Sophos Endpoint Security & Data Protection Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Sophos Endpoint Security & Data Protection an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Sophos Endpoint Security & Data Protection, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Sophos Endpoint Security & Data Protection die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Sophos Endpoint Security & Data Protection. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Sophos Endpoint Security & Data Protection sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Sophos Endpoint Security & Data Protection
- Den Namen des Produzenten und das Produktionsjahr des Geräts Sophos Endpoint Security & Data Protection
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Sophos Endpoint Security & Data Protection
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Sophos Endpoint Security & Data Protection zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Sophos Endpoint Security & Data Protection und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Sophos finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Sophos Endpoint Security & Data Protection zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Sophos Endpoint Security & Data Protection, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Sophos Endpoint Security & Data Protection widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    S o p h o s E n d p o i n t S e c u r i t y a n d D a t a P r o t e c t i o n : R e v i e w e r’ s g u i d e[...]

  • Seite 2

    1 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE[...]

  • Seite 3

    2 WELCOME W elcom e to this rev iewe r ’s guid e fo r So phos Endp oint Sec urit y an d Da ta P rotec tion – S opho s’s fully int egra ted, sca lable end poin t se curi ty so luti on . Th is d ocume nt int rodu ces the k ey softw are elem ents of S opho s En dpoi nt Se curi ty a nd D ata P rot ecti on: mana geme nt c onsol e, a nti- viru s, c[...]

  • Seite 4

    3 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE CONTENTS 1 COMPLETE PROTECTION FOR THE ENDPOINT 4 Over view of Sophos Endpoint Security and Data P rotection 2 SINGLE, CENTRAL AUTOMA TED CONSOLE 7 Over view of Sophos Enterprise Console 3 PROTECTING WINDOWS COMPUTERS 17 Over view of Sophos Endpoint Security and Control, Sophos Cli[...]

  • Seite 5

    4 1 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDE sophos endpoint security and da t a protection 1 COMPLETE PROTECTION FOR THE ENDPOINT OVERVIEW OF ENDPOINT SECURITY AND DA T A PROTECTION Sophos simplifies the task of securing your desktops, laptops, mobile devices, and file ser vers against known and unknown threats, as well as protect[...]

  • Seite 6

    5 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Comprehensive data protection Th e co mb in at io n of a nu mb er o f di ff er ent t ec hn ol og ie s en su res t ha t yo ur d at a is pr ot ec te d ag ai ns t a cc id en ta l lo ss . DL P c on te nt s ca nn in g in teg ra te d in to t he s in gle en dp oi nt a ge nt m oni to rs f [...]

  • Seite 7

    6 1 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDE T esting key features Before you test, here are some items to consider and to compare to competing products: • Can you manage protection for all your platforms from a single management console? • How many deployments are required to provide equal endpoint protection coverage – [...]

  • Seite 8

    7 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE sophos enterprise console 2 SINGLE, CENTRAL A UTOMA TED CONSOLE OVERVIEW OF SOPHOS ENTERPRISE CONSOLE Sophos Enterprise Console delivers smarter , simpler policy-based management of your endpoint protection. It lets you manage thousands of W indows, Mac, Linux and UNIX computers fr[...]

  • Seite 9

    8 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE active directory integra tion and synchroniza tion F aster deployment and automatic protection Sophos Endpoint Security and Data P rotection makes it easy to find computers on your network by enabling the replication of Active Director y groups and client structure into Enterprise Console. [...]

  • Seite 10

    9 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE At the click of a mouse, you can: • Filter the view to focus on those computers with out-of-date protection or with malware alerts, giving you instant visibility of the areas on your network that require attention. • Adjust the dashboard thresholds at which the status col[...]

  • Seite 11

    10 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE smart views T argeted cleanup Cleaning up a large network after an attack can be expensive and time- consuming. Enterprise Console provides remote, centralized cleanup of files, registr y entries, and running processes. Smart Views gives a complete view of the security status of all comput[...]

  • Seite 12

    11 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE activepolicies Simplified policy setting and enforcement Using Sophos ActiveP olicies™, you can quickly and intuitively create and deploy network-wide policies independently of groups, allowing you to deploy one policy across multiple groups simultaneously . ActiveP olicies tak[...]

