Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.

Prévia do material em texto

Hi there, this is a Sophos Certified Engineer course for Sophos Central Endpoint and Server Protection. 
This is module 1 - Overview. 
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection ET15
Overview
July 2020
Version: 2.1
Product version: Sophos Central
© 2020 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any 
means without the prior written consent of Sophos. 
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this 
document may be the trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or 
representations (whether express or implied) as to its completeness or accuracy. This document is subject to change at any 
time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon 
Science Park, Abingdon, Oxfordshire, OX14 3YP.
Sophos Central Engineer v2.1.0 - 1
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection
Overview
Version 2.1
This course is designed for technical professionals who will be demonstrating Sophos Central Endpoint 
and Server protection. It provides an overview of the protection Sophos Central provides to endpoints 
and servers including the major capabilities and core configuration concepts.
This course will take around eight hours to complete.
Sophos Central Engineer v2.1.0 - 3
About This Course
This course is designed for technical professionals who will be demonstrating 
Sophos Central Endpoint and Server Protection. It provides an overview of 
the protection Sophos Central provides to endpoints and servers including 
the major capabilities and core configuration concepts
• This course will take around 8 hours to completeCourse Duration
Prior to taking this training you should have completed and passed the Sophos Central Overview 
Certified Engineer course. 
We recommend students have the following knowledge and experience: 
✓ Experience working with Active Directory
✓ A good understanding of IT security
✓ A good understanding of Windows operating system
Sophos Central Engineer v2.1.0 - 4
Prerequisites
Prior to taking this training you should:
✓ Have completed and passed the Sophos Central Overview - Certified Engineer course
We recommend students have the following knowledge and experience:
✓Experience working with Active Directory
✓A good understanding of IT security
✓A good understanding of Windows operating system
To complete the Sophos Central Engineer certified course, you must complete and pass the online 
assessment that is available in the training portal. 
You will have 2.5 hours to complete the assessment, and can take four attempts to pass the 
assessment. The assessment may include questions on both theory and simulation content.
You must complete and pass the online assessment if you wish to register for the Sophos Central 
Endpoint and Server Certified Architect course.
Sophos Central Engineer v2.1.0 - 5
Certification
To complete the Sophos Central Engineer certified course:
Complete and pass the 
assessment in the training portal
You have 2.5 hours to complete 
the assessment
You have 4 attempts to 
pass the assessment
The assessment may include 
questions on the theory or
simulations
Course Agenda
Server Protection
Threat cases, reports and Troubleshooting
Overview
Getting Started with Sophos Central
Endpoint Protection
1
3
4
5
2
This course is split into five modules with practical simulations interspersed throughout the course to 
allow for application of the content discussed in the previous modules. 
Sophos Central Engineer v2.1.0 - 6
Development
Sophos Central is in constant development
This course contents and labs are accurate at the time of writing
Sophos Central is in constant development. New features and improvements are frequently added 
several times a quarter. 
Depending on when you are studying this course, there may be differences between the content and 
the live version of Sophos Central. You can view a summary of changes via the ‘What’s New’ link within 
the Sophos Central Dashboard. Additionally, we recommend that you take some time to work through 
any Delta modules released subsequently to this course.
Sophos Central Engineer v2.1.0 - 7
Course Objectives
Once you complete this course, you will be able to:
Explain how Sophos Central Endpoint and Server protection helps protect against security threats
Perform an installation of Sophos Central on Windows and Mac endpoints and Windows servers
Customize threat protection and control policies
Demonstrate threat protection and commonly used features
Manage threat cases and view reports
Use the Endpoint Self-Help Tool to identify and resolve issues on Windows endpoints
Once you have completed this course you will be able to explain how Sophos Central Endpoint and 
Server protection helps protect against security threats. How to perform an installation of Sophos 
Central on Windows and Mac endpoints and Windows Servers. 
You will learn to customize threat protection, control policies and demonstrate threat protection along 
with commonly used features. Additionally, this course covers how to manage threats cases, viewing 
reports and how to use the Endpoint Self-Help tool to identify and resolve issues on Windows 
endpoints. 
Sophos Central Engineer v2.1.0 - 8
A glossary of technical terms used throughout the course can be found in knowledgebase article 
118500.
Sophos Central Engineer v2.1.0 - 9
Glossary of Technical Terms
A glossary of technical terms used throughout the course 
can be found in knowledgebase article 118500
https://community.sophos.com/kb/118500
Lab Environment
InternetStudent PC
CLIENTONE.SOPHOS.LOCAL
IP: 172.16.1.30
Windows 10 Client
DC.SOPHOS.LOCAL
IP: 172.16.1.10
Windows Server 2016
AD Domain Controller
CloudShare
DC
CLIENT ONE
CLIENTTWO.SOPHOS.LOCAL
IP: 172.16.1.40
Windows 10 Client
CLIENT TWO
This network diagram shows the environment that is used during the course and the simulations, you 
may find it useful for reference to provide additional context.
This diagram can also be found in the simulation workbook.
Sophos Central Engineer v2.1.0 - 10
Feedback is always welcome
Please email globaltraining@sophos.com
TRAINING FEEDBACK
Feedback on our courses is always welcome.
Please email us at globaltraining@sophos.com with your comments. 
Sophos Central Engineer v2.1.0 - 11
Throughout the rest of this module we will explain what security threats are and which are most 
prevalent. We will discuss how these threats are evolving and most importantly how Sophos Central 
Endpoint and Server Protection can prevent these threats from compromising your business. 
Sophos Central Engineer v2.1.0 - 12
Overview
RegistrationSecurity Threats
Top Security Threats
26%
20%
20%
12%
12%
8%
Advanced 
Malware
Ransomware
Email
Malware
Web
Malware
Generic
Malware
Cryptocurrency
Of organizations hit by 
ransomware
RANSOMWARE
*Source: State of Endpoint Protection Study 2018
54%
ADVANCED MALWARE
Zero-day attacks, Worms, Trojans, File-
less
EXPLOITS
Industrialized attacks, Flash, 
Downloaders, Behavioral
Se
cu
ri
ty
 T
h
re
at
s
Traditionally the primary form of an attack was what we would now call ‘generic malware’. Generic 
malware attacks are protected against using traditional anti-virus solutions, however, these types of 
attacks make up just 12% of security threats, so what makes up the other 88%?
Advanced malware makes up 20% of global security threats, this type of threat includes zero-day multi 
stage attacks. WannaCry and Petya are examples of advanced malware that also have a ransomware 
payload. Ransomware is increasing with 54% of organizations in 2017 being hit by ransomware.Email 
and web threats are also rising making up 32% of security threats against organizations. 
It is important to understand how exploits are becoming more prevalent across many of these 
categories, especially among the top four categories you see on this chart. Exploiting vulnerabilities is 
one of the fastest growing tactics among cybercriminals. To round out the chart, we’re seeing 
cryptocurrency mining now making up 8% of all threats we see. So what does this chart really tell us? 
That security threats are evolving and to protect your business it is essential to be using technology that 
can defend against all security threats. Endpoint and Server Protection from Sophos Central provides 
high level security to your endpoints across your network. To explain how it does this, let’s first look at 
how your network can be attacked.
The white paper for this can be found here: https://www.sophos.com/en-us/medialibrary/Gated-
Assets/white-papers/endpoint-survey-report.pdf 
Sophos Central Engineer v2.1.0 - 15
Drops new ransomware 
that encrypts local files
Anatomy of Attack
Credential Theft
Identify Targets
Move to other devices 
on the network
Gain Access Establish persistence Monetize
Vertical & Lateral
movement
User opens 
phishing email
A malicious script is launched.
It connects to a C&C server
Gains privileged access 
to your systems
Establishes persistence
Se
cu
ri
ty
 T
h
re
at
s
Here we have a ransomware attack example. A user in your organization opens a phishing email which 
has a document attached. 
The user opens the document which has a unique malicious script embedded. Once the document is 
opened the script is launched and breaks out of the programme it was opened in. Part of the script is 
executed to communicate back to a command and control server.
This communication is temporary, as it is only valid whilst the document is open. To establish 
persistence, the attacker compromises another application on the machine that is in constant use. 
Through this application, the attacker is able to access your systems.
Now the attacker has access to your systems, they can steal credentials. They can also scan your 
network to identify targets for movement across your network. 
Using the credentials they can also move to other devices on your network and to further organisations. 
Furthermore, they can drop ransomware onto your network and encrypt your files. Your business is now 
unable to function. 
Let’s review what’s happened here, through the phishing email, the attacker gains access to one 
machine in your network. Using an exploit, the attacker gains privileged access to establish persistence. 
The attacker then moves vertically and laterally through your network with the end goal of extortion.
Sophos Central Engineer v2.1.0 - 16
Intercept X Overview
Sophos Central
XG Firewall
Security Heartbeat
Intercept X
Status Updates
Ransomware
Zero-Day Threats
Se
cu
ri
ty
 T
h
re
at
s
So how does Sophos Central Endpoint and Server Protection stop this type of attack? 
Endpoint and Server protection incorporates Intercept X. This technology protects endpoints against 
malicious threats that bypass traditional anti-virus solutions. Typically, these threats are zero-day and 
ransomware. Intercept X focuses on identifying the technique used to compromise networks and 
devices rather than the threat itself. 
If Sophos XG Firewall is installed, synchronized security enables administrators to block any traffic 
passing through the firewall from a compromised endpoint, protecting the rest of your network from 
attack. 
Intercept X will report any actions back to Sophos Central allowing administrators to remotely control all 
protected endpoints. To learn more about Intercept X please complete the technical training course 
available in the Partner Portal. 
Sophos Central Engineer v2.1.0 - 17
Protection Overview
Control
Pre-Execution
In-Execution
Response
Visibility
Using Web, Application and 
Peripheral controls, restrict the 
transfer of sensitive data 
internally and externally.
Proactive detection features 
that prevent malware from 
executing on your endpoints.
Full visibility of endpoint health 
and attack analysis.
Quarantines, reports and 
cleans up attacks.
Protection features that detect malicious activity 
being performed by running processes.
Se
cu
ri
ty
 T
h
re
at
s
Endpoint Protection is made up of layers of security. These layers provide comprehensive security for 
your network. The layers can be roughly categorized as control, pre-execution and in-execution. 
Endpoint protection responds to an attack and the Sophos Central Admin Console provides full visibility 
of attacks and the health of all protected endpoints. 
Let’s look at each of these categories. By implementing control mechanisms you can reduce your attack 
surface area and protect sensitive data. Pre-execution features consist of proactive detection features 
that prevent malware from executing on your endpoints. In-execution layers provide protection features 
that detect malicious activity being performed by running processes. 
In response to an attack, endpoint protection quarantines, reports and cleans up an attack. It provides 
full visibility of your endpoints’ health status and displays attack analysis. 
Sophos Central Engineer v2.1.0 - 18
Control access to Websites based on their category
Enables administrators to block specific apps from running
Ensures removable media does not put your organization at risk
Monitors and restricts file transfers containing sensitive data
Control
Web Control
Application Control
Peripheral Control
Data Loss Prevention
Se
cu
ri
ty
 T
h
re
at
s
Endpoint protection provides you with the tools to control which websites your users can access, the 
applications they can use and the exchange of data both externally and internally. 
By controlling which websites your employees can access using Web Control, you can make use of the 
web security feature. This uses category based URL blocking to control users access to the internet.
Application control enables administrators to block specific applications from running on corporate 
endpoints. This means that you can control those applications that may be vulnerable to an attack. 
Using peripheral controls ensures removable media cannot put your organization at risk. Data loss 
prevention controls accidental data loss by monitoring and restricting the transfer of files containing 
sensitive data. 
Sophos Central Engineer v2.1.0 - 19
Signature-based & 
Machine Learning
Live lookups to 
Sophos servers
Pre-Execution
File 
Scanning
Live 
Protection
Se
cu
ri
ty
 T
h
re
at
s
As we have mentioned, security threats are evolving therefore having just one layer of protection is not 
going to provide you with complete protection. To prevent an attacker from establishing persistence on 
your network should they get that far, endpoint and server protection uses the following technologies to 
scan, protect and analyse the behaviour of your machines across your network. 
Endpoint protection uses signature based file scanning to scan files before they are opened, this will 
ensure that if an attacker is using a known threat, the anti-malware file scanning will detect and block 
this. Signature based file scanning relies on having seen the type of malware previously and detecting it 
based on specific characteristics of the file. Machine Learning was introduced with Intercept X, it scans 
any file being read, opened or written to. Deep neural networks are able to extract multiple features 
from a file and determine if that file is malicious before the program executes. The Machine Learning 
scan is looking for the techniques used in exploits rather than the specific characteristics of a malicious 
file. 
Additionally, live lookups are used to check the files against Sophos Servers. If a new file with a not yet 
defined signature is being read, endpoint protectionwill check this file against the latest data on the 
Sophos Servers. 
Sophos Central Engineer v2.1.0 - 20
Signature-based & 
Machine Learning
Live lookups to 
Sophos servers
Scans for potentially 
malicious behaviour
File Reputation 
Scanning
Pre-Execution
File 
Scanning
Live 
Protection
Behaviour 
Analysis 
(HIPS)
Download 
ReputationS
ec
u
ri
ty
 T
h
re
at
s
To protect against zero-day malware attacks, endpoint protection uses behaviour analysis (HIPS) to scan 
the behaviour on an endpoint that could be potentially malicious, for example, opening files and making 
copies of the files. 
It also makes use of download reputation which will check the reputation of a file. If a file has a low 
reputation score the file will be blocked. 
Sophos Central Engineer v2.1.0 - 21
Provides disk and boot record protectionWipeGuard
In-Execution
Monitors HTTP traffic to detect communication to known bad 
URLs such as command and control (C2) servers.
Detects and stops over 25 exploit methods used to compromise vulnerable 
applications.
Ransomware file protection
Anti Exploit
Malicious Traffic 
Detection (MTD)
CryptoGuard
Se
cu
ri
ty
 T
h
re
at
s
So what happens if malware gets through the control and pre-execution layers of protection in place? 
Endpoint Protection detects and removes malware. Anti-exploit technology which is part of Intercept X 
will detect and stop over 25 exploit methods used to compromise vulnerable applications. When exploit 
activity is detected, the exploited application will be terminated, the user notified of the detected 
activity and a clean up scan will be triggered. Behaviour monitoring (HIPS) also takes place at this layer 
of protection by monitoring potentially malicious behavior.
Malicious Traffic Detection (MTD) monitors HTTP traffic and is able to recognise communication to 
known bad URLs such as C2 (command and control) servers. MTD only monitors traffic from non-
browser applications because web protection monitors browser traffic. 
WipeGuard provides disk and boot record protection to prevent an attacker being able to infect your 
machines pre-boot. 
CryptoGuard provides ransomware file protection which prevents your files from being encrypted. 
Sophos Central Engineer v2.1.0 - 22
Response
Any malicious files 
detected are 
Quarantined
Sophos Clean 
removes any 
detected files
Synchronized 
Security Heartbeat
allows for the isolation 
of the machineSe
cu
ri
ty
 T
h
re
at
s
Should malware be detected on your network, Endpoint Protection will quarantine the source of the 
infection and Sophos Clean will clean it up. 
