This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

New to Intercept X Endpoint

Greetings,

I am completely new to IXE. Could someone point me to a document and or videos that explain the product features and configuration in detail?

We had Symantec Endpoint prior to this and I wasn't the individual that configured it.

I would consider myself very green with respect to antivirus and crypto prevention software.

I'm hoping that someone can help me along and someday I may bee a contributor answering posts.

Than You

Charlie



This thread was automatically locked due to age.
  • Hello Charlie,

    It's hard to gauge the level of detail you're after and what stage of the deployment you're at.  That said it should all be reasonably intuitive, in that I assume that you have created a Sophos Central account and deployed the client software to maybe a few endpoints, possibly a server.

    Maybe you have configured AD Sync, maybe set one or more servers to be message relays or update sources depending on the number of clients?  These aren't required but can be useful depending on network topology, bandwidth requirements, etc..

    At this point you can look to customise policies, be it sticking with just the base policy of each or by creating/layering policies for certain users or devices.  In any case, the policies are either control based, e.g. Device control, Data control, Application control, Web control. The main one of course is Threat Protection.  The default options are pretty much what you want.

    You then of course have exclusions.  You can set this globally or on a threat protection policy basis.  These can be files, directories, process, etc..

    As for resources, the Help pages in Sophos Central are a start but for detail:

    Exploit Prevention is probably the most technical to understand, there are some details for each of the mitigations here: https://www.sophos.com/en-us/medialibrary/Gated-Assets/white-papers/Sophos-Comprehensive-Exploit-Prevention-wpna.pdf  

    Are you running into any specific problems?

    Regards,
    Jak