
20
2 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDE
Important
To fully evaluate the Sophos NAC
functionality please download
and install the NAC Manager
component from
www.sophos.com/downloads/
(Your evaluation credentials will
provide you with access to this
area.)
There are three pre-defined NAC policies:
• Default—The default policy is designed so you can quickly assess and control
managed clients. All new Enterprise Console groups and any client with no
policy assigned to it, or that cannot find the policy assigned to it, will pick up
the default policy. This default policy is pre-populated with Sophos Anti-Virus,
Sophos SafeGuard Encryption, Sophos Client Firewall, Microsoft/Windows
Update and MS Windows Firewall XP SP2/Vista.
• Managed—The managed policy is identical to the default policy. This allows
you to make changes to one of these policies and test it before assigning it to
your machines.
• Unmanaged—The unmanaged policy is applied to those computers that
temporarily join the network and are assessed with the Java-based dissolvable
agent. It is pre-configured to assess a range of third-party security products
including popular anti-spyware, anti-virus and firewall applications and
Windows or Microsoft Update. Vendors include Sophos, Microsoft, Trend
Micro, McAfee, Symantec/Norton, F-Secure, Panda, Spybot and Ad-Aware and
more.
message relays
Significant scalability
Sophos Endpoint Security and Data Protection has been engineered to be highly
scalable, so you can manage tens of thousands of computers from a single
console. Even greater scalability is achieved with message relays that allow
computers on the network to act as relays to Enterprise Console. This feature
reduces network traffic and load on the management server and lets very large
organizations manage tens of thousands of computers.
reports
Customized and scheduled reporting
On-demand, integrated, network-wide reporting is pivotal to maintaining security.
The Enterprise Console provides a number of reports textual and graphical
information on a variety of aspects of your network’s security status. These can
be used out of the box or easily configured to suit your needs. Standard report
types include:
• Alerts by item name
• Alerts per location
• Alerts by time
• Alert history
• Alerts summary
• Endpoint policy non-compliance
• Managed endpoint protection
• Updating hierarchy
• Events per user
Komentarze do niniejszej Instrukcji