Sophos Endpoint Security & Data Protection manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Sophos Endpoint Security & Data Protection. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Sophos Endpoint Security & Data Protection ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Sophos Endpoint Security & Data Protection décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Sophos Endpoint Security & Data Protection devrait contenir:
- informations sur les caractéristiques techniques du dispositif Sophos Endpoint Security & Data Protection
- nom du fabricant et année de fabrication Sophos Endpoint Security & Data Protection
- instructions d'utilisation, de réglage et d’entretien de l'équipement Sophos Endpoint Security & Data Protection
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Sophos Endpoint Security & Data Protection ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Sophos Endpoint Security & Data Protection et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Sophos en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Sophos Endpoint Security & Data Protection, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Sophos Endpoint Security & Data Protection, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Sophos Endpoint Security & Data Protection. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    S o p h o s E n d p o i n t S e c u r i t y a n d D a t a P r o t e c t i o n : R e v i e w e r’ s g u i d e[...]

  • Page 2

    1 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE[...]

  • Page 3

    2 WELCOME W elcom e to this rev iewe r ’s guid e fo r So phos Endp oint Sec urit y an d Da ta P rotec tion – S opho s’s fully int egra ted, sca lable end poin t se curi ty so luti on . Th is d ocume nt int rodu ces the k ey softw are elem ents of S opho s En dpoi nt Se curi ty a nd D ata P rot ecti on: mana geme nt c onsol e, a nti- viru s, c[...]

  • Page 4

    3 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE CONTENTS 1 COMPLETE PROTECTION FOR THE ENDPOINT 4 Over view of Sophos Endpoint Security and Data P rotection 2 SINGLE, CENTRAL AUTOMA TED CONSOLE 7 Over view of Sophos Enterprise Console 3 PROTECTING WINDOWS COMPUTERS 17 Over view of Sophos Endpoint Security and Control, Sophos Cli[...]

  • Page 5

    4 1 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDE sophos endpoint security and da t a protection 1 COMPLETE PROTECTION FOR THE ENDPOINT OVERVIEW OF ENDPOINT SECURITY AND DA T A PROTECTION Sophos simplifies the task of securing your desktops, laptops, mobile devices, and file ser vers against known and unknown threats, as well as protect[...]

  • Page 6

    5 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Comprehensive data protection Th e co mb in at io n of a nu mb er o f di ff er ent t ec hn ol og ie s en su res t ha t yo ur d at a is pr ot ec te d ag ai ns t a cc id en ta l lo ss . DL P c on te nt s ca nn in g in teg ra te d in to t he s in gle en dp oi nt a ge nt m oni to rs f [...]

  • Page 7

    6 1 COMPLETE PROTECTION FOR THE ENDPOINT REVIEWER’S GUIDE T esting key features Before you test, here are some items to consider and to compare to competing products: • Can you manage protection for all your platforms from a single management console? • How many deployments are required to provide equal endpoint protection coverage – [...]

  • Page 8

    7 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE sophos enterprise console 2 SINGLE, CENTRAL A UTOMA TED CONSOLE OVERVIEW OF SOPHOS ENTERPRISE CONSOLE Sophos Enterprise Console delivers smarter , simpler policy-based management of your endpoint protection. It lets you manage thousands of W indows, Mac, Linux and UNIX computers fr[...]

  • Page 9

    8 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE active directory integra tion and synchroniza tion F aster deployment and automatic protection Sophos Endpoint Security and Data P rotection makes it easy to find computers on your network by enabling the replication of Active Director y groups and client structure into Enterprise Console. [...]

  • Page 10

    9 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE At the click of a mouse, you can: • Filter the view to focus on those computers with out-of-date protection or with malware alerts, giving you instant visibility of the areas on your network that require attention. • Adjust the dashboard thresholds at which the status col[...]

  • Page 11

    10 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE smart views T argeted cleanup Cleaning up a large network after an attack can be expensive and time- consuming. Enterprise Console provides remote, centralized cleanup of files, registr y entries, and running processes. Smart Views gives a complete view of the security status of all comput[...]

  • Page 12

    11 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE activepolicies Simplified policy setting and enforcement Using Sophos ActiveP olicies™, you can quickly and intuitively create and deploy network-wide policies independently of groups, allowing you to deploy one policy across multiple groups simultaneously . ActiveP olicies tak[...]

