Sophos Endpoint onboarding

A getting started guide to help you get up and running with Sophos Endpoint—setting up your environment, installing the agent, and applying common customizations.

Looking for our MDR onboarding guide?

Customize this guide

Select a guide or get one that fits your individual needs.

Which guide do you want?

Welcome to Sophos

We've created this getting started guide to help you get up and running with Sophos Endpoint. It takes you through setting up your environment, installing Sophos Endpoint, and adding some of the most common customizations.

Tip: Our Professional Services offer several solutions to speed up and streamline the deployment. More information.

Sophos onboarding webinars

Sophos Endpoint is a powerful solution for safeguarding your digital environment. Watch our four-part webinar series to learn about the different steps in optimizing Sophos Endpoint.

See Sophos Endpoint webinar.

Prepare your environment

We recommend you prepare your environment for ease of management and to reduce the chance of issues. if you want to deploy the product immediately, skip to Install Sophos Endpoint.

Requirements

Ensure your environment meets the following requirements:

Sync users and devices from Entra ID or Active Directory

Synchronize your users, devices, and groups from Entra ID or Active Directory so you can assign security policies based on your existing directory structure.

These instructions tell you how to set up a Microsoft Entra ID directory source. You can synchronize users and groups from Microsoft Entra ID to Sophos Central. You can synchronize from multiple Microsoft Entra ID domains.

These instructions tell you how to set up Active Directory as a directory source. You can synchronize users, devices, and groups. You can also synchronize public folders and mailboxes. You can synchronize different domains in the same forest and select multiple child domains within a single forest.

Install Sophos Endpoint

We recommend that you install the endpoint software on a small number of devices at first. This lets you check for conflicts with other products before you deploy it to all devices.

Manual install

If you have a small number of devices or want to test the product, manually download and run the installer.

Deployment to Windows

You can automate deployment for your Windows devices.

Deployment to macOS

You can automate deployment to macOS devices using Jamf Pro. Our document describes using Jamf Pro, but these files work with any deployment.

Deployment to Linux

You can deploy Sophos Endpoint to Linux devices manually, or script the deployment. If you have virtual machines, an auto-scaling or load-balancing environment, or many Linux devices, consider creating a gold image with Sophos Endpoint.

Configure features

Sophos has pre-configured policies to ensure you have the best protection possible so you can be up and running in no time. However, in some cases, you might want to customize some of these settings.

Configure scanning of secure web pages

SSL/TLS decryption of HTTPS websites allows Sophos Endpoint to decrypt, scan, and act on the contents of secure web pages. We recommend that you turn it on. However, you might want to exclude some sites because decryption might let our product record personal information and show it in logs.

Exclude items from scans for threats

Many vendors provide a list of recommended security exclusions for their products to improve performance.

Note: Although excluding apps from scanning might improve the performance of appliances, it might reduce your security posture. Only exclude apps that you trust!

Sophos has a list of common applications with their vendor-recommended security exclusions. If you encounter significant performance degradation with an application not currently on our list, it's recommended to reach out to the vendor to confirm if they have a recommended list of security exclusions for their product.

Set up scheduled scans for threats

We recommend configuring a scheduled scan once a week to gather information about data stored on your computers that isn't frequently accessed.

Note: The scheduled scan time is the time on the endpoint computers (not UTC). If a device isn't on during the scheduled scan time, it'll wait until the next scheduled scan time before attempting another scan.

In-product workflow

See Threat Protection policy – scheduled scanning.

Control the websites users can access

You can configure an acceptable web usage policy for users and exclusions for specific users. For example, you can block access to social media websites for all your users except the Marketing team.

If you want to allow access to a specific website that’s in a blocked category, you can override the category.

Control the applications users can access

You can block applications that aren’t a security threat but that you decide are unsuitable for use in the office, such as games or unsupported web browsers.

Control the peripherals users can use (Windows and macOS only)

You can control which peripherals and removable media can be used in your environment. Check which peripherals endpoints use, block access to new or existing peripherals, and allow read-only access for some peripheral types.

Configure Data Loss Prevention

Data Loss Prevention (DLP) controls accidental data loss. DLP enables you to monitor and restrict the transfer of files containing sensitive data.

Configure your update management policies

By default, we update Sophos products on your computers automatically. The Update Management policy lets you control the day and time when updates become available on your network. This ensures that your computers don't start updating until a time that best suits you. You can also configure what software packages to apply to a small subset of computers. This allows for testing of new releases before they're rolled out to the rest of your computers.

See Configure updating policy.

Integrate other products with Sophos

XDR customers can integrate third-party security products with Sophos Central. These products can then send alerts to the Sophos Data Lake, where you can analyze them.

You can integrate some popular third-party products free of charge.

Get reports

Protection overview

You can get an overview of your Sophos protection report over the past 30 days. This report can be exported as a PDF.

Find your Sophos Protection report

Account Health Check

Use the Account Health Check dashboard to verify that your account has the best protection. For example, see whether you're using all the protection features included in your license.

Account Health Check

Schedule reports

Find out about the reports you can generate. You can customize reports, save them and send them out as scheduled emails.

Reports

Set up access control

You can configure how administrators sign in to Sophos Central and which products or features they can manage.

Configure federated sign-ins

Allow your users to sign in using Entra ID, Open IDC, or ADFS credentials. To do this, you must make sure that all your administrators and users are assigned to a domain and have an identity provider.

Role Based Access Control

Configure management access to Sophos Central:

You can also configure federated sign-in to provide a Service-Provider initiated single-sign-in for your administrators and users to access Sophos Central. If you choose to use federated sign-in, Sophos Central will verify identities using an identity provider. See Set up federated sign-in.

Get technical support

To get the best technical support, collect logs and turn on remote assistance for Sophos Support.