Whilst this is happening, the Synchronized Security Heartbeat will send a message to your XG Firewall to 
change its status. In response, the XG Firewall can then isolate the client from accessing the Internet (to 
prevent contact with a command and control server) and other networks protected by the XG Firewall. 
In addition to this, the XG Firewall will share the MAC address of the computer that has a RED health 
status with other computers so that they can isolate themselves from it. Once Sophos Clean has 
successfully cleaned up the threat, the Security Heartbeat will send another message to the XG Firewall 
to say that the threat has been removed and the machine is then able to communicate with your 
network again.
Sophos Central Engineer v2.1.0 - 23
Visibility
Visibility
Dashboard
Alerts
Logs
Reports
Threat 
Cases & 
Searches
Data 
Sharing API
Se
cu
ri
ty
 T
h
re
at
s
The Sophos Central Endpoint and Server Protection provides full visibility of your estate. Through the 
dashboard you can view the health of your machines, along with any alerts which are split by severity, 
this means that you will also see any critical alerts first. 
You can view logs and run reports that can be customized. You can also share your data with 3rd party 
reporting applications should this be required using the Data Sharing API. 
Additionally, you can gather more information by accessing on-demand threat intelligence curated by 
SophosLabs. Threat cases and searches allow you to view security incidents, providing visibility of the 
scope of the attack, how it started, what was impacted and how to respond. The search feature enables 
you to scan all endpoints in your network for the same malicious files allowing you to clean up and block 
that attack. 
Sophos Central Engineer v2.1.0 - 24
Drops new ransomware 
that encrypts local files
Protection Against Attack
Credential Theft
Identify Targets
Move to other devices 
on the network
Gain Access Establish persistence Monetize
Vertical & Lateral
movement
User opens 
phishing email
A malicious script is launched.
It connects to a C&C server
Gains privileged access 
to your systems
Establishes persistence
Se
cu
ri
ty
 T
h
re
at
s
We have seen how an attack can happen and covered the features Endpoint Protection uses to prevent 
the attack at the different levels. 
To prevent an attacker gaining access, endpoint protection controls the applications users are able to 
use, it monitors the behaviour of the file and prevents the communication to the command and control 
server. Using signature-based and machine learning scanning, it detects malicious files. Behaviour 
monitoring and anti-exploit prevents the vertical and lateral movement across your network. 
WipeGuard prevents an attacker compromising your machines boot and disk volumes and CryptoGuard 
prevents ransomware from encrypting your files. 
It is worth noting that some of the features discussed are active across multiple layers of protection. 
Through this course we will look at each feature in more depth and demonstrate how these are 
configured and managed. 
Sophos Central Engineer v2.1.0 - 25
Traditionally, cybersecurity has used endpoint and server protection products to identify malicious files 
and firewalls to stop malicious traffic. These two cybersecurity defences work well in isolation, however, 
are typically disconnected from each other. This disconnected approach means that an IT team will be 
manually correlating data between systems and identifying appropriate actions. This can take some time 
and often attacks are missed, research shows that 74% of data breaches go undiscovered for 6+months. 
Synchronized security takes a ‘full system’ approach to cybersecurity. Security solutions connect with 
each other in real time via a Security Heartbeat, working together to combat advanced threats. There 
are 3 pillars to this system: discover, analyze and respond. 
• Discover unknown threats. Sophos products automatically share information to reveal hidden risks 
and unknown threats. Sophos Central is able to see all network traffic, enabling identification of risky 
apps and malicious traffic. Additionally, it can identify risky users by correlating behaviours across 
multiple activities
• Real-time incident analysis and cross-estate reporting delivers instant insights, allowing you to see 
the full chain of events for an incident. This includes all files touched, and URLs/IPs communicated 
with
• Respond automatically to incidents. Adaptive policies automatically respond to infections and 
incidents. This allows those endpoints affected to be isolated, which stops attacks in real time
Sophos Central Engineer v2.1.0 - 26
• Identify unknown threats
• See ALL network traffic
• Identify risky users, apps 
and malicious traffic
• Real-time incident analysis
• Cross-estate reporting
• See the full chain of events 
for an incident
• Correlate network traffic
• Automatically respond to 
infections and incidents
• Isolate compromised 
endpoints
• Restrict access on trusted 
networks for non-compliant 
devices
• Initiate endpoint scans
Synchronized Security
RespondAnalyzeDiscover
Se
cu
ri
ty
 T
h
re
at
s
Synchronized Security automates detection, isolation, and remediation results, this enables attacks to 
be neutralized in seconds. 
Communication betweenfirewalls and endpoints is facilitated by the Sophos Security Heartbeat that 
creates a secure, two-way channel guided by Sophos Central. 
In addition to the close integration between Sophos XG Firewall and endpoint and server protection, 
Synchronized Security also integrates with other Sophos solutions; Sophos Wireless, Sophos Mobile and 
SafeGuard Encryption. To learn more about these solutions please view our on-demand training courses. 
Sophos Central Engineer v2.1.0 - 27
Synchronized Security Overview
 Security Heartbeat
 Peer isolation
 Synchronized App Control
 Configurable firewall rules
XG Firewall
 Guest Wi-Fi
 Hotspots
 Security Heartbeat
Sophos Wireless
 Control access to corporate 
networks
 Wipe, locate and disinfect 
compromised devices
Sophos Mobile
 Encrypt files
 Remove encryption keys on 
compromised endpoints
SafeGuard Encryption
Se
cu
ri
ty
 T
h
re
at
s
In the Sophos Central Overview course we explained that Sophos Central is supported on all major 
browsers. We recommend that you install or upgrade to a supported version of the listed versions.
Sophos Central Engineer v2.1.0 - 29
System Requirements
Sophos Central
Microsoft Edge
Mozilla FireFox
Apple Safari
Google Chrome
R
eg
is
tr
at
io
n
To get started with Sophos Central, you can sign up for a trial via the Sophos Website, browse to 
sophos.com/central and select Free Trial.
Sophos Central Engineer v2.1.0 - 30
Registration
Sign up for your Sophos Central trial at
sophos.com/central and click Free Trial
R
eg
is
tr
at
io
n
To login to Sophos Central via your browser, navigate to https://central.sophos.com this will take you to 
the login page. Enter your email address and password and select Sign In. 
The dashboard view is the first thing you see when you login to your Sophos Central account. Once you 
have started to use Sophos Central to protect endpoints, the Dashboard will provide an immediate 
overview of the state of your account and will display the devices and users once they have been 
configured. 
Sophos Central Engineer v2.1.0 - 31
Logging In
R
eg
is
tr
at
io
n
https://central.sophos.com 
Complete the following simulation tasks in Module 1:
• Task 1.1: Register for and activate a Sophos Central trial
• Task 1.2: Review a ransomware threat
Sophos Central Engineer v2.1.0 - 32
Module 1: Registration
• Complete the following simulation tasks for Module 1
▪ Task 1.1: Register for and activate a Sophos Central trial
▪ Task 1.2: Review a ransomware threat 
Use the Simulation Workbook to view details of each task and 
access the simulations
On completion of this module, you should now be able to perform the actions shown here. Please take 
a moment to review these.
If you are not confident that you have met these objectives, please review the material covered in this 
module.
Sophos Central Engineer v2.1.0 - 33
Explain how Sophos Central can detect and prevent security threats
Identify common security threats and which threat types are most prevalent
Module Review
• Now that you have completed this module, you should be able to:
Getting Started with Sophos Central
Version 2.1
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection
Hi there, this is Sophos Central Engineer Endpoint and Server Protection. This is module 2: Getting 
Started with Sophos Central. 
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection ET15 – Getting Started with Sophos Central
July 2020
Version: 2.1
Product version: Sophos Central
© 2020 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any 
means without the prior written consent of Sophos. 
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this 
document may be the trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or 
representations (whether express or implied) as to its completeness or accuracy. This document is subject to change at any 
time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon 
Science Park, Abingdon, Oxfordshire, OX14 3YP.
Sophos Central Engineer v2.1.0 - 36
Getting Started with Sophos Central
Protection
• Requirements
• Installation options
• Installation demonstration
User Management
• Adding users
• Active Directory Sync
• Role Based Access
Update & Traffic Management
• Update Cache
• Message Relays
This module will explain how to get started with Sophos Central, reviewing how to add users, Active 
Directory Sync and role based access. It will demonstrate how to protect endpoints and servers, 
discussing the requirements, deployment options and installation. 
Additionally we will discuss the use of Update Caches and Message Relays. 
Sophos Central Engineer v2.1.0 - 37
As we have discussed in the Sophos Central Overview course, users are a key element of management in 
Sophos Central. People can have policies assigned to them, be associated with devices and also be 
assigned administrative roles to manage Central.
To recap, users can be created in Sophos Central in several ways:
• You can create users manually
• Import a set of users using a CSV file
• The currently logged in user on a Windows or Mac computer is added as a new user during the 
installation
• When a new user logs into a managed Endpoint they are added to Sophos Central
• Synchronize users from Active Directory using the AD Sync Utility
Select the options to learn more about each of these methods of adding users.
Sophos Central Engineer v2.1.0 - 40
Add users manually or import users from a CSV file
The current user is added during the Endpoint installation or when a new user logs 
into a managed Endpoint
Synchronize users from Active Directory with the AD Sync Utility
Users
U
se
r 
M
an
ag
em
en
t
When you add a user manually , you provide their first and last name, email address, and optionally 
their login name for Exchange, which can be used to configure email access on mobile devices. The user 
can be assigned to one or more groups. When you click Save, the user is added to the users list. 
When adding users using a CSV file, two download links are provided that give you access to a blank 
template with the correct header information required for the import to be successful. The second 
template is one that has example data. Clicking Browse, you select your CSV file and then click Add. 
Once the details have been added you will see a confirmation box that advises how many users have 
been added, updated or skipped. 
Sophos Central Engineer v2.1.0 - 41
Adding Users Manually and using a CSV
U
se
r 
M
an
ag
em
en
t
Automatically Created from an Endpoint
U
se
r 
M
an
ag
em
en
t
Users are added to Sophos Central when the currently logged in user on a Windows or Mac computer is 
added as a new user during the installation and when a new user logs into a managed Endpoint they are 
added to Sophos Central. 
This short video demonstrates how this happens. 
Sophos Central Engineer v2.1.0 - 42
A convenient way to add large numbers of users into your Central account is to set up a synchronization 
with your Active Directory (AD). This uses a small background service on a computer in your domain to 
perform a regular, one-way sync from your AD to your Central account. 
The AD Sync utility can be downloaded from the Central console in Global Settings > Active Directory 
Sync. Once AD Sync has performed its first synchronization from Active Directory you will be able to 
review the status from the same location you downloaded the tool from.
Please note that other directory services such as OpenLDAP and eDirectory are not currently supported.
Sophos Central Engineer v2.1.0 - 43
AD Sync UtilityDomain Controller
Server with 
AD Sync
Sophos Central
U
se
r 
M
an
ag
em
en
t
We recommend installing and configuring AD Sync before you start deploying Sophos to your clients so 
that you can preconfigure the policies and apply them to users and groups.
AD Sync does not need to be installed on to a Domain Controller. Any computer that can connect to the 
Domain Controller can be used.
The Windows user that you configure in AD Sync to connect to Active Directory to gather the user and 
group information does not need to have administrative rights, any normal domain user that can read 
the directory is sufficient.
Sophos Central Engineer v2.1.0 - 44
AD Sync Utility
Install and configure AD Sync before you start deploying to 
clients
AD Sync Utility does not need to be installed onto a domain 
controller
The Windows user configured for AD Sync Utility does not 
need administrator rights, it can be a normal domain user
U
se
r 
M
an
ag
em
en
t
Once you have added users to Sophos Central, clicking on an individual user in the users list will open up 
the details page for the user, which is divided into four tabs:
• Summary, which contains an overview of the other three tabs
• Devices
• Events
• Policies
The ‘Devices’ tab displays all of the devices the user has associated to them, and allows you to perform 
a number of actions on the devices, depending on whether they’re mobiles or computers.
The ‘Events’ tab displays all of the events for a user, which can be filtered by time range.
The ‘Policies’ tab displays the policies that apply to them.
Sophos Central Engineer v2.1.0 - 45
User Details
U
se
r 
M
an
ag
em
en
t
Groups provide a way of applying policies to users with the same requirements. These groups can be 
manually created in Sophos Central as well as being synchronized from Active Directory. A user can be a 
member of multiple groups.
To add a group navigate to People > Groups > Add Group
Sophos Central Engineer v2.1.0 - 46
Groups
U
se
r 
M
an
ag
em
en
t
You saw that when adding a user they are assigned a role, with User being the default. Sophos Central 
supports role-based access control. This allows users to be given administrative rights to Sophos Central 
by assigning them to one of the pre-defined admin roles.
As well as configuring a user’s role when creating or editing people, Role Management can also be 
configured by navigating to Global Settings > Role Management from the General Settings section. 
Clicking on any of the pre-defined roles will show the privileges they have and the Role Members.
Sophos Central Engineer v2.1.0 - 47
Role-Based Access
U
se
r 
M
an
ag
em
en
t
Role-Based Access
• Full accessSuper Admin
• Partial access
• Unable to manage user roles and role assignments
Admin
• Read-only access
• Can view sensitive logs and reports
• Can receive alerts
Read-only
Help Desk
• Partial access
• Can view sensitive logs and reports
• Receives alerts and can clear them
• Can update Sophos Agent software
• Can scan endpoints
• Read-only access to settings
U
se
r 
M
an
ag
em
en
t
Let’s take a moment to remind ourselves of the pre-defined roles. 
The Super Admin role has access to everything in Sophos Central. This role is unable to be edited or 
deleted. Only those assigned the Super Admin role are able to make changes to Role Management. 
The Admin role has access to almost everything in Sophos Central, apart from the ability to manage 
roles and role assignments. 
The Help Desk role allows read only access for all settings in Sophos Central. In addition, the Help Desk 
role is able to look at sensitive logs and reports, receive and clear alerts, update the Sophos agent 
software on an endpoint and scan endpoints. The Help Desk role does not allow a user to assign policies 
or change settings. Due to these restrictions, a Help Desk user may see that some buttons are not 
displayed in the Sophos Central Admin console. 
The Read-only role has read only access for all settings in Sophos Central, in addition, they can look at 
sensitive logs and reports and receive alerts. Read-only role is unable to manage roles and role 
assignments. They are unable to assign policies, change settings, clear alerts, Update the Sophos Agent 
software on endpoints. Due to these restrictions, all options will be read-only when a user with this role 
logs into Sophos Central Admin console. 
Sophos Central Engineer v2.1.0 - 48
Activity
Select the minimum role that will allow a user to view and clear alerts in 
Sophos Central
Super Admin
Read Only Admin
Help Desk
SUBMIT
U
se
r 
M
an
ag
em
en
t
In this activity please select the minimum role that will allow a user to view and clear alerts in Sophos 
Central. 
Sophos Central Engineer v2.1.0 - 49
Endpoint System Requirements
• Mac OS X 10.11
• MacOS 10.12
• MacOS 10.13
• MacOS 10.14
• 2GB RAM
• 2GB Free Disk Space
• Windows 7, 8, 8.1, 10
• 2GB RAM
• 2GB Free Disk Space
MacWindows
P
ro
te
ct
io
n
https://sophos.com/kb/121027
Before you protect your endpoints, you should ensure that they meet the system requirements. 
