{"id":869,"date":"2024-06-13T08:16:05","date_gmt":"2024-06-13T08:16:05","guid":{"rendered":"https:\/\/uat.vacif.com\/?p=869"},"modified":"2024-12-27T07:52:51","modified_gmt":"2024-12-27T07:52:51","slug":"giai-phap-bao-mat-may-chu-sophos-intercept-x-advanced-for-server-with-xdr-and-mdr","status":"publish","type":"post","link":"https:\/\/vacif.com\/en\/giai-phap-bao-mat-may-chu-sophos-intercept-x-advanced-for-server-with-xdr-and-mdr\/","title":{"rendered":"Gi\u1ea3i ph\u00e1p b\u1ea3o m\u1eadt m\u00e1y ch\u1ee7 Sophos Intercept X Advanced for Server with XDR and MDR"},"content":{"rendered":"\n<p><strong>I. Gi\u1edbi thi\u1ec7u<\/strong><\/p>\n\n\n\n<p><strong>1.1. Gi\u1edbi thi\u1ec7u v\u1ec1 Sophos<\/strong><\/p>\n\n\n\n<p>Ng\u00e0y nay, c\u00e1c doanh nghi\u1ec7p \u0111ang ph\u00e1t tri\u1ec3n theo xu h\u01b0\u1edbng v\u1eadn h\u00e0nh h\u1ec7 th\u1ed1ng d\u1ef1a tr\u00ean c\u00f4ng ngh\u1ec7 v\u00e0 c\u00e1c d\u1ecbch v\u1ee5 cloud \u0111\u1ec3 d\u1ec5 d\u00e0ng tri\u1ec3n khai h\u1ec7 th\u1ed1ng c\u0169ng nh\u01b0 t\u1ed1i \u01b0u h\u00f3a chi ph\u00ed. V\u00ec v\u1eady vi\u1ec7c b\u1ea3o m\u1eadt h\u1ec7 th\u1ed1ng c\u0169ng tr\u1edf n\u00ean ph\u1ee9c t\u1ea1p h\u01a1n v\u00ec hacker c\u00f3 th\u1ec3 t\u1ea5n c\u00f4ng h\u1ec7 th\u1ed1ng t\u1eeb nhi\u1ec1u h\u01b0\u1edbng kh\u00e1c nhau. Vi\u1ec7c trang b\u1ecb nhi\u1ec1u h\u1ec7 th\u1ed1ng \u0111\u1ec3 b\u1ea3o v\u1ec7 doanh nghi\u1ec7p t\u1ea1o ra s\u1ef1 ph\u1ee9c t\u1ea1p trong c\u00f4ng t\u00e1c qu\u1ea3n l\u00fd v\u00e0 chi ph\u00ed v\u1eadn h\u00e0nh.<\/p>\n\n\n\n<p>V\u1edbi c\u00e1ch ti\u1ebfp c\u1eadn nh\u1eb1m gi\u1ea3i quy\u1ebft b\u00e0i to\u00e1n n\u00e0y, c\u00e1c s\u1ea3n ph\u1ea9m c\u1ee7a Sophos \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf theo h\u01b0\u1edbng \u0111\u01a1n gi\u1ea3n cho vi\u1ec7c qu\u1ea3n l\u00fd v\u00e0 c\u00f3 hi\u1ec7u qu\u1ea3 cao trong c\u00f4ng t\u00e1c b\u1ea3o v\u1ec7 an ninh an to\u00e0n th\u00f4ng tin.<\/p>\n\n\n\n<p>Sophos l\u00e0 c\u00f4ng ty chuy\u00ean v\u1ec1 b\u1ea3o m\u1eadt h\u1ec7 th\u1ed1ng ra \u0111\u1eddi t\u1ea1i UK v\u00e0o n\u0103m 1985. Trong 31 n\u0103m, Sophos \u0111\u00e3 \u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn l\u00e0 ng\u01b0\u1eddi \u0111i \u0111\u1ea7u trong b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng an ninh th\u00f4ng tin. C\u00e1c s\u1ea3n ph\u1ea9m c\u1ee7a ch\u00fang t\u00f4i hi\u1ec7n \u0111ang \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi 100 tri\u1ec7u ng\u01b0\u1eddi d\u00f9ng tr\u00ean to\u00e0n c\u1ea7u v\u00e0 h\u01a1n 100.000 doanh nghi\u1ec7p nh\u01b0 Pixar, Under Armor, Northrop Grumman, Xerox, Ford, Avis v\u00e0 Toshiba\u2026<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Th\u00e0nh l\u1eadp n\u0103m 1985 t\u1ea1i Oxford<\/li>\n\n\n\n<li>4,000 nh\u00e2n vi\u00ean to\u00e0n c\u1ea7u<\/li>\n\n\n\n<li>327,000 kh\u00e1ch h\u00e0ng to\u00e0n c\u1ea7u<\/li>\n\n\n\n<li>100 tri\u1ec7u ng\u01b0\u1eddi d\u00f9ng \u1edf 150 n\u01b0\u1edbc tr\u00ean th\u1ebf gi\u1edbi<\/li>\n\n\n\n<li>45,000 \u0111\u1ed1i t\u00e1c ph\u00e2n ph\u1ed1i s\u1ea3n ph\u1ea9m<\/li>\n\n\n\n<li>Ph\u00f2ng nghi\u00ean c\u1ee9u Sophos Labs n\u1ed5i ti\u1ebfng th\u1ebf gi\u1edbi<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-29.png\" alt=\"\" class=\"wp-image-4952\"\/><\/figure>\n<\/div>\n\n\n<p><strong>1.2. Sophos Labs<\/strong><\/p>\n\n\n\n<p>Sophos Labs l\u00e0 m\u1ea1ng l\u01b0\u1edbi k\u1ebft n\u1ed1i to\u00e0n c\u1ea7u c\u1ee7a c\u00e1c chuy\u00ean gia k\u1ef9 thu\u1eadt cao, \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o chuy\u00ean nghi\u1ec7p trong m\u1ea3ng b\u1ea3o m\u1eadt t\u1ea1i Ch\u00e2u \u00c1, Ch\u00e2u \u00c2u v\u00e0 B\u1eafc M\u1ef9. Sophos Labs l\u00e0 s\u1ef1 k\u1ebft h\u1ee3p 500 n\u0103m kinh nghi\u1ec7m b\u1ea3o m\u1eadt c\u1ee7a to\u00e0n th\u1ebf gi\u1edbi tr\u01b0\u1edbc c\u00e1c m\u1ed1i nguy c\u01a1.<\/p>\n\n\n\n<p>\u0110\u1ed9i ph\u00e2n t\u00edch Sophos Labs c\u00f3 nhi\u1ec7m v\u1ee5 nghi\u00ean c\u1ee9u t\u1ea5t c\u1ea3 c\u00e1c m\u1ea3ng li\u00ean quan \u0111\u1ebfn b\u1ea3o m\u1eadt c\u00f4ng ngh\u1ec7 th\u00f4ng tin nh\u01b0 ph\u00e2n t\u00edch m\u00e3 \u0111\u1ed9c, c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt h\u1ec7 th\u1ed1ng, ph\u00f2ng ch\u1ed1ng x\u00e2m nh\u1eadp, th\u01b0 r\u00e1c, \u0111\u1ed9 tin t\u01b0\u1edfng \u1ee9ng d\u1ee5ng, Website ,d\u1eef li\u1ec7u ng\u01b0\u1eddi d\u00f9ng v\u00e0 c\u00e1c thi\u1ebft b\u1ecb ngo\u1ea1i vi\u2026.<\/p>\n\n\n\n<p>C\u00e1c k\u1ebft qu\u1ea3 nghi\u00ean c\u1ee9u c\u1ee7a Sophos Labs \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt ngay \u0111\u1ebfn ng\u01b0\u1eddi d\u00f9ng s\u1ea3n ph\u1ea9m c\u1ee7a Sophos th\u00f4ng qua t\u00ednh n\u0103ng B\u1ea3o v\u1ec7 th\u1eddi gian th\u1ef1c ( Live Active Protection).