Sophos Endpoint
Tech Specs
Strongest Protection. Simple Licensing.
Sophos Endpoint powered by Intercept X delivers unparalleled protection against advanced attacks. Benefit from comprehensive detection and response capabilities with an upgrade to Sophos XDR, or free up your staff with Sophos MDR, our 24/7 managed security service.
Sophos Endpoint System Requirements:
Protect your iOS and Android devices with Sophos Mobile. 
Windows Server and Linux devices require a subscription to Intercept X for Server.
|
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
|---|---|---|---|---|
| THREAT SURFACE REDUCTION | ||||
| Web Protection |
|
|||
| Web Control |
|
|||
| Download Reputation |
|
|||
| Application Control |
|
|||
| Peripheral Control |
|
|||
| Data Loss Prevention |
|
|||
| Server Lockdown (application whitelisting) |
|
|||
| Full Disk Encryption |
Add-on |
Add-on |
Add-on |
|
| THREAT PREVENTION | ||||
| Ransomware file protection (CryptoGuard) |
|
|||
|
Remote ransomware protection (CryptoGuard) Watch Video |
|
|||
| Ransomware Master Boot Record (MBR) protection |
|
|||
|
Context-sensitive Defense: Adaptive Attack Protection Watch Video |
|
|||
|
Context-sensitive Defense: Estate-wide Critical Attack Warnings |
|
|||
| Deep Learning AI-powered malware prevention |
|
|||
| Anti-malware file scanning |
|
|||
| Potentially Unwanted App (PUA) blocking |
|
|||
| Live Protection cloud-lookups |
|
|||
| Behavioral Analysis |
|
|||
| Anti-Exploitation (60+ mitigations) |
|
|||
| Application Lockdown |
|
|||
| Anti-malware Scan Interface (AMSI) |
|
|||
| Malicious Traffic Detection |
|
|||
| Intrusion Prevention System (IPS) |
|
|||
| File Integrity Monitoring (Servers) |
|
|||
|
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
|---|---|---|---|---|
| Extensive data on-device and in the cloud |
- |
|||
| Cloud data retention |
- |
90 days |
90 days |
|
| Additional cloud storage available |
- |
1 Year (Add-on) |
1 Year (Add-on) |
|
| Rich on-device data for real-time insights |
- |
|
||
| Compatible with non-Sophos solutions |
- |
|||
| DETECTION | ||||
| Suspicious event detections |
- |
|||
| AI-powered prioritization of detections |
- |
|
||
| Automatic MITRE Framework mapping |
- |
|
||
| Linux container behavioral and exploit detections |
- |
|
||
| Cross-product event correlation and analysis |
- |
|||
| INVESTIGATION | ||||
| RCA threat graphs |
|
|||
| Automatic and manual case creation |
- |
|
||
| Live Discover query tool |
- |
|
||
| Scheduled queries |
- |
|
||
| Simple (SQL-less) search |
- |
|
||
| Forensic data export |
- |
|
||
| On-demand Sophos X-Ops threat intelligence |
- |
|
||
| RESPONSE | ||||
| Automatic malware cleanup |
|
|||
| Automatic ransomware file encryption roll-back |
|
|||
| Automatic process termination |
|
|||
| Synchronized Security: Automatic device isolation via Sophos Firewall |
|
|||
| On-demand device isolation |
- |
|
||
| Live Response remote terminal access |
- |
|
||
|
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
|---|---|---|---|---|
| 24/7 threat monitoring and response |
- |
- |
||
| Weekly and monthly reporting |
- |
- |
||
| Health Check |
- |
- |
||
| Expert-led threat hunting |
- |
- |
||
| Threat containment |
- |
- |
||
| Direct call-in support during active incidents |
- |
- |
||
| Full-scale incident response: threats are fully eliminated |
- |
- |
||
| Root cause analysis |
- |
- |
||
| Dedicated Incident Response Lead |
- |
- |
||
| $1M Breach Protection Warranty |
- |
- |
||
|
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
|---|---|---|---|---|
| Integrated ZTNA agent |
|
|||
| ZTNA access policy and control |
Optional |
Optional |
Optional |
|



