Central Endpoint & Intercept X: Getting Started

Sophos Support
2 Sept 201912:17

Summary

TLDRDoug from Sophos introduces Endpoint and Intercept X protection within Sophos Central, assuming viewers have an active account and licensed products. The tutorial covers accessing the product, managing policies, and syncing with Active Directory. It details setting up threat protection, peripheral control, application control, data loss prevention, web control, and Windows Firewall management. The video also guides users on downloading installers and managing users, with help available for troubleshooting.

Takeaways

  • 🔐 **Sophos Central Account Requirement**: To use Endpoint and Intercept X protection, you need an active Sophos Central account and at least one licensed product.
  • 👤 **User Management**: Sophos Central allows adding users manually, importing via CSV, syncing with Active Directory, or automatically creating users during endpoint agent deployment.
  • 🛡️ **Endpoint Protection Policies**: Base policies are automatically applied to all users or computers unless exemption policies are created for specific groups or machines.
  • 💡 **Recommended Settings**: Sophos provides recommended settings for optimal protection, which include features like deep learning for malware detection and real-time scanning.
  • 🔎 **Deep Learning Technology**: Sophos utilizes deep learning for file-based malware detection, offering greater accuracy and fewer false positives than traditional machine learning.
  • 🚫 **Behavior-Based Detections**: The platform includes real-time scanning and behavior-based detections to block access to malicious websites, which can prevent about 80% of attacks.
  • 🛡️ **Exploit Protection and CryptoGuard**: Intercept X features comprehensive exploit protection and CryptoGuard to defend against ransomware and other advanced threats.
  • 🔄 **Peripheral Control**: Sophos Central allows monitoring or controlling peripheral devices, with options to allow, block, or restrict wireless connections.
  • ⛔ **Application Control**: The platform enables blacklisting of malicious or inappropriate apps and offers monitoring modes to detect or block controlled applications.
  • 🚫 **Data Loss Prevention (DLP)**: DLP policies can inspect file contents for sensitive data and enforce rules based on content type, user actions, and file transfer destinations.
  • 🌐 **Web Control**: Additional security options extend threat protection by controlling web-based activities, including blocking risky downloads and managing acceptable web usage.
  • 🔄 **Update Management**: Sophos Central provides update management policies to schedule updates during specific hours, ensuring minimal disruption in controlled environments.
  • 🔒 **Windows Firewall Management**: The platform can monitor and configure the state of the Windows firewall, with options to block or allow connections based on network type.

Q & A

  • What is required to get started with Endpoint and Intercept X protection in Sophos Central?

    -You need an active Sophos Central account and at least one licensed product to get started with Endpoint and Intercept X protection.

  • Where can you check which products are licensed in Sophos Central?

    -You can check which products are licensed by clicking on your name in the upper right corner and selecting 'Licensing' from the drop-down menu.

  • What is the base policy in Sophos Central, and when is it applied?

    -The base policy is a default policy that applies automatically to every user or computer unless specific exemption policies are created for particular users, machines, or groups.

  • How can you add users to the Sophos Central system?

    -Users can be added manually, imported via CSV files, or synced with Active Directory using a tool found in the settings section. Additionally, users are created automatically when the endpoint agent is installed on a machine.

  • What makes Sophos' deep learning different from other machine learning systems?

    -Sophos' deep learning is pre-trained and works immediately in your environment without a training period, offering greater accuracy and fewer false positives compared to competitors.

  • How does the 'Block access to malicious websites' feature in real-time scanning contribute to security?

    -This feature checks against a constantly growing database of known malicious websites, stopping about 80% of attacks, and is enabled by default.

  • What is Cryptoguard, and how does it protect against ransomware?

    -Cryptoguard is a feature in Sophos Central that protects against ransomware by preventing malicious encryption of user files and blocking demands for payment to unlock them.

  • What are the different modes available for peripheral control in Sophos Central?

    -Peripheral control has three modes: disabled, monitor mode (which audits all peripherals), and control mode (which allows peripherals to be allowed, read-only, or blocked).

  • How does application control work in Sophos Central?

    -Application control allows you to blacklist apps that are deemed malicious or inappropriate. It has a monitoring mode for detection or blocking of apps and includes options like automatically blocking older versions of software such as Adobe Reader.

  • What does the Data Loss Prevention (DLP) feature do, and how can you configure it?

    -The DLP feature monitors the content of files as they leave the endpoint. You can use built-in templates for quick setup, create custom rules, and choose to block or audit file transfers based on content or file types.

