Professional Documents
Culture Documents
3. Deep learning - to analyze the behavior of files & applications in real time.
4. Sandbox Analysis - sandboxes suspicious files in an isolated environment
5. Heuristic Analysis - to look for suspicious patterns in files and applications
6.
7.
8. Web security/ web control
a. Web application control: control access to web applications, such as social media and
streaming services.
b. Website categorization: categorizes websites based on their content, allowing granular control
over access.
c. Customizable policies: Create custom policies to control web access for different user groups
or devices.
9.
10. Deep Scanning
22.
23. Log and report
24. Events: A record of all security events, including malware detections, intrusion prevention blocks, and
endpoint protection actions.
25. Malware and PUAs Blocked: A simplified version of the Events log, specifically highlighting blocked
malware and potentially unwanted applications (PUAs).
26. Audit Logs: A detailed record of all administrative activities within Sophos Central, such as user
logins, configuration changes, and device management actions.