{"id":4532,"date":"2022-02-25T13:13:32","date_gmt":"2022-02-25T12:13:32","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=4532"},"modified":"2022-02-25T13:13:32","modified_gmt":"2022-02-25T12:13:32","slug":"sophos-solution-update-february-2022","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2022\/02\/resources\/sophos-solution-update-february-2022\/","title":{"rendered":"Sophos Solution Update \u2013 February 2022"},"content":{"rendered":"<p>We\u2019re pleased to provide you with your February 2022 Sophos Solution Update. Yesterday, we shared the news below via email with Sophos users \u2013 i.e. your customers.<\/p>\n<p>It\u2019s a great opportunity for you to reiterate the updates and stay in touch with your customers. Pick from the list below and provide them with tips, tricks and the latest news on the products they are using. Feel free to share the relevant updates via email, newsletter or social media.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Endpoint.png\" alt=\"YOUR ENDPOINT PROTECTION: SOPHOS ENDPOINT - INTERCEPT X\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR ENDPOINT PROTECTION:<br \/>\nSOPHOS ENDPOINT \u2013 INTERCEPT X<\/strong><\/p>\n<p><strong>Sophos XDR: Enhanced Investigations and Office 365 Integration<\/strong><br \/>\nWe are pleased to announce exciting enhancements to the Investigations dashboard as well as integration of Microsoft 365 data into Sophos XDR.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/04\/sophos-xdr-enhanced-investigations-and-office-365-integration\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Automated Software Deployment<\/strong><br \/>\nGlenn from the Sophos Community walks you through automating your Sophos Central Endpoint deployment using active directory via a startup script.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/watch\/VgBe2uXdhckAp674xP26N5\"><strong>Watch the Video<\/strong><\/a><\/p>\n<p><strong>MacOS Endpoint EAP 2022 Update<\/strong><br \/>\nAs of January 27, 2022, the MacOS Endpoint EAP is moving to version 10.3.2. Read on for an overview of the improvements.<br \/>\n<a href=\"https:\/\/community.sophos.com\/intercept-x-endpoint\/macos-endpoint-eap\/b\/announcements\/posts\/macos-endpoint-eap---january-2022-update\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN\u2026<\/strong><\/p>\n<p><strong>Three Good Reasons to Take a SD-WAN Approach<\/strong><br \/>\nSoftware-defined wide area networks are an important part of your IT and cybersecurity landscape. Here\u2019s how to take advantage of them.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/01\/27\/three-good-reasons-to-take-a-sd-wan-approach\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Firewall.png\" alt=\"YOUR NEXT-GEN FIREWALL \u2013 SOPHOS XG FIREWALL\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR FIREWALL:<br \/>\nSOPHOS FIREWALL<\/strong><\/p>\n<p><strong>Three Good Reasons to Take a SD-WAN Approach<\/strong><br \/>\nSoftware-defined wide area networks are an important part of your IT and cybersecurity landscape. Here\u2019s how to take advantage of them.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/01\/27\/three-good-reasons-to-take-a-sd-wan-approach\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Multi-Factor Authentication Enhancements in SFOS v19<\/strong><br \/>\nIn this short video, we demonstrate an overview of some exciting enhancements we&#8217;ve made to MFA in SFOS v19.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/watch\/s2ywVgyPPAULbhfVHteCWt \"><strong>Watch the Video<\/strong><br \/>\n<\/a><\/p>\n<p><strong>Sophos Firewall OS v19 EAP 2 Now Available<\/strong><br \/>\nSophos Firewall OS v19 is now entering the second phase of the EAP, providing access to the full set of v19 features slated for general availability in April.<br \/>\n<a href=\"https:\/\/community.sophos.com\/sophos-xg-firewall\/sfos-v19-early-access-program\/b\/announcements\/posts\/sophos-firewall-os-v19-eap-2-now-available\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN&#8230;<\/p>\n<p>Sophos MTR Now Protects More Than One Million Devices<\/strong><br \/>\nIndustry-best expertise and hands-on-keyboard response are just some of the reasons driving so many organizations to choose Sophos Managed Threat Response.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/10\/26\/another-milestone-for-sophos-managed-detection-and-response-mdr-service\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Central.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR CYBERSECURITY PLATFORM:<br \/>\nSOPHOS CENTRAL<\/strong><\/p>\n<p><strong>The Most Powerful Parts of Sophos Central? The Ones Nobody Notices<\/strong><br \/>\nThere\u2019s a lot of going on quietly in the background with Sophos Central, the world\u2019s most trusted cybersecurity platform. Take a dive under the hood to find out more.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/01\/20\/the-secret-ingredient-in-our-technology-stack\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>New Sophos Central Login Experience Begins Rolling Out<\/strong><br \/>\nWe&#8217;ve made some changes to the Sophos Central login experience. Get the lowdown here.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/01\/19\/new-sophos-central-login-experience-begins-rolling-out\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Sophos Mobile and Android Enterprise<\/strong><br \/>\nThis article provides a high-level overview of managing devices in Sophos Mobile with Android Enterprise.