Outlines

00:00

🛠️ Getting Started with Sophos Central

Doug from Sophos introduces the process of setting up Endpoint and Intercept X protection within Sophos Central. It's assumed that the user has an active Sophos Central account and at least one licensed product. The video guides viewers on how to access the product, check licensed products, and navigate the Sophos Central platform. It focuses on Endpoint Protection and Intercept X, explaining the base policies and how they apply to users and computers. The video also covers various ways to add users to the system, such as manually, via CSV, Active Directory sync, or automatic creation during endpoint agent deployment. The threat protection settings are explored, emphasizing Sophos' deep learning technology for malware detection, real-time scanning, and behavior-based detections like exploit protection and Cryptoguard against ransomware. The recommended settings are highlighted as the optimal best practices for organizations, with the option to customize these settings as needed.

05:00

🔧 Configuring Endpoint Protection Policies

The video script delves into the configuration of peripheral control, application control, and data loss prevention (DLP) policies within Sophos Central. Peripheral control settings allow for monitoring or controlling peripheral devices, with options to block or allow wireless connections. Application control is used to blacklist malicious or inappropriate apps, with features to monitor or block them. The script also explains how to manage blacklists and automatically update them with new software discovered by Sophos' labs. DLP is discussed as an advanced policy for monitoring the content of files as they leave the endpoint, with options to create custom rules based on content, file types, or names. The script guides viewers on setting up DLP rules, choosing actions for detected content, and configuring rules to apply to specific applications or media. The aim is to provide a comprehensive understanding of how to configure and manage various security policies in Sophos Central.

10:05

🔄 Advanced Settings and Installers in Sophos Central

The final paragraph of the video script covers additional settings in Sophos Central, such as Web Control and Update Management. Web Control extends the security features by blocking risky downloads and managing acceptable web usage, with options to customize these settings. The script also touches on data loss options for web-based email and download sites. Update Management allows administrators to set update windows for machines, ensuring updates occur during specified hours. The Windows Firewall management policy is also discussed, with options to monitor and configure the firewall state for different network types. The video concludes with instructions on how to download installers for endpoint protection from the protect devices section, offering choices between complete installers or custom component selection. The script emphasizes the ease of setting base policies and deploying them across the network, with support available for any assistance needed.

Mindmap

Keywords

💡Sophos Central

Sophos Central is a cloud-based platform that serves as the central hub for managing various security products offered by Sophos. In the context of the video, it is the primary interface for setting up and managing Endpoint Protection and Intercept X. The script mentions navigating through Sophos Central to access different features and policies, highlighting its role as the core management system for Sophos security solutions.

💡Endpoint Protection

Endpoint Protection refers to a suite of security measures designed to safeguard individual devices, such as computers and mobile devices, from various types of cyber threats. In the video, Endpoint Protection is one of the key features within Sophos Central, with policies that can be configured to protect devices from malware, ransomware, and other security risks, as discussed when the script delves into the settings and features of the protection policy.

💡Intercept X

Intercept X is an advanced threat protection solution that is part of Sophos' Endpoint Protection. It uses deep learning and other technologies to detect and block malware, including zero-day threats and ransomware. The video script mentions Intercept X in the context of its behavior-based detections and exploit protection, emphasizing its role in providing comprehensive security against advanced attacks.

💡Policies

In the context of the video, policies refer to the configurable rules and settings within Sophos Central that dictate how security features are applied and managed across devices. The script outlines various policies such as threat protection, peripheral control, and application control, which are crucial for tailoring the security posture to an organization's needs.

💡Deep Learning

Deep Learning is a subset of machine learning that uses neural networks with many layers to model and understand complex patterns in data. The video script highlights Sophos' use of deep learning in its Endpoint Protection, which enables more accurate detection of malware with fewer false positives, as mentioned when discussing the threat protection policy settings.

💡Active Directory Sync

Active Directory Sync is a process mentioned in the script that allows for the integration of Sophos Central with an organization's Active Directory, simplifying user management by syncing user accounts and permissions. This feature is part of the broader user management capabilities within Sophos Central, streamlining the process of adding and managing users across the security platform.

💡Exploit Protection

Exploit Protection is a feature of Intercept X that focuses on defending against attacks that exploit vulnerabilities in software. The script describes it as the most comprehensive and powerful exploit protection available, crucial for dealing with fileless malware and advanced threats, as highlighted in the discussion of the runtime protection section.

💡CryptoGuard

CryptoGuard is a feature within Sophos' security solutions designed to protect against ransomware attacks by monitoring and controlling the encryption and decryption of files. The video script mentions CryptoGuard as a popular feature that prevents malicious encryption of user files, illustrating its importance in the threat protection policy.

💡Data Loss Prevention (DLP)

Data Loss Prevention, or DLP, refers to a strategy for enforcing policies that protect sensitive data from being exposed or lost. In the video, DLP is discussed as an advanced policy within Sophos Central that monitors and controls the transfer of files containing specific content, as demonstrated when setting up a custom DLP rule to track financial data.

💡Application Control

Application Control is a security feature that allows organizations to manage which applications can run on their systems, often used to prevent the execution of unauthorized or potentially harmful software. The script explains how Sophos Central can be configured to blacklist certain apps, either by specifying them individually or by using broad categories, as part of the application control policy.

Highlights

Introduction to getting started with Endpoint and Intercept X protection in Sophos Central.

Prerequisite of having an active Sophos Central account and at least one licensed product.

Accessing Endpoint Protection and Intercept X from the product menu or navigation bar.

Overview of Sophos Central as a cloud-based platform for managing various security products.

Option to start free trials for Sophos products to evaluate their features.

Explanation of base policies in Endpoint Protection and their automatic application.

Methods for adding users to the system: manual addition, CSV import, Active Directory sync, and automatic creation during endpoint agent deployment.

Threat Protection policy overview, including the use of recommended settings and deep learning technology.

Sophos' approach to file-based malware detection with deep learning and real-time scanning.

Behavior-based detections, including real-time scanning features and block access to malicious websites.

Exploit Protection technology for dealing with fileless malware and advanced attacks.

CryptoGuard feature for protecting against ransomware that encrypts user files.

Peripheral Control policy with options for monitoring and controlling peripheral device access.

Application Control policy for blacklisting malicious or inappropriate apps and setting detection modes.

Data Loss Prevention (DLP) policy for monitoring and controlling the contents of files as they leave the endpoint.

Web Control policy for extending threat protection features and setting acceptable web usage.

Update Management policy for scheduling product updates during specific hours.

Windows Firewall management policy for detecting and reporting the state of the Windows firewall.

Instructions on downloading installers for endpoint protection from the protect devices section.

Options for downloading complete installers or choosing components for custom installations.

Conclusion of the tutorial with a summary of steps for setting base policies and deploying endpoint protection.

Transcripts

play00:00

Hi I'm Doug from the product team here at Sophos and today we're going to be

play00:03

taking a look at how to get started with Endpoint and Intercept X protection.

play00:07

Inside Sophos Central now this assumes you have an active Sophos

play00:12

Central account and at least one licensed product already. You can click

play00:17

your product right here to get started, or exit out of this model and select

play00:22

your product from the left-hand navigation bar. You can also check which

play00:26

products you have licensed by clicking on your name in the upper right corner

play00:29

here, and choosing licensing from the drop-down. Now in this video we'll be

play00:34

focusing on Endpoint Protection and Intercept X, which are found in the

play00:39

Endpoint Protection section, but Sophos central in and of itself is a

play00:43

cloud-based platform where you can manage our server, mobile, full disk

play00:48

encryption, wireless, email and anti-phishing products. And whenever you

play00:53

like you can visit the free trials link to learn more about each product and

play00:57

start a 30-day trial with a few clicks. So let's click into endpoint protection

play01:03

and run through a quick overview of policies by clicking the policies link.

play01:08

Endpoint protection starts with a base policy for each of the policies you see

play01:13

here. Now these base policies automatically apply to every user or

play01:18

computer until you create exemption policies that cater to particular users'

play01:23

machines and groups. You have a few options for getting users into the

play01:28

system: you can add users manually or import them via CSV files by clicking

play01:33

the people link here. You can also sync with Active Directory by using our tool

play01:38

found in the settings section here. And finally when deploying the endpoint

play01:43

agent found in the protect devices section, more on that in a bit, it'll

play01:47

simply create users automatically each time it's installed on a machine. So

play01:51

let's visit each of these based policies starting with threat protection. Let's

play01:55

click into this policy and head to the settings tab.

play01:58

Now you notice the settings are greyed out and the 'use recommended settings' box

play02:04

is ticked. This is what we at Sophos believe to be the optimal best practice

play02:10

settings for just about any or organization. We're also constantly

play02:14

adding new features to Sophos Central, and for many of them, we'll roll them out

play02:19

in phases, so from time to time you'll notice that right now, for instance at

play02:23

the time of this recording we're rolling out our active adversary mitigations. At

play02:28

some point this feature will be switched on automatically and added as a

play02:33

recommended setting, but for now this account can turn one or more of these

play02:38

mitigations on manually by clicking the drop-down, choosing custom and ticking

play02:44

the various boxes here. So let's take a closer look at some of the settings in

play02:51

this policy by unchecking the 'use recommended settings' box temporarily.

play02:56

Let's first talk about our approach to file based. Malware you'll notice here

play03:01

that we have Sophos deep learning enabled. Now this is different from

play03:05

everyone else's machine learning and that the combination of deep learning

play03:08

with our tried and true endpoint protection means greater accuracy and

play03:13

far fewer false positives than competing products. And it's enabled by default,

play03:17

which is great. There's no training period for a deep learning system, it

play03:22

just works right out of the gate for your environment. We have a

play03:25

state-of-the-art labs team that constantly trains and tunes our deep

play03:29

learning engines you don't have to. So paired with this real-time scanning

play03:33

setting that leverages our 30-plus years of industry experience, deep learning is

play03:38

made that much more powerful, and accurate. We then get into our behavior

play03:42

based detections, starting with real-time scanning features. This block

play03:47

access to malicious websites setting for instance, checks against the database of

play03:51

known bad websites, that grows by about 6 million URLs each week. This setting

play03:57

alone is responsible for stopping about 80% of attacks, and again it's on by

play04:02

default. And then taking a look at our run time protection section, this is

play04:07

really where the power of Intercept X begins to shine. Our exploit protection

play04:12

technology for instance, is the most comprehensive and powerful exploit

play04:16

protection of any product on the market today, so it's great for dealing with

play04:20

fileless malware and other nasty advanced attacks. Cryptoguard is another

play04:25

one of our extremely popular features this protects

play04:28

against ransomware that maliciously encrypts user files and demands payment

play04:32

to unlock them. So that's a quick look at the threat protection based policy. Let's

play04:37

head back up top and recheck the 'use recommended settings' box. Click Save and

play04:42

we'll be on our way. Moving right along to peripheral control.

play04:46

We'll again click the Settings tab and we'll see that this is disabled by

play04:50

default. Now aside from disabling peripheral control, we've got two main

play04:55

modes. In monitor mode, we'll allow all peripherals to be used, but we'll just

play05:00

audit them to get a good idea of what's going on in our environment. In control

play05:05

mode we'll actually control whether peripherals can be allowed, read-only, or

play05:10

blocked. Wireless is a slightly different setting. We can allow, block, or block

play05:16

bridging, say to a nearby wireless coffee shop network, or a cellphone hotspot

play05:20

while them a machine is connected to the wired office network. We can also create

play05:25

exemptions here based on the history of log devices. This is a new account so we

play05:31

have nothing of note here yet, but if we check back in a week or so there should

play05:35

be full of devices that we can exempt from the base peripheral control policy

play05:39

if we like. Next up is application control, again click the Settings tab and

play05:44

again, this is off by default. With app control we're looking to blacklist apps

play05:50

we believe to be malicious or inappropriate, and as with peripheral

play05:55

control we've got a sort of monitoring mode that we can use to either let

play05:58

controlled apps run in a detection only mode, or outright block them. We can also

play06:04

choose whether we want scheduled or full system scans to also detect controlled

play06:09

applications. So let's set that to 'yes,' and then get to work building our blacklist

play06:14

Now blacklists can be cumbersome to manage so we've got a few tricks up

play06:18

our sleeve here. Taking a look at document viewers for example, we've got

play06:22

all these versions of Adobe Reader to worry about keeping updated. Well Adobe

play06:27

is a big target for exploit based attacks so what we can do is just block

play06:31

all older versions of reader to ensure that only the latest version is being

play06:36

used across the company. And then let's say we don't want people

play06:40

using any file-sharing apps, they're just too risky.