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-30.png\" alt=\"\" class=\"wp-image-4953\"\/><\/figure>\n<\/div>\n\n\n<p><strong>1.3. D\u1ecbch v\u1ee5 h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt t\u1ea1i Vi\u1ec7t Nam<\/strong><\/p>\n\n\n\n<p>D\u1ecbch v\u1ee5 h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt c\u1ee7a Sophos l\u00e0 24\/7. Kh\u00e1ch h\u00e0ng c\u00f3 th\u1ec3 li\u00ean h\u1ec7 v\u1edbi \u0111\u1ed9i h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt c\u1ee7a Sophos b\u1ea5t k\u1ef3 l\u00fac n\u00e0o \u0111\u1ec3 \u0111\u01b0\u1ee3c h\u1ed7 tr\u1ee3 tr\u1ef1c ti\u1ebfp th\u00f4ng qua \u0111i\u1ec7n tho\u1ea1i ho\u1eb7c email. Sophos c\u00f2n c\u00f3 c\u1ed9ng \u0111\u1ed3ng h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt tr\u00ean Website. Ng\u01b0\u1eddi d\u00f9ng c\u00f3 th\u1ec3 t\u00ecm ki\u1ebfm c\u00e1c th\u00f4ng tin m\u00ecnh c\u1ea7n m\u1ed9t c\u00e1ch nhanh ch\u00f3ng.<\/p>\n\n\n\n<p>C\u00e1c trung t\u00e2m h\u1ed7 tr\u1ee3 k\u1ef9 thu\u1eadt c\u1ee7a Sophos : Australia, Canada, France, Germany, Japan, Italy, Spain, UK v\u00e0 USA.<\/p>\n\n\n\n<p>T\u1ea1i <strong>Vi\u1ec7t Nam<\/strong>, Sophos h\u1ed7 tr\u1ee3 s\u1ed1 hotline mi\u1ec5n ph\u00ed 24\/24 cho kh\u00e1ch h\u00e0ng: <strong>1800400530<\/strong><\/p>\n\n\n\n<p><strong>II. Gi\u1ea3i ph\u00e1p b\u1ea3o v\u1ec7 th\u1ebf h\u1ec7 m\u1edbi cho m\u00e1y tr\u1ea1m<\/strong><\/p>\n\n\n\n<p><strong>2.1. Sophos Intercept X Advanced for Endpoint with EDR<\/strong><\/p>\n\n\n\n<p>Sophos Intercept X Advanced for Endpoint l\u00e0 gi\u1ea3i ph\u00e1p b\u1ea3o v\u1ec7 th\u1ebf h\u1ec7 m\u1edbi d\u00e0nh cho m\u00e1y tr\u1ea1m, gi\u00fap b\u1ea3o v\u1ec7 m\u00e1y tr\u1ea1m kh\u1ecfi c\u00e1c d\u00f2ng virus ch\u01b0a t\u1eebng xu\u1ea5t hi\u1ec7n tr\u00ean th\u1ebf gi\u1edbi, c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng c\u00f3 ch\u1ee7 \u0111\u00edch v\u00e0 virus m\u00e3 h\u00f3a d\u1eef li\u1ec7u. T\u00ednh n\u0103ng EDR (Endpoint Detection &amp; Response) s\u1ebd gi\u00fap ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb d\u1ec5 d\u00e0ng qu\u1ea3n l\u00fd h\u1ec7 th\u1ed1ng v\u1edbi kh\u1ea3 n\u0103ng truy v\u1ebft c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0 ki\u1ec3m tra c\u00e1c s\u1ef1 ki\u1ec7n \u0111\u00e3 v\u00e0 \u0111ang x\u1ea3y ra tr\u00ean c\u00e1c m\u00e1y tr\u1ea1m. Ngo\u00e0i ra Sophos Intercept X Advanced c\u0169ng gi\u00fap doanh nghi\u1ec7p ti\u1ebft ki\u1ec7m v\u1ec1 m\u1eb7t nh\u00e2n s\u1ef1 v\u1edbi kh\u1ea3 n\u0103ng ng\u0103n ch\u1eb7n ph\u00e1t hi\u1ec7n v\u00e0 ng\u0103n ch\u1eb7n c\u00e1c m\u1ed1i \u0111e d\u1ecda th\u00f4ng tin v\u00e0 t\u1ef1 \u0111\u1ed9ng h\u00f3a.<\/p>\n\n\n\n<p>C\u00e1c t\u00ednh n\u0103ng n\u1ed5i b\u1eadt c\u1ee7a s\u1ea3n ph\u1ea9m<\/p>\n\n\n\n<p><strong>2.1.1. B\u1ea3o v\u1ec7 \u0111a n\u1ec1n t\u1ea3ng m\u00e1y tr\u1ea1m<\/strong><\/p>\n\n\n\n<p>H\u1ed7 tr\u1ee3 c\u1ea3 Windows v\u00e0 MacOS<\/p>\n\n\n\n<p><strong>2.1.2. T\u00ednh n\u0103ng b\u1ea3o m\u1eadt th\u1ebf h\u1ec7 m\u1edbi<\/strong><\/p>\n\n\n\n<p><strong>Deep Learning: Ng\u0103n ch\u1eb7n c\u00e1c m\u1ed1i nguy ch\u01b0a \u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn b\u1eb1ng AI<\/strong><\/p>\n\n\n\n<p>Deep Learning l\u00e0 c\u00f4ng ngh\u1ec7 tr\u00ed tu\u1ec7 nh\u00e2n t\u1ea1o \u0111\u01b0\u1ee3c hu\u1ea5n luy\u1ec7n ra b\u1edfi Sophos Lab, b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng h\u00e0ng tr\u0103m tri\u1ec7u m\u1eabu virus \u0111\u1ec3 \u0111\u00e0o t\u1ea1o. Sophos Deep Learning c\u00f3 th\u1ec3 nh\u1eadn d\u1ea1ng m\u1ed9t c\u00e1ch ch\u00ednh x\u00e1c c\u00e1c m\u1eabu virus m\u1edbi v\u00e0 c\u00e1c file h\u1ee3p l\u1ec7 m\u00e0 kh\u00f4ng d\u1ef1a v\u00e0o database virus nh\u01b0 c\u00e1c s\u1ea3n ph\u1ea9m antivirus kh\u00e1c.<\/p>\n\n\n\n<p>\u01afu \u0111i\u1ec3m c\u1ee7a Deep Learning<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hi\u1ec7u su\u1ea5t cao<\/strong>: \u0110\u00e1nh gi\u00e1 c\u00e1c m\u1eabu file trong th\u1eddi gian b\u00e9 h\u01a1n 20 mili gi\u00e2y<\/li>\n\n\n\n<li><strong>T\u1ed1c \u0111\u1ed9 cao<\/strong>: M\u1eabu h\u1ecdc ch\u1ec9 c\u00f3 dung l\u01b0\u1ee3ng &lt; 20MB kh\u00f4ng chi\u1ebfm t\u00e0i nguy\u00ean m\u00e1y tr\u1ea1m<\/li>\n\n\n\n<li><strong>Kh\u00f4ng d\u1ef1a v\u00e0o database<\/strong>: C\u00f4ng ngh\u1ec7 ph\u1ecfng \u0111o\u00e1n kh\u00f4ng d\u1ef1a v\u00e0o database, kh\u00f4ng c\u1ea7n internet \u0111\u1ec3 ho\u1ea1t \u0111\u1ed9ng.