In this article we will show how to integrate Sophos Endpoint Protection’s Web Control module with Sophos UTM using Sophos Enterprise Console (SEC) policies.
This method is suitable for large deployments that utilize one or more SECs.
Be sure to close the Sophos AV Console window after disabling Tamper-Protect." Read-Host "Press ENTER to continue" #Open Sophos Endpoint AV Console for the user.
Use the call operator (&) to open the & 'C:\Program Files (x86)\Sophos\Sophos Anti-Virus\SAVmain.exe' #Prompt user to confirm tamper protection has been disabled.
" $Message Title = "Confirm to Continue Sophos Uninstall" $Result = [System. Message Box]:: Show($Message Body,$Message Title,$Button Type,$Message Icon) Write-Host "$Result has been selected, continuing Sophos Uninstall"Next, we’ll want to call a batch file script from Power Shell to run the uninstallers.
I wanted to run a batch file from a Power Shell script, because testing and running inside of Power Shell is overly complicated.
Again, it’s easy to run the batch script using the “&” operand.
#https://4sysops.com/archives/how-to-display-a-pop-up-message-box-with-powershell/ Add-Type -Assembly Name Presentation Core, Presentation Framework $Button Type = [System. Message Box Button]:: Yes No $Message Icon = [System. Message Box Image]:: Warning $Message Body = "Tamper-Proof has been disabled and it's ok to continue?
" $Message Title = "Confirm to Continue Sophos Uninstall" $Result = [System.
The commands are silent; they suppress a reboot and send a verbose log to the default Windows\Logs directory.
At the end, we include a 15-second delayed system restart command.