{"id":22194,"date":"2020-03-03T12:00:00","date_gmt":"2020-03-03T11:00:00","guid":{"rendered":"https:\/\/www.avanet.com\/blog\/sophos-central-update-enhanced-protection-for-servers-and-more\/"},"modified":"2024-01-02T09:32:57","modified_gmt":"2024-01-02T08:32:57","slug":"sophos-central-update-enhanced-protection-for-server-and-more","status":"publish","type":"post","link":"https:\/\/www.avanet.com\/en\/blog\/sophos-central-update-enhanced-protection-for-server-and-more\/","title":{"rendered":"Sophos Central Update &#8211; Enhanced protection for servers and more"},"content":{"rendered":"\n<p>Over the last two months, Sophos has again released a few innovations for the Central platform, which I would like to briefly summarize here. I will start this article, however, with a note about the imminent end of support for Windows 7 and Server 2008 R2.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-baldiges-ende-der-unterstutzung-von-windows-7-und-windows-server-2008-r2\">Soon end of support for Windows 7 and Windows Server 2008 R2<\/h2>\n\n<p>Microsoft has now finally discontinued support for both Windows <strong>7<\/strong> and <strong>Windows Server 2008 R2<\/strong> on January 14, 2020. As a result, Sophos will no longer support these two operating systems for much longer. Standard support officially ends on <strong>December 31, 2021<\/strong>.<\/p>\n\n<p><strong>Windows 7<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>End of standard support: December 31, 2021<\/li>\n\n\n\n<li>End of extended support: March 31, 2025<\/li>\n<\/ul>\n\n<p><strong>Windows Server 2008 R2<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>End of standard support: December 31, 2021<\/li>\n\n\n\n<li>End of extended support: March 31, 2025<\/li>\n<\/ul>\n\n<p><strong>Info<\/strong>: Windows Server 2008 support ends on July 31, 2020.<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-erwerben-einer-verlangerten-unterstutzung\">Acquire an extended support<\/h3>\n\n<p>Sophos is offering <strong>extended support<\/strong> to customers who do not have a December 31, 2021 deadline to replace existing hardware. You will need to purchase an extra license for Sophos to give you a grace period until March 31, 2025 for the following products:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Intercept X Advanced\/Intercept X Advanced with EDR<\/li>\n\n\n\n<li>Intercept X Advanced for Server\/Intercept X Advanced for Server with EDR<\/li>\n\n\n\n<li>Central Endpoint Protection\/Central Server Protection<\/li>\n\n\n\n<li>Endpoint Protection Standard\/Endpoint Protection Advanced<\/li>\n\n\n\n<li>Server Protection for Virtualization, Windows and Linux\/Server Protection Enterprise<\/li>\n<\/ul>\n\n<p>If you are interested in such an extended support, just write us via <a href=\"https:\/\/www.avanet.com\/en\/contact\/\">contact form<\/a>. We will be happy to provide you with an appropriate offer.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-sophos-intercept-x-enhanced-protection-beta-jetzt-fur-server-verfugbar\">Sophos Intercept X Enhanced Protection (Beta) now available for servers<\/h2>\n\n<p>Sophos has already launched a beta program for <strong>Intercept X Enhanced Protection<\/strong> in October 2019. The goal of this program is to further drill down Intercept X and provide new functionality to combat current malware. Even in 2020, ransomware attacks are not stopping and terms like EMOTET are on everyone&#8217;s lips. Sophos therefore continues to work diligently to ensure that customers can continue to feel secure with <strong>Intercept X technology<\/strong>.<\/p>\n\n<p>In the first version, <strong>Intercept X Enhanced Protection<\/strong> already included the two functions <strong>Anti-Malware Scanning Interface<\/strong> (AMSI) and <strong>Intrusion Prevention System<\/strong> (IPS).<\/p>\n\n<p>In December 2019, new and very important protection mechanisms for Windows systems were added, which are now also available for Windows Server from version 2008 R2:<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-schutz-gegen-verschlusselnde-dateisystem-angriffe-efs-guard\">Protection against encryption file system attacks (EFS Guard)<\/h3>\n\n<p>Since Windows 2000, Microsoft has integrated a function called <strong>EFS<\/strong> (Encrypting File System) into its operating system. Not to be confused with BitLocker, which can be used to encrypt an entire hard drive, EFS is used to encrypt specific files and folders.<\/p>\n\n<p>Attackers have found a way to abuse this function and encrypt their victims&#8217; data right away using the APIs of the system&#8217;s own encryption function (EFS). What is practical about the whole thing is that they do not have to reload their own malware for it. With <strong>EFS Guard<\/strong>, Intercept X can now protect against such attacks.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"162\" data-id=\"13636\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-1024x162.png\" alt=\"Protection against encryption file system attacks (EFS Guard)\" class=\"wp-image-13636\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-1024x162.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-64x10.png 64w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-300x48.png 300w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-600x95.png 600w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-768x122.png 768w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-1536x244.png 1536w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen-18x3.png 18w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-vor-encrypting-file-system-angriffen-schutzen.png 1538w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"dynamischer-shellcode-schutz\">Dynamic shellcode protection<\/h3>\n\n<p>The inventors of new malware are increasingly using so-called &#8220;stagers&#8221;. This refers to small and innocent programs that download and execute malware in the temporary memory. As a result, they are hardly detected by traditional anti-malware applications. By analyzing the behavior of applications, dynamic shellcode protection can protect against exactly such malware. When behavior similar to that of a stager is detected, the detection immediately intervenes and stops the application.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"66\" data-id=\"13638\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-1024x66.png\" alt=\"Dynamic shellcode protection\" class=\"wp-image-13638\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-1024x66.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-64x4.png 64w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-300x19.png 300w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-600x39.png 600w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-768x49.png 768w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-1536x99.png 1536w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz-18x1.png 18w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-dynamischer-shellcode-schutz.png 1866w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"ctf-protocol-caller-validieren-ctf-guard\">Validate CTF Protocol Caller (CTF Guard)<\/h3>\n\n<p>CTF is a vulnerability in a Windows component that has been present since Windows XP. This vulnerability allows an unauthorized attacker to control any Windows process, including applications running in a sandbox. To ensure that the CTF protocol can no longer be exploited, the Sophos Threat Mitigation team has developed the <strong>CTF Guard<\/strong> feature and added it to the Threat Protection policy.