The physical system requirements for a Windows Endpoint are that it requires 2GB of memory and free 
disk space. For Mac endpoints, they should have 2GB of memory and 2GB of free disk space. 
A list of all system requirements can be found in knowledge base article: https://sophos.com/kb/121027
Sophos Central Engineer v2.1.0 - 51
• x86_64 bit
• See knowledgebase article 
16819 for supported distributors
Server System Requirements
• Server 2008/R2
• Server 2012/R2
• Server 2016
• Server 2019
• 4GB RAM
• 5GB Free Disk Space
LinuxWindows
P
ro
te
ct
io
n
https://sophos.com/kb/121027
The physical system requirements for your Windows servers are fairly simple, with versions only 
requiring 4GB of memory and free disk space on the Server client. 
For details of which Linux distributors are supported, please see knowledgebase article 
https://sophos.com/kb/16819 on the Sophos website. 
A list of system requirements for all Sophos products can be found in knowledge base article 121027. 
Sophos Central Engineer v2.1.0 - 52
Deployment options
Protect Devices Email Setup Link
Bulk Deployment Migration from SEC
P
ro
te
ct
io
n
There are a number of ways to deploy the Sophos Central Agent onto your endpoints and servers. 
You can protect your endpoints by downloading the installer directly from Sophos Central, Email the 
Setup Link to your users, configure a bulk deployment or migrate your endpoints from Sophos Enterprise 
Console.
Select each of these methods to learn more about them. 
The Certified Architect course explores the bulk deployment options for Windows, Mac and Linux and 
migration from Enterprise Console in more detail. 
Sophos Central Engineer v2.1.0 - 53
Protect Devices
Endpoint Protection
Server Protection
P
ro
te
ct
io
n
The protect devices page is the starting point for deploying the Sophos Central Agent software. In the 
overview section, all devices that you are licensed to protect are listed.
Alternatively, if a product is selected from the MY PRODUCTS menu, Protect Devices is listed in the left-
hand menu for that product.
Sophos Central Engineer v2.1.0 - 54
Endpoint Protection
P
ro
te
ct
io
n
Once downloaded you will see the SophosSetup.exe which 
is then able to be run on the endpoint it has been 
download to
NOTE: Only licensed components will be shown here
Endpoint Protection allows you to download Intercept X and Device Encryption as separate components 
or to install them by downloading the complete installer. Please note that the components listed will 
depend on your licensed products. 
For both Windows and Mac endpoints it is possible to select the components that should be included 
when the installer is downloaded. For example, the customer only wants to install Intercept X but not 
Device Encryption. 
The installers you download are unique to your Sophos Central accountand will configure the endpoint 
to register with your account to be managed. 
For more information about software deployment methods, please see knowledgebase article 119625 
https://sophos.com/kb/119265.aspx 
Sophos Central Engineer v2.1.0 - 55
Demonstration of Mac Endpoint Installation from Sophos Central
P
ro
te
ct
io
n
The installation of the Sophos Agent on a Mac OS endpoint is very similar to a Windows endpoint. This 
quick video demonstrates how a Mac endpoint installation is completed.
Sophos Central Engineer v2.1.0 - 56
Server Protection
Server Protection provides:
• Exclusions for common server roles
• Process exclusions
• Environmental variables
• Server specific policies
P
ro
te
ct
io
n
Once downloaded you will see the SophosSetup.exe which 
is then able to be run on the Server it has been download 
to
Server Protection is designed specifically for servers. Exclusions for common server roles can be 
automatically applied. Process exclusions and environmental variables can be added to server policies 
which provide greater levels of control to linked servers. 
Server Protection is available for Windows and Linux Servers. It also includes Virtual Environment 
Protection for VMWare ESXi and Microsoft Hyper-V, as well as support for servers hosted by Amazon 
Web Services (AWS) and Azure. 
Although listed separately in the Server Protection page, the same Windows installers will automatically 
detect a server class operating system and place the server in the servers list to streamline the 
deployment process. 
For more information see knowledgebase article https://sophos.com/kb/121636. 
Sophos Central Engineer v2.1.0 - 57
Email Setup Link
P
ro
te
ct
io
n
You may wish for users to install protection on their own devices. To achieve this, you can email users a 
setup link. 
To do this, you would navigate to MANAGE PROTECTION > People. Select those users you wish to email 
the setup link to from the user list and select ‘email setup link’. When choosing to email the setup link to 
users, you are unable to select the components that are installed. All licensed components will be 
included by default. 
Within the email setup link window, you can also select to send the self service portal information to the 
user to enable them to manage their endpoint. 
Sophos Central Engineer v2.1.0 - 58
Bulk Deployment
http://sophos.com/kb/120611
Download 
SophosSetup.exe from 
Sophos Central 
Deploy the batch file using an AD script in 
Group Policy
Use SSCM for bulk deployment
P
ro
te
ct
io
n
If you need to deploy the Sophos Central client software to a large number of Windows Computers, you 
can download sophossetup.exe. You can deploy the SophosSetup.exe to your endpoints through one of 
the automated deployment methods. 
You can either deploy this using Active Directory scripts in your Group Policy. Alternatively, you can use 
Microsoft System Center Configuration Manager (SCCM) to distribute and install the Endpoint Agent. 
Please note that you should not deploy a user specific sophosetup.exe as received via email. If you do, 
all devices will be associated to the Sophos Central user that sent the email. 
For more information see knowledgebase article 120611 – Methods for automating the deployment of 
Sophos Central software to Windows computers. For organizations who use virtual machines, it is 
common to install all software on a ‘gold machine’ and then run multiple instances of this. This can 
cause problems for Sophos Central because they all attempt to use the same identity in the Central 
Admin Console. The steps needed to force clients to re-register with Central are described in 
knowledgebase article 120560 – How to install Sophos Central Endpoint on a gold image avoiding 
duplicate identities. 
Sophos Central Engineer v2.1.0 - 59
Migration from Sophos Enterprise Console (SEC)
For more information please see KBA: https://sophos.com/kb/122264
P
ro
te
ct
io
n
Migrate 
computers
6
Set up new 
policies in 
Sophos Central
5
Check which 
computers can 
be migrated
4
Install Sophos 
Central 
Migration Tool
3
Check the 
requirements 
for migration
2
Consider 
possible issues 
with migration
1
Migrate the 
on-premise 
management 
server
7
Another option for deployment is to migrate endpoints that are already protected by on-premise 
Sophos Enterprise Console (SEC), which provides protection for workstations and servers. If you already 
have a SEC installation, with your endpoints and servers protected, you can migrate these to be 
managed by your Central Account. To migrate your computers to Sophos Central, follow these key steps
1. Consider possible issues with migration such as endpoints that are unprotected during migrations, 
changing policy settings and endpoints where updating is configured differently
2. Check the requirements for migration. Please see Knowledgebase article 121751 to view 
unsupported features
3. Install the Sophos Central Migration Tool
4. Check which computers can be migrated. This can be completed using the migration tool
5. Setup new policies. The Migration Tool does not migrate your policy settings
6. Migrate computers. This is completed in the Migration Tool by selecting the required computers and 
clicking Migrate
7. Migrate the on-premise management server
For more information please review Knowledgebase article 122264 which describes how to perform a 
migration in more complex environments.
Sophos Central Engineer v2.1.0 - 60
Update Caches and Message Relays
U
p
d
at
e 
&
 T
ra
ff
ic
 M
an
ag
em
en
t
For more information see the FAQ: 
https://sophos.com/kb/122577
Misconfiguration of Update Caches can cause unintended consequences. We 
recommend completing the Sophos Central Architect course to learn more.
Downloads updates from Sophos Central and stores them in 
a cache that is available on a network
UPDATE CACHE
Enables your devices to communicate all policy and 
reporting data using a dedicated server
MESSAGE RELAY
An Update Cache server downloads updates from Sophos Central, it will then store the updates in a 
cache available on the network. When a device needs to update, it contacts the Update Cache server to 
get the updates from the cache. 
An Update Cache set up as a Message Relay can remove the requirement for direct access to Sophos 
Central all together. A Message Relay enables your devices to communicate all policy and reporting data 
via a dedicated server. 
Some common scenarios where Update Caches and Message Relays are either required, or will be a 
benefit, are:
• Where there are sites that have either low or limited bandwidth
• Networks that have restricted Internet access, or no direct Internet access
For maximum benefit, configure an Update Cache before deploying Endpoint Software. 
We strongly recommend that you take the time to understand what an Update Cache and Message 
Relay will do in your network if configured. Further information is included in the Architect course, 
additionally, please see Sophos Central Update Caches Frequently Asked Questions 
https://sophos.com/kb/122577
Sophos Central Engineer v2.1.0 - 62
The Update Cache software creates a local warehouse on your network for clients to update from. An 
Update Cache will use TCP port 8191 to communicate updates. TCP Port 443 is required to receive 
updates from Sophos Central. 
Message Relays work in a similar way to the Update Caches, but for management traffic rather than 
updates. The Message Relay uses TCP Port 8190 to for traffic management.
Once one or more Update Caches have been deployed and an endpoint updates it will automatically try 
to update from the closest Update Cache. If none of the Update Caches can be reached, the endpoint 
will try to update from Sophos Central directly. 
Endpoints select a Message Relay using the same method as for Update Caches.
Sophos Central Engineer v2.1.0 - 63
Update Cache and Message Relay Overview
Mobile Devices
Roaming Users/
Home Workers
Servers / Virtual Servers
Office-based Users
Management
Sophos Central
Updating
Update Cache
&
Message Relay
TCP:8191
TCP:8190
TCP:8191
TCP:8190
TCP:443 (HTTPS)
U
p
d
at
e 
&
 T
ra
ff
ic
 M
an
ag
em
en
t
Update Caches can be installed onto supported Windows Servers that have 5GB of free disk space, and 
port 8191 available. On Windows Servers the Update Cache installer will open port 8191 in the 
Windows Firewall.
Server Standard Protection license and Server Protection must be installed before an Update Cache can 
be deployed to that server. 
The recommended specifications for Update Cache servers are:
• 2 CPUs and 4GB of RAM to serve up to 2,000 computers
• 4 CPUs and 8GB of RAM to serve up to 5,000 computers
If the server is performing other roles, additional RAM and CPUs will need to be added. Message Relays 
can only be deployed on Update Caches, and in addition to the Update Cache requirements also needs 
port 8190 to be available. There are currently some limitations when using Message Relays, please see 
knowledge base article to see a list of these: https://sophos.com/kb/122577
Sophos Central Engineer v2.1.0 - 64
Update Cache & Message Relay Requirements
 5 GB of free disk space
 Port 8191 available (inbound)
 Uses ports 80 and 443 (outbound)
 Windows 2008/2008 R2/2012/2012 
R2/2016
Sizing
Up to 2,000 computers Up to 5,000 computers
 2 CPUs
 4 GB RAM
 4 CPUs
 8 GB RAM
U
p
d
at
e 
&
 T
ra
ff
ic
 M
an
ag
em
en
t
Pre-Requisites
Update Cache
 Update Cache
 Port 8190 available
 https://sophos.com/kb/122577
Pre-Requisites
Message Relay
Learn More
Update Cache & Message Relay Configuration Demonstration 
U
p
d
at
e 
&
 T
ra
ff
ic
 M
an
ag
em
en
t
This demonstration shows how to configure a server as an Update Cache and a Message Relay. 
You will need to be logged into the Sophos Central Admin Console. From the dashboard, select Global 
Settings from the left-hand menu. Scroll down to the Server Protection section and select Manage 
Update Caches and Message Relays. The drop down menu allows you to filter the list to easily select 
Cache Capable Servers. 
Select the server(s) that you want to setup as the Update Cache and Message Relay and click Set Up 
Cache/Relay. In the Set Up Update Cache and Message Relay window you are able to select to only set 
up an Update Cache, or to also setup a Message Relay. The server requirements are listed here as well 
as the ports that will need to be available. Once you have selected your options, click Setup. 
The update cache configuration will take some time. It will install and download the configuration. Once 
it has completed, the Cache Status will change to ‘Active’. You can view the Update Cache status of a 
server on the SUMMARY tab in the Server Protection view. Once the Update Cache has been 
configured, the server will automatically configure all managed endpoints to update from the cache. 
Sophos Central Engineer v2.1.0 - 65
In Global Settings > Manage Update Caches and Message Relays you can see which endpoints have 
been updating from the Update Cache(s) you have activated. You should do this a few hours after 
deploying the Update Cache to ensure that no endpoints are updating from the cache that should not 
be.
You can also choose to manually assign endpoints to specific Update Caches. To assign computers 
manually, move them from the ‘Available Computers’ on the left, to the ‘Assigned Computers’ on the 
right.
Sophos Central Engineer v2.1.0 - 66
Managing Update Cache & Message Relay Clients
U
p
d
at
e 
&
 T
ra
ff
ic
 M
an
ag
em
en
t
Complete the following simulation tasks in Module 2:
• Task 2.1: Manually add users and groups
• Task 2.2: Install and configure Active Directory Sync
• Task 2.3: Configure role-based access
• Task 2.4: Deploy Sophos Protection to Endpoints
• Task 2.5: Deploy Sophos Protection to a Server
Sophos Central Engineer v2.1.0 - 67
Module 2: User Configuration and Protection
• Complete the following simulation tasks in Module 2
▪ Task 2.1: Manually add users and groups
▪ Task 2.2: Install and configure Active Directory Sync
▪ Task 2.3: Configure role-based access
▪ Task 2.4: Deploy Sophos Protection to Endpoints
▪ Task 2.5: Deploy Sophos Protection to a Server
Use the Simulation Workbook to view details of each task and 
access the simulations
On completion of this module, you should now be able to perform the actions shown here. Please take 
a moment to review these.
If you are not confident that you have met these objectives, please review the material covered in this 
module.
Sophos Central Engineer v2.1.0 - 68
Configure role-based access to provide appropriate permissions to users
Explain the methods for adding users to Sophos Central
Module Review
• Now that you have completed this module, you should be able to:
Identify the deployment options available for Windows endpoints and servers
Install Sophos Central on Windows and Mac endpoints and Windows servers
Hi there, this is the Sophos Certified Engineer course for Sophos Central Endpoint and Server Protection. 
This is module 3: Endpoint Protection.
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection ET15 – Endpoint Protection
July 2020
Version: 2.1
Product version: Sophos Central
© 2020 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any 
means without the prior written consent of Sophos. 
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this 
document may be the trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or 
representations (whether express or implied) as to its completeness or accuracy. This document is subject to change at any 
time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon 
Science Park, Abingdon, Oxfordshire, OX14 3YP.
Sophos Central Engineer v2.1.0 - 71
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection
Endpoint Protection
Version 2.1
In this module we will describe how to manage your protected endpoints in Sophos Central and how to 
configure the policies that will provide them the best protection and control the data your users are able 
to access. We will also describe how to add exclusions, use content control lists and rules and explain 
the use of Tamper Protection.
Additionally, we will demonstrate the best way to remove Endpoint Protection from an endpoint. 
