Viruses on CCRI Computers
The majority of faculty and staff computers are protected from viruses with the Sophos AntiVirus software.
If a virus has been detected and quarantined, please follow the steps outlined below:
|Instructions and Screenshots|
Open Sophos by right clicking on the blue shield in the system tray
Select Open Sophos Anti-Virus
|From the Sophos home page click Manage quarantine items.|
|In the Quarantine manager page, click the drop-down arrow on the Show box, and select Suspicious files.|
Information about each item:
- Name displays the identity that Sophos Anti-Virus has detected. To learn more about the suspicious file, click the identity, and Sophos Anti-Virus connects you to the analysis of the suspicious file on the Sophos website.
- Details displays the name and location of the item. If the item is associated with a rootkit, it is displayed as “Hidden”.
- Available actions displays actions that you can perform on the item. Unless the item is hidden, there are three actions: Authorize, Delete and Move, described below. If you click one of the actions, the action is performed on the item, following confirmation. Hidden files can only be authorized.
Dealing with the suspicious files
Select all/Deselect all
Click these buttons to select or deselect all the items. This enables you to perform the same action on a group of items. To select or deselect a particular item, select the check box to the left of the item type.
Clear from list
Click this to remove selected items from the list, if you trust them. This does not delete the items from disk, however.
- Click Authorize to authorize the selected items on the computer, if you trust them. This adds the items to the list of authorized suspicious items so that Sophos Anti-Virus does not prevent them from being accessed.
- Click Delete to delete the selected items from your computer. Use this function with care.
- Click Move to move the selected items to another folder. The items are moved to the folder that was specified when cleanup was set up. Moving an executable file reduces the likelihood of it being run. Use this function with care.
This page developed and maintained by Information Technology. Send comments and suggestions to .