
17
SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE
There are a number of actions that can be taken when a data control rule is
matched:
• Allow file transfer and log event
• Allow transfer on acceptance by user and log event
• Block transfer and log event
By default, when a rule is matched and file transfer is blocked or user confirmation
of file transfer is required, a message will be displayed on the endpoint computer’s
desktop. You can easily add your own custom messages to the standard messages
for user confirmation of file transfer and for blocked file transfer.
The “authorize transfer on user acceptance” action can be used to train users
that the data they are transferring may contravene a company policy without
actually preventing them from carrying out their work. The end users decision is
audited and can be reviewed at a later date.
When a data control event occurs, for example, the copying of a file containing
sensitive data to a USB flash drive, the event is sent to Enterprise Console and
can be viewed in the data control event viewer. The number of computers with
data control events over a specified threshold within the last seven days will also
be displayed on the dashboard.
Firewall policies
By default, Sophos Client Firewall is enabled for all computers in all groups and
blocks all non-essential traffic. It is shipped with a set of secure default policies,
but you can easily change these to suit your particular business requirements.
Every aspect of the firewall configuration can be centrally managed (please see
section 3 for more on Sophos Client Firewall).
The “alert only” mode allows you to deploy the firewall across your estate to collect
information on all applications that are used on the network. This information
will be sent back to the console and you can use this to build a policy that won’t
impact your users’ productivity, before you roll out a “live” policy.
Figure 12: Data control – End user authorization notification
Komentarze do niniejszej Instrukcji