{"id":1168,"date":"2020-04-15T11:50:47","date_gmt":"2020-04-15T11:50:47","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=1168"},"modified":"2020-04-15T11:50:47","modified_gmt":"2020-04-15T11:50:47","slug":"powerful-new-edr-features-now-in-early-access-for-intercept-x","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2020\/04\/products\/powerful-new-edr-features-now-in-early-access-for-intercept-x\/","title":{"rendered":"Powerful New EDR Features Now in Early Access for Intercept X"},"content":{"rendered":"<p>We are excited to announce that powerful new Endpoint Detection and Response (EDR) features for Intercept X are now available in early access.<\/p>\n<p>This early access program (EAP) brings pre-built, fully customizable SQL queries for both granular threat hunting <em>and <\/em>IT health checks and management across your organization\u2019s estate. Here\u2019s <a href=\"https:\/\/community.sophos.com\/products\/intercept\/early-access-program\/b\/blog\/posts\/powerful-new-edr-capabilities-now-available-in-early-access\">how to join<\/a>.<\/p>\n<h2>Live Discover<\/h2>\n<p>This feature allows admins to search their data for almost any question they can think of by searching across endpoints and servers with SQL queries. You can choose from a selection of pre-created queries that can be fully customized to pull the exact information that you need. IT operations and threat hunting sample questions include:<\/p>\n<ul>\n<li>Why is a machine performing slowly? Is it pending a reboot?<\/li>\n<li>Are users running unauthorized browser extensions?<\/li>\n<li>Have any processes had their registry keys or files modified recently?<\/li>\n<li>Is remote sharing enabled? What about guest accounts?<\/li>\n<li>What processes are attempting to make network connections on non-standard ports?<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1212 size-large\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/live-discover-dashboard.png?w=640\" alt=\"\" width=\"640\" height=\"300\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/live-discover-dashboard.png 1920w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/live-discover-dashboard.png?resize=300,141 300w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/live-discover-dashboard.png?resize=768,360 768w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/live-discover-dashboard.png?resize=1024,481 1024w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/live-discover-dashboard.png?resize=1536,721 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<h2>Live Response (coming in May to early access)<\/h2>\n<p>Live Response gives admins the ability to respond with precision. Using a cmdline interface, remotely access devices in order to perform further investigation or take action. For example:<\/p>\n<ul>\n<li>Reboot a device pending updates<\/li>\n<li>Terminate suspicious processes<\/li>\n<li>Browse the file system<\/li>\n<li>Edit configuration files<\/li>\n<li>Run scripts and programs<\/li>\n<\/ul>\n<h2>How to join the EAP<\/h2>\n<p>The EAP is open to everyone with Intercept X and Intercept X for Server \u2013 even if you don\u2019t currently have EDR. For complete instructions on how to join as well as additional technical information, please head over to the <a href=\"https:\/\/community.sophos.com\/products\/intercept\/early-access-program\/b\/blog\/posts\/powerful-new-edr-capabilities-now-available-in-early-access\">Sophos community<\/a>. We look forward to hearing your feedback!<\/p>\n<h2>Spreading the word<\/h2>\n<p>Take advantage of these assets and get your customers excited about these new EDR enhancements:<\/p>\n<ul>\n<li><a href=\"https:\/\/vimeo.com\/showcase\/6972121\"><strong>Video series<\/strong><\/a><br \/>\nLots of great content showing off the features in action, performing a variety of tasks<\/li>\n<li><a href=\"https:\/\/news.sophos.com\/en-us\/powerful-new-edr-features-now-in-early-access-for-intercept-x\"><strong>Sophos News blog post<\/strong><\/a><br \/>\nCustomer-facing blog post highlighting key new features and benefits<\/li>\n<li><a href=\"https:\/\/partnerportal.sophos.com\/en-us\/email-co-branding\/detail.aspx?Id=1f96e797-7a73-4257-a467-2427573c6b82\"><strong>Email<\/strong><\/a><br \/>\nReady-to-send email \u2013 just add your logo and send<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><em>Please note: Some links above require access to the <\/em><a href=\"https:\/\/partnerportal.sophos.com\"><em>Sophos Partner Portal<\/em><\/a><em> which is available for Sophos partners only. If you are a registered partner and have trouble logging in, please contact <\/em><a href=\"mailto:customercare@sophos.com\"><em>customercare@sophos.com<\/em><\/a><em>. <\/em><\/p>\n<p><em>In some cases, if you are not logged in, the direct links given may not work. If so, verify you are logged in to the Partner Portal and then click the link again to view the desired page.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This early access program (EAP) brings pre-built, fully customizable SQL queries for both granular threat hunting and IT health checks and management across your organization\u2019s estate.<\/p>\n","protected":false},"author":56,"featured_media":561,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[9,30],"coauthors":[61],"class_list":["post-1168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-early-access-program","tag-intercept-x"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/02\/endpoint-displacement-partner-blog-image-1600x960px.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/1168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=1168"}],"version-history":[{"count":4,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/1168\/revisions"}],"predecessor-version":[{"id":1213,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/1168\/revisions\/1213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/561"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=1168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=1168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=1168"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=1168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}