This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Endpoint Protection Questions

Fairly new to Sophos Enterprise Management Console, and have few questions regarding the console, policies, and some more..

1. How does Sophos differentiate between Suspicious files and Suspicious behavior?

Are they both heuristically determined? If so, how are they technically different? Really the question is -- which one of these two could possibly have lower false (+)ves and  be preferred over another for result efficiency purpose?

2. Default Policy vs Custom Policy: If both policies (differently configured) are enforced to a group, which policy overrides?

3. What does HIPS' "detect buffer overflow" do? By its name, one can infer that it detects overflow attempt -- but is there an use case or an example that clarifies its functions? 'Detect Suspicious behavior' is another option under HIPS settings; if it's behavior based, couldn't they both be bundled together? The goal is to determine whether there's an advantage in enabling this feature.

4. Under 'Anti-virus and HIPS policy' column, we have some systems that 'Differ from policy'. What causes this, and how can they be re-enforced with appropriate policies?

5. Under 'On-access' column, several systems are marked as 'Inactive'. The services seem to be running fine on them. What makes the On-access inactive? Does it happen when someone disables on-access scan? I tried reproducing that, but did not see any difference on my test machine's On-access status.

6. What are 'other errors' signify? Under Anti-virus and HIPS -> View/Edit Policy -> Messaging.

I tried to include a pdf with screenshots of the console, but didn't see an option to upload/attach documents within the forum. 

Thanks in advance for any help/suggestions/advice.

:4699


This thread was automatically locked due to age.
Parents
  • The are several posts about  differs from policy in this forum, see specifically . Usually right-clicking the group or client and select Comply with ... resolves the issue (unless it's one of the "special cases"). Another option is making a minor change in the policy and saving it, which causes the policy to be sent to the clients.

    The On-access status Inactive in SEC tells you that on-access scanning disabled. If you turn it off on a client you should see the corresponding change in SEC after (usually) a few seconds. Normally this is the case when either scanning has been turned off on the client or is set to off in the policy. If it's inactive because of an error (e.g. policy Comparison failure) the error will also be shown in SEC.  

    Christian

    P.S. there's a number of free sites where you can upload images/screenshots for inclusion in your posts

    :4711
Reply
  • The are several posts about  differs from policy in this forum, see specifically . Usually right-clicking the group or client and select Comply with ... resolves the issue (unless it's one of the "special cases"). Another option is making a minor change in the policy and saving it, which causes the policy to be sent to the clients.

    The On-access status Inactive in SEC tells you that on-access scanning disabled. If you turn it off on a client you should see the corresponding change in SEC after (usually) a few seconds. Normally this is the case when either scanning has been turned off on the client or is set to off in the policy. If it's inactive because of an error (e.g. policy Comparison failure) the error will also be shown in SEC.  

    Christian

    P.S. there's a number of free sites where you can upload images/screenshots for inclusion in your posts

    :4711
Children
No Data