<\/li>\n<\/ul>\n\n\n\n<p><strong>Exploit Prevention: B\u1ea3o v\u1ec7 c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt ch\u01b0a \u0111\u01b0\u1ee3c v\u00e1 tr\u00ean m\u00e1y tr\u1ea1m<\/strong><\/p>\n\n\n\n<p>Sophos Exploit Prevention ng\u0103n ch\u1eb7n hacker khai th\u00e1c v\u00e0o c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt ch\u01b0a \u0111\u01b0\u1ee3c v\u00e1 tr\u00ean m\u00e1y tr\u1ea1m. B\u1eb1ng c\u00e1c ng\u0103n ch\u1eb7n c\u00e1c k\u1ef9 thu\u1eadt khai th\u00e1c, n\u00ean Anti-exploit c\u00f3 th\u1ec3 ng\u0103n ch\u1eb7n to\u00e0n b\u1ed9 c\u00e1c d\u00f2ng virus ho\u1eb7c cu\u1ed9c t\u1ea5n c\u00f4ng s\u1eed d\u1ee5ng c\u00e1c k\u1ef9 thu\u1eadt n\u00e0y, bao g\u1ed3m c\u1ea3 c\u00e1c d\u00f2ng virus ch\u01b0a t\u1eebng xu\u1ea5t hi\u1ec7n tr\u01b0\u1edbc \u0111\u00e2y.<\/p>\n\n\n\n<p>Sophos Anti-exploit hi\u1ec7n h\u1ed7 tr\u1ee3 ng\u0103n ch\u1eb7n h\u01a1n 26 k\u1ef9 thu\u1eadt khai th\u00e1c. Nhi\u1ec1u nh\u1ea5t khi so s\u00e1nh v\u1edbi c\u00e1c gi\u1ea3i ph\u00e1p kh\u00e1c.<\/p>\n\n\n\n<p><strong>CryptoGuard: Ng\u0103n ng\u1eeba virus m\u00e3 h\u00f3a d\u1eef li\u1ec7u v\u00e0 kh\u00f4i ph\u1ee5c d\u1eef li\u1ec7u b\u1ecb m\u00e3 h\u00f3a<\/strong><\/p>\n\n\n\n<p>Virus m\u00e3 h\u00f3a hi\u1ec7n v\u1eabn l\u00e0 v\u1ea5n \u0111\u1ec1 kh\u00f3 gi\u1ea3i quy\u1ebft do ng\u00e0y c\u00e0ng nhi\u1ec1u c\u00e1c virus m\u00e3 h\u00f3a \u0111\u01b0\u1ee3c t\u1ea1o ra, V\u1edbi t\u00ednh n\u0103ng CryptoGuard n\u00f3 s\u1ebd theo d\u00f5i c\u00e1c t\u1ec7p d\u1eef li\u1ec7u v\u00e0 n\u1ebfu ph\u00e1t hi\u1ec7n c\u00e1c ti\u1ebfn tr\u00ecnh m\u00e3 h\u00f3a c\u00e1c t\u1ec7p tin n\u00f3 s\u1ebd ti\u1ebfn h\u00e0nh ki\u1ec3m tra xem c\u00e1c ti\u1ebfn tr\u00ecnh n\u00e0y c\u00f3 h\u1ee3p l\u1ec7 kh\u00f4ng n\u1ebfu kh\u00f4ng th\u00ec s\u1ebd ti\u1ebfn h\u00e0nh ng\u0103n ch\u1eb7n v\u00e0 ch\u1ea5m d\u1ee9t c\u00e1c ti\u1ebfn tr\u00ecnh n\u00e0y. \u0110\u1ed3ng th\u1eddi c\u00e1c t\u1ec7p tin b\u1ecb m\u00e3 h\u00f3a c\u0169ng s\u1ebd \u0111\u01b0\u1ee3c kh\u00f4i ph\u1ee5c tr\u1edf l\u1ea1i.<\/p>\n\n\n\n<p><strong>2.1.3. T\u00edch h\u1ee3p t\u00ednh n\u0103ng Endpoint Detection &amp; Response (EDR)<\/strong><\/p>\n\n\n\n<p>EDR l\u00e0 xu h\u01b0\u1edbng b\u1eaft bu\u1ed9c ph\u1ea3i c\u00f3 trong c\u00e1c gi\u1ea3i ph\u00e1p b\u1ea3o v\u1ec7 m\u00e1y tr\u1ea1m. Gi\u1ea3i ph\u00e1p EDR c\u1ee7a Sophos l\u00e0 s\u1ef1 k\u1ebft h\u1ee3p gi\u1eefa c\u00f4ng ngh\u1ec7 m\u00e1y h\u1ecdc v\u00e0 con ng\u01b0\u1eddi, l\u00e0 nh\u1eefng chuy\u00ean gia trong l\u0129nh v\u1ef1c security, s\u1ebd gi\u00fap ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb c\u00f3 t\u1ea7m nh\u00ecn v\u1ec1 t\u1ea5t c\u1ea3 nh\u1eefng s\u1ef1 ki\u1ec7n x\u1ea3y ra tr\u00ean m\u00e1y tr\u1ea1m, \u0111\u1ec3 t\u1eeb \u0111\u00f3 d\u1ec5 d\u00e0ng ph\u00e2n t\u00edch, truy v\u1ebft v\u00e0 \u0111i\u1ec1u tra v\u1ec1 c\u00e1c s\u1ef1 c\u1ed1 an to\u00e0n th\u00f4ng tin tr\u00ean m\u00e1y tr\u1ea1m. Sophos Intercept X t\u00edch h\u1ee3p t\u00ednh n\u0103ng EDR v\u00e0 ch\u1ec9 s\u1eed d\u1ee5ng 1 agent, gi\u00fap \u0111\u01a1n gi\u1ea3n trong vi\u1ec7c tri\u1ec3n khai v\u00e0 qu\u1ea3n l\u00fd h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p>C\u00e1c t\u00ednh n\u0103ng n\u1ed5i b\u1eadt c\u1ee7a Sophos EDR<\/p>\n\n\n\n<p>Trung t\u00e2m ph\u00e2n t\u00edch m\u1ed1i \u0111e do\u1ea1<\/p>\n\n\n\n<p>Trung t\u00e2m ph\u00e2n t\u00edch m\u1ed1i \u0111e d\u1ecda trong giao di\u1ec7n qu\u1ea3n tr\u1ecb s\u1ebd th\u1ed1ng k\u00ea t\u1ea5t c\u1ea3 c\u00e1c m\u1ed1i nguy tr\u00ean m\u00e1y tr\u1ea1m v\u00e0 m\u00e1y tr\u1ea1m trong to\u00e0n h\u1ec7 th\u1ed1ng. Gi\u00fap d\u1ec5 d\u00e0ng ph\u00e2n lo\u1ea1i v\u00e0 \u0111\u00e1nh gi\u00e1 r\u1ee7i ro t\u1eeb c\u00e1c m\u1ed1i nguy t\u1eeb \u0111\u00f3 \u0111\u01b0a ra h\u00e0nh \u0111\u1ed9ng x\u1eed l\u00fd ph\u00f9 h\u1ee3p.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-31.png\" alt=\"\" class=\"wp-image-4958\"\/><\/figure>\n<\/div>\n\n\n<p>\u0110\u00e1nh gi\u00e1 ch\u1ec9 s\u1ed1 m\u1ed1i nguy<\/p>\n\n\n\n<p>T\u00ednh n\u0103ng \u0111\u00e1nh gi\u00e1 ch\u1ec9 s\u1ed1 m\u1ed1i nguy c\u1ee7a Sophos Intercept X with EDR s\u1ebd t\u1ef1 \u0111\u1ed9ng ph\u00e2n t\u00edch c\u00e1c m\u1ed1i nguy v\u00e0 \u0111\u00e1nh gi\u00e1 nguy c\u01a1 theo c\u00e1c thang \u0111i\u1ec3m v\u00e0 t\u1ea1o th\u00e0nh m\u1ed9t danh s\u00e1ch. Qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng nh\u00ecn v\u00e0o danh s\u00e1ch n\u00e0y v\u00e0 bi\u1ebft \u0111\u01b0\u1ee3c \u1ea3nh h\u01b0\u1edfng c\u1ee7a t\u1eebng m\u1ed1i nguy \u0111\u1ebfn h\u1ec7 th\u1ed1ng v\u00e0 n\u00ean \u01b0u ti\u00ean x\u1eed l\u00fd m\u1ed1i nguy n\u00e0o tr\u01b0\u1edbc.<\/p>\n\n\n\n<p>Qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng truy c\u1eadp v\u00e0o t\u00ednh n\u0103ng n\u00e0y theo \u0111\u01b0\u1eddng d\u1eabn: Sophos Central Admin &gt; Threat Analysis Center &gt; Threat Indicators.