03 Central Agent Deployment
03 Central Agent Deployment
[Additional Information]
April 2024
Version: 5.0v1
© 2024 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any means without the prior written
consent of Sophos.
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this document may be the
trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or representations (whether express
or implied) as to its completeness or accuracy. This document is subject to change at any time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon Science Park, Abingdon,
Oxfordshire, OX14 3YP.
DURATION 6 minutes
In this chapter you will learn how to install the Sophos Central endpoint agent on Windows and
macOS.
There are four ways to deploy the Sophos Central Endpoint agent, these are; Downloading the installer
directly from Sophos Central to the device, emailing the setup link to the device owner, using a script
to deploy the agent to multiple devices, and including the Sophos Central agent in an image.
[Additional Information]
For more information about software deployment methods, please see knowledge base article KB-
000034831. https://support.sophos.com/support/s/article/KB-000034831
To download the installer from Sophos Central, select Devices in the top menu and then select
Installers.
For Endpoint, Server, and Encryption products, the installer menu is also available when you select the
product from the My Products menu. When the installer is run, it detects what operating system it is
being installed on. The appropriate packages are then installed based on the device type, endpoint or
server.
Agent Download
The installers page is divided into sections for each product. In the ‘Endpoint Protection’ section there
are options to either download the complete installer or to select the components you want to install
for both Windows and macOS devices. Please note that you will only be able to select the components
you are licensed for.
In the example shown here you can choose whether to install Intercept X Advanced with XDR, Device
Encryption, or both.
If your users have local administrator rights, they can install protection on their own devices using a
link emailed to them. To send an installation link, navigate to People > Manage Users & Groups. Select
the users you want to send the link to, then click Email Setup Link.
You can choose which setup links to send to a user. You can select to send an installation link for
deploying the Sophos agent, and a setup link for the self-service portal. The self-service portal allows
users to manage their devices, view their quarantined emails, read emails using an emergency inbox,
and retrieve recovery passwords for device encryption.
When emailing an installation link to users you cannot select individual components, all licensed
components will be included.
Manual installation on Windows is very simple, but let’s consider what steps the installer is taking in
the background.
https://training.sophos.com/ce/simulation/WindowsInstall/2/start.html
Click Launch Simulation to start. Once you have finished, click Continue.
The macOS installer works in a very similar way to Windows but does things in a different order.
1. You start by running the installer. Here you may be prompted to allow the installer access to the
files in ‘Downloads’. This is required to proceed with the installation.
2. The installer downloads and installs the Sophos Endpoint agent.
3. The Endpoint agent registers with Sophos Central so it can be managed.
4. The Endpoint agent downloads the configuration.
5. At the end of the installation the software will prompt for you to enable the extensions required
for Sophos to provide protection. This is done in ‘System Preferences’.
When prompted to enable extensions, open Security Preferences and select Privacy and Security.
Click Details… You will need to enter the password for the device to make any changes.
https://training.sophos.com/ce/simulation/MacInstall/2/start.html
Click Launch Simulation to start. Once you have finished, click Continue.
If you need to deploy the Sophos Endpoint agent to multiple devices, you can create a script that will
automatically deploy and install it. You can either use Active Directory scripts in your Group Policy, or
alternatively you can choose to use an RMM tool. For example, Microsoft Endpoint Configuration
Manager to distribute and install the Sophos Endpoint agent.
It is important to note that bulk deployments should NOT be created using an installer that has been
sent using the email setup link. If this installer is used, all devices will be associated with the Sophos
Central account that sent the email.
[Additional Information]
The steps required to force devices to re-register with Sophos Central can be found in knowledge base
article KB-000035040. https://support.sophos.com/support/s/article/KB-000035049
▪ Multiple images of the same device will try to use the same identity
To resolve this…
Install using --goldimage to detect name change and Install then remove the identity causing it to register on next
register a new identity boot
For organizations using virtual machines, it is common to create a gold image and run multiple
instances of that image. During the installation of the Sophos Endpoint Agent the device identity is set,
this is used by Sophos Central to identify individual devices. If you run multiple images using the same
identity, all devices will report to Sophos Central as the same device. To prevent this issue, new images
created from the gold image must register for a new identity. There are a couple of ways this can be
done.
