コンテンツに移動
Sophos AI - Hero Banner - Background Image

Sophos Endpoint Tech Specs

Strongest protection. Simple licensing.

Sophos Endpoint Detection and Response (EDR) elevates your endpoint defenses by enabling you to identify, investigate, and neutralize evasive threats.

 

Sophos Extended Detection and Response (XDR) extends EDR to provide visibility across your entire attack surface.

 

Organizations with limited in-house resources can engage Sophos’ Managed Detection and Response (MDR) services, delivered by a team of global cybersecurity experts that monitor your environment for threats 24/7.

Sophos Endpoint System Requirements:

Windows
logo 3
logo4
Linux

Protect your iOS and Android devices with Sophos Mobile

Windows Server and Linux devices require a subscription to Sophos Workload Protection.



Sophos Endpoint for Legacy Platforms add-on available for critical systems running older operating systems.

Endpoint protection and control

Sophos Endpoint

 

Endpoint protection and control  

 

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

 

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

 

 

Sophos MDR

 

24/7 expert-led threat monitoring and response service  

 

Learn more

 

 

Threat surface reduction

 

 

Web Protectioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Web Control

 

circle-check.svg 

 

circle-check.svg 

 

circle-check.svg 

 

circle-check.svg 
windows
apple
Download Reputation

 

circle-check.svg 

 

circle-check.svg 

 

circle-check.svg 

 

circle-check.svg 
windows
Application Controlcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Peripheral Controlcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Data Loss Preventioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Server Lockdown (application whitelisting)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Full Disk EncryptionAdd-onAdd-onAdd-onAdd-onwindows
apple
 

Threat prevention

Ransomware file protection (CryptoGuard)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Remote ransomware protection (CryptoGuard)
Watch video
circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Ransomware Master Boot Record (MBR) protectioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Context-sensitive Defense:
Adaptive Attack Protection
Watch video
circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Context-sensitive Defense:
Estate-wide Critical Attack Warnings
circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Deep Learning AI-powered malware preventioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
linux
Anti-malware file scanningcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
linux
Potentially Unwanted App (PUA) blockingcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
linux
Live Protection cloud-lookupscircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
linux
Behavioral Analysiscircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
linux
Anti-Exploitation (60+ mitigations)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Application Lockdowncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Anti-malware Scan Interface (AMSI)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Malicious Traffic Detectioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Intrusion Prevention System (IPS)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
File Integrity Monitoring (Servers)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Integrated ZTNA agentcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
 

Detection, investigation and response

Sophos Endpoint

Endpoint protection and control  

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

Sophos MDR

 

24/7 expert-led threat monitoring and response service  

 

Learn more

Detection, investigation and response

Rich on-device data for real-time insightscircle-check.svgcircle-check.svgcircle-check.svgwindows
Suspicious event detectionscircle-check.svgcircle-check.svgcircle-check.svg 
AI-powered prioritization of detectionscircle-check.svgcircle-check.svgcircle-check.svgwindows

 


linux

 

Automatic MITRE Framework mappingcircle-check.svgcircle-check.svgcircle-check.svgwindows

 


linux

 

Linux container behavioral and exploit detectionscircle-check.svgcircle-check.svgcircle-check.svglinux

 

Device Exposurecircle-check.svgcircle-check.svgcircle-check.svgwindows

 

Generate detections on integrated third-party datacircle-check.svgcircle-check.svg 
Cross-product event correlation and analysiscircle-check.svgcircle-check.svg 

INVESTIGATION

RCA threat graphscircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows

 


apple

 

Automatic and manual case creationcircle-check.svgcircle-check.svgcircle-check.svgwindows

linux
On-demand Sophos X-Ops threat intelligencecircle-check.svgcircle-check.svgcircle-check.svgwindows

 

AI Case Summarycircle-check.svgcircle-check.svgcircle-check.svg 
AI Command Analysiscircle-check.svgcircle-check.svgcircle-check.svg 
AI Searchcircle-check.svgcircle-check.svgcircle-check.svg 
AI Assistantcircle-check.svgcircle-check.svg 
Forensic data exportcircle-check.svgcircle-check.svgwindows

 

RESPONSE

Automatic malware cleanup 

 
Automatic ransomware file encryption roll-back 
 
Automatic process termination 
 
Synchronized Security: Automatic device isolation via Sophos Firewall 
 
On-demand Adaptive Attack Protection  
On-demand device isolation 
 
Live Response remote terminal access 

 
Microsoft 365 response actions  

DATA INGESTION

Extensive data on-device and in the cloud (Sophos Products)
 
Cloud data retention30 days90 days90 days windows
apple
linux 
Additional cloud storage retention1 Year (Add-on)1 Year (Add-on)1 Year (Add-on) windows
apple
linux 
Ingest and correlate data from your existing (non-Sophos) technology investments 

Sophos Endpoint

 

Endpoint protection and control  

 

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

 

Sophos MDR

 

24/7 expert-led threat monitoring and response service  

 

Learn more

24/7 managed detection and response service

24/7 threat monitoring and responsecircle-check.svg 
Weekly and monthly reportingcircle-check.svg 
Health Checkcircle-check.svg 
Expert-led threat huntingcircle-check.svg 
Threat containmentcircle-check.svg 
Direct call-in support during active incidentscircle-check.svg 
Full-scale incident response: threats are fully eliminatedcircle-check.svg 
Root cause analysiscircle-check.svg 
Dedicated Incident Response Leadcircle-check.svg 
$1M Breach Protection Warrantycircle-check.svg 
Guided threat insights from Sophos X-Opscircle-check.svg 

Sophos Endpoint

 

Endpoint protection and control  

 

 

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

 

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

 

 

Sophos MDR

 

24/7 expert-led threat monitoring and response service

 

Learn more

Optional add-ons

Sophos Endpoint for Legacy PlatformsOptionalOptionalOptionalOptional
Sophos Device EncryptionOptionalOptionalOptionalOptional
Sophos Advisory ServicesOptionalOptionalOptionalOptional
Sophos Incident Response (IR) Services RetainerOptionalOptionalOptionalOptional
Additional cloud storage retentionOptionalOptionalOptional
Sophos Identity Threat Detection and Response (ITDR)OptionalOptional
Sophos Network Detection and Response (NDR)OptionalOptional
Sophos Managed Risk powered by TenableOptional
Full Width CTA - BG

Try Sophos Endpoint for free

Sign up for a free no-obligation 30-day trial.