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-32.png\" alt=\"\" class=\"wp-image-4961\"\/><\/figure>\n<\/div>\n\n\n<p>Ph\u00e1t hi\u1ec7n c\u00e1c \u0111e do\u1ea1 n\u00e2ng cao v\u00e0 t\u00ecm nguy\u00ean nh\u00e2n g\u1ed1c r\u1ec5<\/p>\n\n\n\n<p>Khi ph\u00e1t hi\u1ec7n m\u1ed9t s\u1ef1 c\u1ed1. Sophos EDR s\u1ebd nhanh ch\u00f3ng t\u1ea1o m\u1ed9t h\u1ed3 s\u01a1 chi ti\u1ebft v\u1ec1 virus \u0111\u1ed3ng th\u1eddi cung c\u1ea5p cho qu\u1ea3n tr\u1ecb vi\u00ean th\u00f4ng tin v\u1ec1 nguy\u00ean nh\u00e2n g\u1ed1c r\u1ec5 c\u1ee7a v\u1ea5n \u0111\u1ec1.<\/p>\n\n\n\n<p>Giao di\u1ec7n b\u00e1o c\u00e1o nguy\u00ean nh\u00e2n g\u1ed1c r\u1ec5<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-33-1024x336.png\" alt=\"\" class=\"wp-image-4962\"\/><\/figure>\n<\/div>\n\n\n<p>Th\u00f4ng tin chi ti\u1ebft v\u1ec1 lo\u1ea1i virus<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-34.png\" alt=\"\" class=\"wp-image-4963\"\/><\/figure>\n<\/div>\n\n\n<p>S\u01a1 \u0111\u1ed3 di chuy\u1ec3n c\u1ee7a Virus<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-36.png\" alt=\"\" class=\"wp-image-4965\"\/><\/figure>\n<\/div>\n\n\n<p>Ch\u1ee7 \u0111\u1ed9ng \u0111\u00e1nh gi\u00e1 c\u00e1c m\u1eabu virus m\u1edbi b\u1eb1ng Deep Learning<\/p>\n\n\n\n<p>Khi ph\u00e1t hi\u1ec7n m\u1eabu virus m\u1edbi, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng g\u1eedi m\u1eabu n\u00e0y l\u00ean h\u1ec7 th\u1ed1ng sandbox \u0111\u1ec3 \u0111\u00e1nh gi\u00e1 ch\u1ec9 b\u1eb1ng 1 c\u00fa click chu\u1ed9t m\u00e0 kh\u00f4ng c\u1ea7n ph\u1ea3i li\u00ean h\u1ec7 h\u00e3ng \u0111\u1ec3 h\u1ed7 tr\u1ee3. Gi\u1ea3m th\u1eddi gian ph\u00e2n t\u00edch t\u1eeb 1 tu\u1ea7n xu\u1ed1ng c\u00f2n 10 ph\u00fat.<\/p>\n\n\n\n<p>Ph\u00e2n t\u00edch b\u1eb1ng Machine Learning v\u00e0 g\u1eedi m\u1eabu \u0111\u00e1nh gi\u00e1 cho chuy\u00ean gia ngay giao di\u1ec7n qu\u1ea3n tr\u1ecb<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-37.png\" alt=\"\" class=\"wp-image-4970\"\/><\/figure>\n<\/div>\n\n\n<p>T\u00ecm ki\u1ebfm m\u1ecdi th\u1ee9 tr\u00ean h\u1ec7 th\u1ed1ng v\u1edbi t\u00ednh n\u0103ng Live Discover<\/p>\n\n\n\n<p>Live Discover cho ph\u00e9p qu\u1ea3n tr\u1ecb vi\u00ean t\u00ecm ki\u1ebfm th\u00f4ng tin tr\u00ean m\u00e1y tr\u1ea1m th\u00f4ng qua SQL Query. Khi c\u00f3 m\u1ed9t y\u00eau c\u1ea7u ki\u1ec3m tra th\u00f4ng tin tr\u00ean m\u00e1y tr\u1ea1m, v\u00ed d\u1ee5: Ki\u1ec3m tra c\u00e1c b\u1ea3n patch c\u1eadp nh\u1eadt, c\u00e1c c\u1ed5ng \u0111ang m\u1edf tr\u00ean m\u00e1y tr\u1ea1m, s\u1ed1 l\u1ea7n \u0111\u0103ng nh\u1eadp trong ng\u00e0y\u2026 qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng truy v\u1ea5n th\u00f4ng qua c\u00e1c t\u1eadp l\u1ec7nh c\u00f3 s\u1eb5n ho\u1eb7c t\u1ef1 vi\u1ebft ra m\u1ed9t t\u1eadp l\u1ec7nh theo nhu c\u1ea7u c\u1ee7a m\u00ecnh.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-38.png\" alt=\"\" class=\"wp-image-4978\"\/><\/figure>\n<\/div>\n\n\n<p>Ph\u1ea3n h\u1ed3i ngay l\u1eadp t\u1ee9c v\u1edbi t\u00ednh n\u0103ng Live Response<\/p>\n\n\n\n<p>Live Response cho ph\u00e9p qu\u1ea3n tr\u1ecb vi\u00ean k\u1ebft n\u1ed1i t\u1eeb xa v\u1edbi c\u00e1c thi\u1ebft b\u1ecb th\u00f4ng qua giao di\u1ec7n command line ngay tr\u00ean trang qu\u1ea3n tr\u1ecb Sophos Central. Trong tr\u01b0\u1eddng h\u1ee3p m\u00e1y tr\u1ea1m x\u1ea3y ra s\u1ef1 c\u1ed1, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 kh\u00e1c ph\u1ee5c ngay l\u1eadp t\u1ee9c d\u00f9 \u0111ang \u1edf nh\u00e0 hay b\u00ean ngo\u00e0i.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-39.png\" alt=\"\" class=\"wp-image-4979\"\/><\/figure>\n<\/div>\n\n\n<p>S\u1eed d\u1ee5ng Live Response, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kh\u1edfi \u0111\u1ed9ng l\u1ea1i thi\u1ebft b\u1ecb<\/li>\n\n\n\n<li>Xem danh s\u00e1ch c\u00e1c ti\u1ebfn tr\u00ecnh \u0111ang ch\u1ea1y, v\u00e0 ng\u0103n ch\u1eb7n c\u00e1c ti\u1ebfn tr\u00ecnh \u0111\u00e1ng nghi<\/li>\n\n\n\n<li>C\u00e0i \u0111\u1eb7t v\u00e0 x\u00f3a c\u00e1c \u1ee9ng d\u1ee5ng, t\u1ea1o ng\u01b0\u1eddi d\u00f9ng m\u1edbi, t\u00f9y ch\u1ec9nh th\u00f4ng s\u1ed1 h\u1ec7 th\u1ed1ng<\/li>\n\n\n\n<li>Ki\u1ec3m tra Log tr\u00ean m\u00e1y tr\u1ea1m<\/li>\n<\/ul>\n\n\n\n<p><strong>2.2. Sophos Intercept X Advanced for Endpoint with MTR<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-40.png\" alt=\"\" class=\"wp-image-4984\"\/><\/figure>\n<\/div>\n\n\n<p>Sophos Managed Threat Response (MTR) l\u00e0 m\u1ed9t d\u1ecbch v\u1ee5 gi\u00e1m s\u00e1t h\u1ec7 th\u1ed1ng c\u1ee7a Sophos. V\u1edbi \u0111\u1ed9i ng\u0169 chuy\u00ean gia b\u1ea3o m\u1eadt h\u00e0ng \u0111\u1ea7u, Sophos MTR cung c\u1ea5p d\u1ecbch v\u1ee5 gi\u00e1m s\u00e1t, s\u0103n l\u00f9ng, ph\u00e1t hi\u1ec7n v\u00e0 ph\u1ea3n h\u1ed3i c\u00e1c m\u1ed1i \u0111e d\u1ecda 24\/7 cho kh\u00e1ch h\u00e0ng.