Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Intercept X with EDR: Powerful new IT operations and threat hunting
#1
[Image: U7NiUOm.png]

Quote:The latest version of Sophos EDR is now available in Intercept X Advanced.

We are thrilled to announce that the latest version of Sophos EDR (endpoint detection and response) is now available in Intercept X Advanced with EDR and Intercept X Advanced for Server with EDR.

This release brings powerful new capabilities that enable both IT admins and security analysts to ask detailed IT operations and threat hunting questions across their entire estates. It also provides new functionality to remotely respond with precision.

Existing EDR customers will see these new features appear in their Sophos Central consoles throughout June (see below for additional rollout details).

Upgrade your IT security operations

Maintaining proper IT hygiene can be a significant time investment for IT admins. Being able to identify which devices need attention and what action needs to be taken can add another layer of complexity.

With Sophos EDR you can now do just that, quickly and easily. For example:

Find devices with software vulnerabilities, unknown services running or unauthorized browser extensions
Identify endpoints and servers that still have RDP and guest accounts enabled
See if software has been deployed on devices, e.g. to make sure a rollout is complete
Remotely access devices to dig deeper and take action such as installing software, editing configuration files and rebooting a device

Hunt and neutralize threats

Tracking down subtle, evasive threats requires a tool capable of detecting even the smallest indicator of compromise.

With this release Sophos EDR is significantly enhancing its threat hunting capabilities. For example:

Detect processes attempting to make a connection on non-standard ports
Get granular detail on unexpected PowerShell executions
Identify processes that have recently modified files or registry keys
Remotely access a device to deploy additional forensic tools, terminate suspect processes, and run scripts or programs


Continue reading HERE
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Threat Hunting Overview | Learn Cybersecurity tarekma7 0 1,423 07-22-2020 , 12:17 AM
Last Post: tarekma7

Forum Jump:


Users browsing this thread: 1 Guest(s)