Sophos Endpoint For Windows
Sophos Endpoint For Windows
Help
Contents
About Sophos Endpoint for Windows...................................................................................................... 1
Sophos Endpoint...................................................................................................................................... 2
Status........................................................................................................................................................3
Events.......................................................................................................................................................4
Detections.................................................................................................................................................6
Settings.....................................................................................................................................................7
How to .....................................................................................................................................................9
Scan a file..................................................................................................................................... 9
Scan the computer or server........................................................................................................ 9
Clean up a threat.......................................................................................................................... 9
Change security settings............................................................................................................... 9
Update now................................................................................................................................. 10
Troubleshoot................................................................................................................................ 10
Encrypt the computer.................................................................................................................. 10
Send protected files via email.....................................................................................................11
Access the computer if you forget the password........................................................................13
Why is my file transfer blocked?........................................................................................................... 14
Get additional help................................................................................................................................. 15
Legal notices.......................................................................................................................................... 16
(2020/06/01)
Sophos Endpoint for Windows
2 Sophos Endpoint
Sophos Endpoint runs on computers and servers to protect them.
Note
You may not have all the features described in this Help. This depends on your license.
Sophos Endpoint is configured and managed centrally from the Sophos Central Admin console.
However, you can do some tasks on the computer or server:
• Check the Status (page 3) of the computer.
• Scan a file (page 9) or Scan the computer or server (page 9) for threats.
• See details of Events (page 4) on the computer or server, such as threats detected.
• Clean up a threat (page 9).
• Change security settings (page 9). For example, you can turn off features so that you can
troubleshoot.
• Update now (page 10).
• Troubleshoot (page 10).
Note
You need to use Admin sign-in and enter the Tamper Protection password to clean up threats or
change settings.
3 Status
Note
You may not have all the features described here. This depends on your license.
Note
The About link in the lower right of the page lets you update your virus definitions or troubleshoot
the product.
Security Status
An icon in the upper part of the page shows the status.
4 Events
Note
You may not have all the features described here. This depends on your license.
The Events page shows events on the computer or server, for example threats detected.
You can filter events, for example to show only events that require you to take action, or search for
specific types of events.
Web threats
Web threats include malicious websites, uncategorized websites, and risky downloads.
Some websites are also generally considered unsuitable for business networks, for example adult
websites or social media. These can be blocked.
Malicious behavior
Malicious behavior is suspicious behavior detected in software that is already running on the
computer or server.
Ransomware is malicious software that denies you access to your files until you pay a ransom.
Controlled Items
This category includes:
• Applications that are not a security threat, but that you decide are unsuitable for use in the office.
• Peripherals and removable media.
• Risky downloads or websites that are inappropriate for the office.
• Files containing sensitive information (like personal or financial details) that you don't want to leak.
Malicious Traffic
Malicious traffic is traffic between computers that indicates a possible attempt to take control of the
computer or server (a “command and control” attack).
Exploits
Exploits that Sophos can prevent include application hijacking and exploits that take advantage of
vulnerabilities in browsers, browser plug-ins, Java applications, media applications and Microsoft
Office applications.
5 Detections
The Detections page lets you:
• Scan the computer or server for threats.
• See the threats that Sophos has detected and protected against.
Detection History
Shows how many threats of a specific type have been detected. Click on a type to see details of the
detected threats of that type on the Events page.
6 Settings
Note
You may not have all the features described here. This depends on your license.
The Settings page is only available if you use Admin sign-in and enter the Tamper Protection
password (available from the Sophos Central administrator).
You can temporarily change the security settings on this computer or server.
You might need to do this to troubleshoot. For example, you might want to turn off a feature to see if
it is causing problems on the computer.
Note
You can change the settings back sooner if you want to. You can’t use the slider controls to do this
for individual features. Instead, uncheck Override Sophos Central Policy for up to 4 hours to
troubleshoot.
Deep learning
Deep learning uses advanced machine learning to detect threats. It can identify malware and
potentially unwanted applications without using signatures.
Real-time Scanning
Real-time scanning scans items as users attempt to access them, and grants access only if they are
clean. You can select:
• Files: This scans local files and (if this is selected in the policy) network shares.
• Internet: This scans internet resources. It can scan downloads in progress, block access to
malicious websites, and detect low-reputation websites.
Controls on Users
• Peripheral Control lets you control access to peripherals and removable media.
• Application Control lets you detect and block applications that are not a security threat, but that
you decide are unsuitable for use in the office.
• Web Control lets you protect against risky downloads, control the sites that users can visit, and
prevent data loss.
• Data Loss Prevention lets you monitor and restrict the transfer of files containing sensitive data.
• Tamper Protection: When this is enabled, a local administrator can only change security settings
or uninstall Sophos Endpoint if they have the necessary password.
Runtime Protection
Runtime protection protects against threats by detecting suspicious or malicious behavior or traffic
on endpoint computers. You can select:
• Ransomware Detection: This protects against malware that restricts access to files, and then
demands a fee to release them.
• Safe Browsing: This protects your web browsers against exploitation by malware.
• Exploit Mitigation: This protects the applications most prone to exploitation by malware, such as
Java applications.
• Network Threat Protection: This detects traffic between an endpoint computer and a server that
indicates a possible attempt to take control of the endpoint computer. It includes packet inspection,
which scans network communications, identifying and blocking threats before they can harm the
operating system or applications.
Note
If you turn off Network Threat Protection, the EDR features, Isolation and Stonewalling, will
also be turned off.
