sophos atc logo

Sophos Architect Central

This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production...

Read More
$1,500 USD
Course Code AT15
Duration 3 days
Available Formats Classroom
6118 Reviews star_rate star_rate star_rate star_rate star_half
Course Image

This course provides an in-depth study of Sophos Central, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments.

It consists of presentations and practical lab exercises to reinforce the taught content, and electronic copies of the supporting documents for the course will be provided to each trainee through the online portal. The course is expected to take 3 days (24 hours) to complete, of which approximately 9 hours will be spent on the practical exercises.

Prerequisites

  • Have completed and passed the Sophos Central Endpoint and Server Protection - Certified Engineer course
  • Experience with Windows networking and the ability to troubleshoot issues
  • A good understanding of IT security
  • Experience using the Linux command line for common tasks
  • Experience configuring Active Directory Group Policies
  • Experience creating and managing virtual servers or desktops

Course Details

Certification

To become a Sophos Certified Architect, trainees must take and pass an online assessment. The assessment tests their knowledge of both the presented and practical content. The pass mark for the assessment is 80% and is limited to 3 attempts.

Lab Exercises

  • Each student will be provided with a pre-configured environment which simulates a company with two networks and several Windows and Linux computers.
  • An additional pre-configured environment is used to simulate a virtual environment network for use when completing Module 5: Protecting Virtual Servers.

Module 1: Deployment Scenarios

  • Identify some of the common challenges when deploying Central
  • Deploy Update Caches
  • Set up Message Relays
  • Configure AD Sync Utility
  • Identify where Update Caches and Message Relays should be used
  • Labs:
  • Register and activate a Sophos Central evaluation
  • Install Server Protection
  • Install and Configure AD Sync Utility
  • Deploy an Update Cache and Message Relay

Module 2: Client Deployment Methods

  • Identify the recommended steps for deploying Sophos Central
  • Explain the installation process, and identify the different types of installer
  • Automate deployment for Windows, Linux and Mac computers
  • Migrate endpoints from Enterprise Console
  • Locate installation log files
  • Remove third-party products as part of a deployment
  • Labs:
  • Enable Server Lockdown
  • Deploy using Active Directory Group Policy
  • Use the Competitor Removal Tool
  • Deploy to a Linux Server using a Script

Module 3: Endpoint Protection Policies

  • Describe the function and operation of each of the components that make up an Endpoint Protection and Intercept X
  • Configure policies to meet a customer's requirements and follow best practice
  • Test and validate Endpoint Protection
  • Configure exclusions
  • Configure Data Loss Prevention
  • Labs:
  • Test Threat Protection Policies
  • Configure and Test Exclusions
  • Configure Web Control Policies
  • Configure Application Control Policies
  • Data Control Policies
  • Configure and test Tamper Protection

Module 4: Server Protection Policies

  • Configure Server Protection Policies
  • Configure and Manage Server Lockdown
  • Labs:
  • Configure Sever Groups and Policies
  • Manage Server Lockdown
  • Test Linux Server Protection

Module 5: Protecting Virtual Servers

  • Connect AWS and Azure accounts to Sophos Central
  • Deploy Server Protection to AWS and Azure
  • Deploy and Manage Sophos for Virtual Environments
  • Labs:
  • Download the installer for the Security Virtual Machine
  • Install the Security Virtual Machine (SVM) on a Hyper-V Server
  • Configure Threat Protection policies to apply to the Security VMs and the Guest VMs they protect
  • Perform a manual installation of the Guest VM Agent and view logs
  • Test and configure a script to deploy the GVM Agent
  • Manage Guest VMs from the Central Console
  • Test Guest VM Migration

Module 6: Logging and Reporting

  • Explain the types of alert in Sophos Central
  • Use the Sophos Central logs and reports to check the health of your estate
  • Export data from Sophos Central into a SIEM application
  • Locate client log files on Windows, Mac OS X and Linux
  • Labs:
  • Configure SIEM with Splunk

Module 7: Managing Infections

  • Identify the types of detection and their properties
  • Explain how computers might become infected
  • Identify and use the tools available to cleanup malware
  • Explain how the quarantine works and manage quarantined items
  • Cleanup malware on a Linux server
  • Labs:
  • Source of Infection Tool
  • Release a File from SafeStore
  • Disinfect a Linux Server

Module 8: Endpoint Detection and Response

  • Explain what EDR is and how it works
  • Demonstrate how to use threat cases and run threat searches
  • Explain how to use endpoint isolation for admin initiated and automatic isolation
  • Demonstrate how to create a forensic snapshot and interrogate the database
  • Labs:
  • Create a forensic snapshot and interrogate the database
  • Run a threat search and generate a threat case

Module 9: Management

  • Use the Controlled Updates policies appropriately
  • Enable multi-factor authentication
  • Use the Enterprise Dashboard to manage multiple sub-estates
  • Identify the benefits of the Partner Dashboard
  • Identify common licensing requirements
  • Labs:
  • Enable Manually Controlled Updates
  • Enable Multi-Factor Authentication
Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward