You install an Endpoint Protection agent on workstations to protect them against malware, risky file types and websites, and malicious network traffic.
Intercept X for Server delivers protection that is top-rated by industry experts, combining server-specific features to create a comprehensive, defense-in-depth solution. A policy is a set of options (for example, settings for malware protection) that Sophos Central applies to protected users, devices, servers, or networks. Intercept X with EDR. Sophos Endpoint Detection and Response (EDR) lets you investigate detected threats (“threat cases”) and search for new threats. If you would like to prevent users from upgrading to BigSur AND if you or your customer are using Sophos Endpoint, then it’s worth noting that the SophosLabs have added an Application Control detection for the Big Sur installer. They were briefly mentioned in the Sophos XG Academy webinars (last session, future og XG, at the last part). Im really interested in learning more of what to expect! Were currently evaluating Fortinet as replacement for Sophos UTM because they have switches that tie into the Fortigate platform.
It also offers peripheral control, web control and more.
Sophos Device Encryption is also installed automatically on Windows workstations (if you have the required license).
Download and run installers
Go to Protect Devices.
Download the installer for your operating system and run it on workstations you want to protect.
- Download Complete Windows Installer: Click this for an installer with all endpoint products your license covers.
Alternatively, click Choose Components… to choose which products will be included in the installer. The choices are:
- Sophos Intercept X Advanced (protection from ransomware and exploits).
- Device Encryption.
- Download Complete macOS Installer: Click this for an installer with all endpoint products your license covers.
Alternatively, click Choose Components… to choose which products will be included in the installer. The choices are as for Windows above.
- Send Installers to Users: Click this to go to a page where you can add users and send them installers that they can use.
What happens when you protect a computer
When you protect a computer:
Sophos Intercept X Big Surface
- Each user who logs in is added to the users list in Sophos Central automatically.
- Default policies are applied to each user.
- Each computer is added to the Computers list in Sophos Central.
Sophos Intercept X Reviews
How we handle Windows usernames and login names
Users are listed with full login name, including the domain if available (for example, DOMAINNAMEjdoe).
If there is no domain, and a user logs in to multiple computers, multiple user entries are displayed for this user, for example MACHINE1user1 and MACHINE2user1. To merge these entries, delete one and assign the login to the other (and rename the user, if required). See Endpoint protection deployment methods.
For those of you who have been using Sophos Home Free as their preferred app for protection against viruses, malware and hackers, it is now available for Big Sur - even the M1 machines.
The comparable Sophos Home for Mobile in the App Store requires a Sophos Premium account. But ...
The free Sophos Intercept X for iOS and iPadOS is in the App Store. This app contains many features, such as Wi-Fi security, Secure QR code scanner, Authenticator, and Password Safe.
If you don’t already have a Sophos account, there’s no charge and no pain in creating one. With a Sophos account, you can monitor all of your devices with a browser from anywhere.
And there is a free Sophos XG Firewall for home users - but it runs on a dedicated computer. Perfect if you have an old spare computer.
John R Carter Sr