play06:44

Well obviously we'll just select all of them by using the master checkbox here,

play06:49

but we can also check this bottom box. By doing that every time our labs team here

play06:54

at Sophos discovers new file-sharing software,

play06:57

it'll get added to our block apps list automatically. Okay let's move on now to

play07:02

data loss prevention or DLP. This is actually a pretty advanced policy. What

play07:08

we're doing here is we're looking at the contents of files as they leave the

play07:13

endpoint. So let's enable these rules and let's take a look at some of the

play07:17

controls that we have. Now for starters, we have some built-in region-based

play07:22

templates. So choosing the US region here for example, this will let us get started

play07:28

quickly with general health care and Finance rules. We can also create a

play07:34

custom policy on the right hand side here. I like to first decide if I want to

play07:38

message my end users when a file that's being transferred needs to be confirmed,

play07:41

or is blocked. We can then choose to add either an existing rule we've already

play07:46

created, a rule that controls content found inside files, or a rule that

play07:52

controls the transfer of specific file types,or names. So let's choose new

play07:58

content rule to track specific content inside files. We'll call this 'financial

play08:05

data,' and we can choose to create exclusions based on file type, but let's

play08:12

skip those. And then we need to decide what happens. Do we want to allow the

play08:16

content to transfer transparently without messaging the user, do we want to

play08:21

gently nudge the user to think twice about the transfer, or do we want to

play08:25

block it entirely. For now, let's choose to allow it. We'll simply create this as

play08:31

an auditing rule. Next we'll choose the type of content. We can and we'll want to

play08:36

leverage our filters here. First to choose 'financial data,' and then to choose

play08:41

the U.S. region. And let's check these first two rules here. Now by default here,

play08:47

this rule will look for 10 routing numbers for instance, before springing

play08:51

into action. We can change this to 1 to ensure

play08:55

we're logging as much as possible though. And finally let's choose our

play08:59

destinations. We want this rule to apply to content detected in the following

play09:03

types of applications, or media. We'll click finish, and we've got our custom

play09:11

DLP rule all set up. Since this is in our base policy,

play09:14

this will start reporting on all connected Windows machines. Now on to Web

play09:21

Control. In this first section additional security options for instance. What we're

play09:27

doing is kind of extending the features found in our threat protection policy.

play09:31

We're blocking certain risky downloads by default. We're letting ads and

play09:36

uncategorized sites through while blocking, allowing, or warning about

play09:41

various items based on how prevalent they are to attack. So to change settings

play09:46

here, we switch to 'let me specify' whenever we want to override the default

play09:50

settings of a certain section. So we normally just warn people that Windows

play09:55

executables can be risky, but if we're looking for greater control we can just

play10:00

block them entirely. So those are the security options, but we've also got

play10:05

other protections such as acceptable web usage. We've got some presets here, and

play10:10

again we can override individual settings by choosing 'let me specify.' The

play10:15

'keep it clean' setting is on by default, which either warns or allows most

play10:19

categories with the exception of adult and potentially inappropriate content.

play10:23

And then we've got some data loss options when it comes to potential data

play10:27

sharing. We can allow, block, or warn our users when they visit web-based email

play10:33

sites and download sites. So that's web control, let's head back out to the

play10:38

policies list and check out update management. Now with this we can choose

play10:43

an update window for our machines. If we don't set this, our machines will check

play10:48

for product updates every hour. This option is good for highly controlled

play10:52

environments where we only want devices to perform updates during set hours. And

play10:57

last but not least, let's take a look at the Windows Firewall management policy.

play11:02

What we're doing here is detecting and reporting the state of the Windows

play11:06

firewall. By default, we'll monitor only, but let's go ahead and choose monitor

play11:11

and configure. From here we can choose a connection type for each of the profiles

play11:17

seen here. So let's say we want to block public networks, we want to block private

play11:24

networks with exceptions. These are the exceptions set by Microsoft's Group

play11:29

Policy Orchestrator. And for domain networks we'll leave those as allowed. So

play11:34

that's a quick run-through of end point policies. Once we're happy with those, we

play11:38

can go ahead and grab our installers from the protect devices section here.

play11:41

We've got a few different options here for Windows and Mac. We can download the

play11:45

complete installer, which contains multiple products in a single agent, or

play11:49

we can select 'choose components' to mix and match what we want to install. So

play11:54

that's a quick tour of endpoint protection and Sophos Central. You set

play11:58

your base policies download your installers, and then you either add your

play12:03

users manually, use our AD sync tool, or deploy the Installer to automatically

play12:08

create them. If you get stuck, help is just a couple clicks away over here in

play12:12

the upper right corner.

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
CybersecuritySophos CentralEndpoint ProtectionThreat MitigationPolicy ManagementDeep LearningExploit ProtectionData Loss PreventionSecurity Best PracticesIT Management
¿Necesitas un resumen en inglés?