Sophos Central Engineer v2.1.0 - 72
Endpoint Protection
Control
• Exclusions
• Tamper Protection
• Content Control Lists & Rules
Removal
• Removing Endpoint Protection
Management
• Endpoint Management
• Policies
Sophos Central Architecture
Remote Office Main Office Roaming
MCS
Updating
Sophos Central
M
an
ag
em
en
t
A key benefit of Sophos Central is that it does not matter where the endpoints are located. No server 
hardware is required to manage the endpoints as all management takes place in the cloud-based 
management system. 
All endpoints communicate with the Sophos Central Console via Management Communications System 
(MCS) over the Internet using HTTPS. By default all endpoints obtain the latest threat updates directly 
from online Sophos warehouses, however, you can configure a server update cache if needed.
Sophos Central Engineer v2.1.0 - 75
Manage Endpoint Software
Select the components you want to 
install on your endpoints
M
an
ag
em
en
t
All protected endpoints are listed in the Endpoint Protection Computers page, navigate to MANAGE 
PROTECTION > Computers in the left-hand menu. The Computers page lists the name, IP address and 
OS of your protected endpoints. Additionally, it lists the components that are installedon the endpoint 
and the last user that logged in. 
Components can be assigned to or removed from endpoints by selecting the endpoint(s) from the list 
and selecting Manage Endpoint Software. 
For each component you will see a list of eligible and assigned computers based on which endpoints 
have the component assigned and which do not. You can move endpoints from eligible to assigned and 
click Save. 
Sophos Central Engineer v2.1.0 - 76
Computers
Filter your 
endpoints and 
manage your 
endpoint 
software
M
an
ag
em
en
t
In the Computers view in Endpoint Protection, you can filter your endpoints. Here, we have filtered the 
view to only show Windows Computers. 
You can edit an endpoint by selecting the checkbox; once selected the delete option becomes available. 
Sophos Central Engineer v2.1.0 - 77
Computer Groups
Create 
Computer 
Groups
M
an
ag
em
en
t
To manage a large estate of computers, you can create computer groups for your endpoints. Select Add 
Computer Group. 
Give the computer group a name and optionally a group description. You can then move those 
computers you wish to be part of that group into the group and save the changes. 
Once you have saved the changes, you will see the computer group appear in the list of computer 
groups. 
Please note, computers can only be a member of one computer group. 
Sophos Central Engineer v2.1.0 - 78
Endpoint Protection Policies
C
o
n
tr
o
l Policies are applied in the 
order they appear. 
The base policy is always 
applied last
Policies are used in Sophos Central to define the security measures that will be applied to protected 
endpoints. Policies are split into different areas of protection and Sophos Central comes pre-configured 
with base policies. These policies contain Sophos’ recommended settings and are applied to all users. 
To exercise more granular control, you can create additional policies with different settings, and apply 
these to specific users or endpoints. You can clone an existing user policy or create a new policy.
Policy settings can be received from multiple policies. The order that the policies appear in the list in 
Sophos Central dictates which order the settings in the policies are applied, regardless of whether the 
policy type is user or computer. Those at the top of the list have priority and are applied first. We use a 
first match approach, this means that the first policy that matches either the user, user group, computer 
or computer group it was assigned to will be used.
Best practice is therefore to configure your base policies in a way that they cover all standard scenarios 
and then create additional policies for specific computers or users where other settings are needed.
Sophos Central Engineer v2.1.0 - 80
Endpoint protection policies can be applied to users and user groups meaning that they apply regardless 
of the computer being used. 
They can also be applied to computers and computer groups, in which case they ensure consistent 
protection that is not affected by the user that logs in. 
To learn about the policies select the policy name on the left. When you have selected all policies, click 
Finish.
Sophos Central Engineer v2.1.0 - 81
Policies
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
C
o
n
tr
o
l Policies are split into different areas of protection.
To learn about each policy select the policy name on the left.
When you have selected all policies, click Finish.
Finish
Windows Firewall
The threat protection policy helps you to keep you users protected against malware, risky file types and 
websites and malicious network traffic. 
To create a threat protection policy navigate to CONFIGURE > Policies > Add Policy. From the drop down 
menu select Threat Protection. Select if the policy will be applied to users or devices.
In the USERS tab you can apply the policy to the required users. Similarly, if you are creating a policy to 
be deployed to multiple users, you can use the GROUPS tab to apply it to specific groups. 
The SETTINGS tab, you will see an Active Adversary Mitigations drop down menu. We recommend that 
you enable these features (until they are automatically released for all users). Select Custom from the 
drop down menu and select all available options here.
The use recommended settings is automatically enabled. The recommended settings provide the best 
protection you can have without complex configuration. Please note that if Sophos changes their 
recommendations in the future, we will automatically update your policy with the new settings. 
Although settings will be enabled for you by default, it is useful to know what they mean. 
Live Protection – Checks suspicious files against the latest information in Sophos Labs. You can select to 
enable live protection during scheduled scans and automatically submit malware samples to Sophos. 
This will send a sample of detected malware to Sophos for analysis. 
Deep Learning – Deep Learning uses advanced machine learning to detect threats. It can identify known 
and previously unknown malware and potentially unwanted applications without using signatures.
Sophos Central Engineer v2.1.0 - 82
Policies
C
o
n
tr
o
l
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
Windows Firewall
Real-time scanning – Local Files and Network Shares – Scans files as users attempt to 
access them, denies access unless the file is clean. On Read means that files will be 
scanned when a file is opened. On Write means that files will be scanned when the 
file is saved. 
Real-time scanning – Internet – Scans internet resources as users attempt to access 
them. Detect low-reputation files will warn a user if a download has a low reputation. 
The reputation is based on a file’s source, how often it is downloaded and other 
factors. You can specify the action to take, the user can be given the option to trust or 
delete a file with a low-reputation score. Prompt user is the default setting here. For 
the reputation level, if you select strict, medium-reputation as well as low-reputation 
files will be detected. The default setting is recommended. 
Remediation – Sophos Central will attempt to clean up detected malware 
automatically. If this is successful, the alert in Sophos Central against the 
compromised endpoint is deleted. The detection and clean up are displayed in the 
events list. Threat Cases are created to assist with investigating the malware infection 
allowing you to pinpoint areas to improve your security. Please note that automatic 
clean up is not performed for portable executable (PE) files like applications, libraries 
and system files. PE files are quarantined and can be restored. 
Runtime Protection – Protects against threats by detecting suspicious or malicious 
behaviour or traffic. Here you can protect your files from ransomware (CryptoGuard), 
your master boot record from ransomware and destructive attacks (WipeGuard) and 
your web browsers against exploitation by malware. Additionally, you can select to 
mitigate exploits in vulnerable applications which protects the applications most 
prone to exploitation by malware. You can protect the processes on your endpoints 
which helps prevent the hijacking of legitimate applications by malware.
Runtime protection also detects traffic between an endpoint computer and a server 
that indicates a possible attempt to take control of the endpoint computer (a C2 
server) and detects malicious behaviour (HIPS) which can protect against unknown 
threats by detecting and blocking behaviour that is known to be malicious or is 
suspicious. 
Device Isolation, when enabled, allows computers to isolate themselves if they have a 
red health status. Once isolated, the computer will isolate itself from the network, 
however, it will still communicate with Sophos Central. 
Scheduled scanning, Scanning Exclusionsand Desktop Messaging can be configured in 
the threat protection policy however, we will discuss these later in this module. 
Sophos Central Engineer v2.1.0 - 82
Policies
C
o
n
tr
o
l
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
Windows Firewall
To control the data coming into and going out of your business, Sophos Central allows you to control 
peripheral devices being used on protected endpoints. You can restrict access to devices on an endpoint 
such as USB sticks and wireless network cards. Peripheral control policies let you both monitor and 
block the use of removable devices and other peripherals on your Windows and Mac endpoints. 
By setting the access policy to allow or block, you can control access to these peripherals on your users’ 
devices. For storage media, such as USB or optical drives, you can also set them to be read-only, and 
wireless devices can be prevented from being used in bridge mode. 
Any detected peripherals will be recorded and can then be used in the exemptions section to specify an 
explicit rule for a particular peripheral. For example, a detected optical drive may be blocked in the 
overall policy settings, but an exemption can be created for a particular optical drive model. 
Sophos Central Engineer v2.1.0 - 83
Policies
C
o
n
tr
o
l
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
Windows Firewall
Application Control in Sophos Central lets you monitor and manage the applications that your users 
have access to. In the policy, you can define all of the applications that you want to control, and whether 
you want them to be detected on user access and/or during scans. 
You can also choose to allow or block the controlled applications, so this feature can be used to track 
and restrict your user’s activities. You will be notified if any detections in the endpoints properties page 
in the Central Console. 
To get started, click on the add/edit list button. You will see a popup containing a comprehensive list of 
applications, organised into categories. This list is populated and maintained by Sophos and contains all 
of the applications that you are likely to want to control. If you have an application that is not in the list, 
just let us know via the link in the bottom of the policy section and we will add it for you. 
You can choose a single application within a category, or select everything currently in that set. You can 
also choose to automatically add any new applications that Sophos adds to the category in the future. 
For example, if you wanted to block all browser toolbars, you’d select everything currently in the toolbar 
category, and check the box shown to automatically add any future toolbars that are added. 
Sophos Central Engineer v2.1.0 - 84
Policies
C
o
n
tr
o
l
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
Windows Firewall
Data Loss Prevention (DLP) is part of Endpoint Protection and controls accidental data loss by 
monitoring and restricting the transfer of files containing sensitive data. For example, it can be used to 
prevent a user sending a file containing sensitive data home using web-based email. 
In the SETTINGS tab you will see an option to Use rules for data transfers. Turn this on to create and use 
rules. Turn it off to stop using rules. For example, if you want a policy that you can use to exempt certain 
users. Once switched on you can choose to create a rule from a template based on your region, or 
create a new rule. You can add an existing rule, create a new content rule or create a new file rule. Each 
option will present you with an option to set conditions such as where the file contains, or the 
destination is. Exclusions like where the file name matches or the file type is. Finally you can determine 
the action. The event is always logged, therefore the actions can be to allow the file transfer, allow the 
transfer if the user confirms or block the transfer. 
Data Loss Prevention Policies contain one or more rules. It is possible to add an existing content or file 
rule to a policy or create a new rule. Rules and content control lists that will be used across multiple 
policies can be managed from Global Settings. 
Sophos Central Engineer v2.1.0 - 85
Policies
C
o
n
tr
o
l
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
Windows Firewall
Web Control is part of Endpoint Protection and is focused on giving the administrator control over web 
browsing. This complements Web Protection, which is part of the threat protection policy and is 
designed to prevent threats reaching the web browser. For the additional security options section, you 
can choose how risky files, advertisements and uncategorized files are dealt with on the endpoint. You 
can use the Sophos recommended settings or specify yourself how each type of file should be 
processed, based on categories such as ActiveX controls and PDF Files. 
The acceptable web usage section allows you to control which websites your users are allowed to visit. 
There are four pre-set categories, keep it clean, gentle guidance, conserve bandwidth and business only. 
All of which apply different settings to allow, block or warn for various categories and sub-categories of 
websites. Alternatively you can choose to specify your own settings, should you want to have more 
granular control over certain websites or categories. 
You can choose to log all attempts to visit blocked sites, along with instances where users proceed past 
warnings, or choose only to log attempts to visit infected sites. It is possible to change the default 
behaviour of Web Control for specific websites. This can be achieved either by applying tags to them, 
which can then have an action configured for them in the policy, or by overriding the default category 
for the website. Website customization is located in Global Settings, website management. 
Customization can be applied for single URLs, domains, TLDs (top level domains), IP addresses and CIDR 
ranges (subnets). Once configured the websites can be added to the custom sites section of policies and 
then have specific actions defined for them that override the settings elsewhere in the policy.
Sophos Central Engineer v2.1.0 - 86
Policies
C
o
n
tr
o
l
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
Windows Firewall
Update Management Policies can be used to specify when product updates become available to 
devices. Different scheduled times can be applied to computer groups. 
This policy only affects product updates, not updates to threat information. 
Sophos Central Engineer v2.1.0 - 87
Firewall Policy
C
o
n
tr
o
l
Peripheral Control
Data Loss Prevention
Update Management
Threat Protection
Application Control
Web Control
Windows Firewall
You can monitor and configure Windows Firewall and monitor other registered firewalls on your 
computers using a Windows Firewall policy. 
Please note that other firewalls or Windows Groups Policy settings may affect how the policy is applied 
in individual endpoints. We advise that you test any firewall rules you create to ensure that 
communication with Sophos is allowed. 
In the monitor type select the level of monitoring you require. 
Monitor Only – This is the default options that enables devices to report their firewall status to Sophos 
Central. 
Monitor and Configure Network Profiles – As well as reporting their firewall status, you can choose 
whether to block or allow inbound connections on Domain, Private and Public networks. You can select 
to Block All, Block with exceptions or Allow all.
Sophos Central Engineer v2.1.0 - 88
Exclusions
C
o
n
tr
o
l
Earlier you saw where to add exclusions in a threat protectionpolicy. It is also possible to configure 
global exclusions for scanning, which might be useful to allow certain files, websites or applications to 
be used even if they are being detected as malware by the scanning engine. 
You can exclude applications from protection against security exploits, for example, you might want to 
exclude an application that is incorrectly detected as a threat or PUA, until the problem has been 
resolved. Additionally, if you have device isolation enabled, you may want to add an exclusion for the 
source IP addresses or range that are allowed to connect to computers using Remote Desktop Protocol 
(RDP). Usually this would be the IT admin machines. 
Global exclusions can be applied by navigating to Sophos Central Admin Console > Global Settings > 
Global Exclusions. To add an exclusion, select the Exclusion Type from the drop-down menu. Once 
selected enter the value of the exclusions, the file path, the website name or the process for example. 
Please note that some third party applications such as SQL Server and Microsoft Exchange have 
recommended exclusions which apply to all anti-virus products. Details of these can be found in 
knowledgebase article 35970. 
Sophos Central Engineer v2.1.0 - 89
Exclusions
C
o
n
tr
o
l
These exclusions apply to just this policy and 
therefore to devices or users depending on 
your policy configuration
These exclusions apply to all users
Let’s see how this looks in a policy. In the exclusions section of the SETTINGS tab you can view all of the 
global exclusions that have been configured. Please note that these exclusions apply to all users and are 
only added, edited or removed via System Settings > Global Exclusions.
You can add policy exclusions within a specific threat protection policy if required. These exclusions will 
apply to just that policy and therefore only to those devices or users that have had the policy assigned. 
Sophos Central Engineer v2.1.0 - 90
Tamper Protection
C
o
n
tr
o
l
Prevents users from 
uninstalling Sophos 
Protection
Prevents users from 
modifying the protection 
settings
Can be disabled however 
this is NOT recommended
Tamper Protection can be used to prevent users from uninstalling the Sophos Endpoint Agent or 
modifying their protection settings. This means that certain parts of the client software are read-only, 
unless the user authenticates themselves with this password. 
Tamper protection is enabled by default, however, it can be disabled using Global Settings. Each 
endpoint is assigned a unique tamper protection password that can be viewed by checking the ‘show 
password’ tick box. You can also generate a new password should this be required by clicking ‘Generate 
New Password’. 
