Intercept X with XDR

Sophos Extended Detection and Response (XDR) lets you investigate detected threats (threat graphs) and search for new threats or security weaknesses. It also lets you monitor devices and fix issues remotely.

You can find most XDR features in Overview > Threat Analysis Center.

These features are available if you have an Intercept X license that includes Sophos XDR.

Threat graphs

Threat graphs let you investigate and clean up malware attacks.

You can find out where an attack started, how it spread, and which processes or files it has affected.

For help, see Threat Graphs.

Live Discover

Live Discover lets you check activity on devices. You can run queries about the software installed, processes running, registry changes, and more. This helps you detect security weaknesses or malicious activity.

You can run queries on devices or on our Data Lake, which stores device data in the cloud. The Data Lake lets you query devices even when they’re not connected, schedule your queries, and query data from multiple Sophos products.

You can send information to the Data Lake from the following products:

  • Sophos Endpoint Protection
  • Server Protection
  • Sophos Email
  • Sophos Firewall
  • Sophos Cloud Optix

For help with creating and running queries, see Live Discover.

Live Response

Live Response lets you connect directly to an individual device to investigate and fix possible security issues.

For help, see Set up and start Live Response.

Detections

Detections identify activity that’s unusual or suspicious and might need investigation. They're based on data that devices upload to the Sophos Data Lake.

You can use these detections to examine devices, processes, users, and events for signs of potential threats that other Sophos features haven’t blocked.

You can also use them as the starting-point of searches for security weaknesses or threats already seen elsewhere.

For more information, see Detections.

Threat Searches and Threat Indicators

We've now withdrawn the older Threat Searches and Threat Indicators features.

You can still search for threats and indicators of compromise by using Live Discover queries. See Intercept X Advanced with XDR updates.

Our new Detections feature also helps you identify suspicious activity which might need investigation. See Detections.