Sec - 521 - Guide Complete Guide PDF
Sec - 521 - Guide Complete Guide PDF
Sec - 521 - Guide Complete Guide PDF
2 What do I install?......................................................................................................................................4
15 Protect computers.................................................................................................................................14
18 Troubleshooting....................................................................................................................................22
20 Technical support..................................................................................................................................23
21 Legal notices..........................................................................................................................................23
2
quick startup guide
3
Sophos Enterprise Console
2 What do I install?
To protect your network, you install:
■ Sophos Enterprise Console on your server. This enables you to install and manage Sophos
security software.
■ Sophos protection software on your endpoint computers. This protects the computers against
threats and sends alerts to Enterprise Console.
■ Sophos encryption software on your endpoint computers (if your license includes it).
Standalone,
off-site computers
Checking for
updates
Management/Reporting
Checking for
updates
4
quick startup guide
The following steps assume that you have a MySophos account and that you have associated your
license credentials with it. If you need help, go to
www.sophos.com/en-us/support/knowledgebase/111195.aspx.
1. Go to www.sophos.com/en-us/support/downloads/.
2. Type your MySophos username and password.
You see a webpage that shows your license or licenses.
3. Under your license name, find the Console downloads. You should download the Enterprise
Console installer.
1. Go to http://www.sophos.com/en-us/products/free-trials/endpoint-protection.aspx.
2. Complete the registration form.
After you submit the registration form, your evaluation credentials will be displayed. The
credentials will also be sent to the email address you entered in the registration form. You will
need them when setting up Enterprise Console.
3. Click Download now and download the Enterprise Console installer.
5
Sophos Enterprise Console
6
quick startup guide
After .NET Framework 4.0 is installed, you may receive a message asking you to restart your
computer. If you do, we recommend that you restart the computer immediately or shortly after
the installation.
■ Update Manager account. This is a Windows user account that enables your endpoint
computers to access the folders where Enterprise Console puts software updates.
We recommend that that you name the Update Manager account SophosUpdateMgr.
7
Sophos Enterprise Console
8
quick startup guide
1. At the computer where you want to install Enterprise Console, log on as an administrator:
■ If the server is in a domain, use a domain account that has local administrator rights.
■ If the server is in a workgroup, use a local account that has local administrator rights.
g) On the Sophos Encryption page, click New installations if you do not have an earlier
version of Sophos Disk Encryption installed on the network. You are prompted for the
password for the certificates backup store. Make a note of the password.
6. When installation is complete, you may be prompted to restart. Click Yes or Finish.
Important: The Sophos Auditing database, SophosSecurity, must be present and running side
by side with the other Enterprise Console databases, even if you don't intend to use the Sophos
Auditing feature. This is because the database is used for enhanced access control as well as for
logging audit events.
9
Sophos Enterprise Console
10
quick startup guide
Note: If you used Remote Desktop for installation, the console does not open automatically. Open
it from the Start menu.
The wizard guides you through selecting and downloading protection software. You should do
as follows:
1. On the Sophos download account details page, enter the username and password printed on
your license schedule or your evaluation credentials. If you access the internet via a proxy
server, select the Access Sophos via a proxy server check box and enter the proxy details.
2. On the Platform selection page, select only the platforms you need to protect now.
3. If your license includes encryption, on the Software type page, select Encryption if you want
to download it now.
When you click Next, Enterprise Console begins downloading your software.
4. On the Downloading software page, downloading progress is displayed. Click Next at any
time.
5. On the Import computers from Active Directory page, select Set up groups for your computers
if you want Enterprise Console to use your existing Active Directory computer groups.
To create further groups, go to the left-hand pane. Select the server shown at the top if you want
another top-level group. Select a group if you want a sub-group within it. Then create and name
the group as before.
11
Sophos Enterprise Console
3. In the Firewall Policy Wizard we recommend that you make the following selections.
a) On the Configure firewall page, select Single location unless you want the firewall to use
different settings according to the location where you use it.
b) On the Operational Mode page, select Block inbound and allow outbound traffic.
c) On the File and print sharing page, select Allow file and print sharing.
12
quick startup guide
If you use one of the Discover options, the computers are placed in the Unassigned group.
14.2 Check that you have an account that can be used to install software
You will be prompted to enter details of a Windows user account that can be used to install security
software. This is typically a domain administrator account. It must:
■ Have local administrator rights on computers you want to protect.
13
Sophos Enterprise Console
15 Protect computers
This section tells you how to:
■ Protect Windows computers automatically.
■ Protect Windows computers or Macs manually.
■ Protect Linux computers (if your license includes this).