  • Page 13

    12 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE F igur e 6: Configuring Anti-virus and HIPS policy Anti-virus and HIPS policies – vir us, spyware, PUA, intrusion prevention Imp leme ntin g our ant i-vi rus prot ectio n al so p rovi des you w ith a co mple te h ost int rusi on p reven tion sys tem (HIP S) wi thou t th e ne ed f or co m[...]

  • Page 14

    13 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Application control policies Applications like V oIP , IM and P2P are increasingly the cause of security , legal and productivity issues in business – consequently IT departments are being asked to control their unauthorized installation and usage. Sophos integrates the detectio[...]

  • Page 15

    14 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE Device control policies Device control can help to significantly reduce your exposure to accidental data loss and restrict the ability of users to introduce software and malware from outside of your network environment. Integrated into the Sophos endpoint agent, it enables you to control t[...]

  • Page 16

    15 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Y ou can also significantly reduce the risk of network bridging between a corporate network and a non-corporate network. The Block bridged mode is available for both wireless and modem types of device. The mode works by disabling either wireless or modem network adapters when an [...]

  • Page 17

    16 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE There are two types of data control rule: • file matching rule: specifies the action that is taken if the user attempts to transfer a file with the specified file name or of the specified file type (true file type categor y , e.g. a spreadsheet) to the specified destination, f[...]

  • Page 18

    17 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE There are a number of actions that can be taken when a data control rule is matched: • Allow file transfer and log event • Allow transfer on acceptance by user and log event • Block transfer and log event By defa ult, when a r ule is m atch ed an d fil e tr ansf e[...]

  • Page 19

    18 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE Y ou can configure different location aware security policies to ensure that mobile computers are protected, whether in or out of the office. The location of the mobile computer is detected using either DNS or the gateway MAC address. Network access control policies NAC pol icie s are con[...]

  • Page 20

    19 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE • Manage—provides components for editing and managing policies and managing computers. • Enforce—offers control of network access using access templates and exemptions. • Report—offers a suite of reports for troubleshooting compliance and network access. •?[...]

  • Page 21

    20 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE Important T o fully evaluate the Sophos NAC functionality please download and install the NAC Manager component from www .sophos.com/downloads/ (Y our evaluation credentials will provide you with access to this area.) There are three pre-defined NAC policies: • Default —The default [...]

  • Page 22

    21 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Reports can be output in table format as well as chart format, including pie charts and can be expor ted in a number of file formats, namely : PDF (Acrobat), HTML, MS Excel, MS W ord, RTF , CSV , XML. Using the Report Manager , you can quickly create a repor t based on an existin[...]

  • Page 23

    22 2 SINGLE, CENTRAL AUTOMA TED CONSOLE REVIEWER’S GUIDE There are four pre-configured roles: 1. System Administrator —A pre-configured role that has full rights to manage Sophos security software on the network and roles in Enterprise Console. The System Administrator role cannot be edited or deleted. 2. Administrator —A pre-configured ro[...]

  • Page 24

    23 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE sophos endpoint security and da t a protection 3 PROTECTING WINDOWS COMPUTERS Sophos Endpoint Security and Data P rotection protects your Windows network with Sophos Endpoint Security and Control for Windows, Sophos NAC, SafeGuard Disk Encr yption and Sophos Client Firewall. SOPHO[...]

  • Page 25

    24 3 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDE Intrusion prevention Sophos Endpoint Security and Control for Windows includes complete intrusion prevention (HIPS), ensuring proactive protection without you having to carr y out the complex installation and configuration of a separate product. A number of pre-emptive detection technologies com[...]

  • Page 26

    25 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Application Control While some applications can provide efficiency gains, others can distract users from their business tasks, and waste valuable network bandwidth and processing power . In addition, with P2P and IM-based malware attacks growing fast, and regulations that make it[...]

  • Page 27

    26 3 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDE SophosLabs also maintains a librar y of extensive librar y of global sensitive data definitions (Content Control Lists) which covers personally identifiable information (PII) such as credit card numbers, social security numbers, postal addresses, or email addresses helping you to protect your s[...]

  • Page 28

    27 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE SAFEGUARD DISK ENCRYPTION SafeGuard Disk Encr yption is an easy to implement solution that encr ypts hard disks and data on mobile media to protect against the loss of data and meet compliance requirements. Securing data through full disk encr yption Har d di sks (IDE, SCS I, s er[...]