The ability to disable tamper protection is included so that the endpoint software can be removed by an 
administrator if required. 
Sophos Central Engineer v2.1.0 - 91
Content Control Lists (CCL) 
Select Content Control Lists 
from the Global Settings menu
C
o
n
tr
o
l
Data Loss Prevention policies use Content Control Lists (CCL) to define a set of conditions that specify 
file content. For example, credit or debit card numbers or bank account details near to other forms of 
personally identifiable information. 
Sophos Central Engineer v2.1.0 - 92
Content Control Lists (CCL) 
C
o
n
tr
o
l
Sophos Labs provide a large number of pre-defined CCLs. To reduce the number of CLLs shown in the 
list, it is possible to filter by region, source and type. 
Each content list description can be viewed by hovering over the information icon. Additionally, you can 
select to export, clone or remove a specific item. You can create your own content control lists if you 
have custom requirements. These are referred to as Custom Content Control Lists. 
Custom CCLs are covered in more depth in the Endpoint and Server Certified Architect course. 
Sophos Central Engineer v2.1.0 - 93
Rules
To create a new rule select 
from Content or File rules
C
o
n
tr
o
l
If data is matched to a CCL, rules are used to define the action taken. 
• To create a new rule based on content, select New Content Rule
• To create a new rule based on a file type, select New File Rule
A content rule is a rule that controls the transfer of certain types of data whereas a file rule controls the 
transfer of certain file types or file names. 
Sophos Central Engineer v2.1.0 - 94
Content Rules
C
o
n
tr
o
l
When creating a new content rule you will enter the name and description of the rule. Please note that 
the description is what will be displayed when you hover over the information icon therefore, the 
description needs to accurately describe what the content rule is for. 
You can then define which exclusion is applied, ‘where the file name matches’ or ‘where the file type is’. 
You also set the action to take here, for example block transfer. Clicking Next Rule Configuration will 
allow you to define the conditions of the content along with the destination. Additionally, you can add 
any exclusions to this content rule and click Finish. 
The new rule will be listed, hovering over the information icon will display the description of the rule. 
Sophos Central Engineer v2.1.0 - 95
Rule Actions
C
o
n
tr
o
l
Creating file content rules follows the same process as content rules.
The actions that can be defined for a rule are: 
• Allow transfer
• Allow transfer if user confirms
• Block transfer
Whichever action is selected will be logged. This allows you to build up a picture of data transfer in your 
network. This information can then be used to guide creation of additional rules. 
Sophos Central Engineer v2.1.0 - 96
Deleting Endpoints
Disable Tamper ProtectionRe
m
o
va
l
If you wish to delete an endpoint, firstly you need to remove the Tamper Protection from the device so 
the endpoint software can be uninstalled. 
The endpoint agent can then be uninstalled by locating and removing the software on the endpoint. 
Once completed, you can delete the endpoint from Sophos Central.
Sophos Central Engineer v2.1.0 - 98
Deleting Endpoints
Remove the Endpoint Agent 
(Windows)
Remove the Endpoint Agent 
(Mac)
R
em
o
va
l
Once Tamper Protection has been disabled, the endpoint agent can be removed from the endpoint. 
The example shows what this looks like on both a Windows and Mac endpoint. For the Mac Endpoint, 
we did NOT disable Tamper Protection in the Central Console. 
Sophos Central Engineer v2.1.0 - 99
Deleting Endpoints
Removal confirmation
(Windows)
Removal confirmation
(Mac)
R
em
o
va
l
Before you remove the endpoint agent, you will see a confirmation message asking if you are sure you 
want to remove the endpoint agent. 
For Mac endpoints you will click Continue. For Windows, you will click Uninstall. 
Sophos Central Engineer v2.1.0 - 100
Deleting Endpoints
Tamper Protection password 
is requested
Mac admin password is 
required
R
em
o
va
l
For the Mac endpoint, we did not disable Tamper Protection through the Central Console. During the 
removal process on the Mac, the user is asked to enter the Tamper Protection password before being 
allowed to remove the Endpoint Agent. 
For Mac devices, the user will also need to confirm their administrator password to allow the helper tool 
to run which aids the removal. 
Sophos Central Engineer v2.1.0 - 101
Deleting Endpoints
Removal Process
(Windows)
Removal Process
(Mac)
R
em
o
va
l
The endpoints will show the status of the removal or uninstall of the endpoint agent. 
Sophos Central Engineer v2.1.0 - 102
Deleting Endpoints
Uninstall Successful
(Windows)
Removal Successful
(Mac)
R
em
o
va
l
Once the Endpoint Agent has been removed/uninstalled successfully a confirmation message will be 
displayed on the endpoint. 
Sophos Central Engineer v2.1.0 - 103
Deleting Endpoints
R
em
o
va
l
A reminder is provided to ensure you have 
removed the Sophos software from the 
endpoint and that tamperprotection has 
been disabled
To remove an endpoint from the Sophos Central Endpoint Protection Console, select it from the list of 
endpoints and then click Delete. 
You will see a confirmation window to ensure that you really mean to delete the endpoint from your 
Central Console. Once you select Delete, the endpoints will be removed from the Sophos Central 
Endpoint Protection Console, however, this deletion process ONLY removes the device from the 
Console, it will not remove the Endpoint Agent from the device itself. 
Sophos Central Engineer v2.1.0 - 104
Recover Tamper Protection Passwords
R
em
o
va
l
Click View details to view the tamper protection 
password for current and deleted endpoints
In the logs & reports section you can use the Recover Tamper Protection passwords report. Using this 
report an administrator can get access to tamper protection passwords from computers that were 
deleted from Sophos Central prior to the deinstallation of the client.
This is especially useful if a client was deleted from Central BEFORE the Endpoint Protection Agent was 
removed on the client. Please note, tamper protection passwords for deleted computers are saved for 
90 days. If you do need to access a deleted device after 90 days please see the instructions in this 
Knowledgebase article: https://sophos.com/kb/124377
Sophos Central Engineer v2.1.0 - 105
Complete the following simulation tasks in Module 3:
• Task 3.1: Test Threat Protection with the Recommended Settings
• Task 3.2: Create and Test a Threat Protection Policy
• Task 3.3: Configure and Test Application Control
• Task 3.4: Configure and Test Web Control
• Task 3.5: Configure and Test Data Loss Prevention
Sophos Central Engineer v2.1.0 - 106
Module 3: Endpoint Protection Policies
• Complete the following simulation tasks in Module 3
▪ Task 3.1: Test Threat Protection with the Recommended Settings
▪ Task 3.2: Create and test a Threat Protection Policy
▪ Task 3.3: Configure and Test Application Control
▪ Task 3.4: Configure and Test Web Control
▪ Task 3.5: Configure and Test Data Loss Prevention
Use the Simulation Workbook to view details of each task and 
access the simulations
Module Review
• Now that you have completed this module, you should be able to:
Customize threat protection and control policies
Demonstrate how to manage protected endpoints in Sophos Central
Uninstall Sophos Central Endpoint Protection from Windows and Mac endpoints
On completion of this module, you should now be able to perform the actions shown here. Please take 
a moment to review these.
If you are not confident that you have met these objectives, please review the material covered in this 
module.
Sophos Central Engineer v2.1.0 - 107
Hi there, this is the Sophos Certified Engineer course for Sophos Central Endpoint and Server Protection. 
This is module 4, Server Protection. 
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection ET15 – Server Protection
July 2020
Version: 2.1
Product version: Sophos Central
© 2020 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any 
means without the prior written consent of Sophos. 
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this 
document may be the trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or 
representations (whether express or implied) as to its completeness or accuracy. This document is subject to change at any 
time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon 
Science Park, Abingdon, Oxfordshire, OX14 3YP.
Sophos Central Engineer v2.1.0 - 110
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection
Server Protection
Version 2.1
This module will cover Server Management, it will explain the server policies and configuration of 
exclusions. We will demonstrate Server Lockdown and explain why this is a useful feature for your 
business. 
We will discuss file integrity monitoring and explain it’s uses and benefits. Additionally, we will explain 
how to protect your Virtual Environments using Server Protection. 
Sophos Central Engineer v2.1.0 - 111
Server Management
File Integrity Monitoring
• Overview
• Policy 
• Management
Server Management
• Policies
• Exclusions
Virtual Environments
• SVM and GVM
• AWS
• Azure
Server Lockdown
• Overview
• Policy
• Management
Servers
All protected 
Servers are listed 
under the Servers 
tab
Se
rv
er
 M
an
ag
em
en
t
Windows and Linux servers appear in the Sophos Central Admin Console in a similar way to endpoints. 
You access the servers view via the dedicated Server Protection menu. Servers are deployed in the same 
way as endpoints and you will see a list of all of the servers that are linked to your account in the Servers 
tab. All Servers are listed with the Name/OS, IP address, when they were last active, the group they are 
associated with, the License they are using and the lockdown status.
Sophos Central Engineer v2.1.0 - 114
Server Details
The Server Protection 
view displays the 
information about 
that server
Se
rv
er
 M
an
ag
em
en
t
Selecting a server from the server list will display the Server details. From this view you can view the 
SUMMARY of the server, the most recent events, the last update on the server, the IP address and 
operating system of the server. 
The EVENTS tab displays all of the events for the server which can be filtered if required. 
The STATUS tab displays the servers’ health. If a server does have an alert or a warning you can 
acknowledge and resolve those in the STATUS tab of a server record. 
The EXCLUSIONS tab allows you to view the exclusions the server has in place. You can search these and 
filter them. 
The APPLICATIONS tab allows you to view a list of applications that are currently installed on the Server. 
The POLICIES tab simply displays the policies applied to the server. 
Sophos Central Engineer v2.1.0 - 115
Exclusions
Up-to-date automatic application 
exclusion list can be found here: 
https://sophos.com/kb/121461
Se
rv
er
 M
an
ag
em
en
t
We mentioned the exclusions tab previously. In this tab, you can see any files or folders that are 
excluded from scanning for threats. A number of applications used on servers, such as Exchange, have 
files which must be excluded from scanning in order to prevent issues. Exclusions can be added using 
global settings or through a specific server policy you configure.
Exclusions for common Windows server applications can be automatically applied. The Real-time 
scanning option to ‘Automatically exclude activity by known applications’ is enabled by default. The 
Server’s Exclusions tab can be used to view the exclusions configured. 
Knowledgebase article 121461, linked from the policy, includes the current known applications for 
automatic exclusions. https://sophos.com/kb/121461
Note: The exclusion information is delivered as a data feed to enable Sophos to add new roles over 
time. As with endpoints, process exclusions, environmental variables and more advanced exclusions can 
be added to server policies. For more information see the 
https://docs.sophos.com/central/Customer/help/en-
us/central/Customer/concepts/ExclusionsVariablesWindows.html
Sophos Central Engineer v2.1.0 - 116
There are two Server Protection licenses, Server Protection and Intercept X Advanced for Servers. 
The Server Protection license includes all of the standard real-time scanning protection, Web Protection, 
detection of command and control traffic and Sophos Security Heartbeat. In addition to these threat 
protection features, it also includes the control policies for peripherals, applications, web, Data Loss 
Prevention, WindowsFirewall and File Integrity Monitoring, as well as Server Lockdown.
All of the functionality is available for Windows Servers. Linux Servers have real-time scanning with Live 
protection, detection of command and control traffic and Sophos Security Heartbeat.
Intercept X Advanced for Servers includes all of the server protection features and adds significant real-
time protection, including machine learning.
Sophos Central Engineer v2.1.0 - 117
Protect from master boot record ransomware
Protect document files from ransomware (CryptoGuard)
Protect critical functions in web browsers (Safe Browsing)
Mitigate exploits in vulnerable applications
Prevent credential theft
Prevent code cave utilization
Prevent APC violation
Prevent application verifier exploits
Prevent privilege escalation
Prevent process hollowing attacks
Prevent DLLs loading from untrusted folders
Machine Learning
Real-time scanning - Local files and network shares *
Live Protection *
Detect malicious behavior (HIPS)
Scan downloads in progress
Block access to malicious websites
Detect low-reputation files
Detect network traffic to command and control servers *
Sophos Security Heartbeat *
Automatic cleanup of malware
Threat Protection Features
Intercept X Advanced for ServersServer Protection
* Supported on Linux Servers
Peripheral Control
Application Control
Web Control
Lockdown
Data Loss Prevention
Windows Firewall
File Integrity Monitoring
Se
rv
er
 M
an
ag
em
en
t
Threat Protection Policies
Se
rv
er
 M
an
ag
em
en
t
Server policies define the security measures that will be used for your servers.
It is important to note that unlike endpoint protection policies, when you add a policy it can only be 
applied to servers or server groups. There is no option to select for the policy to be applied to users. 
Sophos Central Engineer v2.1.0 - 118
It is important to note that not all new features are enabled in the policy by default. This is because 
enabling new functionality without warning may have unexpected consequences.
When you login to Sophos Central you will see notifications when new features are released, and you 
can make the decision when to enable them, and whether to use a pilot group for the new features 
before enabling them for your whole estate.
You can also access the information about new features from the Help menu in Sophos Central.
Sophos Central Engineer v2.1.0 - 119
Not all new features are enabled by default
Enabling New Features
Se
rv
er
 M
an
ag
em
en
t
Server Policies Demonstration
Se
rv
er
 M
an
ag
em
en
t
Policies for servers are configured in the same way as for endpoints. The base policy exists for each 
policy category. We recommend creating new policies to be applied to different servers that use the 
configuration required specifically for your servers. 
The main difference to note is that server policies can only be applied to Servers or Server groups. This 
means that they apply to the server itself, irrespective of the user logged in. This ensures that your 
server will always be protected by the settings you define. 
Policies are available for threat protection, peripheral control, application control, web control, server 
lockdown, data loss prevention and update management. These are similar to the policies provided for 
client computers but have been modified where appropriate for server use.
Sophos Central Engineer v2.1.0 - 120
Server Lockdown
Whitelist
Locked down Server
Known good 
applications are 
whitelisted
Existing Applications are 
trusted
New Applications
New Applications are not able to 
run unless approved by the Sophos 
Central Administrator
Administrator
Se
rv
er
 L
o
ck
d
o
w
n
The server lockdown feature allows you to restrict the applications that can run on your servers, and 
also which of them can interact with each other. 
It uses drivers that reside in the operating system kernel and works by creating an initial whitelist of 
known good applications.
When you enable lockdown, all existing applications that are installed on the server are trusted. The 
difference between trusted and whitelisted applications are that trusted applications can make changes 
to the system which are reflected in whitelist updates. Whereas whitelisted applications are not able to 
make changes to the system and therefore do not change the whitelist. 
Once a server has been locked down, new applications won’t be able to run unless explicitly approved 
by the Sophos Central administrator.
Sophos Central Engineer v2.1.0 - 122
The Server Lockdown settings in a policy can be used to change what is allowed without the need to 
unlock the server. For example, you might want to add and run new software. It may also be beneficial 
to configure the policy before choosing to Lockdown the server because the specified files/folder will 
not be scanned and added to the whitelist. This decreases the overall time taken to generate the 
whitelist. The Lockdown process itself scans all local drives, so any policies will need to cover all local 
drives.
