Sophos Endpoint Agent Application User Interface๐
The Sophos Endpoint Agent app user interface helps you keep your computer secure. You can check the security status, scan for threats, and review recent security events. The features available depend on your version of Sophos Agent.
Accessing the Application UI๐
Status Page๐
The Status page gives you an overview of your computerโs security.
What You Can Do๐
- See the computerโs security status.
- Scan the computer for threats.
- View installed features and their security status.
- Use the About link in the lower right to update or troubleshoot Sophos Agent.
Security Status Icons๐
An icon in the upper left shows the current security status.
| Icon | Status | Description |
|---|---|---|
![]() |
Green | No alerts, or only low-priority alerts |
![]() |
Red | High-priority alerts |
![]() |
Yellow | Medium-priority alerts |
![]() |
Gray | Status is unknown |
Features Installed๐
All installed features display their security status. Features depend on your agent version and may include:
- Malware and PUA Protection
- Data Protection (Windows) or Device Encryption (Mac)
- Zero Trust Network Access
Note
Data Protection refers to encryption with BitLocker.

Scanning the Computer๐
You can scan your computer for threats from the Status or Detections page.
How to Scan๐
- Go to the Status or Detections page.
- Select Scan next to the malware and PUA status.
-
Choose Quick scan or Full scan.
Feature Description Quick Scan - Checks memory, Master Boot Record (MBR), running processes, and files that run at startup
- Provides rapid resultsFull Scan - Scans all files, folders, memory, and the MBR
- Takes longer than a quick scan
Viewing Scan Results๐
- The Detections page shows scanning progress and results.
- If threats are detected, go to the Events page for details.
Scan a File๐
You can select a single file or multiple files and start a scan from the right-click menu. For instructions, click the tab for your operating system.
- In Explorer, right-click the file.
- Select Scan.
- Check scanning progress and results on the Detections page.
- In Finder right-click the file or files and select Scan with Sophos Endpoint.
- A Finder Item Scan dialog opens and shows you scanning progress and results.
If you don't see Scan with Sophos Endpoint when you right-click, you need to add it as a service.
Add the Scan Service๐
- Open Sophos Endpoint and click Services > Services Settings.

Alternatively, on the Mac go to System Settings > Keyboard > Keyboard Shortcuts > Services.
- In Services, click Files and Folders, and select Scan with Sophos Endpoint.

- Click Done.
Events Page๐
The Events page shows all security events on your computer. You can filter, search, and review event details.
Event List๐
Each event displays:
- Severity โ The icon shows if the event is high priority, medium priority, or a notification.
- Source โ The icon indicates which Sophos feature reported the event.
- Date and Time โ When the event occurred.
- Description โ What happened.
- Action Link โ If youโre signed in as an administrator and action is required.
To view details, select the arrow to the right of the event.

Event Filters๐
Filter events by:
- Priority โ High, medium, or notification.
- Resolution โ Show unresolved or all events.
- Source โ Filter by the reporting Sophos feature.
- Detection Type โ Filter by type of threat or item (options depend on your operating system).

Detections Page๐
The Detections page shows all threats detected on your computer.
What You Can Do๐
- Check whether there are any threats to address.
- See detection history for malware and PUAs.
- Select Scan to run a new scan.
If no malware or PUAs are outstanding, all threats have been cleaned up.

Detection History๐
- See statistics for each type of threat.
- Select a threat type to view related events on the Events page.

Detection Types๐
Sophos Agent detects several types of threats and unwanted items.
| Detection Type | Description |
|---|---|
| Malware and PUAs | Malware includes viruses, worms, Trojans, and spyware. PUAs (Potentially Unwanted Applications) are programs that arenโt malicious but are unsuitable for most business networks. |
| Web Threats | Malicious or uncategorized websites, and risky downloads. Includes sites unsuitable for business, such as adult content or social media. |
| Malicious Behavior | Suspicious behavior in running software. (Windows only.) |
| Ransomware | Malware that blocks access to files until a ransom is paid. |
| Controlled Items | Applications, peripherals, removable media, risky downloads, inappropriate websites, and files with sensitive information. |
| Malicious Traffic | Network traffic that may indicate attempts to take control of the computer. |
| Exploits | Application hijacks and attacks on vulnerabilities in browsers, plugins, Java, media, and Microsoft Office. (Windows only.) |
Settings Page๐
The Settings page is available when you sign in as an administrator.
How to Access Settings๐
- Select Admin sign-in (Windows) or Admin login (Mac) in the upper right.
- Enter the tamper protection password from your Sophos Central administrator.
- The Settings tab appears in the menu bar.
Note
Not all features are available on all licenses.
Overriding Policy๐
You can temporarily override the Sophos Central policy for up to four hours for troubleshooting.
- On the Settings page, check Override Sophos Central Policy for up to four hours to troubleshoot.
- Make the necessary changes.
- After four hours, settings revert automatically. To revert sooner, clear the override check box.
You canโt use sliders to revert individual features early. Use the override check box.

Security Features๐
You can turn the following features on or off, depending on your license and operating system.
Deep Learning๐
Uses advanced machine learning to detect threats without relying on signatures.
Real-Time Scanning๐
Scans items as users attempt to access them.
- Files โ Scans local files and network shares (if enabled).
- Internet โ Scans downloads, blocks malicious sites, and detects low-reputation sites.
Controls on Users๐
- Peripheral Control โ Manage access to peripherals and removable media.
- Application Control โ Detect and block applications unsuitable for business use.
- Web Control โ Block risky downloads and websites, and prevent data loss.
- Data Loss Prevention โ Monitor and restrict the transfer of sensitive data.
Tamper Protection๐
Restricts changes to security settings or uninstalling Sophos Agent. Requires the tamper protection password.
Runtime Protection๐
Protects against threats by detecting suspicious or malicious behavior or traffic.
- Ransomware Detection โ Blocks malware that restricts file access for ransom.
-
Malicious Behavior Detection โ Blocks known and suspicious malicious behavior.
-
Safe Browsing โ Protects browsers from exploitation.
- Exploit Mitigation โ Protects applications prone to malware exploitation.
- Network Threat Protection โ Detects and blocks network threats. Includes packet inspection.
Note
Turning off Network Threat Protection also disables features that isolate devices or block network connections.
Computer Controls๐
Monitor the Windows Firewall and other registered firewalls.




