Sophos Endpoint Security & Data Protection Dokumentacja

Przeglądaj online lub pobierz Dokumentacja dla Oprogramowanie antywirusowe Sophos Endpoint Security & Data Protection. Sophos Endpoint Security & Data Protection [en] [es] [fr] [nl] Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Protection: Reviewer’s guide

Sophos Endpoint Security and Data Protection: Reviewer’s guide

Strona 2

9SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEAt the click of a mouse, you can:• Filter the view to focus on those computers with ou

Strona 3

102 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEsmart views Targeted cleanupCleaning up a large network after an attack can be expensive and ti

Strona 4 - CONTENTS

11SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEactivepoliciesSimplified policy setting and enforcementUsing Sophos ActivePolicies™, yo

Strona 5 - Simplified, automated console

122 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEFigure 6: Configuring Anti-virus and HIPS policyAnti-virus and HIPS policies – virus, spyware, P

Strona 6 - Endpoint compliance

13SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEApplication control policiesApplications like VoIP, IM and P2P are increasingly the ca

Strona 7 - Testing key features

142 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEDevice control policiesDevice control can help to significantly reduce your exposure to accident

Strona 8 - deployment

15SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEYou can also significantly reduce the risk of network bridging between a corporate netw

Strona 9 - dashboard

162 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEThere are two types of data control rule:• file matching rule: specifies the action that is take

Strona 10 - At-a-glance dashboard

17SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEThere are a number of actions that can be taken when a data control rule is matched:•

Strona 11 - update manager

182 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEYou can configure different location aware security policies to ensure that mobile computers are

Strona 12 - Figure 5: ActivePolicies

1SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE

Strona 13

19SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE• Manage—provides components for editing and managing policies and managing computers

Strona 14 - Controllable applications

202 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEImportantTo fully evaluate the Sophos NAC functionality please download and install the NAC Man

Strona 15

21SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEReports can be output in table format as well as chart format, including pie charts an

Strona 16

222 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEThere are four pre-configured roles:1. System Administrator—A pre-configured role that has full

Strona 17

23SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEsophos endpoint security and data protection3 PROTECTING WINDOWS COMPUTERSSophos Endpo

Strona 18

243 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDEIntrusion preventionSophos Endpoint Security and Control for Windows includes complete intrusion pre

Strona 19 - Important

25SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEApplication ControlWhile some applications can provide efficiency gains, others can dis

Strona 20

263 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDESophosLabs also maintains a library of extensive library of global sensitive data definitions (Conten

Strona 21 - Significant scalability

27SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDESAFEGUARD DISK ENCRYPTION SafeGuard Disk Encryption is an easy to implement solution t

Strona 22 - -based administration

283 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDESOPHOS CLIENT FIREWALLSophos Client Firewall is integrated into the endpoint agent making deployment

Strona 23 - information storage

2WELCOMEWelcome to this reviewer’s guide for Sophos Endpoint Security and Data Protection – Sophos’s fully integrated, scalable endpoint security solu

Strona 24

29SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEEnsuring protection with location awarenessSophos Client Firewall lets you configure d

Strona 25 - Quarantine Manager

304 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDEsophos anti-virus for mac os x, linux and unix4 PROTECTING NON-WINDOWS COMPUTERS THE NEED TO PRO

Strona 26 - Data Control

31SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEYou can also enable remote and mobile users to update from wherever they are via the n

Strona 27 - SOPHOS NAC

324 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDEAutomatic updatesUpdates are automatically downloaded and distributed through Enterprise Console

Strona 28 - Resetting forgotten passwords

33SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEappendix iEVALUATING ENDPOINT SECURITY AND DATA PROTECTIONWe want you to be absolutely

Strona 29 - Proactive lockdown

34SYSTEM REQUIREMENTSFor full details, visit www.sophos.com/products/all-sysreqs.htmlEnterprise Console system requirementsPlatforms supportedWindows

Strona 30

35SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDESophos Endpoint Security and Control for Windows system requirementsPlatforms supporte

Strona 31

36appendix iiTHE EICAR TEST “VIRUS”ABOUT THE EICAR TEST FILEThe EICAR* Standard Anti-virus Test File is safe to use for test purposes because it is no

Strona 32

37SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEappendix iiiOTHER SOPHOS PRODUCTS AND SERVICESSophos Security and Data ProtectionSopho

Strona 33

38Sophos Alert ServicesSophos ZombieAlert™ Service provides you with immediate warning if spammers have hijacked any of your organization’s computers

Strona 34 - PROTECTION

3SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDECONTENTS 1 COMPLETE PROTECTION FOR THE ENDPOINT 4 Overview of Sophos Endpoint Securi

Strona 35 - SYSTEM REQUIREMENTS

39SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEFree toolsSophos provides a number of tools can be used to reduce vulnerabilities and

Strona 36

Boston, USA | Oxford, UK© Copyright 2009. Sophos. All rights reserved. All trademarks are the property of their respective owners.rg/091215

Strona 37 - THE EICAR TEST “VIRUS”

41 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDEsophos endpoint security and data protection1 COMPLETE PROTECTION FOR THE ENDPOINT OVERVIEW O

Strona 38

5SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEComprehensive data protectionThe combination of a number of different technologies ensu

Strona 39 - Technical training

61 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDETesting key featuresBefore you test, here are some items to consider and to compare to compet

Strona 40 - Free tools

7SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDEsophos enterprise console2 SINGLE, CENTRAL AUTOMATED CONSOLE OVERVIEW OF SOPHOS ENTERPR

Strona 41 - Oxford, UK

82 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDEactive directory integration and synchronizationFaster deployment and automatic protection Sopho

Komentarze do niniejszej Instrukcji

Brak uwag