<\/p>\n\n\n\n<p><strong>2.2.1. D\u1ecbch v\u1ee5 gi\u00e1m s\u00e1t \u0111i k\u00e8m &#8220;H\u00e0nh \u0111\u1ed9ng&#8221;<\/strong><\/p>\n\n\n\n<p>\u01afu \u0111i\u1ec3m c\u1ee7a gi\u1ea3i ph\u00e1p Sophos MTR ch\u00ednh l\u00e0 \u1edf kh\u1ea3 n\u0103ng \u201cph\u1ea3n h\u1ed3i\u201d. So v\u1edbi c\u00e1c d\u1ecbch v\u1ee5 kh\u00e1c ch\u1ec9 cung c\u1ea5p kh\u1ea3 n\u0103ng c\u1ea3nh b\u00e1o cho kh\u00e1ch h\u00e0ng. Sophos MTR c\u00f3 nhi\u1ec1u c\u00e1ch l\u00e0m vi\u1ec7c \u0111\u1ec3 gi\u00fap kh\u00e1ch h\u00e0ng ch\u1ee7 \u0111\u1ed9ng h\u01a1n trong vi\u1ec7c ph\u1ea3n \u1ee9ng v\u1edbi c\u00e1c s\u1ef1 c\u1ed1.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Notify<\/strong>: Sophos MTR s\u1ebd th\u00f4ng b\u00e1o c\u00e1c m\u1ed1i nguy cho ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb<\/li>\n\n\n\n<li><strong>Collaborate<\/strong>: Sophos MTR s\u1ebd ph\u1ed1i h\u1ee3p v\u1edbi \u0111\u1ed1i t\u00e1c tin t\u01b0\u1edfng c\u1ee7a kh\u00e1ch h\u00e0ng \u0111\u1ec3 x\u1eed l\u00fd s\u1ef1 c\u1ed1<\/li>\n\n\n\n<li><strong>Authorize<\/strong>: Sophos MTR s\u1ebd t\u1ef1 x\u1eed l\u00fd c\u00e1c m\u1ed1i nguy trong quy\u1ec1n h\u1ea1n v\u00e0 b\u00e1o c\u00e1o chi ti\u1ebft \u0111\u1ebfn ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb.<\/li>\n<\/ul>\n\n\n\n<p><strong>2.2.2. C\u00e1c t\u00ednh n\u0103ng n\u1ed5i b\u1eadt c\u1ee7a Sophos MTR<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ch\u1ee7 \u0111\u1ed9ng ph\u1ea3n h\u1ed3i c\u00e1c nguy c\u01a1<\/li>\n\n\n\n<li>Truy t\u00ecm c\u00e1c m\u1ed1i nguy 24\/7<\/li>\n\n\n\n<li>Ph\u00e1t hi\u1ec7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ch\u1ee7 \u0111\u00edch ATP<\/li>\n\n\n\n<li>Ki\u1ec3m tra b\u1ea3o m\u1eadt to\u00e0n h\u1ec7 th\u1ed1ng<\/li>\n\n\n\n<li>Ch\u1ee7 \u0111\u1ed9ng b\u00e1o c\u00e1o<\/li>\n\n\n\n<li>Truy t\u00ecm c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng fileless<\/li>\n\n\n\n<li>C\u00f3 \u0111\u1ed9i ph\u1ea3n \u1ee9ng v\u1edbi s\u1ef1 c\u1ed1 ri\u00eang bi\u1ec7t<\/li>\n\n\n\n<li>H\u1ed7 tr\u1ee3 s\u1ed1 \u0111i\u1ec7n tho\u1ea1i g\u1ecdi tr\u1ef1c ti\u1ebfp \u0111\u1ebfn \u0111\u1ed9i h\u1ed7 tr\u1ee3<\/li>\n\n\n\n<li>\u0110\u00e1nh gi\u00e1 h\u1ec7 th\u1ed1ng \u0111\u1ecbnh k\u1ef3<\/li>\n\n\n\n<li>D\u00f2 qu\u00e9t to\u00e0n b\u1ed9 thi\u1ebft b\u1ecb b\u1ea3o m\u1eadt h\u1ec7 th\u1ed1ng<\/li>\n\n\n\n<li>N\u00e2ng cao kh\u1ea3 n\u0103ng do l\u01b0\u1eddng b\u1ea3o m\u1eadt cho h\u1ec7 th\u1ed1ng<\/li>\n<\/ul>\n\n\n\n<p><strong>2.2.3. Kh\u1ea3 n\u0103ng tri\u1ec3n khai nhanh ch\u00f3ng<\/strong><\/p>\n\n\n\n<p>D\u1ecbch v\u1ee5 MTR s\u1eed d\u1ee5ng Sophos Intercept X Advanced with EDR l\u00e0m agent. Ch\u00ednh v\u00ec v\u1eady kh\u00e1ch h\u00e0ng s\u1ebd d\u1ec5 d\u00e0ng tri\u1ec3n khai d\u1ecbch v\u1ee5 ngay trong ng\u00e0y m\u00e0 kh\u00f4ng c\u1ea7n c\u00e0i th\u00eam b\u1ea5t k\u00ec ph\u1ea7n m\u1ec1m n\u00e0o l\u00ean m\u00e1y tr\u1ea1m.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-41.png\" alt=\"\" class=\"wp-image-4985\"\/><\/figure>\n<\/div>\n\n\n<p><strong>2.3. C\u00e1c g\u00f3i s\u1ea3n ph\u1ea9m c\u00e1ch t\u00ednh b\u1ea3n quy\u1ec1n cho m\u00e1y tr\u1ea1m<\/strong><\/p>\n\n\n\n<p><strong>2.3.1. T\u1ed5ng h\u1ee3p c\u00e1c g\u00f3i license d\u00e0nh cho m\u00e1y tr\u1ea1m<\/strong><\/p>\n\n\n\n<p>B\u1ea3n quy\u1ec1n cho Endpoint \u0111\u01b0\u1ee3c t\u00ednh theo thi\u1ebft b\u1ecb. M\u1ed7i user t\u00ednh 1 b\u1ea3n quy\u1ec1n<\/p>\n\n\n\n<p>Th\u00f4ng tin c\u00e1c phi\u00ean b\u1ea3n d\u00e0nh cho Endpoint v\u00e0 t\u00ednh n\u0103ng<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-44.png\" alt=\"\" class=\"wp-image-4988\"\/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-45.png\" alt=\"\" class=\"wp-image-4989\"\/><\/figure>\n<\/div>\n\n\n<p><strong>2.3.2. Chi ti\u1ebft t\u00ednh n\u0103ng g\u00f3i MTR Standard v\u00e0 MTR Advanced<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-47.png\" alt=\"\" class=\"wp-image-4991\"\/><\/figure>\n<\/div>\n\n\n<p><strong>2.3.3. D\u00f9ng th\u1eed s\u1ea3n ph\u1ea9m<\/strong><\/p>\n\n\n\n<p>Link \u0111\u0103ng k\u00fd d\u00f9ng th\u1eed s\u1ea3n ph\u1ea9m 30 ng\u00e0y full t\u00ednh n\u0103ng: <a href=\"https:\/\/secure2.sophos.com\/en-us\/products\/endpoint-antivirus\/free-trial.aspx\">https:\/\/secure2.sophos.com\/en-us\/products\/endpoint-antivirus\/free-trial.aspx<\/a><\/p>\n\n\n\n<p><strong>III. Chi ti\u1ebft c\u00e1c t\u00ednh n\u0103ng k\u1ef9 thu\u1eadt c\u1ee7a gi\u1ea3i ph\u00e1p<\/strong><\/p>\n\n\n\n<p><strong>3.1. T\u00ednh n\u0103ng k\u1ef9 thu\u1eadt c\u1ee7a s\u1ea3n ph\u1ea9m Sophos Intercept X Advanced for Endpoint<\/strong><\/p>\n\n\n\n<p><strong>3.1.1. Threat Protection &#8211; B\u1ea3o v\u1ec7 tr\u01b0\u1edbc c\u00e1c m\u1ed1i nguy<\/strong><\/p>\n\n\n\n<p>L\u00e0 m\u1ed9t th\u00e0nh ph\u1ea7n quan tr\u1ecdng c\u1ee7a Sophos Endpoint. T\u00ednh n\u0103ng Threat Protection \u0111\u1ea3m b\u1ea3o r\u1eb1ng c\u00e1c m\u00e1y c\u00f3 c\u00e0i \u0111\u1eb7t Sophos Agents \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 kh\u1ecfi c\u00e1c m\u1ed1i \u0111e d\u1ecda t\u1eeb Internet v\u00e0 trong m\u1ea1ng n\u1ed9i b\u1ed9.