  • Page 29

    28 3 PROTECTING WINDOWS COMPUTERS REVIEWER’S GUIDE SOPHOS CLIENT FIREW ALL Sophos Client Firewall is integrated into the endpoint agent making deployment, configuration, updating, and management by Enterprise Console simple. It proactively locks down computers, protecting against known and unknown threats, such as internet worms, hackers, and un[...]

  • Page 30

    29 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Ensuring protection with location awareness Sophos Client Firewall lets you configure different policies for different locations according to the location where computers are used, for example, in the office (on the network) and out of the office. The Enterprise Console will th[...]

  • Page 31

    30 4 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDE sophos anti - virus for mac os x , linux and unix 4 PROTECTING NON- WINDOWS COMPUTERS THE NEED TO PROTECT NON- WINDOWS COMPUTERS It has become increasingly important to protect Mac, Linux, UNIX and other computers. The ability of non-W indows computers to harbor and spread Windows viruses, th[...]

  • Page 32

    31 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Y ou can also enable remote and mobile users to update from wherever they are via the network or internet, either from the main ser ver , a backup, or directly from Sophos. Automatic reporting of virus incidents Enterprise Console’s security dashboard shows outbreak risk data, a[...]

  • Page 33

    32 4 PROTECTING NON-WINDOWS COMPUTERS REVIEWER’S GUIDE Automatic updates Updates are automatically downloaded and distributed through Enterprise Console, cascading web ser vers or directly from Sophos, ensuring that all computers across the network, including remote laptops, are fully protected. SOPHOS ANTI- VIRUS FOR UNIX Sophos Anti- Virus for [...]

  • Page 34

    33 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE appendix i EV AL U A TING ENDPOINT SECURITY AND DA T A PROTECTION W e want you to be absolutely convinced that Sophos Endpoint Security and Data P rotection will protect your network and support you better than any other security vendor . This appendix gives you details of what do[...]

  • Page 35

    34 SYSTEM REQUIREMENTS F or full details, visit www .sophos.com/products/all-sysreqs.html Enterprise Console system requir ements Platforms supported Windows 95/98/NT4/2000/XP/2003/V ista/2008/7 Mac OS X Linux UNIX Hardware Minimum 2.0 GHz P entium or equivalent Management server Windows Server 2008 Windows Server 2003 and R2 Windows 2000 Server VM[...]

  • Page 36

    35 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE Sophos Endpoint Security and Control for Windows system requirements Platforms supported Windows 95/98/NT4/2000 and 2000 P ro/XP Home and P ro/2003/Vista/2008/7 Windows Netbooks Windows XP e Windows Embedded Standard W ePOS VMW are ESX VMW are W orkstation VMW are Server Disk spac[...]

  • Page 37

    36 appendix ii THE EICAR TEST “ VIRUS” ABOUT THE EICAR TEST FILE The EICAR* Standard Anti-virus T est File is safe to use for test purposes because it is not a virus, and does not include any fragments of viral code. It is a legitimate DOS program that consists entirely of printable ASCII characters. The file lets you simulate safely what happ[...]

  • Page 38

    37 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE appendix iii OTHER SOPHOS PRODUCTS AND SERVICES Sophos Security and Data P rotection Sophos Email Security and Data Protection Sophos Email Security and Control is a choice of software solutions and fully integrated Email Appliances, providing effective and intelligent protection [...]

  • Page 39

    38 Sophos Alert Ser vices Sophos ZombieAlert™ Ser vice provides you with immediate warning if spammers have hijacked any of your organization ’s computers to send spam or launch denial-of-ser vice attacks. www .sophos.com/products/enterprise/aler t-ser vices/zombiealert.html Sophos PhishAlert™ Ser vice provides fast, near real-time alerts of [...]

  • Page 40

    39 SOPHOS ENDPOINT SECURITY AND DA T A PROTECTION REVIEWER’S GUIDE F ree tools Sophos provides a number of tools can be used to reduce vulnerabilities and threats. They are free downloads that utilize our most up-to-date technologies and information. Sophos Computer Security Scan htt p:// www .s opho s.com /pro duct s/fr ee-t ools /soph os-c ompu[...]

  • Page 41

    Boston, USA | Oxford, UK © Copyright 2009. Sophos. All rights reser ved. All trademarks are the property of their respective owners. rg/091215[...]