You can also use your own tools or scripts for installing protection on Windows computers. For
details, go to www.sophos.com/en-us/support/knowledgebase/114191.aspx.
3. A wizard guides you through the installation of Sophos security software. You should do as
follows:
a) On the Welcome page, click Next.
b) On the Installation Type page, leave the option Protection software selected.
c) On the Select features page, you can choose to install optional features.
14
quick startup guide
The current version of the firewall (included with Endpoint Security and Control 10.2 or
earlier) cannot be installed on Windows 8 computers.
d) On the Protection summary page, check for any installation problems. For help, see
Troubleshooting (section 18).
e) On the Credentials page, enter details of a Windows user account that can be used to install
software on computers.
Installation is staggered, so that the process may not be complete on all the computers for some
time.
When installation is complete, look at the list of computers again. In the On-access column, the
word Active indicates that the computer is running on-access virus scanning.
2. Make a note of the location for each operating system you want to protect.
1. At each computer that you want to protect, browse to the bootstrap location, find setup.exe
and double-click it.
2. In the Sophos Setup dialog box, in the User account details, enter details of the Update Manager
account, SophosUpdateMgr, that you created to access the share where Enterprise Console
puts software updates. You did this in Update Manager account (section 6.2).
Tip: You can also use any low-privilege account that can access the bootstrap location.
Enterprise Console will apply an updating policy that includes the right user account details
later.
Note: For information about command line parameters for the setup.exe file, see
http://www.sophos.com/en-us/support/knowledgebase/12570.aspx.
15
Sophos Enterprise Console
1. At each Mac that you want to protect, browse to the bootstrap location, copy Sophos
Anti-Virus.mpkg to the Mac OS X desktop and double-click it.
A wizard guides you through installation.
2. Accept the default options. When prompted, enter the details of a user account that can install
software on the Mac.
16
quick startup guide
1. In Enterprise Console, in the Policies pane, double-click Full disk encryption. Double-click
the Default policy to edit it.
2. Under Power-on Authentication (POA) click Exceptions next to Enable Power-on
Authentication.
3. In Exceptions, click Add, enter the User name and the Computer or domain name of the
relevant Windows account(s) and click OK.
You can use wildcards as the first or last character. In the User name field, the ? character is
not allowed. In the Computer or Domain Name field, the characters / \ [ ] : ; | = , + ? < > " are
not allowed.
4. In the Default policy dialog, click OK.
17
Sophos Enterprise Console
5. In the Policies pane, select the policy and drag it onto the group to which you want to apply
the policy. When prompted, confirm that you want to continue.
■ Check if a Windows user account with credentials is set up and active for the user on the
endpoint computer.
■ Make sure that the computer has already been protected with Sophos anti-virus software version
10 before you deploy full disk encryption.
■ Uninstall third-party boot managers, such as PROnetworks Boot Pro and Boot-US.
■ Use the Windows built-in defrag tool to locate and consolidate fragmented boot files, data
files, and folders on local drives:
defrag %drive%
For further information, see: http://www.sophos.com/en-us/support/knowledgebase/109226.aspx.
■ If you have used an imaging/cloning tool on the computer, clean the master boot record (MBR).
Start the computer from a Windows DVD and use the command FIXMBR within the Windows
Recovery Console. For further information, see:
http://www.sophos.com/en-us/support/knowledgebase/108088.aspx.
■ If the boot partition on the computer has been converted from FAT to NTFS, and the computer
has not been restarted since then, restart the computer. If you do not do this, the installation
may not complete successfully.
18
quick startup guide
■ Open Windows Firewall with Advanced Security, using the Administrative Tools item in
Control Panel. Ensure that Inbound connections are allowed. Change the Inbound rules to
enable the processes below:
When installation is complete and you want to continue using Windows Firewall, you may
disables the process again.
1. In Enterprise Console, select the computers on which you want to install full disk encryption.
2. Right-click the computers, and then click Protect computers. The Protect Computers Wizard
is launched.
3. On the Welcome page, click Next.
4. On the Installation Type page, select Encryption software.
5. If there is more than one encryption subscription and installer location (bootstrap location)
available, the Encryption location page is displayed. Select the Encryption subscription and
Address to install from.
6. On the Encryption summary page, check for any installation problems.
7. On the Credentials page, enter details of an account that can be used to install software on
computers.
Installation is staggered, so the process may not be complete on all the computers for some time.
The installation of encryption will cause computers to restart automatically within about 30
minutes after installation of the encryption software. If encryption is enabled by policy, it will only
take place after the computer's restart.
