You are on page 1of 7

1.

Sophos Intercept X Advanced with XDR

2. Central Endpoint Protection - Zero-day Malware Detection

3. Deep learning - to analyze the behavior of files & applications in real time.
4. Sandbox Analysis - sandboxes suspicious files in an isolated environment
5. Heuristic Analysis - to look for suspicious patterns in files and applications

6.
7.
8. Web security/ web control
a. Web application control: control access to web applications, such as social media and
streaming services.
b. Website categorization: categorizes websites based on their content, allowing granular control
over access.
c. Customizable policies: Create custom policies to control web access for different user groups
or devices.

9.
10. Deep Scanning

11. On-demand: scans that are initiated manually by the user

12. Scheduled: scans automatically initiated at specific times or intervals.

13. Full system: scans entire computer’s files & applications.


14. On-access scanning: scans files when they are accessed, such as when they are opened or downloaded.
15.
16. Email Notifications
17. Security alerts: These alerts will notify you of potential threats, such as malware infections or
intrusion attempts.
18. Device health alerts: These alerts will notify you of issues with your Sophos security
products, such as when updates are available or when there are any issues that need to be
addressed.
19. License alerts: These alerts will notify you of issues with your Sophos licenses, such as when they
are about to expire.
20. Report notifications: These alerts will notify you when reports are generated, such as daily
security reports or weekly vulnerability scans.
21. By configuring email notifications for your Sophos product, you can stay informed about the
security of your network and take action to address any potential threats.

22.
23. Log and report

24. Events: A record of all security events, including malware detections, intrusion prevention blocks, and
endpoint protection actions.

25. Malware and PUAs Blocked: A simplified version of the Events log, specifically highlighting blocked
malware and potentially unwanted applications (PUAs).
26. Audit Logs: A detailed record of all administrative activities within Sophos Central, such as user
logins, configuration changes, and device management actions.

You might also like