1LABS GALLERY: Sophos Endpoint Security and Data Protection 9 Is Easy to Configure, Manage
LABS GALLERY: Sophos Endpoint Security and Data Protection 9 Is Easy to Configure, ManageBy Matthew D. Sarrel
2Sophos Download
It all starts by downloading the appropriate installation package and instructions from sophos.com.
3Sophos Enterprise Console
Sophos Enterprise Console provides all the information you need to quickly assess the security of your organization’s endpoints.
4Sophos Dashboard
The dashboard shows alerts and errors at a glance. Clicking on any alert category brings up a list of computers with that alert condition.
5Standard Interface
I thought it was better to close the dashboard and work directly within the standard interface.
6Update Errors
Drilling down into specific groups and sorting by specific errors allowed me to quickly assess and correct issues with the Sophos environment.
7Computer Details
Double-clicking the computer entry from the previous screen opens up a detailed list of outstanding alerts and errors. It’s very easy to go back and forth between single machines and entire groups while tweaking settings and verifying that they work.
8Solid Reporting
Solid reporting shows device control and data control events. Looking at this, I can tell who attempted to do what and when.
9Data Control Rules
Data control rules worked in my testing. Here, a file containing the text string “eweek” was blocked from being uploaded to Hotmail.
10App Warning
The age-old specter of an intrusive firewall rears its ugly head with Sophos. The average installation asks users far too many questions without providing enough education for them to answer.
11App Control Popup
This is the type of message a user gets when an application is blocked by policy. The last sentence—shown here as “Turn it down!”—is customizable.
12Advanced Firewall Settings
This is an example of advanced firewall settings. Clicking through the tabs across the top demonstrates the full functionality of the firewall solution.
13Device Control Policy
Device control allows administrators to provide full access, read-only or no access to removable devices such as USB memory sticks and optical drives.
14Application Control Policy
Application control allows administrators to quickly and easily prevent certain application types (such as Distributed Computing, shown here) from being run.
15Simple or Advanced
If only every question in life could come down to this: Would you like to configure simple or advanced policy? Simple is along the lines of “OK to use Windows file sharing” and advanced gets as granular as individual firewall rules.
AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...