Allowed files/folders permits new software to run. It also allows existing software (for example, 
installers or updaters) to run and modify other applications. An example may be a folder used to store 
trusted installers.
CAUTION: This option “trusts” the software, so that any files it creates or changes are also allowed. This 
is different from the process when you lock down a server, which only allows the software itself to run.
Blocked files/folders can be used to block software that is currently allowed to run or to block a specific 
folder for applications, such as installers, that you want to make available to other users on the network, 
but don’t want to run on your server. An example may be a share or filer location.
Note: if you have installers in a share they can be executed on a remote computer without it being in 
the allowed files and folders, this is only required to allow local execution on the server. In the same 
way, you cannot prevent a shared installer from being run on a remote computer by adding it to the 
blocked files and folders.
Sophos Central Engineer v2.1.0 - 123
Server Lockdown Policy
Se
rv
er
 L
o
ck
d
o
w
n
The process for adding and updating applications is to manually download the installer, add the installer 
filename to the 'Allow software to run and to modify other files' lockdown policy, and to run the installer 
manually. Once the software has been installed or updated, the installer filename can be removed from 
the policy. This process adds the installed application files to the local whitelist so that the application 
can be executed.
Adding applications to the ‘Allow software to run and modify other files’ in the lockdown policy can have 
unwanted effects and can reduce the security of a server. Please note that adding applications such as 
firefox.exe or filezilla.exe will mean that every file they download becomes trusted to execute on that 
server. If these applications have been installed using the process shown above this does not happen.
For more information and other applications that should be manually configured see knowledgebase 
article 122263. https://sophos.com/kb/122263
Sophos Central Engineer v2.1.0 - 124
Adding and Updating Applications
Manually download the installer
Allow the installer filename in the 
policy 
Run the installer manually
Remove the installer filename from 
the policy
Avoid allowing applications such as FireFox.exe and FileZilla.exe in the Lockdown policy
Files downloaded by the allowed applications would then be allowed
Other examples can be found in: https://sophos.com/kb/122263 
Se
rv
er
 L
o
ck
d
o
w
n
Adding Applications to a locked down server
Se
rv
er
 L
o
ck
d
o
w
n
Let’s take a look at this in action. 
Firstly we run the Firefox installer.exe which fails as the server lockdown prevents the installer from 
running. So we login to Sophos Central and browseto the Server Policies. 
We edit the Server Lockdown policy and add the file path of Firefox Installer.exe as an allowed file. We 
save the changes. 
Once the policy has updated on the server, we run the installer again, this then successfully installs 
Firefox onto the server. We then return to the Server Lockdown Policy in Central, edit it again and 
remove the file path from the allowed list. We save the changes and wait for the server to be updated. 
Now when running Firefox from the desktop shortcut it opens without issue. 
Sophos Central Engineer v2.1.0 - 125
Managing a Locked Down Server
LOCKDOWN EVENTS tab displays all 
events from the lockdown server
Click Request Report/Update Report 
to view the latest details
Se
rv
er
 L
o
ck
d
o
w
n
The LOCKDOWN EVENTS tab will appear in the server properties page once lockdown has been applied. 
This tab will display any triggered warnings or events relating to the Lockdown status of the server. 
Please note that following the Lockdown you will need to click Request Report to view the reports, and 
then Update Report to view any updated lockdown events. 
Sophos Central Engineer v2.1.0 - 126
Unlocking a Locked Down Server
To unlock a server select Unlock and 
then confirm that you want to 
unlock the server
Se
rv
er
 L
o
ck
d
o
w
n
To unlock a locked down server, you simply browse to the locked down server in the servers list and 
select Unlock. 
Please note that by unlocking a server unauthorized activities on that server will no longer be 
prevented. A confirmation message will be displayed for you to confirm that you do wish to unlock the 
server. 
Once unlocked, the server will return to it’s unlocked state and the execution of all files will be allowed 
without them having to be on a whitelist. 
Sophos Central Engineer v2.1.0 - 127
File Integrity Monitoring
Why monitor? What is monitored? Find out more…
Files
Registry Entries
Additional
Security
Compliance https://sophos.com/kb/132846
https://sophos.com/kb/132146
Default Monitoring Locations
FAQ
Fi
le
 In
te
gr
it
y 
M
o
n
it
o
ri
n
g
Sophos File Integrity Monitoring can assist you, either monitoring critical systems for additional security, 
or to meet PCI:DSS compliance. It can monitor files and registry keys and values, and comes 
preconfigured with default rules as well as providing the ability to add additional monitoring locations 
and exclusions via policy.
The default monitoring locations are documented in knowledgebase article 132146: 
https://sophos.com/kb/132146 and Frequently asked questions can be found in knowledgebase article 
132846: https://sophos.com/kb/132846
Please note, if you select a folder, we monitor the folder by default but not the files in it. To monitor the 
files, you must fill out ‘Monitor these file types’. To stop monitoring the folder, deselect Monitor changes 
to the folder as well as the files. If you select a Registry Key, we monitor the key but not the values in it. 
You must use the location type Registry Value to monitor values.
Sophos Central Engineer v2.1.0 - 129
Sophos File Integrity Monitoring is installed by default, but it is only enabled when the Use File Integrity 
Monitoring setting is turned on in the Policy.
There are two configurable Policies for File Integrity Monitoring as shown here:
• Custom monitoring lets you add files, folders, registry keys or registry values to the list of monitored 
items. This is in addition to the critical Windows system files that are monitored by default
• Monitoring exclusions lets you exclude files, folders, registry keys or registry values to the list of 
monitored items. For example, you may decide to exclude a critical Windows system file that is 
monitored by default
Rules are evaluated with the following order of preference:
1. Custom monitoring exclusions
2. Custom monitoring inclusions
3. Default Sophos exclusions
4. Default Sophos inclusions
Sophos Central Engineer v2.1.0 - 130
File Integrity Monitoring
Fi
le
 In
te
gr
it
y 
M
o
n
it
o
ri
n
g
File Integrity Monitoring events are logged to databatch.xml files in ProgramData\Sophos\File Integrity 
Monitoring\Export\. These files are written every 15 minutes and each file may contain multiple events.
The data files in the default Export location are purged when they become older than 90 days, so we 
recommended storing your own copy of the data to prevent deletion of any data you may require.
Sophos Central Engineer v2.1.0 - 131
File Integrity Monitoring
Fi
le
 In
te
gr
it
y 
M
o
n
it
o
ri
n
g
Files written every 15 minutes
Each file may contain multiple events
Files older than 90 days are deleted
Many servers are not on physical platforms but are hosted in virtual environments such as VMWare and 
Hyper-V. 
Sophos offers two approaches to protecting virtual machines. The first option is to deploy the full server 
or endpoint agent on each guest virtual machine. It provides enhanced protection features including 
Server Lockdown, MTD and CryptoGuard, higher resource overheads relative to a virtualization-specific 
solution. An example of use for deploying the full server or endpoint agent is when endpoints have high-
value data, are subject to multiple attack vectors and persistent virtual servers.This is the only option 
available for servers hosted by Amazon Web Services or Azure.
The alternative, for servers hosted using VMware or Hyper-V is to install the ultra-thin guest agent 
provided by Sophos for Virtual Environments and deploy Sophos Security Virtual Machines (SVMs) to 
provide centralized threat protection. These provide anti-malware including live protection lookups and 
automated clean-up, lower resource overheads which enables higher VM density relief from scan 
storms and update storms. An example of use is for non-persistent virtual endpoints with restricted 
access to lower value data and exposed to fewer attack vectors.
The approach to select depends on the requirements and the role of the virtual machines and the slide 
shows key factors that would influence the choice. Regardless of the approach taken, managing 
protection of virtual machines requires special consideration. Please note that both options are included 
in all Sophos Server Protection licenses.
Sophos Central Engineer v2.1.0 - 133
Two Approaches to Protecting Virtual Machines
Enhanced protection features including Server 
Lockdown, MTD, CryptoGuard
Higher resource overheads relative to 
virtualization-specific solution
Example use: Endpoints with high-value data 
and exposure to multiple attack vectors
Anti-malware including Live Protection lookups, with 
automated threat clean-up
Lower resource overheads; enables higher VM density 
Relief from scan storms and update storms
Example use: Endpoints with restricted access to lower 
value data and exposure to fewer attack vectors
SOPHOS FOR VIRTUAL ENVIRONMENTS
Full Server/Endpoint agent 
deployed on each guest VM
Ultra-thin guest agent with 
centralized threat protection
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
HOST
HOST
Sophos for Virtual Environments
Sophos Central
• Policy Status
• Update status 
• Threats
Encrypted Traffic; Scan results, Action 
Centre Control and Product Updates
Encrypted Traffic: On access scan requests, 
Partial file information and Clean up results
Guest VM Migration
Guest VMs may connect to another 
SVM
GVM Thin AgentSVM
SVM GVM Thin Agent
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
Sophos for Virtual Environments comprises of two components. The security virtual machine (SVM) and 
a thin agent on the guest virtual machine (GVM). You must install a Sophos security VM (SVM) on each 
virtualization host to provide central anti-virus scanning for all the guest VMs on that host. When the 
SVM is installed, it will appear in Sophos Central in the Servers section and receive the settings in the 
base policy by default. 
Guest VMs do not have the full endpoint client installed. Instead they requirethe GVM Agent installed 
for the SVM to be able to protect them. Traffic between the Guest VMs and the SVM is encrypted using 
AES 128. A significant enhancement introduced in SVE v1.2 is the ability for Guest VMs to migrate 
between SVMs. When multiple SVMs are deployed on the same network, the Guest VMs can 
automatically move from their existing SVM and connect to another in order to load balance.
Sophos Central Engineer v2.1.0 - 134
The key steps required to deploy Sophos for Virtual Environments are shown in the slide. 
1. Check the system requirements
2. Uninstall other anti-virus products
3. Install the Sophos Security VM and apply policies
4. Install the Sophos Guest VM Agent on guest VMs
5. Check that Guest VMs are protected
For further information please see the frequently asked questions knowledge base article: 
https://sophos.com/kb125679. Additionally, the Certified Architect course further explores protecting 
virtual environments.
Sophos Central Engineer v2.1.0 - 135
Deploy Sophos for Virtual Environments
Check the system requirements
Uninstall other anti-virus products
Install the Sophos Security VM and 
apply policies
Install the Sophos Guest VM Agent on 
guest VMs
Check that Guest VMs are protected
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
https://sophos.com/kb/125679
The installer for the Security VM is downloaded from Sophos Central. Unlike the client installers, this is 
not linked to the Central account. The installer prompts for entry of the Central Administrator email and 
password to determine the account.
Sophos Central Engineer v2.1.0 - 136
Security VM Installer
Download the installer
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
Downloaded installer
Once protected, your virtual servers can be viewed from Sophos Central. 
This includes Sophos Security VMs, although the Guest VMs protected by them are not shown at this 
level.
Sophos Central Engineer v2.1.0 - 137
Viewing and Managing Servers
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
Virtual servers are displayed in the 
Servers list
It is also common for servers to be hosted on cloud virtualized platforms such as Amazon Web Services 
(AWS) and Microsoft Azure. We will look at these now. 
Integration with AWS improves the management of Sophos Server Protection on EC2 instances in AWS. 
It will:
• Enable Terminated EC2 instances to be removed automatically from Sophos Central (for example, if 
using AWS Auto-Scaling)
• Enable Server policy to be applied to AWS Auto Scaling Groups in Sophos Central
• Display useful EC2 instance information for each server in Sophos Central (for example, instance 
Lifecycle state, Amazon Machine Image (AMI) ID, Region, etc.)
• Display details of all EC2 instances in your AWS environment, and show whether the Sophos Server 
Protection Agent is installed on each instance.
Windows and Linux servers can be protected and the supported versions are the same as those for 
Central Server Protection.
For more information on AWS see the FAQ on Amazon Web Services integration with Sophos Central, 
knowledgebase article 122510 https://sophos.com/kb/125510.
Sophos Central Engineer v2.1.0 - 138
Amazon Web Services (AWS) Integration
Automatically remove 
terminated EC2 instances
Display EC2 instance 
information in Sophos Central
Show if the Sophos Server 
Protection Agent is installed
Apply Server policies AWS 
Auto Scaling Groups
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
Integration with AWS requires the connection of the AWS account with Sophos Central.
The process of connecting an AWS account to Sophos Central has three stages. Firstly, create an Identity 
and Access Management (IAM)policy. Secondly, create an IAM role for Sophos Central and then add the 
AWS account to Sophos Central. Sophos provides the script required for this. 
On completion the AWS account will have the specific read-only permissions required by Sophos. The 
next task is to deploy server protection to the AWS instances. 
Sophos Server Protection can be installed onto AWS EC2 instances using:
• Manual installation
• Ready-made scripts provided by Sophos. Embed the link to the installer from the Protect Devices area 
of Sophos Central Admin console into a deployment script
• Create an Amazon Machine Image (AMI) with Sophos Server Protection installed. When new AWS 
instances are launched with the Sophos agent installed, the agent will register with Sophos Central 
console and apply the policy automatically. 
Follow the instructions in knowledgebase article 120560 to install Sophos on gold image to avoid 
duplicate identities’ https://sophos.com/kb/120560
For more information about creating an IAM role in Sophos Central please see knowledgebase article 
126082. https://sophos.com/kb/126082.
Sophos Central Engineer v2.1.0 - 139
Deploy server protection to 
AWS instances
Connect AWS Account to 
Sophos Central
Connecting an AWS Instance
Create a managed policy
Add the AWS Account to Sophos Central
Create an IAM Role for Sophos Central
Manual installation
Shell scripts on instance launch
Amazon Machine Image (AMI) with 
Server Protection installed. Follow 
process to install Sophos on a Gold Image
1 2
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
The integration with Azure improves the management of Sophos Server Protection on VMs in Azure. It 
will:
• Enable deleted VMs to be removed automatically from Sophos Central
• Display useful VM information for each server in Sophos Central (for example, running state, Azure 
VM ID, Resource Group Name, VM location, etc.)
• Display details of all VMs in your Azure environment and show whether the Sophos Server Protection 
Agent is installed on each VM
Windows and Linux servers can be protected and the supported versions are the same as those for 
Central Server Protection.
For more information see Sophos Central: FAQ on Microsoft Azure integration with Sophos Central 
https://sophos.com/kb/126215.
Sophos Central Engineer v2.1.0 - 140
Microsoft Azure Integration
Automatically remove deleted VMs
Show if the Sophos Server 
Protection Agent is installed
Display useful VM information in 
Sophos Central 
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
Integration with Microsoft Azure requires the connection of an Azure domain with Sophos Central. 
Connecting Azure to Sophos Central requires the creation of an application in the Azure Active Directory 
which has the necessary permissions. This can be done manually or through a script. 
Once the Application registration is complete and the recommended permissions have been given, the 
Azure Active Directory can be added to the Sophos Central account. The next task is deploy server 
protection to the Azure virtual machines. 