On Windows you can run the install with the --goldimage option. When the device name changes
when a new instance is created from the image, the Sophos Endpoint Agent will register for a new
identity. You can remove the identity, which causes the Sophos Endpoint agent to register for a new
identity when it next starts.
[Additional Information]
Removing identity from Windows to create a gold image KB-000035040:
https://support.sophos.com/support/s/article/KB-000035040
Chapter Review
Sophos can be installed on devices by manually download and running the installer, this requires
administrator rights. Endpoint protections allows you to select which of your licensed components you
want to install.
You can send a setup link via email to the device owner to install if they have administrator rights. You
can include links for deploying the software and setting up access to the self-service portal.
The Sophos Endpoint agent can be deployed to multiple devices using a script, third-party RMM tools, or
included in a gold image.
Here are the three main things you learned in this chapter.
Sophos can be installed on devices by manually downloading and running the installer, this requires
administrator rights. Endpoint Protection allows you to select which of your licensed components you
want to install.
You can send a setup link via email to the device owner to install if they have administrator rights. You
can include links for deploying the software and setting up access to the self-service portal.
The Sophos Endpoint agent can be deployed to multiple devices using a script, third-party RMM tools,
or included in a gold image.
[Additional Information]
April 2024
Version: 5.0v1
© 2024 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any means without the prior written
consent of Sophos.
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this document may be the
trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or representations (whether express
or implied) as to its completeness or accuracy. This document is subject to change at any time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon Science Park, Abingdon,
Oxfordshire, OX14 3YP.
DURATION 5 minutes
In this chapter you will learn what Sophos Server Protection for Linux is and the features it includes.
You will learn what the system requirements are and how to install Sophos Server Protection for Linux.
Sophos Server Protection for Linux provides detection and response capabilities for Linux servers and
Linux workloads and containers hosted in the Cloud.
You can protect both physical and virtual Linux servers against threats and view those servers in one
place. This optimizes performance and integration with security and development operation
workflows.
There are two types of deployment of Sophos Server Protection for Linux, agent or sensor. The type of
deployment you choose, and the license will determine the features available. The features included in
the agent and sensor are outlined in this table. Please note that some features of the agent require an
advanced, an XDR license, or an MDR license. The Sophos Server Protection for Linux Agent has three
licenses; Intercept X Essentials for Server, Intercept X Advanced for Server, and Intercept X Advanced
for Server with XDR.
Agent Vs Sensor
AGENT SENSOR
For the majority of administrators looking to provide protection for typical server workloads, either on
premises or in cloud environments, you want to deploy the Linux protection agent.
For highly scalable microservice environments that are mission critical and require ultra-high
performance the sensor may be more appropriate. Sensor deployments do not report detections back
to Sophos Central, 3rd party applications are used to collate, and action based on the detection data.
The Sophos Server Protection for Linux agent can be deployed in two ways: full malware protection
and lockdown, and XDR sensor. When installed for full malware protection and lockdown, a full set of
protection, detection, investigation, and response capabilities are included with the agent. When
installed as an XDR sensor, there are no protection capabilities; Detection, investigation, and response
capabilities from XDR are included that can be used alongside existing protection products that are
already deployed.
Please note that the XDR sensor is not to be confused with the Sophos Linux Sensor, which has
different capabilities as outlined in the previous slides.
To use Sophos Server Protection for Linux agent, the device must meet the system requirements and
run a supported platform shown here. For the latest system requirements, please check the release
notes.
