergo. You can find these options by using the Sophos program icon

with the RIGHT mouse button and then click on the option with the LEFT mouse button

Sophos Endpoint Security and Control.

  • By selecting the option to scan computers, the entire computer can be viruses.
  • By selecting the option to set up scans and then set up New Scan, a desired data carrier (hard drive, CD drive, USB stick) with yourself options to be set (see Configure Scan) for viruses; This review can be carried out as part of a schedule to be created (see Schedule for Scan regularly at a specific time.
[Translate to Englisch:] Sophos Endpoint Security and Control - Programmoberfläche

Because — in contrast to the virus guard just installed, with all important settings the nature and scope of the verification and treatment of infected files from the University Data Centre are pre-determined in an immutable way — for these possibilities of targeted virus scanning, the sensible selection of these details (e.g. which files you check or which one you want from the check, whether you infected files or rather delete them, etc.) in the area of responsibility of the user, you need to use these details yourself. To present them would be the framework blast this guide; but the university consulting data center will be happy to help you.

Support Information

KU Notebooks/Computers:

Sophos Antivirus should be installed on all KU notebooks/computers. If you have questions about Sophos Antivirus on your KU workstation, contact our IT Support: it-support(at)ku.de

Private devices:

For extensive information on the private use of the software or special questions, you can find a detailed Start Up Guide Endpoint Security and Control Single-User Startup guide (read before installation) or look for help with problems with private devices in the Edpoint Security and Control 10.3. https://www.sophos.com/de-de/support/documentation/endpoint-security-and-control-for-windows.aspx

Uninstalling Anti-Virus Programs (only private use)

  1. Click Start, then click Control Panel (Windows XP, 2003, Vista, 7) or Search for Control Panel (Windows 8, 10)
  2. In Control Panel, double-click Add/Remove Programs
  3. Look for any other Anti-Virus Programs including, but not limited to those listed below. Click Remove to uninstall.
    • Avast
    • Avira
    • BitDefender
    • Bull Guard
    • Kaspersky
    • McAfee Anti-Virus
    • Norton Anti-Virus
    • Sophos AutoUpdate
    • Sophos Remote Management System
    • Sophos Remote Update**

Please Note: If you are asked to restart your computer after uninstalling any of these applications, please do so, then return to install Sophos Antivirus. 

What is there to consider abroad?

Depending on the destination and status, there are a few things to consider. You can find under the links which agreements/guidelines regarding encrypted devices exist.
https://www.gp-digital.org/world-map-of-encryption/
http://www.cryptolaw.org/
Encrypted terminals always raise suspicions of wanting to hide something, so if possible, prepare your terminals before travelling to the USA, China and Russia as follows:

What do I need to do to my laptop or mobile device prior to traveling?

  1. Take with you only what you need. If you can manage your trip without a laptop, tablet, and/or smartphone, leave them at home.
  2. Remove all data that is not essential to your travel or that is export restricted.
  3. Ensure smartphones and tablets are encrypted (if allowed) and protected by a passcode, passphrase, or biometric, such as a fingerprint or facial recognition. Remove all unneeded data, apps, and accounts from the device prior to travel. Register your device with a locator service such as Find My iPhone/iPad or Android Device Manager so that it can be wiped remotely if lost or stolen.
  4. If permitted by your destination country, all USB flash drives, external hard drives, and other external storage should be encrypted. These devices should remain with you at all times and should be transported in carry-on luggage.
  5. Do not use USB-based public battery charging stations. “Juice jacking” attacks can install malware on your mobile device and/or copy data from your device. Only use chargers you brought with you from home and know to be good.

A special note regarding travel to China or Russia:

While you are in these countries, assume that all of your communications are being intercepted, including voice calls, text messages, and internet traffic you believe is encrypted such as HTTPS connections and connections via a VPN service.

Things to consider if traveling to Russia or China:

  • NEVER ALLOW THE DEVICE OUT OF YOUR PHYSICAL CUSTODY, even for repairs.
  • Integrated laptop cameras and microphones should be physically disconnected. If possible, purchase a laptop without this functionality.
  • Install a privacy screen to discourage “shoulder surfing.”
  • Disable all file sharing protocols.
  • Disable Wi-Fi, Bluetooth, and infrared if not needed.
  • Set up a temporary email account for your travels on a service such as Google’s Gmail. Abandon and delete this account after your trip. Do not use this account to send or receive sensitive information.
  • Tor and other censorship circumvention tools should be considered compromised. Their use may be monitored. If you choose to use them, you may be punished or expelled from the country.
  • Consider all USB drives, CD/DVDs, email attachments, shortened URLs, QR codes, etc to be hostile. Do not scan QR codes, click links, open attachments, or insert any removable media into your computer.
  • Clean out your wallet. Remove anything that is non-essential for your travels. RFID-enabled cards should be carried in an RF-shielded sleeve to prevent them from being surreptitiously scanned.
  • Assume that discarded items such as CD/DVDs, USB drives, notes, and other documents will be retrieved from the trash for analysis.

Powered-off cellphones can still be used for geolocation and monitoring. Remove cell phone batteries when not in use.