LABS GALLERY: Sophos Endpoint Security and Data Protection 9 Is Easy to Configure, Manage

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
1 of 15

LABS GALLERY: Sophos Endpoint Security and Data Protection 9 Is Easy to Configure, Manage

LABS GALLERY: Sophos Endpoint Security and Data Protection 9 Is Easy to Configure, ManageBy Matthew D. Sarrel

2 of 15

Sophos Download

It all starts by downloading the appropriate installation package and instructions from sophos.com.

3 of 15

Sophos Enterprise Console

Sophos Enterprise Console provides all the information you need to quickly assess the security of your organization's endpoints.

4 of 15

Sophos Dashboard

The dashboard shows alerts and errors at a glance. Clicking on any alert category brings up a list of computers with that alert condition.

5 of 15

Standard Interface

I thought it was better to close the dashboard and work directly within the standard interface.

6 of 15

Update Errors

Drilling down into specific groups and sorting by specific errors allowed me to quickly assess and correct issues with the Sophos environment.

7 of 15

Computer Details

Double-clicking the computer entry from the previous screen opens up a detailed list of outstanding alerts and errors. It's very easy to go back and forth between single machines and entire groups while tweaking settings and verifying that they work.

8 of 15

Solid Reporting

Solid reporting shows device control and data control events. Looking at this, I can tell who attempted to do what and when.

9 of 15

Data Control Rules

Data control rules worked in my testing. Here, a file containing the text string "eweek" was blocked from being uploaded to Hotmail.

10 of 15

App Warning

The age-old specter of an intrusive firewall rears its ugly head with Sophos. The average installation asks users far too many questions without providing enough education for them to answer.

11 of 15

App Control Popup

This is the type of message a user gets when an application is blocked by policy. The last sentence—shown here as "Turn it down!"—is customizable.

12 of 15

Advanced Firewall Settings

This is an example of advanced firewall settings. Clicking through the tabs across the top demonstrates the full functionality of the firewall solution.

13 of 15

Device Control Policy

Device control allows administrators to provide full access, read-only or no access to removable devices such as USB memory sticks and optical drives.

14 of 15

Application Control Policy

Application control allows administrators to quickly and easily prevent certain application types (such as Distributed Computing, shown here) from being run.

15 of 15

Simple or Advanced

If only every question in life could come down to this: Would you like to configure simple or advanced policy? Simple is along the lines of "OK to use Windows file sharing" and advanced gets as granular as individual firewall rules.

Top White Papers and Webcasts