<\/p>\n\n\n\n<p>T\u00ednh n\u0103ng Threat Protection gi\u00fap b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i virus, ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p, trojan, rootkit v\u00e0 s\u00e2u tr\u00ean m\u00e1y tr\u1ea1m, m\u00e1y tr\u1ea1m v\u00e0 m\u00e1y t\u00ednh x\u00e1ch tay. Ngo\u00e0i ra Threat Protection c\u00f2n qu\u00e9t c\u00e1c t\u1eadp tin th\u1ef1c thi, c\u0169ng nh\u01b0 c\u00e1c t\u00e0i li\u1ec7u c\u00f3 ch\u1ee9a c\u00e1c script ho\u1eb7c marco \u0111\u1ed9c h\u1ea1i, b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i c\u00e1c khai th\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt trong c\u00e1c h\u1ec7 th\u1ed1ng ho\u1eb7c ph\u1ea7n m\u1ec1m.<\/p>\n\n\n\n<p>T\u00ednh n\u0103ng qu\u00e9t virus c\u00f3 th\u1ec3 c\u1ea5u h\u00ecnh \u0111\u1ec3 ch\u1ea1y t\u1ef1 \u0111\u1ed9ng ho\u1eb7c th\u1ee7 c\u00f4ng theo y\u00eau c\u1ea7u ng\u01b0\u1eddi d\u00f9ng \u0111\u1ec3 qu\u00e9t c\u00e1c th\u01b0 m\u1ee5c \u0111\u01b0\u1ee3c ch\u1ec9 \u0111\u1ecbnh.<\/p>\n\n\n\n<p><strong>Live Protection.<\/strong><\/p>\n\n\n\n<p>Khi ph\u00e1t hi\u1ec7n c\u00e1c m\u1ed1i nguy kh\u00f4ng c\u00f3 trong c\u01a1 s\u1edf d\u1eef li\u1ec7u. Sophos Antivirus nhanh ch\u00f3ng ng\u0103n ch\u1eb7n c\u00e1c m\u1ed1i \u0111e d\u1ecda n\u00e0y b\u1eb1ng c\u00e1ch ki\u1ec3m tra ngay l\u1eadp t\u1ee9c th\u00f4ng tin c\u00e1c t\u1eadp tin \u0111\u00e1ng ng\u1edd d\u1ef1a tr\u00ean c\u01a1 s\u1edf d\u1eef li\u1ec7u r\u1ed9ng l\u1edbn v\u1ec1 Virus Sophos cloud \u2013 th\u1eddi gian ph\u1ea3n h\u1ed3i ch\u1ec9 trong v\u00e0i gi\u00e2y \u0111\u1ec3 \u0111\u00e1nh gi\u00e1 t\u1eadp tin tin c\u00f3 ph\u1ea3i l\u00e0 virus hay kh\u00f4ng, gi\u00fap gi\u1ea3m nhu c\u1ea7u c\u1eadp nh\u1eadt c\u01a1 s\u1edf d\u1eef li\u1ec7u tr\u00ean m\u00e1y tr\u1ea1m.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-48.png\" alt=\"\" class=\"wp-image-4992\"\/><\/figure>\n<\/div>\n\n\n<p><strong>Real-time Scanning \u2013 Local Files v\u00e0 Networks Shares<\/strong><\/p>\n\n\n\n<p>Qu\u00e9t th\u1eddi gian th\u1ef1c s\u1ebd ki\u1ec3m tra c\u00e1c t\u1eadp tin t\u1ea1i th\u1eddi \u0111i\u1ec3m ng\u01b0\u1eddi d\u00f9ng c\u1ed1 g\u1eafng truy c\u1eadp ch\u00fang. N\u1ebfu c\u00e1c t\u1eadp tin an to\u00e0n, truy c\u1eadp s\u1ebd \u0111\u01b0\u1ee3c cho ph\u00e9p. V\u00e0 n\u1ebfu t\u1eadp tin ch\u1ee9a m\u00e3 \u0111\u1ed9c, truy c\u1eadp s\u1ebd b\u1ecb ng\u0103n ch\u1eb7n. B\u1ea1n c\u00f3 th\u1ec3 ch\u1ecdn c\u00e1c t\u00f9y ch\u1ecdn n\u00e0y \u0111\u1ec3 th\u1ef1c hi\u1ec7n gi\u00e1m s\u00e1t c\u1ee5c b\u1ed9 c\u00e1c t\u1eadp tin v\u00e0 th\u01b0 m\u1ee5c chia s\u1ebb t\u1eadp tin.<\/p>\n\n\n\n<p><strong>Real-time Scanning &#8211; Internet<\/strong><\/p>\n\n\n\n<p>M\u1ed9t th\u1ef1c t\u1ebf ai c\u0169ng nh\u1eadn th\u1ea5y \u0111\u00f3 l\u00e0 web \u0111\u00e3 tr\u1edf th\u00e0nh ngu\u1ed3n l\u00e2y nhi\u1ec5m ch\u00ednh cho ng\u01b0\u1eddi d\u00f9ng. Khi ng\u01b0\u1eddi d\u00f9ng v\u00f4 t\u00ecnh truy c\u1eadp c\u00e1c trang web c\u00f3 h\u1ea1i ho\u1eb7c t\u1ea3i xu\u1ed1ng c\u00e1c t\u1eadp tin \u0111\u1ed9c h\u1ea1i.<\/p>\n\n\n\n<p>SophosLabs h\u1ee3p t\u00e1c v\u1edbi nhi\u1ec1u c\u00f4ng ty, bao g\u1ed3m c\u00e1c c\u00f4ng c\u1ee5 t\u00ecm ki\u1ebfm v\u00e0 \u0111\u00e3 ph\u00e2n lo\u1ea1i c\u00e1c trang web trong nhi\u1ec1u n\u0103m theo m\u1ee9c \u0111\u1ed9 r\u1ee7i ro. C\u00f3 th\u1ec3 ph\u00e1t hi\u1ec7n v\u00e0 b\u1ea3o v\u1ec7 cho ng\u01b0\u1eddi d\u00f9ng khi h\u1ecd truy c\u1eadp Web.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SophosLabs li\u00ean t\u1ee5c c\u1eadp nh\u1eadt v\u1edbi 20.000 \u0111\u1ebfn 40.000 trang web m\u1edbi \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh m\u1ed7i ng\u00e0y.<\/li>\n\n\n\n<li>Ng\u01b0\u1eddi d\u00f9ng \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 kh\u1ecfi c\u00e1c m\u1ed1i \u0111e d\u1ecda n\u00e0y cho d\u00f9 h\u1ecd l\u00e0m vi\u1ec7c trong c\u00f4ng ty hay b\u00ean ngo\u00e0i m\u1ea1ng c\u1ee7a c\u00f4ng ty &#8211; t\u1ea1i nh\u00e0 ho\u1eb7c th\u00f4ng qua WIFI c\u00f4ng c\u1ed9ng.<\/li>\n\n\n\n<li>H\u1ed7 tr\u1ee3 t\u1ea5t c\u1ea3 c\u00e1c tr\u00ecnh duy\u1ec7t th\u00f4ng d\u1ee5ng (Internet Explorer, Firefox, Safari, Opera, Chrome, v.v.).<\/li>\n<\/ul>\n\n\n\n<p><strong>3.1.2. Tamper Protection &#8211; Password h\u1ec7 th\u1ed1ng<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng \u0111\u1eb7t password cho \u1ee9ng d\u1ee5ng. Gi\u00fap ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb d\u1ec5 d\u00e0ng \u00e1p \u0111\u1eb7t c\u00e1c ch\u00ednh s\u00e1ch b\u1ea3o m\u1eadt c\u1ee7a c\u00f4ng ty v\u00e0 lo\u1ea1i tr\u1eeb c\u00e1c t\u00ecnh hu\u1ed1ng ng\u01b0\u1eddi d\u00f9ng c\u1ed1 t\u00ecnh t\u1eaft t\u00ednh n\u0103ng b\u1ea3o v\u1ec7 c\u1ee7a Sophos Endpoint.