What is Sophos Endpoint Self Help tool?
The Endpoint Self Help (ESH) finds, troubleshoots, and resolves issues found on Windows endpoints and servers using the Sophos Endpoint Agent.
ESH identifies issues with the underlying technologie...
Managing threats to your data, users and devices is becoming ever more important, and increasingly a task that you need the support of experts and comprehensive systems for.
In season 4 of the Sophos Threat Hunting Academy, focusing on MDR, we&rsquo...
XDR customers will notice some new enhancements to the Detections page in the Threat Analysis Center. Here is a breakdown of the changes:
As well as displaying Sophos raised detections from Sophos managed devices we can now raise detections fr...
The XDR Sensor is a new deployment option specifically designed for prospects/customers who are unwilling or unable to replace their existing, non-Sophos endpoint protection platform with the full Sophos Intercept X Advanced with XDR agent but a...
Firstly we should point out that we do not support Beta variants of macOS.
We do understand that, like us, you might need to run beta versions of software for testing purposes hence this community post!
At the present time, the 13.1 Beta has introduc...
We have been adding the ability to view more detection information both from the Sophos managed devices and from 3rd party integrations.
In this update you can now view all detections and manage filters to see just detections that map to a specific M...
We have been working with Apple on support for macOS Ventura, testing the beta builds and providing feedback to Apple. We have now received the Release Candidate build and will support for macOS Ventura with Sophos Endpoint Protection versi...
Updated November 9th, 2022 - Customer looking to migrate to macOS 13 Ventura should review this KBA for details on known compatibility issues. Based on customer feedback we are now providing separate configuration profiles for each major suppor...
We're working on a new feature to help identify when Central accounts are configured in ways that reduce security, so that admins can take action to improve their protection.
Feedback is appreciated at any stage, you can comment on this blog post.
...
In this video, Kushal from Technical Support walks you through how to create a Gold Image.
A Gold Image is used with Citrix or VDI environments where you wish to set up one Master Image (the Gold Image) to replicate out to your end-users.
Watch the f...
Being able to easily and silently deploy Endpoint Protection for macOS using Jamf Pro has been a top customer ask and with the most recent version of Endpoint Protection for macOS an Apple Configuration Profile is now provided that can configure...
Note: Use of all features and functionalities provided under the Early Access Program is subject to the Sophos End User Terms of Use.
We are excited to announce the opening of the New XDR Features Early Access Program (EAP). This EAP will...
We are adding a filter to the XDR Threat Analysis center Detections page. This will allow you filter for detection by device name. The filter will check if the data provided matches any portion of the device name.Device name Filter for Detectio...
In May 2022 the Best Protection EAP will move to version 10.3.5.
All enrolled devices should automatically update.
Improvements in 10.3.5
CryptoGuard stability improvements
Improved performance impact when compiling with IntelliJ IDE
We encou...
I am pleased to announce significant enhancements to the detection and response capabilities for Linux server workloads and containers in the cloud, on-premises and virtual deployments. The new functionality, made available through the integrati...
For Endpoint/Server customers looking to control the region being used when requesting the latest SophosLabs intelligence on files, we have introduced the new ‘Intelix Service Region’ setting. SophosLabs Intelix provides threat...
We are continuing to make improvements to the XDR Detections and Investigation console. Sophos is continuously developing new features and refining how existing ones work and for those who use the product regularly you will notice th...
With the Microsoft 365 Data Lake connector along with the Detection and Investigation functionality having reached general availability to all XDR customers we are now in a position where we are ready to close the ‘XDR – Detection and In...
Hi all, I hope you've had a chance to think about your Threat Response posture since last week's sessions - have you had a conversation with anyone about your Incident Response plan yet? If not there's no time like the present! Remember, it doe...
And that's a wrap! Thanks to all of you for helping us have such a great session today - I loved the conversation and talking through your questions. It really helps bring it all to life and to know that so many of you are benefitting from what&#...
I loved today's session - really good to be able to reflect on the wider business aspect of Threat Hunting and Response, and consider that this is a whole-business affair, rather than just the remit of the IT/Technical team. Thank-you all for you...
We have introduced a new Time Period selector that is applied to XDR Data Lake queries. On creating a brand new Data Lake query, a new Data Lake query based off a canned query or a new scheduled Data Lake query you will see the new Time Period select...
And that's a wrap for week 1! Thanks for being with us for the three sessions this week - we all really enjoyed delivering them and it was great to see so many of you active in the conversation.
Couple of resources we mentioned during the session...