For further information on the start behaviour of the computer and first logon after installation
and activation of encryption, see First logon after installation (section 16.5).
19
Sophos Enterprise Console
2. At the computer that hosts the bootstrap location, create a read-only user account.
3. Go to each computer and log on with local administrator rights.
4. Locate the encryption setup program setup.exe in the bootstrap location and double-click it.
The encryption setup program can be found in the following location:
\\<ServerName>\SophosUpdate\CIDs\<Subscription>\ENCRYPTION
5. A wizard guides you through installation of the encryption software.
For further information on the start behaviour of the computer and first logon after installation
and activation of encryption, see First logon after installation (section 16.5).
20
quick startup guide
When the computer restarts, a number of messages (for example, the autologon screen) are
displayed. Then the Windows operating system starts. The user logs on to Windows with their
Windows credentials. The user is registered as a Sophos SafeGuard user on the computer.
Note: After successful registration, a tool tip confirming this is shown on the endpoint computer.
If enabled by policy, encryption starts on the selected drives. Encryption and decryption are
performed in the background without any user interaction. The user may continue working or
shut down the computer during the encryption process. No restart is required after encryption is
completed.
The next time the user starts the computer, Power-on Authentication is activated. From now on,
the user only has to enter their Windows credentials at the Power-on Authentication and is
automatically logged on to Windows.
Note: When starting the computer from hibernation, the user needs to enter their Windows
credentials at Power-on Authentication and at Windows.
For further information, see the Sophos Disk Encryption user help.
Log on for administrative tasks with Windows account that has been put on the list
of exceptions
The logon procedure only corresponds to the one described here if the user logs on with a Windows
account that has been put on a list of exceptions and Power-on-Authentication has been enabled
in the full disk encryption policy.
When the computer restarts, the Windows operating system starts. The Windows logon is displayed.
The user logs on with their credentials as previously defined in the full disk encryption policy. The
user is logged on to Windows as a guest user. Power-on Authentication is not activated. The
encryption process does not start. The user can carry out post-installation tasks as required.
1. On the menu bar, click the Dashboard icon (if the Dashboard is not already displayed).
The Dashboard shows you how many computers:
■ Have detected threats.
■ Are out of date.
■ Do not comply with policies.
21
Sophos Enterprise Console
18 Troubleshooting
When you run the Protect computers wizard, installation of security software can fail for a number
of reasons:
■ Automatic installation is not possible on that operating system. Perform a manual installation.
See Protect Macs (section 15.2.3). For other operating systems (if your license permits you to
protect them), see the Sophos Enterprise Console startup guide for Linux, NetWare and UNIX.
■ Operating system could not be determined. This may be because you did not enter your
username in the format domain\username when finding computers.
■ The computers are running a firewall.
■ You have tried to install full disk encryption on computers where the required software such
as anti-virus has not yet been installed.
Task Document
22
quick startup guide
20 Technical support
You can find technical support for Sophos products in any of these ways:
■ Visit the SophosTalk community at community.sophos.com/ and search for other users who are
experiencing the same problem.
■ Visit the Sophos support knowledgebase at www.sophos.com/en-us/support.aspx.
■ Download the product documentation at www.sophos.com/en-us/support/documentation/.
■ Send an email to [email protected], including your Sophos software version number(s),
operating system(s) and patch level(s), and the text of any error messages.
21 Legal notices
Copyright © 2009–2013 Sophos Limited. All rights reserved. No part of this publication may be
reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording or otherwise unless you are either a valid licensee where the
documentation can be reproduced in accordance with the license terms or you otherwise have
the prior permission in writing of the copyright owner.
Sophos, Sophos Anti-Virus and SafeGuard are registered trademarks of Sophos Limited, Sophos
Group and Utimaco Safeware AG, as applicable. All other product and company names mentioned
are trademarks or registered trademarks of their respective owners.
23
Sophos Enterprise Console
of dealing, usage or trade practice. Moreover, DOC software is provided with no support and
without any obligation on the part of Washington University, UC Irvine, Vanderbilt University,
their employees, or students to assist in its use, correction, modification, or enhancement. A
number of companies12 around the world provide commercial support for DOC software, however.
DOC software is Y2K-compliant, as long as the underlying OS platform is Y2K-compliant.
Washington University, UC Irvine, Vanderbilt University, their employees, and students shall
have no liability with respect to the infringement of copyrights, trade secrets or any patents by
DOC software or any part thereof. Moreover, in no event will Washington University, UC Irvine,
or Vanderbilt University, their employees, or students be liable for any lost revenue or profits or
other special, indirect and consequential damages.
