This is an overview of the tasks you need to perform to protect your network after you have installed Enterprise Console and completed the Download Security Software Wizard. For more information about using Enterprise Console, refer to the other materials and sections mentioned.
We recommend that you refer to the Sophos Enterprise Console policy setup guide for advice on best practices for using and managing Sophos security software. Sophos documentation is published at http://www.sophos.com/en-us/support/documentation.
If you haven't completed the Download Security Software Wizard, see Run the Download Security Software Wizard.
To protect your network, follow these steps:
You can create groups yourself, one by one, or you can import Active Directory containers, with or without computers, and use them as Enterprise Console computer groups.
If you want to import Active Directory containers, see Import containers and computers from Active Directory. We recommend that you first import containers from Active Directory without computers, then assign group policies to the groups, and then add computers to the groups, for example, by synchronizing the groups with Active Directory.
For information about creating groups manually, see Creating and using groups.
Enterprise Console has a set of default policies that are essential to keep your network protected. You can use default Updating and Anti-virus and HIPS policies out of the box. To configure the firewall policy, run the Firewall policy wizard. See Set up a basic firewall policy.
If you have imported containers and computers from Active Directory in step 1, you do not need to do anything. Otherwise, see Discovering computers on the network.
You can choose between two approaches to protecting your networked computers, depending on which suits you best.
When you drag a computer from the Unassigned group and drop it onto another group, a wizard is launched to help you protect the computers. See Protect computers automatically and other topics in the section Protecting computers.
If you chose to synchronize with Active Directory, you can also choose to protect your Windows computers automatically. You can do so in the Synchronize with Active Directory Wizard or Synchronization properties dialog box. For instructions, see Use synchronization to protect computers automatically.
When installation is complete, look at the list of computers in the new group again. In the On-access column, you should see the word Active: this shows that the computer is protected by on-access scanning, and that it is now managed by Enterprise Console. For more information, see Checking whether your network is protected.
If a virus, unwanted application, or other issue has been detected on your network, clean up affected computers as described in Clean up computers now.
Additional protection options
By default, Sophos Endpoint Security and Control detects malware (viruses, Trojans, worms, spyware), adware and other potentially unwanted applications, suspicious behavior, and malicious network traffic. It also blocks access to websites that are known to host malware and scans content downloaded from the internet. You can enable further security and productivity features, as described in Creating and using groups.
You can set up different roles in Enterprise Console, add rights to the roles, and then assign Windows users and groups to the roles. The System Administrator role that includes the Sophos Full Administrators Windows group has full rights and does not require setting up. For more information, see Managing roles and sub-estates.
You can split your IT estate into sub-estates and assign Enterprise Console groups of computers to the sub-estates. You can then control access to the sub-estates by assigning Windows users and groups to them. The Default sub-estate contains all Enterprise Console groups, including the Unassigned group. For more information about sub-estates, see Managing roles and sub-estates.