Sophos Enterprise Console Help

Sophos Enterprise Console Help

Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console ..........................................................................................6 2 Guide to the Enterprise Console interface...............................................................................7 2.1 User interface layout...................................................................................................7 2.2 Toolbar buttons...........................................................................................................7 2.3 Dashboard panels.......................................................................................................9 2.4 Security status icons.................................................................................................10 2.5 Navigating the Endpoints view..................................................................................11 2.6 Computer list icons...................................................................................................12 2.7 Filter computers by the name of a detected item......................................................13 2.8 Find a computer in Enterprise Console....................................................................14 2.9 Navigating the Update managers view.....................................................................15 3 Getting started with Sophos Enterprise Console...................................................................16 4 Setting up Enterprise Console................................................................................................18 4.1 Managing roles and sub-estates...............................................................................18 4.2 Creating and using groups........................................................................................29 4.3 Creating and using policies.......................................................................................32 4.4 Discovering computers on the network.....................................................................38 4.5 Synchronizing with Active Directory..........................................................................41 4.6 Configure the Sophos Mobile Control URL...............................................................47 5 Protecting computers..............................................................................................................48 5.1 Prepare for installation of security software..............................................................48 5.2 Remove third-party security software.......................................................................48 5.3 Protect computers automatically...............................................................................49 5.4 Locate installers for protecting computers manually ................................................50 5.5 Checking whether your network is protected............................................................51 5.6 Dealing with alerts and errors...................................................................................53 5.7 Scanning and cleaning up computers now...............................................................57 6 Updating computers...............................................................................................................59 6.1 Configuring the update manager..............................................................................59 6.2 Configuring software subscriptions...........................................................................67 6.3 Configuring the updating policy................................................................................71 6.4 Monitoring the update manager................................................................................78 2 6.5 Update out-of-date computers..................................................................................79 7 Configuring policies................................................................................................................81 7.1 Anti-virus and HIPS policy........................................................................................81 7.2 Firewall policy.........................................................................................................113 7.3 Application control policy........................................................................................141 7.4 Data control policy..................................................................................................144 7.5 Device control policy...............................................................................................159 7.6 Tamper protection policy.........................................................................................166 7.7 Patch policy............................................................................................................168 7.8 Web control policy...................................................................................................169 7.9 Exploit prevention policy.........................................................................................177 8 Setting up alerts and messages...........................................................................................180 8.1 Set up software subscription alerts.........................................................................180 8.2 Set up anti-virus and HIPS email alerts..................................................................181 8.3 Set up anti-virus and HIPS SNMP messaging.......................................................182 8.4 Configure anti-virus and HIPS desktop messaging................................................183 8.5 Set up application control alerts and messages.....................................................183 8.6 Set up data control alerts and messages...............................................................184 8.7 Set up device control alerts and messages............................................................185 8.8 Set up network status email alerts..........................................................................186 8.9 Set up Active Directory synchronization email alerts..............................................187 8.10 Configure Windows event logging.........................................................................187 8.11 Turn sending feedback to Sophos on or off..........................................................188 9 Viewing events......................................................................................................................189 9.1 View application control events...............................................................................189 9.2 View data control events.........................................................................................189 9.3 View device control events......................................................................................190 9.4 View firewall events.................................................................................................191 9.5 View tamper protection events................................................................................191 9.6 Patch assessment events.......................................................................................192 9.7 View web events.....................................................................................................195 9.8 View exploit prevention events................................................................................197 9.9 Export the list of events to a file..............................................................................198 10 Generating reports.............................................................................................................199 10.1 Create a new report..............................................................................................199 10.2 Configure the Alert and event history report.........................................................200 3 10.3 Configure the Alert summary report.....................................................................200 10.4 Configure the Alerts and events by item name report..........................................201 10.5 Configure the Alerts and events by time report....................................................202 10.6 Configure the Alerts and events per location report.............................................203 10.7 Configure the Endpoint policy non-compliance report..........................................204 10.8 Configure the Events by user report.....................................................................204 10.9 Configure the Managed endpoint protection report..............................................205 10.10 Updating hierarchy report...................................................................................206 10.11 Schedule a report...............................................................................................206 10.12 Run a report........................................................................................................206 10.13 View a report as a table or chart.........................................................................206 10.14 Print a report.......................................................................................................207 10.15 Export a report to a file.......................................................................................207

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    240 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us