Sophos Server Protection can be installed onto Azure virtual machines using:
• Manual installation
• Ready-made scripts provided by Sophos. Embed the link to the installer from the Protect Devices area 
of Sophos Central Admin console into a deployment script
• Create an image and a template from a VM with the Sophos endpoint installed
For more information see knowledgebase articles 126218 and 126217:
Microsoft Azure - Example workflows for creating/configuring images for Windows servers -
https://sophos.com/kb/126218
Microsoft Azure - Example workflows for creating/configuring images for Linux servers -
https://sophos.com/kb/126217
Sophos Central Engineer v2.1.0 - 141
Deploy server protection to 
Azure virtual machines
Create an application in Azure 
Active Directory
Azure Registration, Settings and Deployment
Manual installation
Ready-made scripts provided by Sophos
Create an image and a template from a 
VM with Sophos endpoint installed
1 3
Add Azure Account to Sophos 
Central2
Manually
Using a script
V
ir
tu
al
 E
n
vi
ro
n
m
en
ts
Complete the following simulation tasks in Module 4:
• Task 4.1: Create a Server Group
• Task 4.2: Manage Server Policies
• Task 4.3: Enable and Configure File Integrity Monitoring
• Task 4.4: Configure and apply Server Lockdown
SophosCentral Engineer v2.1.0 - 142
Module 4: Server Management
• Complete the following simulation tasks in Module 4
▪ Task 4.1: Create a Server Group
▪ Task 4.2: Manage Server Policies
▪ Task 4.3: Enable and Configure File Integrity Monitoring
▪ Task 4.4: Configure and apply Server Lockdown
Use the Simulation Workbook to view details of each task and 
access the simulations
143
On completion of this module, you should now be able to perform the actions shown here. Please take 
a moment to review these.
If you are not confident that you have met these objectives, please review the material covered in this 
module.
Sophos Central Engineer v2.1.0 - 143
Module Review
• Now that you have completed this module, you should be able to:
Demonstrate Server Lockdown
Configure Server Protection policies for Server Lockdown and File Integrity Monitoring
Explain how to protect virtual environments
Hi there, this is the Sophos Engineer Certified Central Endpoint and Server Protection Course. This is 
module 5: Threat Cases, Reports and Troubleshooting. 
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection ET15 – Threat Cases, Reports and Troubleshooting
July 2020
Version: 2.1
Product version: Sophos Central
© 2020 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any 
means without the prior written consent of Sophos. 
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this 
document may be the trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or 
representations (whether express or implied) as to its completeness or accuracy. This document is subject to change at any 
time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon 
Science Park, Abingdon, Oxfordshire, OX14 3YP.
Sophos Central Engineer v2.1.0 - 146
Sophos Certified Engineer
Sophos Central Endpoint and Server Protection
Threat Cases, Reports and Troubleshooting
Version 2.1
In this module, you will learn about the types of detections and how endpoints can become infected. 
We will introduce Endpoint Detection and Response (EDR) and discuss the use of threat cases, searches 
and forensic snapshots. 
You will learn how malware is cleaned up on infected endpoints along with isolation options. We will 
discuss the logs and reports available in Sophos Central. 
We will explain the first steps in troubleshooting any issues with a protected endpoint, including how to 
generate log files. Additionally we will discuss how to find information using the Sophos support site and 
SophosLabs.
Sophos Central Engineer v2.1.0 - 147
Clean Up Logs & Reports
Managing Detections
Troubleshooting & Support
Threat Cases, Reports and Troubleshooting
Threat Cases
Types of Detection
Troj/, Mal/ etc
SUS/, HIPS/, C2/
HPmal/ HPsus/
CXmail, CXmal and CXweb
Adware or PUA – detected pre-execution 
Controlled application – blocked by policy
Malicious threat detections
Suspicious file, malicious behaviour & 
network activity detections
Unknown threat detections that match 
specific profiles in-execution
Adware, PUA & controlled application 
detections
New threats, file and variant detections
M
an
ag
in
g 
D
et
ec
ti
o
n
s
Endpoint and Server Protection will detect a number of threats in your environment, these will be 
recorded as events and will be listed with a detection type. It is useful to know the types of threat 
detections that you may see in order to understand the best way to clean up these threats. 
Let’s take a quick look at the main types of threat detections you may see: 
1. Malicious threats that are detected pre-execution. These will typically be detected by the on-access 
file scanner using definitions. 
2. Suspicious file, malicious behaviour and malicious network activity detections. SUS detections are 
based on properties of the file which make it likely that it is malware, however, there is less certainty 
because it does not match the definition of a known piece of malware. HIPS detections are triggered 
when an application performs actions that are classed as malicious. C2 detections are triggered by 
malicious network activity contacting command and control servers, where malware calls home for 
instructions or to download additional software.
3. Unknown threats and suspicious file detections that match specific combinations of behaviours when 
running for example HPmal and HPsus. 
4. CXmail are email-born threats, and are detected pre-execution, CXweb are malicious files detected 
before the download take place and CXmal detections are in-execution. 
5. Adware or PUA are applications that may be legitimate but can post a risk to your network. Controlled 
application detections are legitimate applications that are being blocked pre-execution by the 
application control policy. 
Sophos Central Engineer v2.1.0 - 150
Types of Detection
Pre-Execution
Detection that takes 
place before the 
program runs
Post-Execution
Detection that takes 
place while the 
program is running
Intercept X
• Anti-Exploit
• CryptoGuard
• Application Lockdown
• Safe Browsing
• Malicious PE detection
• ML/PE-A
• Potentially Unwanted 
Application
• ML/PUA
Machine Learning
M
an
ag
in
g 
D
et
ec
ti
o
n
s
The detections mentioned previously take place pre-execution or post-execution. In module one you 
learned about pre and post-execution. To recap, Pre-execution means that the detection takes place 
before the program has run. This means that no malicious activity has taken place. Post-execution 
means that the detection takes place while the program is running, because it has to be caught in the 
act. In this case we have detected some activity or behaviour that we have categorized as malicious. As 
the program is running some activity may have taken place. 
The tools that Endpoint and Server Protection use to protect your environment from security threats 
were covered in the first module of this course, to reiterate, Intercept X targets the techniques used by 
attackers. The types of detections you may see are for: 
• Anti-exploit
• CryptoGuard
• Application Lockdown
• Safe Browsing
Intercept X’s machine learning (ML) engine (also referred to as deep learning) detects malicious portable 
executable (PE) files which will generate a ML/PE-A or a ML/PUA detection. PE is a file format used on 
Windows 32 and 64 bit computers, and is a structure used by Windows to manage the executable code. 
Examples of PE files can include .exe, .sys, .dll and .scr among many others. 
Sophos Central Engineer v2.1.0 - 151
Now we have seen the types of detections, let’s have a look at how an endpoint in your environment 
could get infected. 
One attack vector are unprotected computers on the network, and by unprotected we could consider 
several states:
• A computer that has no anti-malware software installed. 
• An unprotected and compromised computer can provide a point of access for an attacker to 
gain access to your network and move through it until they have what they wanted. 
• Computers that are running out of date anti-malware software
• Computers are not protected against the latest threats and are vulnerable to attack
• Computers that have up-to-date anti-malware software, but do not have all of the protection features 
enabled
• It is important to enable all protection features, without these, the computer is vulnerable to 
attack
• Computers that are missing application and operating system updates and patches
• Out of date and unpatched applications and operating systems make devices more vulnerable 
to attack as known weaknesses in the software are left open
Inappropriate exclusions can leave your network open to attack. Malware will also tryto leverage 
legitimate apps and processes as much as possible to evade detection. Excluding those tools that you 
find useful or necessary can create an opportunity for the system to be exploited. 
Sophos Central includes various techniques to detect and block zero-day threats, however, attackers do 
not generally release malware that they know is going to be detected and blocked. They will release 
malware they believe will bypass anti-malware software and are therefore constantly developing new 
techniques that a detection has not been created for. 
Sophos Central Engineer v2.1.0 - 152
Why Might a Computer get Infected?
Inappropriate exclusions
Zero-day threat
• Computers with no anti-malware software installed
• Computers that are out of date
• Computers with disabled protection
• Computers missing application and OS updates and patches
• For example: Allow PSExec on all computers
• Malware can use PSExec to spread across the network
• Attackers are constantly developing new techniques that 
have not been seen before
Unprotected computer(s) on the network
M
an
ag
in
g 
D
et
ec
ti
o
n
s
Endpoint Detection and Response (EDR)
EndpointE
DetectionD
ResponseR
&
Visibility of data and activities on protected 
endpoints
Compliance mandate
Remediation techniques
Additional scrutiny of high value assets
M
an
ag
in
g 
D
et
ec
ti
o
n
s
Endpoint Detection and Response (EDR) provides greater visibility of data that is relevant for detecting, 
investigating and mitigating advanced threats and suspicious activities. 
So why would you want to use this? The best endpoint technologies will protect organizations against 
the majority of malware and threats impacting their organization. But as the threat landscape evolves 
and cybercriminals continue to find new security holes, the unknown minority becomes important. 
EDR provides access and visibility of activities happening on your endpoints, there may be a compliance 
mandate that requires additional data which EDR can provide. Additionally, it provides remediation 
techniques and allows a more in depth look at high value assets in your environment. 
Sophos Central Engineer v2.1.0 - 153
EDR provides the following information:
• Event and incident detection
• Incident response
• Threat hunting
• Forensic investigation
Here we will look at the first two of these. 
Event and incident detection provides visibility to changes on the endpoint, this can either be:
• Event detection: An observable change to the normal behavior of a system, environment, process, 
workflow or person
• Incident detection: An event detection attributable to a human. Within each detection we must 
determine not only a priority but whether it is malicious
Incident response is the process of determining if an incident is malicious, how it occurred and how to 
respond.
Sophos Central Engineer v2.1.0 - 154
Endpoint Detection and Response (EDR)
• Visibility of changes on endpoints
Event detection
• A change to normal behaviour
Incident detection
• An event detection caused by a 
human
Event and Incident Detection
• Determine if an incident is malicious
• How the incident occurred
• How to respond
Incident Response
M
an
ag
in
g 
D
et
ec
ti
o
n
s
Now let’s look at the threat hunting and forensic investigation. 
Threat hunting is a proactive exercise that seeks to determine the presence of an ongoing or persistent 
intrusion or attack. What most commonly distinguishes threat hunting from event and incident 
detection and incident response is that the hunter begins their process without the benefit of a beacon. 
A beacon is typically where a threat originated from. Without a beacon, a few common starting points 
for a hunt are:
• Analytics-based such as machine learning
• Situational analysis (crown jewels, assessments, trending data)
• Intelligence (Reports, feeds, vulnerability scans)
• Hunting involves varying degrees of automation based on the maturity of the organization
Forensic investigation is an evidentiary process that seeks to re-create as much relevant data associated 
with a security incident as possible. Forensics largely focuses on the preservation of data, particularly 
when said data is to be utilized for legal proceedings.
Sophos Central Engineer v2.1.0 - 155
Endpoint Detection and Response (EDR)
• Proactively seek the presence of an 
intrusion or attack
• Analytics-based
• Situational analysis/intelligence
Threat Hunting
• Evidentiary process
• Re-create relevant data associated
with a security incident
Forensic Investigation
M
an
ag
in
g 
D
et
ec
ti
o
n
s
We use a combination of automated machine learning and data analyses from SophosLabs to provide 
one-click access to threat intelligence in the product that can be used to track and stop attacks that are 
underway.
Sophos Intercept X Advanced with EDR provides data that anyone can use to make informed decisions, 
and guided investigation and response processes. You will see how EDR is used when we discuss threat 
cases in this module. 
Sophos Central Engineer v2.1.0 - 156
Sophos’ Intelligent EDR
Provides useable data and guided
investigation and response
One-click access to deep learning and 
SophosLabs threat intelligence
Built on top of leading Endpoint 
Protection
M
an
ag
in
g 
D
et
ec
ti
o
n
s
Threat cases in Sophos Central help you achieve these goals by providing a framework of guided 
investigation and response. Intercept X with EDR further augments the information available with 
machine learning threat data from SophosLabs to help you make informed decisions. From within the 
threat case you can take direct action, isolating computers while you complete the investigation, and 
then cleaning and blocking undesirable PEs across your whole estate.
Threat cases are created when suspicious activity is detected on an endpoint, and generally take around 
2-3 minutes to be created, depending on the speed of the endpoint.
Sophos Central Engineer v2.1.0 - 158
Threat Cases Overview
Th
re
at
 C
as
es
Guided investigation and response
Augmented with machine learning threat data from SophosLabs
Incident response actions
Let’s take a brief tour of what is included in a threat case.
From the Dashboard in Central you view the most recent threat cases in the threat analysis center. 
Clicking on the name of the threat will direct you to that specific threat case. It starts with a summary of 
the threat case, including what was detected, where and under which user, and most importantly, if any 
data may have been involved in the incident.
Alongside the summary there are suggested next steps. There are links to isolate the computer while 
you investigate and to start a scan on the computer.
Sophos Central Engineer v2.1.0 - 159
Threat Cases
Th
re
at
 C
as
es
Further down the page is a graphical representation of what happened, with filters to show and hide 
different types of element to help make seeing what is going on clearer.
The graph uses simple, clear iconography to help distinguish between the types of component, and 
coloured markers to denote the root cause, beacon event, allowed apps, and items with an uncertain 
reputation.
By selecting a component you can get additional information on a flyout from the right. Here we can see 
the flyout for the process explorer.exe. This first process details section is available with Intercept X. 
Intercept X with EDR also shows the reputation at the time of the detection. With EDR, from here you 
can request the latest intelligence from Sophos. This can take around 4 – 6 minutes depending on the 
sample size, and performs a deep analysis of the sample comparing code capabilities, structure and 
characteristics against known good and bad files.
Sophos Central Engineer v2.1.0 - 160
Threat Cases
Th
re
at
 C
as
es
In the report summary you can see the current global reputation. You can see when Sophos first saw this 
file and also how recently we have seen it. Generallyspeaking, if it’s a brand new file or a rare file, then 
it likely wont have a high reputation and is more suspicious. It also gives a summarized version of 
machine learning analysis.
This is a more detailed view of the machine learning analysis, made up of 3 sections: Attributes, Code 
Similarity and File/path. In the Attributes section the analysis compares the 5 most relevant attributes of 
the sample against known good and bad samples and plots the similarity. The Code similarity indicates 
which files in the Sophos Labs sample collection it is most similar with, how similar it is with them, and 
whether those files are known good or known bad. File path suspiciousness is also given, and compared 
to file paths of components that are suspicious, and also found in similar spots. All of this information is 
to provide a usable analysis to try and determine whether the sample is something you want on your 
network.
When reviewing the general properties of the file it is important to remember that these can be spoofed 
in an unsigned file, so check that on the File breakdown tab. When a file has a copyright, company 
name, version, signer, and a compile time that is consistent with the first seen time, then the file is more 
likely to be legitimate.
The last section is the File breakdown, and this is more advanced than the other analysis, but there are 
some things you can look out for. If the file is signed you can review the certificate details, this can be 
very useful when investigating the legitimacy of a file. The File breakdown shows the PE sections, as well 
as the imported functions that the PE calls, and where it calls them from.
If something in the properties column is RWX (read, write and execute) that can be red flag, because 
unless it is a Java runtime or is just in time compiled, it will likely map an external resource, such as a 
Sophos Central Engineer v2.1.0 - 161
Threat Cases
Th
re
at
 C
as
es
DLL or script, and run it, rather than having it locally.
