Under a Bavarian state licensing agreement, all Bavarian universities and colleges of applied sciences are currently supplied with the anti-virus program Sophos.
Antivirus software detects and removes malicious software on your computer. Current antivirus programs are an essential part of IT security on all your devices, including computers, smartphones, and tablets.
Antivirus software vendors are constantly updating them to better protect themselves from new and emerging threats.
On all of the Kath. The University Data Centre provides the Sophos program to the University Data Centre and integrated into the university network with PCs and notebooks (PC pools and office workstations at the Eichstätt and Ingolstadt locations) and ensures that it is always up-to-date via automated update mechanisms. The installation of Sophos Antivirus on the service PCs and service notebooks is performed by the University Data Center.
In addition, the Sophos Terms of Use allow all members of the University (staff and students) to use sophos on their home computers, provided they are used privately or for study purposes (i.e. NOT commercially!). Access to the private download of the Sophos program package can be obtained with your user ID and LDAP password at
For the installation of Sophos Antivirus on private computers, a self-installation video is available (see bolow),
The University Data Center strongly recommends that the members of the Kath. University of Eichstätt-Ingolstadt make use of this free possibility for them to use an antivirus program on their private computers.
Please note: By clicking on the image area, you give your consent for video content to be reloaded from Vimeo, for Vimeo cookies to be stored on your IT system and for personal data such as your IP address to be passed on to Vimeo. If you click on another video after having finished watching the video content, Vimeo will open in a new tab of your browser and will collect more data from you. Further information is provided in our data protection notice and under Vimeo Privacy .
The installation just performed (see video) ensures that all file operations (reading, writing, copying, etc.) protect a constantly active "virus monitor" from virus attacks in the background.
Irrespective of this, you have the option to request your own request ("On Demand")
entire computer or a sub-area (hard drive, USB stick) of a virus scan
to undergo. You can find these options by using the Sophos program icon
with the RIGHT mouse button and then click on the option with the LEFT mouse button
Sophos Endpoint Security and Control.
Because — in contrast to the virus guard just installed, with all important settings the nature and scope of the verification and treatment of infected files from the University Data Centre are pre-determined in an immutable way — for these possibilities of targeted virus scanning, the sensible selection of these details (e.g. which files you check or which one you want from the check, whether you infected files or rather delete them, etc.) in the area of responsibility of the user, you need to use these details yourself. To present them would be the framework blast this guide; but the university consulting data center will be happy to help you.
KU Notebooks/Computers:
Sophos Antivirus should be installed on all KU notebooks/computers. If you have questions about Sophos Antivirus on your KU workstation, contact our IT Support: it-support(at)ku.de
Private devices:
For extensive information on the private use of the software or special questions, you can find a detailed Start Up Guide Endpoint Security and Control Single-User Startup guide (read before installation) or look for help with problems with private devices in the Edpoint Security and Control 10.3. https://www.sophos.com/de-de/support/documentation/endpoint-security-and-control-for-windows.aspx
Please Note: If you are asked to restart your computer after uninstalling any of these applications, please do so, then return to install Sophos Antivirus.
Depending on the destination and status, there are a few things to consider. You can find under the links which agreements/guidelines regarding encrypted devices exist.
https://www.gp-digital.org/world-map-of-encryption/
http://www.cryptolaw.org/
Encrypted terminals always raise suspicions of wanting to hide something, so if possible, prepare your terminals before travelling to the USA, China and Russia as follows:
What do I need to do to my laptop or mobile device prior to traveling?
A special note regarding travel to China or Russia:
While you are in these countries, assume that all of your communications are being intercepted, including voice calls, text messages, and internet traffic you believe is encrypted such as HTTPS connections and connections via a VPN service.
Things to consider if traveling to Russia or China:
Powered-off cellphones can still be used for geolocation and monitoring. Remove cell phone batteries when not in use.