  • Seite 13

    12 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE F igur e 6: Configuring Anti-virus and HIPS policy Anti-virus and HIPS policies – vir us, spyware, PUA, intrusion prevention Imp leme ntin g our ant i-vi rus prot ectio n al so p rovi des you w ith a co mple te h ost int rusi on p reven tion sys tem (HIP S) wi thou t th e ne ed f or co m[...]

  • Seite 14

    13 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Application control policies Applications like V oIP , IM and P2P are increasingly the cause of security , legal and productivity issues in business – consequently IT departments are being asked to control their unauthorized installation and usage. Sophos integrates the detectio[...]

  • Seite 15

    14 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE Device control policies Device control can help to significantly reduce your exposure to accidental data loss and restrict the ability of users to introduce software and malware from outside of your network environment. Integrated into the Sophos endpoint agent, it enables you to control t[...]

  • Seite 16

    15 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Y ou can also significantly reduce the risk of network bridging between a corporate network and a non-corporate network. The Block bridged mode is available for both wireless and modem types of device. The mode works by disabling either wireless or modem network adapters when an [...]

  • Seite 17

    16 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE There are two types of data control rule: • file matching rule: specifies the action that is taken if the user attempts to transfer a file with the specified file name or of the specified file type (true file type categor y , e.g. a spreadsheet) to the specified destination, f[...]

  • Seite 18

    17 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE There are a number of actions that can be taken when a data control rule is matched: • Allow file transfer and log event • Allow transfer on acceptance by user and log event • Block transfer and log event By defa ult, when a r ule is m atch ed an d fil e tr ansf e[...]

  • Seite 19

    18 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE Y ou can configure different location aware security policies to ensure that mobile computers are protected, whether in or out of the office. The location of the mobile computer is detected using either DNS or the gateway MAC address. Network access control policies NAC pol icie s are con[...]

  • Seite 20

    19 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE • Manage—provides components for editing and managing policies and managing computers. • Enforce—offers control of network access using access templates and exemptions. • Report—offers a suite of reports for troubleshooting compliance and network access. •?[...]

  • Seite 21

    20 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE Important T o fully evaluate the Sophos NAC functionality please download and install the NAC Manager component from www .sophos.com/downloads/ (Y our evaluation credentials will provide you with access to this area.) There are three pre-defined NAC policies: • Default —The default [...]

  • Seite 22

    21 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Reports can be output in table format as well as chart format, including pie charts and can be expor ted in a number of file formats, namely : PDF (Acrobat), HTML, MS Excel, MS W ord, RTF , CSV , XML. Using the Report Manager , you can quickly create a repor t based on an existin[...]

  • Seite 23

    22 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE There are four pre-configured roles: 1. System Administrator —A pre-configured role that has full rights to manage Sophos security software on the network and roles in Enterprise Console. The System Administrator role cannot be edited or deleted. 2. Administrator —A pre-configured ro[...]

  • Seite 24

    23 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE sophos endpoint security and da t a protection 3 PROTECTING WINDOWS COMPUTERS Sophos Endpoint Security and Data P rotection protects your Windows network with Sophos Endpoint Security and Control for Windows, Sophos NAC, SafeGuard Disk Encr yption and Sophos Client Firewall. SOPHO[...]

  • Seite 25

    24 3 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDE Intrusion prevention Sophos Endpoint Security and Control for Windows includes complete intrusion prevention (HIPS), ensuring proactive protection without you having to carr y out the complex installation and configuration of a separate product. A number of pre-emptive detection technologies com[...]

  • Seite 26

    25 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Application Control While some applications can provide efficiency gains, others can distract users from their business tasks, and waste valuable network bandwidth and processing power . In addition, with P2P and IM-based malware attacks growing fast, and regulations that make it[...]

  • Seite 27

    26 3 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDE SophosLabs also maintains a librar y of extensive librar y of global sensitive data definitions (Content Control Lists) which covers personally identifiable information (PII) such as credit card numbers, social security numbers, postal addresses, or email addresses helping you to protect your s[...]

  • Seite 28

    27 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE SAFEGUARD DISK ENCRYPTION SafeGuard Disk Encr yption is an easy to implement solution that encr ypts hard disks and data on mobile media to protect against the loss of data and meet compliance requirements. Securing data through full disk encr yption Har d di sks (IDE, SCS I, s er[...]

