EP0515 5.0v1 Introduction To Sophos Synchronized Security
EP0515 5.0v1 Introduction To Sophos Synchronized Security
Introduction to Sophos
Synchronized Security
[Additional Information]
April 2024
Version: 5.0v1
© 2024 Sophos Limited. All rights reserved. No part of this document may be used or reproduced in any form or by any means without the prior written
consent of Sophos.
Sophos and the Sophos logo are registered trademarks of Sophos Limited. Other names, logos and marks mentioned in this document may be the
trademarks or registered trademarks of Sophos Limited or their respective owners.
While reasonable care has been taken in the preparation of this document, Sophos makes no warranties, conditions or representations (whether express
or implied) as to its completeness or accuracy. This document is subject to change at any time without notice.
Sophos Limited is a company registered in England number 2096520, whose registered office is at The Pentagon, Abingdon Science Park, Abingdon,
Oxfordshire, OX14 3YP.
DURATION 10 minutes
In this chapter you will learn how Sophos Synchronized Security allows Sophos products to
communicate with each other intelligently to respond to threats.
Workload
Firewall Cloud Wireless Email Sophos Endpoint Encryption Mobile
Protection
Optix Central
Respond Adaptive policy, automated enforcement Analyze Correlation and analysis of events
Sophos Synchronized Security is cybersecurity as a system. Security products working together in real-
time. Traditionally, cybersecurity makes use of separate protection products to identify malicious files
and to detect and stop malicious traffic. These products work well in isolation, however, are
disconnected from each other. This approach results in an IT team manually correlating data between
systems which can take time and often means threats are missed.
Sophos Synchronized Security automates detection, isolation, and remediation results which means
attacks are neutralized quickly. It creates new ways to connect security products that protect your
organization.
Cyber-attacks often include multiple elements, for example, a phishing email could install malicious
code that takes advantage of a software exploit to install ransomware. To help understand the types of
threats being initiated, we asked organizations who had been victims of cyber-attacks what types of
threats they experienced. The key findings were that data exfiltration was the number once security
concern.
When added up, these numbers add up to more than 100% which demonstrates that attacks typically
use multiple attack elements. Synchronized Security takes a full system approach. Security products
connect with each other in real-time, working together to combat advanced threats.
[Additional Information]
This information was taken from our white paper about the state of cyber-security which is available
here: https://www.sophos.com/en-us/whitepaper/state-of-cybersecurity
There are three pillars to the synchronized security system; Discover. Sophos Central products
automatically share information to reveal hidden risks and unknown threats. It enables administrators
to see all network traffic, the identification of risky applications, and the correlating behaviour across
multiple activities.
Analyze. Real-time incident analysis and cross-estate reporting delivers instant insights. This allows
administrators to view the full chain of events for an incident.
Communication between Sophos Central products is facilitated by the Sophos Security Heartbeat
which creates a secure two-way tunnel of communication.
The Security Heartbeat allows for intelligent communication between Sophos products allowing for a
coordinated response to threats. The Security Heartbeat includes a regular heartbeat (a few bytes
every 15 seconds) that identifies the device and communicates that the device is active and protected.
It communicates event information, the device health status, and threat information.
YELLOW Endpoint agent is running. Medium risk and action may be required.
RED Endpoint agent may not be running, and devices may not be protected. High risk and
action is required.
If a computer has a GREEN status, this means that the endpoint agent is running, and the computer is
protected. No potentially unwanted applications, active, or inactive malware has been detected.
If the computer has a YELLOW status, the endpoint agent is running so the computer is protected,
however, inactive malware or a PUA has been detected. It can also indicate that the endpoint agent is
out of date.
When a computer has a RED status, it can indicate that the endpoint agent may not be running, so the
computer may not be protected. Alternatively, it could mean that active malware has been detected
or malware has not been cleaned up. It could also mean that malicious network traffic has been
detected, or communication to a known bad host has been identified.
Sophos Synchronized Security integrates with all Sophos Central products, let’s have a look at some
examples.
Malware
detected
Protected
Protected
What would happen if malware was detected on a device that is part of a network protected with
Sophos Firewall and Synchronized Security is enabled?
If malware is detected, the Security Heartbeat sends event information along with the device health
status to the Sophos Firewall, which shares the MAC address of the device with other devices on the
network. Healthy devices drop traffic from the device with the red health status. This will only work on
local network segments. If traffic is passing through a router, traffic will not be dropped. When traffic
passes through the Sophos Firewall, it can prevent the device with a red health status from connecting
to other devices which protects healthy devices from a possible infection. The Sophos Firewall will
only block traffic from a red health status device, all other devices will have network access.
Once the endpoint agent has cleaned up malware on the device, the Security Heartbeat sends the
updated health status to the Sophos Firewall which then allows the device to access hosts and
networks as normal. It also updates all devices removing the MAC address of the compromised device
from the list of devices with a red health status.
Security Heartbeat
This diagram shows what happens when a device is protected with Sophos Central endpoint
protection and a Sophos Firewall is in use.
The endpoint protection agent detects malware, and the device health status is communicated via
Security Heartbeat with the Sophos Firewall which isolates the device on the network.
Automatic remediation of the device ensures that the threat is cleaned up and once the device is
clean, the health status is updated and reported via the Security Heartbeat to the Sophos Firewall
which restores network access.
This automatic incident response takes seconds with no human interaction required.
Security Heartbeat
Please note that for servers, an administrator will need to provide approval for any actions taken.
Security Heartbeat
Sophos Email detects a compromised mailbox which is being used to send outbound spam emails and
automatically isolates the mailbox. The isolation status is shared with Sophos Central via the Security
Heartbeat.
The endpoint protection agent identifies and scans all known devices associated with the mailbox for
malware and automatically cleans up any malware found. The mailbox is then restored.
Security Heartbeat
An attacker will typically want to move across your network to gain better access to your data. This is
called lateral movement. Synchronized Security provides lateral movement protection.
If a protected device detects a threat, the health status of that device is set to red and shared with the
Sophos Firewall via Security Heartbeat.
Security Heartbeat
The Sophos Firewall isolates the device from both the network and the LAN, and the endpoint
protection agent automatically cleans up the threat.
The now healthy device shares the updated health status with Sophos Firewall.
Security Heartbeat
The connection to the network and the LAN is then restored. This process happens in seconds by
sharing information and using dynamic policies that respond to incidents and events.
Chapter Review
Sophos Synchronized Security automates detection, isolation and remediation results which means
attacks can be neutralized quickly.
There are three pillars to the Synchronized Security system; discover, analyze, and respond.
Communication between Sophos Central products is facilitated by the Sophos Security Heartbeat which
creates a secure two-way tunnel of communication.
Here are the three main things you learned in this chapter.
Sophos Synchronized Security automates detection, isolation and remediation results which means
attacks can be neutralized quickly.
There are three pillars to the Synchronized Security system; discover, analyze, and respond.
Communication between Sophos Central products is facilitated by the Sophos Security Heartbeat
which creates a secure two-way tunnel of communication.