• Malicious Behavior Detection (HIPS): This protects against threats that are not yet known. It
does this by detecting and blocking behavior that is known to be malicious or is suspicious.
• AMSI Protection: This protects against malicous code (for example, PowerShell scripts) using the
Microsoft Antimalware Scan Interface (AMSI). Code forwarded via AMSI is scanned before it runs
and the applications used to run the code are notified of threats by Sophos. If a threat is detected,
an event is logged.
Computer controls
You can monitor Windows Firewall (and other registered firewalls) on your computers and servers.
7 How to ...
Note
You can change the settings back sooner if you want to. You can’t use the slider controls to do this
for individual features. Instead, uncheck Override Sophos Central Policy for up to 4 hours to
troubleshoot.
7.6 Troubleshoot
To troubleshoot problems:
1. Click About in the lower right of the user interface.
2. Click Open Endpoint Self Help Tool to gather data on the problem, or follow the link to the
Community Forum.
The Device Encryption feature encrypts the hard disk of your computer using Windows BitLocker
technology. Your administrator defines whether you need to authenticate each time you access your
computer.
If no authentication is required, the encryption of your hard disk starts automatically as soon as you
restart your computer after you received the Sophos Central policy. There is nothing you need to do
in this case.
If authentication is required, encrypt the computer as follows:
1. When the Sophos Device Encryption dialog is displayed, follow the instructions in the dialog. The
specific instructions depend on your system and the policy settings defined by your administrator.
• If the Device Encryption policy requires a PIN or password for authentication, follow the on-
screen instructions to create a PIN or password.
Note
Be careful when creating a PIN or password. The pre-boot environment only supports the
US-English keyboard layout. If you create a PIN or password now with special characters,
you might have to use different keys when you enter it to sign in later.
•
If the Device Encryption policy requires a USB key for authentication, you need to connect a
USB flash drive to your computer. The USB flash drive must be formatted with NTFS, FAT, or
FAT32.
2. When you click Restart and Encrypt, the computer restarts and encrypts your hard disks. You can
work as usual.
Note
You can select Do this later to close the dialog. However, it will appear again next time you
sign in.
After Sophos Central has encrypted the system volume, the encryption of the data volumes is
started. Removable data volumes such as USB drives are not encrypted.
When you sign in to your computer, you may need a PIN, password, or USB key to unlock your
system volume. Data volumes are unlocked automatically.
Note
The add-in is only available in Central Device Encryption 2.0 or later.
Note
If Sophos SafeGuard Enterprise is installed on the computer, its Outlook add-in is used to encrypt
email attachments.
If configured in your policy, you can choose how to send attachments whenever you send an email
with one or more files attached.
• Password protected
Select this option if you are sending sensitive files to recipients outside of your organization.
After you define a password and select Send, your files are encrypted and saved as an HTML
file.
Recipients can open the file with their web browser as soon as you communicate the password
to them. We recommend that you use a strong password and don’t send it in the same email as
the files. For example, you can give the recipients the password by phone.
Recipients can use one of the following browsers to open the password-protected attachment:
— Mozilla Firefox
— Google Chrome
— Microsoft Edge
— Internet Explorer 11
Decryption with other browsers, such as mobile browsers, may work but is not actively
supported.
Recipients can edit the file and send it back using the same password or a new password. They
can even protect a new file with a password. They are guided through the procedure by a wizard
in their browser.
• Unprotected
Select this option only if your email attachment does not contain any sensitive data. Any action to
send email attachments unprotected may be logged and monitored by your security officer.
If you are not prompted, you can password protect attachments manually, see Use a password to
protect attachments (page 12).
Note
Protect Attachments is only visible if the email is opened in a separate window.
2. Follow the on-screen instructions and create a password. We recommend that you use a strong
password and don’t send it in the same email as the files. For example, you can give the recipients
the password by phone.
Password restrictions:
• The password must be at least 8 characters long.
• The password must not contain more than three characters next to each other in the same
keyboard row.
• The password must not contain three or more consecutive alphanumeric characters.
• The password must have at least 3 different characters.
Note
• You need free disk space for the encryption.
• The maximum supported file size is 50 MB.
• The encrypted HTML file is bigger than the original files.
Your file is encrypted and saved as an HTML file. You can now safely attach the HTML file
to emails. Recipients can use one of the following browsers to open the password-protected
attachment:
• Mozilla Firefox
• Google Chrome
• Microsoft Edge
• Internet Explorer 11
3. Instruct your recipients to double-click the file and follow the on-screen instructions to do one of the
following:
• Enter the password and click Enter to access the file.
The recipients can protect the file with a password when sending it back to you. They may
use the same password or create a new password.
• Click Password protect a new file to protect a different file with a password.
Note
A recovery key can only be used once. If you need to recover your computer again later, you need
to get a new recovery key.
Transfer is blocked
If you receive a "file transfer blocked" message, you cannot transfer the files. Your administrator may
have added some advice to this message.
10 Legal notices
Copyright © 2020 Sophos Limited. All rights reserved. No part of this publication may be reproduced,
stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording or otherwise unless you are either a valid licensee where the documentation
can be reproduced in accordance with the license terms or you otherwise have the prior permission
in writing of the copyright owner.
Sophos, Sophos Anti-Virus and SafeGuard are registered trademarks of Sophos Limited, Sophos
Group and Utimaco Safeware AG, as applicable. All other product and company names mentioned
are trademarks or registered trademarks of their respective owners.