<\/p>\n\n\n\n<p>C\u00e1c h\u00e0nh \u0111\u1ed9ng sau c\u00f3 th\u1ec3 b\u1ecb ch\u1eb7n b\u1edfi t\u00ednh n\u0103ng Tamper Protection<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>D\u1eebng c\u00e1c d\u1ecbch v\u1ee5 \u0111ang ch\u1ea1y c\u1ee7a Sophos t\u1eeb giao di\u1ec7n Windows Service<\/li>\n\n\n\n<li>D\u1eebng c\u00e1c d\u1ecbch v\u1ee5 \u0111ang ch\u1ea1y c\u1ee7a Sophos t\u1eeb Task Manager<\/li>\n\n\n\n<li>G\u1ee1 ph\u1ea7n m\u1ec1m di\u1ec7t Virus Sophos Endpoint<\/li>\n\n\n\n<li>T\u1eaft ph\u1ea7n m\u1ec1m di\u1ec7t Virus Sophos Endpoint<\/li>\n\n\n\n<li>X\u00f3a ho\u1eb7c s\u1eeda \u0111\u1ed5i c\u00e1c t\u1eadp tin ho\u1eb7c th\u01b0 m\u1ee5c c\u00e0i \u0111\u1eb7t<\/li>\n\n\n\n<li>X\u00f3a ho\u1eb7c s\u1eeda \u0111\u1ed5i c\u00e1c kh\u00f3a registry<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-49.png\" alt=\"\" class=\"wp-image-4993\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.1.3. Anti-Rootkit Detection &#8211; Nh\u1eadn d\u1ea1ng rootkit<\/strong><\/p>\n\n\n\n<p>Sophos Antivirus c\u00f3 th\u1ec3 x\u00e1c \u0111\u1ecbnh rootkit khi qu\u00e9t m\u00e0 kh\u00f4ng chi\u1ebfm t\u00e0i nguy\u00ean c\u1ee7a h\u1ec7 th\u1ed1ng. Rootkit \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n ch\u1ee7 \u0111\u1ed9ng v\u00e0 Sophos c\u00f3 th\u1ec3 cung c\u1ea5p c\u00e1c d\u1ea5u hi\u1ec7u vi ph\u1ea1m c\u1ee5 th\u1ec3 cho rootkit theo \u0111\u1ecbnh d\u1ea1ng, t\u00edch h\u1ee3p v\u00e0 minh b\u1ea1ch gi\u1ed1ng v\u1edbi \u0111\u1ecbnh ngh\u0129a c\u1ee7a virus.<\/p>\n\n\n\n<p>Trong tr\u01b0\u1eddng h\u1ee3p c\u1ea7n lo\u1ea1i b\u1ecf rootkit, Sophos cung c\u1ea5p m\u1ed9t c\u00f4ng c\u1ee5 \u0111\u1ed9c l\u1eadp \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1eb7c bi\u1ec7t cho m\u1ee5c \u0111\u00edch n\u00e0y. Sophos Anti-Rootkits s\u1ebd ph\u00e2n t\u00edch m\u00e1y v\u00e0 lo\u1ea1i b\u1ecf ch\u00fang n\u1ebfu c\u1ea7n thi\u1ebft.<\/p>\n\n\n\n<p><strong>3.1.3. Malicious Traffic Detection &#8211; Nh\u1eadn d\u1ea1ng l\u01b0u l\u01b0\u1ee3ng \u0111\u1ed9c h\u1ea1i<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng &#8220;Ph\u00e1t hi\u1ec7n l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111\u1ed9c h\u1ea1i&#8221; l\u00e0 m\u1ed9t th\u00e0nh ph\u1ea7n c\u1ee7a Sophos Central Endpoint for Endpoint Protection.<\/p>\n\n\n\n<p>T\u00ednh n\u0103ng MTD h\u1ed7 tr\u1ee3 ph\u00e1t hi\u1ec7n c\u00e1c l\u01b0u l\u01b0\u1ee3ng HTTP \u0111ang truy c\u1eadp ra b\u00ean ngo\u00e0i m\u00e0 kh\u00f4ng ph\u1ea3i t\u1eeb xu\u1ea5t ph\u00e1t tr\u00ecnh duy\u1ec7t Web, \u0111i\u1ec1u n\u00e0y c\u1ea3nh b\u00e1o cho th\u1ea5y m\u00e3 \u0111\u1ed9c c\u00f3 th\u1ec3 \u0111ang ch\u1ea1y tr\u00ean m\u00e1y tr\u1ea1m. MTD s\u1ebd ph\u00e2n t\u00edch l\u01b0u l\u01b0\u1ee3ng v\u00e0 ng\u0103n ch\u1eb7n truy c\u1eadp n\u1ebfu \u0111\u1ecba ch\u1ec9 \u0111\u00edch c\u1ee7a truy c\u1eadp n\u00e0y l\u00e0 \u0111\u1ebfn c\u00e1c Endpoint C&amp;C b\u00ean ngo\u00e0i.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-50.png\" alt=\"\" class=\"wp-image-4994\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.1.5. Genotype Detection &#8211; Nh\u1eadn d\u1ea1ng theo m\u1eabu Gen virus<\/strong><\/p>\n\n\n\n<p>C\u00e1c d\u00f2ng virus m\u1edbi ph\u1ea7n l\u1edbn l\u00e0 bi\u1ebfn th\u1ec3 c\u1ee7a c\u00e1c d\u00f2ng Virus c\u0169. T\u00ednh n\u0103ng Genotype Detection gi\u00fap Sophos c\u00f3 th\u1ec3 ph\u00e2n t\u00edch \u0111\u01b0\u1ee3c m\u00e3 code t\u01b0\u01a1ng \u0111\u1ed3ng gi\u1eefa c\u00e1c d\u00f2ng virus c\u0169 v\u00e0 virus m\u1edbi. H\u1ed7 tr\u1ee3 nh\u1eadn di\u1ec7n nhanh v\u00e0 ch\u00ednh x\u00e1c c\u00e1c d\u00f2ng virus m\u1edbi.<\/p>\n\n\n\n<p><strong>3.1.6. Zero-day Protection: HIPS &#8211; Ph\u00f2ng ch\u1ed1ng t\u1ea5n c\u00f4ng<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng Host IPS gi\u00fap ph\u00e2n t\u00edch h\u00e0nh vi c\u1ee7a c\u00e1c file. C\u00f3 3 giai \u0111o\u1ea1n ch\u00ednh.<\/p>\n\n\n\n<p><strong>Ph\u00e2n t\u00edch tr\u01b0\u1edbc khi file th\u1ef1c thi<\/strong><\/p>\n\n\n\n<p>C\u00f4ng ngh\u1ec7 Sophos Behavioural Genotype Protection l\u00e0 m\u1ed9t h\u1ec7 th\u1ed1ng ng\u0103n ch\u1eb7n x\u00e2m nh\u1eadp (HIPS). &nbsp;Ph\u1ea7n m\u1ec1m s\u1ebd qu\u00e9t t\u1eadp tin tr\u01b0\u1edbc khi n\u00f3 \u0111\u01b0\u1ee3c kh\u1edfi ch\u1ea1y b\u1edfi ng\u01b0\u1eddi d\u00f9ng. N\u00f3 x\u00e1c \u0111\u1ecbnh v\u00e0 ch\u1eb7n c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh \u0111\u1ed9c h\u1ea1i tr\u01b0\u1edbc khi ch\u00fang th\u1ef1c thi, kh\u00f4ng gi\u1ed1ng nh\u01b0 t\u00ednh n\u0103ng IPS c\u1ee7a c\u00e1c h\u00e3ng kh\u00e1c ch\u1ec9 gi\u00e1m s\u00e1t c\u00e1c ti\u1ebfn tr\u00ecnh \u0111ang ch\u1ea1y v\u00e0 ch\u1ec9 can thi\u1ec7p sau khi ti\u1ebfn tr\u00ecnh n\u00e0y th\u1ef1c hi\u1ec7n h\u00e0nh vi \u0111\u00e1ng ng\u1edd.