<br \/>\n<a href=\"https:\/\/community.sophos.com\/sophos-mobile\/f\/recommended-reads\/123271\/sophos-mobile-and-android-enterprise\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/Endpoint2.png\" alt=\"Sophos\" width=\"35\" align=\"top\" border=\"0\" \/><\/p>\n<p><strong>YOUR ENDPOINT PROTECTION:<br \/>\nSOPHOS ENDPOINT \u2013 SEC ENDPOINT<\/strong><\/p>\n<p><strong>Authenticated SMTP in Email Reporting<\/strong><br \/>\nLearn how to enable authenticated SMTP in email reporting.<br \/>\n<a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000034141?language=en_US\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>YOU MAY ALSO BE INTERESTED IN&#8230;<\/strong><\/p>\n<p><strong>Three Good Reasons to Take a SD-WAN Approach<\/strong><br \/>\nSoftware-defined wide area networks are an important part of your IT and cybersecurity landscape. Here\u2019s how to take advantage of them.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/01\/27\/three-good-reasons-to-take-a-sd-wan-approach\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.emlcdn.net\/cdn\/1001152\/118f8b69-7fcd-4bca-8be6-47d69949f792\/megaphone.png\" alt=\"A ROUNDUP OF THE LATEST SOPHOS CYBERSECURITY UPDATES\" width=\"35\" align=\"top\" border=\"0\" \/><br \/>\n<strong>A ROUNDUP OF THE LATEST SOPHOS CYBERSECURITY UPDATES<\/strong><\/p>\n<p><strong>Sophos Hosts Cyber Insurance Event: March 16, 2022<\/strong><br \/>\nFind out from industry experts how to optimize your cyber insurance position.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/08\/sophos-hosts-cyber-insurance-event-march-16-2022\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>\u201cYou Don\u2019t Do That Usually\u201d: Detecting Anomalies in AWS IAM User Activity<\/strong><br \/>\nUsers can perform thousands of actions per day in their AWS environments, making it unfeasible for security monitoring. Anomaly Detection is one such technique that can help teams uncover security issues.<br \/>\n<a href=\"https:\/\/ai.sophos.com\/2022\/01\/24\/you-dont-do-that-usually-detecting-anomalies-in-aws-user-activity\/ \"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Three Reasons to Add Sophos to Your Incident Response Plan<\/strong><br \/>\nLearn how the Sophos Rapid Response service can help get you out of a cyber incident fast.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/11\/17\/three-reasons-to-add-sophos-to-your-incident-response-plan\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p><strong>Hindsight Security: Exclude Admin Tools with a Scalpel, not a Sledgehammer<\/strong><br \/>\nThe latest in a series of articles sharing lessons learned by breach victims. Each topic includes simple recommendations you can apply immediately.<br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/09\/02\/hindsight-5-exclude-admin-tools-with-a-scalpel-not-a-sledgehammer\/\"><strong>Read the Article<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3552\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/07\/training-hat.png\" alt=\"\" width=\"55\" height=\"34\" \/><\/strong><\/p>\n<p><strong>SELF-HELP MATERIALS AVAILABLE FOR YOU TO USE AT YOUR OWN PACE<\/strong><\/p>\n<p><strong>Sophos TechVids<\/strong><br \/>\nDiscover our extensive library of how-to, product configuration, and product troubleshooting videos.<br \/>\n<a href=\"https:\/\/techvids.sophos.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Access Sophos TechVids<\/strong><\/a><\/p>\n<p><strong>Product Documentation<\/strong><br \/>\nFind all the technical documents for your Sophos products to get your protection up and running right away.<br \/>\n<a href=\"https:\/\/www.sophos.com\/en-us\/support\/documentation.aspx\" target=\"_blank\" rel=\"noopener\"><strong>Access Product Documentation<\/strong><\/a><\/p>\n<p><strong>Sophos Community<\/strong><br \/>\nConnect. Engage. Earn rewards. The Sophos Community is a platform for users to connect and engage on everything Sophos-related from product questions to best practices.<br \/>\n<a href=\"https:\/\/community.sophos.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Access Sophos Community<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay on top of your customers\u2019 minds with relevant product news.<\/p>\n","protected":false},"author":11,"featured_media":3058,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[152],"coauthors":[64],"class_list":["post-4532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-sophos-solution-update"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/05\/featured-image-sophos-sync-sec-app-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/4532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=4532"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/4532\/revisions"}],"predecessor-version":[{"id":4533,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/4532\/revisions\/4533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/3058"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=4532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=4532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=4532"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=4532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}