The ACE13, TAO14, CIAO15, and CoSMIC16 web sites are maintained by the DOC Group17 at the
Institute for Software Integrated Systems (ISIS)18 and the Center for Distributed Object Computing
of Washington University, St. Louis19 for the development of open-source software as part of the
open-source software community20. By submitting comments, suggestions, code, code snippets,
techniques (including that of usage), and algorithms, submitters acknowledge that they have the
right to do so, that any such submissions are given freely and unreservedly, and that they waive
any claims to copyright or ownership. In addition, submitters acknowledgethat any such submission
might become part of the copyright maintained on the overall body of code, which comprises the
DOC software. By making a submission, submitter agree to these terms. Furthermore, submitters
acknowledge that the incorporation or modification of such submissions is entirely at the discretion
of the moderators of the open-source DOC software projects or their designees.
The names ACE, TAO, CIAO, CoSMIC, WashingtonUniversity, UC Irvine, and Vanderbilt
University, may not be used to endorse or promote products or services derived from this source
without express written permission from Washington University, UC Irvine, or Vanderbilt
University. Further, products or services derived from this source may not be called ACE, TAO,
CIAO, or CoSMIC nor may the name Washington University, UC Irvine, or Vanderbilt University
appear in their names, without express written permission from Washington University, UC
Irvine, and Vanderbilt University.
If you have any suggestions, additions, comments, or questions, please let me21 know.
Douglas C. Schmidt22
References
1. http://www.cs.wustl.edu/~schmidt/ACE.html
2. http://www.cs.wustl.edu/~schmidt/TAO.html
3. http://www.dre.vanderbilt.edu/CIAO/
4. http://www.dre.vanderbilt.edu/cosmic/
5. http://www.dre.vanderbilt.edu/~schmidt/
6. http://www.cs.wustl.edu/~schmidt/ACE-members.html
7. http://www.wustl.edu/
8. http://www.uci.edu/
24
quick startup guide
9. http://www.vanderbilt.edu/
10. mailto:[email protected]
11. http://www.cs.wustl.edu/~schmidt/ACE-users.html
12. http://www.cs.wustl.edu/~schmidt/commercial-support.html
13. http://www.cs.wustl.edu/~schmidt/ACE.html
14. http://www.cs.wustl.edu/~schmidt/TAO.html
15. http://www.dre.vanderbilt.edu/CIAO/
16. http://www.dre.vanderbilt.edu/cosmic/
17. http://www.dre.vanderbilt.edu/
18. http://www.isis.vanderbilt.edu/
19. http://www.cs.wustl.edu/~schmidt/doc-center.html
20. http://www.opensource.org/
21. mailto:[email protected]
22. http://www.dre.vanderbilt.edu/~schmidt/
Apache
The Sophos software that is described in this document may include some software programs that
are licensed (or sublicensed) to the user under the Apache License. A copy of the license agreement
for any such included software can be found at http://www.apache.org/licenses/LICENSE-2.0
Boost
Version 1.0, 17 August 2003
Permission is hereby granted, free of charge, to any person or organization obtaining a copy of
the software and accompanying documentation covered by this license (the “Software”) to use,
reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works
of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject
to the following:
The copyright notices in the Software and this entire statement, including the above license grant,
this restriction and the following disclaimer, must be included in all copies of the Software, in
whole or in part, and all derivative works of the Software, unless such copies or derivative works
are solely in the form of machine-executable object code generated by a source language processor.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND
NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE
DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY,
WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
25
Sophos Enterprise Console
ConvertUTF
Copyright 2001–2004 Unicode, Inc.
This source code is provided as is by Unicode, Inc. No claims are made as to fitness for any
particular purpose. No warranties of any kind are expressed or implied. The recipient agrees to
determine applicability of information provided. If this file has been purchased on magnetic or
optical media from Unicode, Inc., the sole remedy for any claim will be exchange of defective
media within 90 days of receipt.
Unicode, Inc. hereby grants the right to freely use the information supplied in this file in the
creation of products supporting the Unicode Standard, and to make copies of this file in any form
for internal or external distribution as long as this notice remains attached.
Loki
The MIT License (MIT)
Copyright © 2001 by Andrei Alexandrescu
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction,
including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do
so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
26
quick startup guide
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young ([email protected]). This
product includes software written by Tim Hudson ([email protected]).
27
Sophos Enterprise Console
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
28
quick startup guide
The license and distribution terms for any publically available version or derivative of this code
cannot be changed. i.e. this code cannot simply be copied and put under another distribution
license [including the GNU Public License.]
29