Sophos antivirus client update

Hi,
I am running Sophos AV version 2.0.0.364 I have a few PC's that i need to update I have tried through the manager but no luck, does anyone know where I can manually get the client to install?

Thanks
Techno-Man-ukAsked:
Who is Participating?
 
Asta CuConnect With a Mentor Commented:
Is this a Trial environment?  I noted the past few days that many of the links to Sophos timed out - they must be experiencing server issues or just too much traffic.  http://www.sophos.com/security/ - appears true for the end-user home as well as Business links - http://www.sophos.com/products/enterprise/endpoint/security-and-control/8.0/?cpid=GOG1000&kw=sophos&utm_source=Non%20campaign&utm_medium=AdWords%20NA&utm_campaign=NA%20AW%20EPSAC%20BR&utm_term=AWNA-sophos
May just be a 'traffic congestion' issue or server update intervals at their site.
0
 
Asta CuCommented:
Finally got through, found this which follows.  If I understand correctly, you're running version 2 vs. current versions:  If you are running an older version of Sophos Anti-Virus and do not automatically update your protection, you should download virus identity files (IDEs), which provide detection and disinfection of viruses, worms, Trojans and spyware.
All the IDEs you need are available in a single compressed file. The file is available in two formats: a Zip file or a self-extracting file. Files are updated every time we release protection for a new virus. (To use IDE files, you must know which version of Sophos Anti-Virus you are running and how to use virus identity (IDE) files.)
Our self-extracting files are not compatible with Windows 2003 and Windows Vista. Please update the IDEs automatically or download the Zip file.Please note: We do not provide IDEs for versions of Sophos Anti-Virus that are more than three months old.
http://www.sophos.com/downloads/ide/
Listening when I can .... hope this helps you somewhat.  Asta
 
0
 
Asta CuCommented:
Have you run the Malicious Software Removal Tool (after updating) FREE from Microsoft here?
Run the Malicious Software Removal tool The Microsoft Malware Protection Center has updated the Malicious Software Removal tool (MSRT). This is a stand-alone binary that is useful in the removal of prevalent malicious software, and it can help remove the Win32/Conficker malware family.

You can download the MSRT from either of the following Microsoft Web sites: http://www.update.microsoft.com (http://www.update.microsoft.com)
http://support.microsoft.com/kb/890830 (http://support.microsoft.com/kb/890830)
Source for more:  http://support.microsoft.com/kb/962007
You'll also find manual removal steps and more in the above link including
For more information about specific deployment details for the MSRT, click the following article number to view the article in the Microsoft Knowledge Base: 891716  (http://support.microsoft.com/kb/891716/ ) Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment Note The Stand-Alone System Sweeper tool will also remove this infection. This tool is available as a component of the Microsoft Desktop Optimization Pack 6.0 or through Customer Service and Support. To obtain the Microsoft Desktop Optimization Pack, visit the following Microsoft Web site: http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx  - (http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx) If Windows Live OneCare or Microsoft Forefront Client Security is running on the system, these programs also block the threat before it is installed.
More here from the Microsoft Malware Protection Center: -
 
Also Known As: TA08-297A (other) CVE-2008-4250 (other) VU827267 (other) Win32/Conficker.A (CA) Mal/Conficker-A (Sophos) Trojan.Win32.Agent.bccs (Kaspersky) W32.Downadup.B (Symantec) Trojan-Downloader.Win32.Agent.aqfw (Kaspersky) W32/Conficker.worm (McAfee) Trojan:Win32/Conficker!corrupt (Microsoft) W32.Downadup (Symantec) WORM_DOWNAD (Trend Micro) Confickr (other) Summary Win32/Conficker is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled. Depending on the specific variant, it may also spread via removable drives and by exploiting weak passwords. It disables several important system services and security products and downloads arbitrary files.
http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker
Asta
 
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.