
29
SOPHOS ENDPOINT SECURITY AND DATA PROTECTION REVIEWER’S GUIDE
Ensuring protection with location awareness
Sophos Client Firewall lets you configure different policies for different locations
according to the location where computers are used, for example, in the office
(on the network) and out of the office. The Enterprise Console will then apply
different firewall settings to the computers depending on whether they are on
the network or not. This dual location configuration is particularly important for
mobile computers such as laptops.
Preventing application hijacking and impersonation
Application-level filtering is used to monitor application behavior, allowing
internet or network access only to applications that meet your specifications.
Sophos Client Firewall prevents application hijacking by monitoring inappropriate
application and system calls, and the launching of hidden processes. It also
uses a checksum method to foil attempts by spyware and other malware
to masquerade as a legitimate application, thereby preventing the theft of
confidential information over the internet.
Stateful inspection scans incoming and outgoing data packets
Sophos Client Firewall uses stateful inspection to enhance security by keeping
track of packets to ensure only legitimate packets are allowed. Packets are
tracked in order to allow limited response communication. For example if an
outbound packet is sent then only those incoming packets originating from the
computer that has been communicated with (from the appropriate port) are
allowed through the firewall.
Central reporting and logging
The firewall provides a central report to the management console. This includes
unknown applications and traffic, hidden processes and modified memory
events. This provides a simple way for you to understand potential areas of
security concern. In addition, the firewall’s log viewer lets you view, filter, and
save details of the connections that the firewall has allowed or blocked.
Monitor-only mode
The firewall can be deployed across your entire estate in an “alert only” mode.
It will discover all applications that are used on the network (taking into account
any LAN settings you have made). The results are reported back to the Enterprise
Console. This allows you to collect information about unknown traffic and then to
refine firewall policies accordingly without impacting user productivity.
Interactive working
The firewall can run in a learning (interactive) mode, asking the user how to deal
with detected traffic. If this mode is enable, the firewall will display a pop-up on
the endpoint computer each time an unknown application or service requests
network access. The learning dialog asks the user whether to allow or block the
traffic, or whether to create a rule for that type of traffic.
Komentarze do niniejszej Instrukcji