1 / 70

Small Business Edition 4

Small Business Edition 4. C707 – Technical overview. Prerequisites. Prior to taking this training you should be able to setup a Windows server with Windows workstations in a production environment. Course objectives. By completing this training you will be able to:

raleigh
Download Presentation

Small Business Edition 4

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Small Business Edition 4 C707 – Technical overview

  2. Prerequisites Prior to takingthis training youshouldbe able to setup • a Windows server • with Windows workstations • in a production environment

  3. Course objectives By completing this training you will be able to: • qualify the main system requirements • describe the solution architecture as well as the installation and management tasks to a technical audience • highlight the differences with Sophos Endpoint Security and Control 9 • list additional Sophos online resources 3

  4. Agenda Solution components Solution architecture System requirements and deployment Management from Sophos Control Center Management at the endpoint Endpoint Security & Control 9 Online resources 4

  5. Small Business Edition 4 Solution components

  6. Section objectives Upon completion of this section you will be able to identify which components are part of: • Sophos Small Business Security suite • Sophos Small Business Computer security • Sophos Small Business Anti-Virus

  7. Solution components PureMessage and SafeGuard are covered in a separate training

  8. Small Business Edition 4 Solution architecture

  9. Section objectives Upon completion of this section you will be able to: • list the components that comprise the solution • describe each of the components with reference to the product architecture Section agenda • SophosLabs • Updating • Management

  10. SophosLabs • Anti-Malware (Viruses, worms, trojans, rootkits & spywares) • Anti-Adware • HIPS • Application control • Anti-Spam • URL risk classification • Genotype (detects up to 85% of new malware)

  11. Central installation directories • \\<server name>\SophosUpdate\CIDs Sophos Control Center

  12. Sophos AutoUpdate

  13. Sophos Control Center • Find and populate endpoints • Deploy • Configure the client software • Monitor the network • Take actions • Generate reports and alerts • Store all data in SQL server database

  14. Client side components • Sophos Anti-Virus • Sophos Endpoint Security and Control client • Sophos Client FireWall • Sophos AutoUpdate • Sophos RMS agent

  15. Sophos Update Manager Messagerouter SophosAnti-Virus ClientFirewall AutoUpdate Messagerouter Agent Management server ControlCenter SCCdatabase Communication overview Clientside RMS Serverside COM Console

  16. Section review • What are the main roles of: • Sophos Endpoint Security and Control client? • Sophos Client-Firewall? • Sophos Console Center? • RMS? • CIDs? • Sophos AutoUpdate? • SophosLabs?

  17. Small Business Edition 4 System requirements and deployment

  18. Section objectives Upon completion of this section you will be able to: • qualify the main system requirements for the management software components and endpoint software components • list the main steps of Sophos Control Center deployment • list the main steps involved in a typical endpoint deployment

  19. Sophos Control Center *Windows XP, Vista , 7 and 2000 pro have performance limitations, especially with CIDs

  20. Endpoint client http://www.sophos.com/products/all-sysreqs.html for more details

  21. Software lifecycle

  22. Installation of Sophos Control Center Main steps: • Installation of Microsoft .Net Framework and Msxml • Complete setup • Optional feedback to Sophos • Software installationincl. SQL Express 2005 andcreation of SophosUpdateMgr • Server restart • Sophos download account • Selection of client platforms • Download of client software

  23. Upgrades from SCC version 2 • Read the upgrade guide • Upgrade of Sophos Control Center is automatic • Upgrade of the endpoint client is automaticon Windows 2000/XP/2003/Vista/2008/7 • Upgrade requires to run setup onWindows 98 and Macintosh

  24. Typical steps for endpoint deployment • Protect new computers • Windows user account (must be valid on all computers) • Search & select computers • Select features • Deploy via task scheduler • See startup guide for details

  25. Manual installation • When installation from the console fails • For Windows 98 and Macintosh • Run setup from • \\servername\SophosUpdate\CIDS

  26. Competitor Removal Tool (CRT) • detects 3rd party anti-virus • detects 3rd party firewalls (except Windows and VPN clients) • stops installation upon detection • optionally removes 3rd party security software • can be customizedby Sophos • Run avremote.exeto test

  27. Section review • List the operating systems supported by • Sophos Control Center 4 • Sophos Anti-Virus • Sophos Client Firewall • List 2 cases which require a manual installation • Where can you find more details on how to prepare your network?

  28. Small Business Edition 4 Management from Sophos Control Center

  29. Section objectives • Upon completion of this section you will be able to describe the main management tasks which can be completed from Sophos Control Center

  30. Section agenda • Central configuration • Configure scanning • Configure updating • Configure firewall • Configure application control • Configure device control • Dashboard and alerts • Smart views • Resolve alerts and errors • Event viewers • Reports

  31. Central configuration

  32. Configure scanning

  33. Configure scanning (continued) • Recommended steps: • Detect and alert only • Authorize unwanted detections • Block (Block may require to test installation of new applications)

  34. Configure Updating

  35. Configure Firewall • Monitor operational mode: Easily create rules

  36. Configure application control

  37. Configure device control

  38. Dashboard and alerts

  39. Smart views

  40. Resolve alerts and errors

  41. Event viewers

  42. Event viewers(continued)

  43. Event viewers(continued)

  44. Reports

  45. Section review • What are the main roles of: • Event viewers • Smart views • Dashboard • Device control • Application control • Authorization Manager • Where can you acknowledge and delete alerts? • Where can you see which users have attached an Ipod to their corporate computer? • How can you set a separate configuration for one server?

  46. Small Business Edition 4 Management at the endpoint

  47. Section objectives Upon completion of this section you will be able to: • describe the main management tasks which can be completed at the endpoint • describe which features are available on each supported platform Section agenda • End user experience on Windows • End user experience on Macintosh • Management of threats at the endpoint • Features by platform

  48. End user experience on Windows Installing or updating Client installed Message for user Failing to update

  49. End user experience on Windows (continued)

  50. End user experience on Macintosh

More Related