Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console

Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console

Sophos Enterprise Console Help product version: 5.5 Contents About Sophos Enterprise Console...........................................................................................................1 Guide to the Enterprise Console interface.............................................................................................. 2 User interface layout..................................................................................................................... 2 Toolbar buttons..............................................................................................................................2 Dashboard panels......................................................................................................................... 4 Security status icons..................................................................................................................... 5 Navigating the Endpoints view......................................................................................................6 Computer list icons........................................................................................................................7 Filter computers by the name of a detected item.........................................................................8 Find a computer in Enterprise Console........................................................................................ 9 Navigating the Update managers view......................................................................................... 9 Getting started with Sophos Enterprise Console...................................................................................11 Setting up Enterprise Console............................................................................................................... 13 Managing roles and sub-estates.................................................................................................13 Creating and using groups..........................................................................................................22 Creating and using policies.........................................................................................................25 Discovering computers on the network.......................................................................................31 Synchronizing with Active Directory............................................................................................34 Configure the Sophos Mobile URL............................................................................................. 40 Protecting computers............................................................................................................................. 41 Prepare for installation of security software................................................................................41 Remove third-party security software..........................................................................................41 Protect computers automatically................................................................................................. 42 Locate installers for protecting computers manually...................................................................44 Checking whether your network is protected..............................................................................44 Configure the Dashboard............................................................................................................ 44 Check that computers are protected...........................................................................................45 Check that computers are up to date......................................................................................... 45 Find computers with problems.................................................................................................... 46 Dealing with alerts and errors.....................................................................................................46 Scanning and cleaning up computers now.................................................................................50 Updating computers............................................................................................................................... 52 Configuring the update manager................................................................................................ 52 Configuring software subscriptions............................................................................................. 59 Configuring the updating policy...................................................................................................63 Change primary server credentials............................................................................................. 67 Schedule updates........................................................................................................................69 Monitoring the update manager.................................................................................................. 70 Update out-of-date computers.....................................................................................................72 Configuring policies................................................................................................................................ 73 Anti-virus and HIPS policy.......................................................................................................... 73 On-access scanning.................................................................................................................... 75 On-demand and scheduled scanning......................................................................................... 81 Behavior monitoring.....................................................................................................................87 Sophos Live Protection............................................................................................................... 91 Web protection............................................................................................................................ 93 Scanned file types and exclusions..............................................................................................96 Authorizing items for use.......................................................................................................... 100 Firewall policy............................................................................................................................ 103 Application control policy...........................................................................................................131 Data control policy.....................................................................................................................133 Device control policy................................................................................................................. 147 (2018/12/17) Tamper protection policy...........................................................................................................153 Patch policy............................................................................................................................... 156 Web control policy.....................................................................................................................158 Full Web Control....................................................................................................................... 163 Exploit prevention policy............................................................................................................165 Setting up alerts and messages.......................................................................................................... 169 Set up software subscription alerts...........................................................................................169 Set up anti-virus and HIPS email alerts....................................................................................170 Set up anti-virus and HIPS SNMP messaging......................................................................... 171 Configure anti-virus and HIPS desktop messaging.................................................................. 172 Set up application control alerts and messages....................................................................... 172 Set up data control alerts and messages................................................................................. 173 Set up device control alerts and messages..............................................................................174 Set up network status email alerts........................................................................................... 175 Set up Active Directory synchronization email alerts................................................................176 Configure Windows event logging.............................................................................................176 Turn sending feedback to Sophos on or off............................................................................. 177 Viewing events..................................................................................................................................... 178 View application control events.................................................................................................178 View data control events...........................................................................................................178

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    219 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us