All of this information can help you determine if it is something you want on your 
network or not. One use case would be validating, or invalidating, a detection as a 
false positive.
Sophos Central Engineer v2.1.0 - 161
Back to the main threat case, and at the bottom you can see all of the files and processes that have 
been affected. These can be searched and filtered or exported to a CSV file. You can also create a 
forensic snapshot on the endpoint to aid further investigation.
The last piece is the Case record, which logs comments when actions are taken, for example isolating an 
endpoint, and can also be used to record findings during the investigation.
Sophos Central Engineer v2.1.0 - 162
Threat Cases
Th
re
at
 C
as
es
Case Record
View 
artefacts 
involved
The threat searches are for active threat hunting, looking for indicators of compromise (IoC) across your 
estate.
You can search across your estate for SHA256 file hashes, file names, domains and IP addresses. The 
results will include portable executables with an unknown or low reputation and the network activity 
associated with those files.
Data is trickle fed into Central in 5 minute chunks, so you would expect it to be searchable within 10 - 15 
minutes.
The amount of data that will be uploaded to Sophos Central will depend on the number of PE files 
identified that have a low or uncertain reputation and network connectivity associated to those 
files. Changes to these files, including execution, location, name and reputation are uploaded via the 
trickle feed. In the majority of business environments the amount of data is expected to be low, maybe 
around a few kilobytes per upload.
You can also save searches so they can be run again without having to re-enter the search criteria.
Sophos Central Engineer v2.1.0 - 163
Threat Searches Overview
Search for IoC using SHA256 file hashes, file names, domains and IPs
Data trickle fed to Central in 5 minute chunks
Searches can be saved
Portable Executables with unknown or low reputation and associated network 
activity
Th
re
at
 C
as
es
Here we can see the threat searches section where you can enter the search criteria, or select a saved 
search to run. To navigate to threat searches select Threat Analysis Center > Threat Searches in the left-
hand menu.
You can enter multiple search criteria, one per line.
Sophos Central Engineer v2.1.0 - 164
Performing Threat Searches
Th
re
at
 C
as
es
Run a previously saved search
Enter filenames, SHA256 file hashes, 
domains and IP addresses to search for
On the results screen, you can filter the computers that are returned, review the search criteria or save 
the search so you can easily run it again. Saving a search is as simple as giving it a name, be sure to use 
something descriptive!
Sophos Central Engineer v2.1.0 - 165
Threat Searches Results
Th
re
at
 C
as
es
Save the Search
Filter computers
Review the items being searched for
Switch between file and network results
Here we can see the file result details for a computer, this shows you all of the reads, writes, executes, 
renames and reputation changes for the search criteria that have been found.
From here you can:
• Isolate the computer
• Clean and block a file based in the SHA 256 file hash
• Generate a threat case for a file
To return to the results use the link in the breadcrumbs at the top of the page.
Sophos Central Engineer v2.1.0 - 166
Threat Searches Results
Th
re
at
 C
as
es
• Clean and block based on file hash
• Generate a threat case
Isolate the computer
Automatic Clean up
C
le
an
 U
p
For a lot of malware detections Sophos is able to perform an automatic clean up process to remove it, 
however, there are some scenarios where the clean up may fail, or it may require manual clean up. 
Sophos Central Engineer v2.1.0 - 168
Command line tool included in Sophos Central installation
Separate download that detects and removes malware
Bootable AV scanner and removal tool
Identifies where malicious files are written from
Clean Up Tools
C
le
an
 U
p
SAV32CLI
Virus Removal Tool
Bootable AV
Source of Infection 
Tool
For more information see KB: 
https://sophos.com/kb/116418
Sophos provides a number of tools to assist in recovering from an infection. 
The main tools available are: 
• SAV32CLI. This is a command line tool included as part of the Sophos Central installation
• Virus Removal Tool. This is a separate download to detect and remove malware
• Bootable AV. This is usually used as a last resort and is a bootable virus scanner and removal tool
• Source of Infection Tool. This is used to assist in the identification of where malicious files are being 
written from
Most of the tools described here are included in our Sophos Malware Remediation Toolkit (SMaRT) 
please view knowledge base article 116418 to learn more. 
Sophos Central Engineer v2.1.0 - 169
Logs & Reports
Lo
gs
 &
 R
ep
o
rt
s
Sophos Central provides a huge range of Logs and Reports. In the Sophos Central Admin console, select 
Logs & Reports from the left-hand menu. The page is split into Logs and Reports. 
Within each section is then split into sub categories. For Logs, this split is into General Logs which 
provides the logs for events and audits. Endpoint and Server Protection Logs which lists the Data Loss 
Prevention log and the Email Security Logs which provides message history logs (if you have an Email 
Gateway license applied). 
For Reports, these are split into Users, Endpoint and Server Protection, Unified Endpoint Management & 
Mobile Security, Endpoint and Server Web Control and Email Security. 
We will take a look at those logs and reports that are generated for Endpoint and Server Protection. 
Sophos Central Engineer v2.1.0 - 171
Events Report
Lo
gs
 &
 R
ep
o
rt
s
The general reports are useful when looking at your Endpoints and Servers. The Events report allows you 
to see all of the events that have been generated inyour Central account by your users and devices. You 
can search for events and also filter the date range. 
It’s also possible to select the event types that are included via the panel to the left of the graph. This 
filter would be useful if you just wanted to see all policy violations, or malware detections, for example.
These filters can be further expanded for each event type so that you can report on the specific actions 
taken for that event type. For example, malware that has been detected, cleaned up, not cleaned up, or 
locally cleared.
Sophos Central Engineer v2.1.0 - 172
Events Report Export
Select the report 
type you want to 
export
View the report
Lo
gs
 &
 R
ep
o
rt
s
You can export this and other reports in Sophos Central to CSV or PDF using the Export button at the 
right of the report, which will assist with offline manipulation or presentation of the data outside of the 
Central console.
Sophos Central Engineer v2.1.0 - 173
Custom Events Report
Lo
gs
 &
 R
ep
o
rt
s
You can save a report as a custom report. Give the report a name and confirm the filters for the report. 
In the email options you can select the send a secure link to the report via email, alternatively, you can 
select to attach the report to an email. Please note that this method is not recommended if you are 
including personally identifiable information in the report. 
You can send a custom report as a CSV or a PDF file and can determine when the report is sent, monthly 
or weekly. Please note that scheduled emailing of reports will stop after 6 months. 
Sophos Central Engineer v2.1.0 - 174
Audit Logs
Lo
gs
 &
 R
ep
o
rt
s
You can view and export a record of all activities that are monitored by Sophos Central using the audit 
log report. All activities for the past 7 days are shown in the Audit Log by default. You can view all 
activities for up to 90 days and export that same report. 
For accurate audit logging it is recommended that all users with administrative rights have unique login 
names. 
Sophos Central Engineer v2.1.0 - 175
Endpoint and Server Reports
Endpoint
Server
Lo
gs
 &
 R
ep
o
rt
s
Navigate to Endpoint Protection > Logs & Reports or Server Protection > Logs & Reports to view only 
those reports that are available for that product. 
The top menu will show where you are in the Sophos Central Console. The reports are split into 
sections, logs and then reports. 
Sophos Central Engineer v2.1.0 - 176
Endpoint and Server Reports
Reports for Users, Endpoints and Servers use the same 
format
Lo
gs
 &
 R
ep
o
rt
s
The reports for Users, Endpoints and Servers, all look similar, with a summary view at the top. Clicking 
on the numbers in the summary view will apply a filter to the report for the relevant category.
The detailed information varies depending on the particular report, but it will show details like 
associated devices, the scanning status, the OS and the last active and updated times. You can use all of 
this information to monitor the objects linked to your account and spot any inconsistencies, or hone in 
on a particular user or device to get more information. 
Sophos Central Engineer v2.1.0 - 177
The installation of the Sophos Endpoint starts with the extraction of the thin installer SophosSetup.exe, 
to the user's temporary directory, also referred to as %temp% and creates the installation logs on this 
location: %ProgramData%\Sophos\CloudInstaller\Logs\
For a Mac installation the default level of logging for the installer is written to the file ‘install.log’. This 
file can be found in the following location by default: /private/var/log/install.log
One way to easily find the log is using ‘Console’ app and locate install.log under the ‘var/log/’ section on 
the left hand tree menu.
Sophos Central Engineer v2.1.0 - 179
Windows Installation Logs
Log file Description
SophosCloudInstaller_<date>_<time>.log The thin installer SophosSetup.exe creates the installation logs
Avremove.log The Log of the third-party security detection and removal tool 
(extracted to %temp%\crt\) 
For more information about installation logs please see Knowledgebase article:
https://sophos.com/kb/119621 
Tr
o
u
b
le
sh
o
o
ti
n
g 
&
 S
u
p
p
o
rt
We’ll now look at some of the places you can go to find out information. The Labs section of the Sophos 
web site shows the latest information about security threats.
The SophosLabs section of the Sophos web site can be directly accessed at www.sophos.com/labs 
Sophos Central Engineer v2.1.0 - 180
Sophos Labs
Sophos Labs can be accessed here: sophos.com/labs
Provides the latest 
information about 
security threats
Tr
o
u
b
le
sh
o
o
ti
n
g 
&
 S
u
p
p
o
rt
The Sophos Support site provides a wide range of information and resources. It is the place to go to for 
product documentation, knowledgebase articles and downloads. It can be accessed directly using 
www.sophos.com/support or by using the Support link from www.sophos.com.
Sophos Central Engineer v2.1.0 - 181
Support
sophos.com/support
Tr
o
u
b
le
sh
o
o
ti
n
g 
&
 S
u
p
p
o
rt
To make it easy for you to communicate with the team at SophosLabs, we encourage the sending of 
samples of suspicious files, emails, web addresses and applications for investigation. 
• A knowledgebase article provides instructions on how to do this safely: 
http://www.sophos.com/kb/17327
• Submitting samples of suspicious files: https://www.sophos.com/kb/11490
• How to submit spam, and false-positive spam samples to SophosLabs: 
https://www.sophos.com/kb/23113
• Application Control Request: https://secure2.sophos.com/en-us/support/contact-
support/application-control-request.aspx
Sophos Central Engineer v2.1.0 - 182
Sample Submission
https://secure2.sophos.com/en-us/support/submit-a-sample.aspx
Tr
o
u
b
le
sh
o
o
ti
n
g 
&
 S
u
p
p
o
rt
Sophos Community https://community.sophos.com/ offers a wide range of forums covering each of the 
products.
Sophos Central Engineer v2.1.0 - 183
Community
https://community.sophos.com/
Community forums covering all 
products
Tr
o
u
b
le
sh
o
o
ti
n
g 
&
 S
u
p
p
o
rt
The Community page also provides access to the Knowledgebase. As you will have seen throughout this 
course, the Sophos knowledgebase provides a large number of articles written by Sophos technical 
support to help administrators with:
• Rollout and configuration best practice
• Advanced configuration
• Disaster recovery planning
• Significant files and registry keys
• Troubleshooting on all supported platforms
Sophos Central Engineer v2.1.0 - 184
Knowledgebase
https://community.sophos.com/kb
Tr
o
u
b
le
sh
o
o
ti
n
g 
&
 S
u
p
p
o
rt
Complete the following simulation tasks in Module 5:
• Task 5.1: Use reports in Sophos Central
• Task 5.2: Create a device isolation exclusion
• Task 5.3: Access ESH and generate an SDU
• Task 5.4: Investigate a detection using a threat case
• Task 5.5: Troubleshoot an updating issue using Endpoint Self Help (ESH)
Sophos Central Engineer v2.1.0 - 185
Module 5: Threat Cases, Reports and Troubleshooting
• Complete the following simulation tasks in Module 5
▪ Task 5.1: Use reports in Sophos Central
▪ Task 5.2: Create a device isolation exclusion
▪ Task 5.3: Access ESH and generate an SDU
▪ Task 5.4: Investigate a detection using a threat case
▪ Task 5.5: Troubleshoot an updating issue using Endpoint Self Help (ESH)
Use the Simulation Workbook to view details of each task and 
access the simulations
On completion of this module, you should now be able to perform the actions shown here. Please take 
a moment to review these.
If you are not confident that you have met these objectives, please review the material covered in this 
module
Sophos Central Engineer v2.1.0 - 186
Module Review
• Now that you have completed this module, you should be able to:
Demonstrate the use of threat cases
Generate logs and reports relating to protected users, endpointsand servers
Explain how to find information using the Sophos Knowledgebase and SophosLabs
Demonstrate how to use the Endpoint Self-Help Tool and generate an SDU log
On completion of this course, you should now be able to perform the actions shown here. Please take a 
moment to review these.
If you are not confident that you have met these objectives, please review the material covered in this 
course.
Sophos Central Engineer v2.1.0 - 187
Course Review
• Now that you have completed this course, you should be able to:
Explain how Sophos Central Endpoint and Server protection helps protect against security threats
Perform an installation of Sophos Central on Windows and Mac endpoints and Windows servers
Customize threat protection and control policies
Demonstrate threat protection and commonly used features
Manage threat cases and view reports
Use the Endpoint Self-Help Tool to identify and resolve issues on Windows endpoints
Feedback on our courses is always welcome.
Please email us at globaltraining@sophos.com with your comments.
Sophos Central Engineer v2.1.0 - 188
Feedback is always welcome
Please email globaltraining@sophos.com
TRAINING FEEDBACK
Now that you have completed this course, you should complete the assessment in the training portal.
You will have 2.5 hours to complete the assessment from when you launch it, and you have 4 attempts 
to pass the assessment.
The assessment may include questions on the theory and simulation content. 
Sophos Central Engineer v2.1.0 - 189
Next Steps
Now that you have completed this course, you should:
Complete the assessment
in the training portal
You have 2.5 hours to complete 
the assessment
You have 4 attempts to 
pass the assessment
The assessment may include 
questions on the theory or
simulations
You have now completed the Engineer Certified course for Sophos Central Endpoint and Server 
Protection. 
To continue your training, you can choose to complete either the Sophos Central Endpoint and Server 
Certified Architect course. This course is designed for technical professionals who will be planning, 
installing, configuring and supporting deployments in production environments. 
Or you can select to complete the Sophos Central Technician course, which is designed to provide the 
knowledge and skills required to perform troubleshooting procedures for common issues. 
You can also choose to complete both of these courses if required. 
Sophos Central Engineer v2.1.0 - 190
Provides the knowledge and skills to 
perform troubleshooting procedures for 
common issues
Planning, installing, configuring and 
supporting deployments in production 
environments
Sophos Central TechnicianSophos Central Architect
Next Steps
✓ Design an installation considering all variables
✓ Undertake a multi-site installation appropriate for a 
customer environment
✓ Explain the function of core components, how they 
work and how to configure them
✓ Track the source of infection and clean up infected 
devices
✓ Perform preliminary troubleshooting and basic support 
for customer environments
✓ Understand the support tools required to investigate 
common issues
✓ Identify common issues when reported
✓ Perform appropriate troubleshooting steps
✓ Gather information to allow further troubleshooting if 
required
End.
Sophos Central Engineer v2.1.0 - 191

Mais conteúdos dessa disciplina