Endpoint Protection
You install an Endpoint Protection agent on workstations to protect them against malware, risky file types and websites, and malicious network traffic.
It also offers peripheral control, web control and more.
Sophos Device Encryption is also installed automatically on Windows workstations (if you have the required license).
Download and run installers
Go to
.Download the installer for your operating system and run it on workstations you want to protect.
- Download Complete Windows Installer: Click this for
an installer with all endpoint products your license covers.
Alternatively, click Choose Components… to choose which products will be included in the installer. The choices are:
- Sophos Intercept X Advanced (protection from ransomware and exploits).
- Device Encryption.
- Download Complete macOS Installer: Click this for an
installer with all endpoint products your license covers.
Alternatively, click Choose Components… to choose which products will be included in the installer. The choices are as for Windows above.
- Send Installers to Users: Click this to go to a page where you can add users and send them installers that they can use.
What happens when you protect a computer
When you protect a computer:
- Each user who logs in is added to the users list in Sophos Central automatically.
- Default policies are applied to each user.
- Each computer is added to the Computers list in Sophos Central.
How we handle Windows usernames and login names
Users are listed with full login name, including the domain if available (for example, DOMAINNAME\jdoe).
If there is no domain, and a user logs in to multiple computers, multiple user
entries are displayed for this user, for example
MACHINE1\user1 and
MACHINE2\user1. To merge these
entries, delete one and assign the login to the other (and rename the user, if
required). See Endpoint protection deployment methods
.