Sophos Enterprise Console Help
Total Page:16
File Type:pdf, Size:1020Kb
Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console ..........................................................................................6 2 Guide to the Enterprise Console interface...............................................................................7 2.1 User interface layout...................................................................................................7 2.2 Toolbar buttons...........................................................................................................7 2.3 Dashboard panels.......................................................................................................9 2.4 Security status icons.................................................................................................10 2.5 Navigating the Endpoints view..................................................................................11 2.6 Computer list icons...................................................................................................12 2.7 Filter computers by the name of a detected item......................................................13 2.8 Find a computer in Enterprise Console....................................................................14 2.9 Navigating the Update managers view.....................................................................15 3 Getting started with Sophos Enterprise Console...................................................................16 4 Setting up Enterprise Console................................................................................................18 4.1 Managing roles and sub-estates...............................................................................18 4.2 Creating and using groups........................................................................................29 4.3 Creating and using policies.......................................................................................32 4.4 Discovering computers on the network.....................................................................38 4.5 Synchronizing with Active Directory..........................................................................41 4.6 Configure the Sophos Mobile Control URL...............................................................47 5 Protecting computers..............................................................................................................48 5.1 Prepare for installation of security software..............................................................48 5.2 Remove third-party security software.......................................................................48 5.3 Protect computers automatically...............................................................................49 5.4 Locate installers for protecting computers manually ................................................50 5.5 Checking whether your network is protected............................................................51 5.6 Dealing with alerts and errors...................................................................................53 5.7 Scanning and cleaning up computers now...............................................................57 6 Updating computers...............................................................................................................59 6.1 Configuring the update manager..............................................................................59 6.2 Configuring software subscriptions...........................................................................67 6.3 Configuring the updating policy................................................................................71 6.4 Monitoring the update manager................................................................................78 2 6.5 Update out-of-date computers..................................................................................79 7 Configuring policies................................................................................................................81 7.1 Anti-virus and HIPS policy........................................................................................81 7.2 Firewall policy.........................................................................................................113 7.3 Application control policy........................................................................................141 7.4 Data control policy..................................................................................................144 7.5 Device control policy...............................................................................................159 7.6 Tamper protection policy.........................................................................................166 7.7 Patch policy............................................................................................................168 7.8 Web control policy...................................................................................................169 7.9 Exploit prevention policy.........................................................................................177 8 Setting up alerts and messages...........................................................................................180 8.1 Set up software subscription alerts.........................................................................180 8.2 Set up anti-virus and HIPS email alerts..................................................................181 8.3 Set up anti-virus and HIPS SNMP messaging.......................................................182 8.4 Configure anti-virus and HIPS desktop messaging................................................183 8.5 Set up application control alerts and messages.....................................................183 8.6 Set up data control alerts and messages...............................................................184 8.7 Set up device control alerts and messages............................................................185 8.8 Set up network status email alerts..........................................................................186 8.9 Set up Active Directory synchronization email alerts..............................................187 8.10 Configure Windows event logging.........................................................................187 8.11 Turn sending feedback to Sophos on or off..........................................................188 9 Viewing events......................................................................................................................189 9.1 View application control events...............................................................................189 9.2 View data control events.........................................................................................189 9.3 View device control events......................................................................................190 9.4 View firewall events.................................................................................................191 9.5 View tamper protection events................................................................................191 9.6 Patch assessment events.......................................................................................192 9.7 View web events.....................................................................................................195 9.8 View exploit prevention events................................................................................197 9.9 Export the list of events to a file..............................................................................198 10 Generating reports.............................................................................................................199 10.1 Create a new report..............................................................................................199 10.2 Configure the Alert and event history report.........................................................200 3 10.3 Configure the Alert summary report.....................................................................200 10.4 Configure the Alerts and events by item name report..........................................201 10.5 Configure the Alerts and events by time report....................................................202 10.6 Configure the Alerts and events per location report.............................................203 10.7 Configure the Endpoint policy non-compliance report..........................................204 10.8 Configure the Events by user report.....................................................................204 10.9 Configure the Managed endpoint protection report..............................................205 10.10 Updating hierarchy report...................................................................................206 10.11 Schedule a report...............................................................................................206 10.12 Run a report........................................................................................................206 10.13 View a report as a table or chart.........................................................................206 10.14 Print a report.......................................................................................................207 10.15 Export a report to a file.......................................................................................207