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"65\" data-id=\"13639\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-1024x65.png\" alt=\"Validate CTF Protocol Caller (CTF Guard)\" class=\"wp-image-13639\" style=\"width:910px;height:57px\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-1024x65.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-64x4.png 64w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-300x19.png 300w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-600x38.png 600w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-768x48.png 768w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-1536x97.png 1536w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren-18x1.png 18w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-ctf-protocol-caller-validieren.png 1872w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n<h3 class=\"wp-block-heading\" id=\"side-loading-unsicherer-module-verhindern-apisetguard\">Prevent side-loading of unsafe modules (ApiSetGuard)<\/h3>\n\n<p>The <strong>ApiSetGuard<\/strong> function prevents applications from loading a malicious DLL masquerading as an ApiSet stub DLL. ApiSet Stub DLLs are DLLs that help a program to be compatible with newer Windows versions. Attackers can deposit malicious ApiSet stub DLLs on a system to manipulate functions. For example, the Sophos tamper protection could be overridden to terminate the Sophos client.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"65\" data-id=\"13640\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-1024x65.png\" alt=\"Prevent side-loading of unsafe modules (ApiSetGuard)\" class=\"wp-image-13640\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-1024x65.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-64x4.png 64w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-300x19.png 300w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-600x38.png 600w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-768x48.png 768w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-1536x97.png 1536w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern-18x1.png 18w, https:\/\/www.avanet.com\/assets\/sophos-central-threat-protection-side-loading-unsicherer-module-verhindern.png 1870w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n<h2 class=\"wp-block-heading\" id=\"e-mail-dkim-signierung\">E-mail DKIM signing<\/h2>\n\n<p>Those who use Sophos Central Email to scan their inbound and outbound traffic can now add a DKIM signature to their emails. To set this up, you need to go to the &#8220;Settings&#8221; of Central Email and select the &#8220;Domain Settings\/Status&#8221; menu item. If you now click on a domain that also scans outbound traffic, you will find the option to create a new DKIM key below the summary. Subsequently, a short instruction appears with all necessary information to set up the DKIM key.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-5 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" data-id=\"13641\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-1024x489.jpg\" alt=\"Sophos Central Email Gateway - email DKIM signing\" class=\"wp-image-13641\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-1024x489.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-64x31.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-300x143.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-600x286.jpg 600w, https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-768x366.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-1536x733.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details-18x9.jpg 18w, https:\/\/www.avanet.com\/assets\/sophos-central-email-gateway-domain-details.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n<h2 class=\"wp-block-heading\" id=\"individuell-anpassbare-e-mail-adresse-fur-phish-threat-training\">Customizable email address for Phish Threat Training<\/h2>\n\n<p>Sophos Centrla Phish Threat is actually designed to train employees in a company to detect phishing emails. In the past, it was not really trustworthy when the automated training and registration emails were sent by &#8220;Sophos <em>training@staysafe.sophos.com&#8221;<\/em>. Many an unsure employee has probably asked himself whether he should really click on the link in this e-mail. \ud83d\ude05 Sophos has now reacted to this and now offers the option to store your own domain for <strong>catch emails<\/strong>, <strong>reminder emails<\/strong> and <strong>registration emails<\/strong> that are sent to your end users.<\/p>\n\n<p>To do this, simply go to the &#8220;Settings&#8221; of Phish Threat and select the menu item &#8220;Training notification and reminder emails&#8221;. A custom email address can now be activated and confirmed there. In my tests, however, the verification email, as well as the subsequent test email, ended up in the spam folder. By the way, these settings are applied to the Central Account and cannot be set individually per campaign.<\/p>\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-1024x489.jpg\" alt=\"Customizable email address for Phish Threat Training\" class=\"wp-image-13642\" style=\"width:910px;height:434px\" title=\"\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-1024x489.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-64x31.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-300x143.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-600x286.jpg 600w, https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-768x366.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-1536x733.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails-18x9.jpg 18w, https:\/\/www.avanet.com\/assets\/sophos-central-phish-threat-automatisierte-e-mails.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Over the last two months, Sophos has again released a few innovations for the Central platform, which I would like to briefly summarize here. I will start this article, however, with a note about the imminent end of support for Windows 7 and Server 2008 R2. Soon end of support for Windows 7 and Windows [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":21241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-22194","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-unkategorisiert"],"blocksy_meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/posts\/22194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/comments?post=22194"}],"version-history":[{"count":0,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/posts\/22194\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/media\/21241"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/media?parent=22194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/categories?post=22194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/tags?post=22194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}