  • Seite 29

    28 3 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDE SOPHOS CLIENT FIREW ALL Sophos Client Firewall is integrated into the endpoint agent making deployment, configuration, updating, and management by Enterprise Console simple. It proactively locks down computers, protecting against known and unknown threats, such as internet worms, hackers, and un[...]

  • Seite 30

    29 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Ensuring protection with location awareness Sophos Client Firewall lets you configure different policies for different locations according to the location where computers are used, for example, in the office (on the network) and out of the office. The Enterprise Console will th[...]

  • Seite 31

    30 4 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDE sophos anti - virus for mac os x , linux and unix 4 PROTECTING NON- WINDOWS COMPUTERS THE NEED TO PROTECT NON- WINDOWS COMPUTERS It has become increasingly important to protect Mac, Linux, UNIX and other computers. The ability of non-W indows computers to harbor and spread Windows viruses, th[...]

  • Seite 32

    31 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Y ou can also enable remote and mobile users to update from wherever they are via the network or internet, either from the main ser ver , a backup, or directly from Sophos. Automatic reporting of virus incidents Enterprise Console’s security dashboard shows outbreak risk data, a[...]

  • Seite 33

    32 4 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDE Automatic updates Updates are automatically downloaded and distributed through Enterprise Console, cascading web ser vers or directly from Sophos, ensuring that all computers across the network, including remote laptops, are fully protected. SOPHOS ANTI- VIRUS FOR UNIX Sophos Anti- Virus for [...]

  • Seite 34

    33 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE appendix i EV AL U A TING ENDPOINT SECURITY AND DA T A PROTECTION W e want you to be absolutely convinced that Sophos Endpoint Security and Data P rotection will protect your network and support you better than any other security vendor . This appendix gives you details of what do[...]

  • Seite 35

    34 SYSTEM REQUIREMENTS F or full details, visit www .sophos.com/products/all-sysreqs.html Enterprise Console system requir ements Platforms supported Windows 95/98/NT4/2000/XP/2003/V ista/2008/7 Mac OS X Linux UNIX Hardware Minimum 2.0 GHz P entium or equivalent Management server Windows Server 2008 Windows Server 2003 and R2 Windows 2000 Server VM[...]

  • Seite 36

    35 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Sophos Endpoint Security and Control for Windows system requirements Platforms supported Windows 95/98/NT4/2000 and 2000 P ro/XP Home and P ro/2003/Vista/2008/7 Windows Netbooks Windows XP e Windows Embedded Standard W ePOS VMW are ESX VMW are W orkstation VMW are Server Disk spac[...]

  • Seite 37

    36 appendix ii THE EICAR TEST “ VIRUS” ABOUT THE EICAR TEST FILE The EICAR* Standard Anti-virus T est File is safe to use for test purposes because it is not a virus, and does not include any fragments of viral code. It is a legitimate DOS program that consists entirely of printable ASCII characters. The file lets you simulate safely what happ[...]

  • Seite 38

    37 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE appendix iii OTHER SOPHOS PRODUCTS AND SERVICES Sophos Security and Data P rotection Sophos Email Security and Data Protection Sophos Email Security and Control is a choice of software solutions and fully integrated Email Appliances, providing effective and intelligent protection [...]

  • Seite 39

    38 Sophos Alert Ser vices Sophos ZombieAlert™ Ser vice provides you with immediate warning if spammers have hijacked any of your organization ’s computers to send spam or launch denial-of-ser vice attacks. www .sophos.com/products/enterprise/aler t-ser vices/zombiealert.html Sophos PhishAlert™ Ser vice provides fast, near real-time alerts of [...]

  • Seite 40

    39 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE F ree tools Sophos provides a number of tools can be used to reduce vulnerabilities and threats. They are free downloads that utilize our most up-to-date technologies and information. Sophos Computer Security Scan htt p:// www .s opho s.com /pro duct s/fr ee-t ools /soph os-c ompu[...]

  • Seite 41

    Boston, USA | Oxford, UK © Copyright 2009. Sophos. All rights reser ved. All trademarks are the property of their respective owners. rg/091215[...]