This is an overview of the tasks you need to perform to protect your network after you have installed Enterprise Console and completed the Download Security Software Wizard. For more information about using Enterprise Console, refer to the other materials and sections mentioned.
We recommend that you refer to the Sophos Enterprise Console policy setup guide for advice on best practices for using and managing Sophos security software. Sophos documentation is published at http://www.sophos.com/en-us/support/documentation.
If you haven't completed the Download Security Software Wizard, see Run the Download Security Software Wizard.
To protect your network, follow these steps:
Additional protection options
By default, Sophos Endpoint Security and Control detects malware (viruses, Trojans, worms, spyware), adware and other potentially unwanted applications, suspicious behavior, and malicious network traffic. It also blocks access to websites that are known to host malware and scans content downloaded from the internet. You can enable further security and productivity features, as described in Creating and using groups.
Administrative options
You can set up different roles in Enterprise Console, add rights to the roles, and then assign Windows users and groups to the roles. The System Administrator role that includes the Sophos Full Administrators Windows group has full rights and does not require setting up. For more information, see Managing roles and sub-estates.
You can split your IT estate into sub-estates and assign Enterprise Console groups of computers to the sub-estates. You can then control access to the sub-estates by assigning Windows users and groups to them. The Default sub-estate contains all Enterprise Console groups, including the Unassigned group. For more information about sub-estates, see Managing roles and sub-estates.