[Additional Information]
For more information regarding system requirements and supported platforms please see the current
release notes.
https://docs.sophos.com/releasenotes/output/en-us/esg/linux_protection_rn.html
The system requirements for the sensor are very similar, but there are some differences, including a
lower disk space requirement and the addition of ARM support.
To install Sophos Protection for Linux, download the installer from your Sophos Central account. In
your Central account, navigate to Devices > Installers from the top menu bar. To download the agent,
in the Server Protection section, right-click on the link for the installer you want, either Download
Linux Server Installer or Download XDR Sensor Linux. Select Copy link.
To download the Sophos Linux Sensor installer, follow the instructions in the documentation. The URL
is included in the notes.
[Additional Information]
https://doc.sophos.com/esg/sls/help/en-
us/gettingStarted/installSensor/Installing_SLS_from_Sophos_Repo/index.html
Installation
Use the wget command with the link address
labuser@SophosLab-867764:~$
On your Linux server, at a command prompt or in a script, use the wget command with the link
address. You can paste the link address directly from your Sophos Central account. An example of this
is shown here.
Other commands can be used to download the installer, such as curl, or if you are using a graphical
desktop environment you can use a browser.
You can change the permissions of the file to include the execute permission. To do this, run chmod
+x SophosSetup.sh.
Once this has been completed, run the installer. If you are not logged in as the root user, run the
installer with the sudo command.
[Additional Information]
Installation documentation can be found here:
https://docs.sophos.com/central/customer/help/en-
us/PeopleAndDevices/ProtectDevices/ServerProtection/index.html#download-and-run-the-linux-
server-installer
Additional command line options for the installer can be found here:
https://docs.sophos.com/central/customer/help/en-
us/PeopleAndDevices/ProtectDevices/ServerProtection/SophosProtectionLinux/ServerProtectionAgen
tCommandLineOptions/index.html#products
Installation Directory
Installation directory is
/opt/sophos-spl
Using the command ls you can view the directories included in the installation. Note that you need to
have root privileges to access this directory, so if you are not logged in as the root user, use the sudo
command.
https://training.sophos.com/ce/demo/LinuxInstall/2/play.html
Click Launch Demonstration to start. Once you have finished, click Continue.
▪ Puppet
▪ Others…
If you need to deploy the Sophos Endpoint agent to multiple devices, you can create a script that will
automatically deploy and install it. It is important to note that bulk deployments should NOT be
created using an installer that has been sent using the email setup link. If this installer is used, all
devices will be associated with the user the email setup link was sent to.
[Additional Information]
The steps required to force devices to re-register with Sophos Central can be found in knowledge base
article KB-000035040. https://support.sophos.com/support/s/article/KB-000035049
▪ Multiple images of the same device will try to use the same identity
To resolve this…
For organizations using virtual machines, it is common to create a gold image and run multiple
instances of that image. During the installation of the Sophos Endpoint Agent the device identity is set,
this is used by Sophos Central to identify individual devices. If you run multiple images using the same
identity, all devices will report to Sophos Central as the same device. To prevent this issue, new images
created from the gold image must register for a new identity. You can remove the identity, which
causes the Sophos Endpoint agent to register for a new identity when it next starts.
[Additional Information]
Creating a Linux gold image: https://docs.sophos.com/central/customer/help/en-
us/PeopleAndDevices/ProtectDevices/ServerProtection/SophosProtectionLinux/LinuxGoldImage/inde
x.html
Chapter Review
Sophos Server Protection for Linux is an anti-virus scanner that also provides runtime detections.
After downloading the installer, you need to assign it with executable permissions using the chmod
command.
Sophos Server Protection for Linux is installed to the /opt/sophos-spl directory. This directory requires
root permissions to access.
Sophos Server Protection for Linux is an anti-virus scanner that also provides runtime detections.
After downloading the installer, you need to assign it with executable permissions using the chmod
command.
Sophos Server Protection for Linux is installed to the /opt/sophos-spl directory. This directory requires
root permissions to access.