<\/p>\n\n\n\n<p><strong>Trong khi th\u1ef1c thi (trong th\u1eddi gian ch\u1ea1y)<\/strong><\/p>\n\n\n\n<p>Kh\u00f4ng gi\u1ed1ng nh\u01b0 c\u00e1c gi\u1ea3i ph\u00e1p HIPS kh\u00e1c \u0111\u00f2i h\u1ecfi ki\u1ebfn th\u1ee9c chuy\u00ean s\u00e2u v\u1ec1 k\u1ef9 thu\u1eadt b\u1ea3o v\u1ec7 v\u00e0 qu\u1ea3n l\u00fd h\u00e0ng ng\u00e0y. T\u00ednh n\u0103ng HIPS \u0111\u1ea3m b\u1ea3o t\u00ednh ch\u1ee7 \u0111\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng ki\u1ec3m so\u00e1t hi\u1ec7u qu\u1ea3 h\u00e0nh vi c\u1ee7a c\u00e1c \u1ee9ng d\u1ee5ng c\u1ee7a b\u1ea1n trong khi \u1ee9ng d\u1ee5ng \u0111ang ch\u1ea1y.<\/p>\n\n\n\n<p><em>Hi\u1ec7u su\u1ea5t cao nh\u1edd t\u00ednh n\u0103ng Decision Caching.<\/em><\/p>\n\n\n\n<p>Decision Caching, c\u00f4ng ngh\u1ec7 qu\u00e9t truy c\u1eadp c\u1ee7a Sophos Endpoint Protection cho Windows t\u1ed1i \u01b0u h\u00f3a hi\u1ec7u su\u1ea5t b\u1eb1ng c\u00e1ch ch\u1ec9 ph\u00e2n t\u00edch c\u00e1c th\u01b0 m\u1ee5c m\u1edbi ho\u1eb7c thay \u0111\u1ed5i. Ngo\u00e0i ra, c\u00f4ng ngh\u1ec7 nh\u1eadn d\u1ea1ng t\u1eadp tin th\u00f4ng minh ch\u1ec9 ph\u00e2n t\u00edch c\u00e1c t\u1eadp tin c\u00f3 kh\u1ea3 n\u0103ng mang m\u00e3 \u0111\u1ed9c.<\/p>\n\n\n\n<p><strong>Giai \u0111o\u1ea1n Start v\u00e0 Stop<\/strong><\/p>\n\n\n\n<p>Ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng th\u00edch l\u00e0m vi\u1ec7c tr\u00ean c\u00e1c m\u00e1y b\u1ecb l\u00e0m ch\u1eadm b\u1edfi c\u00e1c th\u00e0nh ph\u1ea7n b\u1ea3o m\u1eadt \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t tr\u00ean m\u00e1y. Do \u0111\u00f3, c\u1ea7n ph\u1ea3i t\u00ednh \u0111\u1ebfn tham s\u1ed1 n\u00e0y khi thi\u1ebft k\u1ebf gi\u1ea3i ph\u00e1p b\u1ea3o v\u1ec7 \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t tr\u00ean m\u00e1y ng\u01b0\u1eddi d\u00f9ng. Gi\u1ea3i ph\u00e1p t\u1ed1t ph\u1ea3i b\u1ea3o v\u1ec7 hi\u1ec7u qu\u1ea3 m\u00e0 kh\u00f4ng l\u00e0m gi\u00e1n \u0111o\u1ea1n vi\u1ec7c s\u1eed d\u1ee5ng m\u00e1y t\u00ednh c\u1ee7a ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n\n<p>Trong khi m\u1ed9t s\u1ed1 nh\u00e0 cung c\u1ea5p kh\u00e1c l\u00e0m gi\u1ea3m ho\u1eb7c th\u1eadm ch\u00ed h\u1ee7y k\u00edch ho\u1ea1t b\u1ea3o v\u1ec7 trong c\u00e1c giai \u0111o\u1ea1n kh\u1edfi \u0111\u1ed9ng m\u00e1y \u0111\u1ec3 kh\u00f4ng g\u00e2y ra s\u1ef1 ch\u1eadm ch\u1ea1p cho tr\u1ea3i nghi\u1ec7m ng\u01b0\u1eddi d\u00f9ng. Sophos \u0111\u00e3 ch\u1ecdn b\u1ea3o v\u1ec7 m\u00e1y c\u00e0ng s\u1edbm c\u00e0ng t\u1ed1t b\u1eb1ng c\u00e1ch t\u1ea3i c\u00e1c c\u01a1 ch\u1ebf b\u1ea3o v\u1ec7 (tr\u00ecnh \u0111i\u1ec1u khi\u1ec3n v\u00e0 kh\u1edfi \u0111\u1ed9ng trong s\u1ed1 c\u00e1c d\u1ecbch v\u1ee5 c\u1ea7n thi\u1ebft) c\u00e0ng s\u1edbm c\u00e0ng t\u1ed1t khi kh\u1edfi \u0111\u1ed9ng h\u1ec7 th\u1ed1ng v\u00e0 b\u1eb1ng c\u00e1ch t\u1eaft n\u00f3 c\u00e0ng mu\u1ed9n c\u00e0ng t\u1ed1t khi ng\u01b0\u1eddi d\u00f9ng t\u1eaft m\u00e1y t\u00ednh, b\u1ea3o v\u1ec7 hi\u1ec7u qu\u1ea3 trong c\u00e1c giai \u0111o\u1ea1n kh\u1edfi \u0111\u1ed9ng v\u00e0 t\u1eaft m\u00e1y.<\/p>\n\n\n\n<p>\u0110\u1ec3 kh\u00f4ng l\u00e0m gi\u1ea3m hi\u1ec7u su\u1ea5t c\u1ee7a c\u00e1c m\u00e1y trong c\u00e1c giai \u0111o\u1ea1n s\u1eed d\u1ee5ng nhi\u1ec1u t\u00e0i nguy\u00ean n\u00e0y, m\u1ed9t s\u1ed1 c\u01a1 ch\u1ebf \u0111\u01b0\u1ee3c t\u00edch h\u1ee3p \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o t\u00ednh to\u00e0n v\u1eb9n c\u1ee7a h\u1ec7 th\u1ed1ng. Th\u1eadt v\u1eady, SophosLabs gi\u00e1m s\u00e1t s\u1ef1 ph\u00e1t tri\u1ec3n c\u1ee7a c\u00e1c th\u00e0nh ph\u1ea7n h\u1ec7 th\u1ed1ng r\u1ea5t \u0111\u1ec1u \u0111\u1eb7n, \u0111\u1eb7c bi\u1ec7t l\u00e0 khi cung c\u1ea5p c\u00e1c b\u1ea3n v\u00e1 c\u1ee7a h\u1ec7 \u0111i\u1ec1u h\u00e0nh. C\u00e1c th\u00e0nh ph\u1ea7n n\u00e0y \u0111\u01b0\u1ee3c bi\u1ebft v\u00e0 \u0111\u01b0\u1ee3c tham chi\u1ebfu trong Central Endpoint Protection, x\u00e1c \u0111\u1ecbnh r\u1eb1ng t\u1eadp tin h\u1ec7 th\u1ed1ng \u0111\u01b0\u1ee3c t\u1ea3i ho\u1eb7c s\u1eed d\u1ee5ng kh\u1edbp v\u1edbi phi\u00ean b\u1ea3n c\u1ee7a tr\u00ecnh ch\u1ec9nh s\u1eeda v\u00e0 kh\u00f4ng ph\u1ea3i l\u00e0 phi\u00ean b\u1ea3n s\u1eeda \u0111\u1ed5i.<\/p>\n\n\n\n<p>Vi\u1ec7c ki\u1ec3m so\u00e1t n\u00e0y \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1eb1ng nhi\u1ec1u ph\u01b0\u01a1ng ph\u00e1p kh\u00e1c nhau bao g\u1ed3m x\u00e1c minh t\u00ednh to\u00e0n v\u1eb9n c\u1ee7a t\u1eadp tin (checksum calculator), danh s\u00e1ch tr\u1eafng v\u00e0 ki\u1ec3m tra h\u00e0nh vi. Khi c\u00e1c ho\u1ea1t \u0111\u1ed9ng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n kh\u1edbp v\u1edbi c\u00e1c kho l\u01b0u tr\u1eef \u0111\u00e3 bi\u1ebft, kh\u00f4ng c\u1ea7n ph\u1ea3i ph\u00e2n t\u00edch ch\u1ed1ng vi-r\u00fat cho c\u00e1c y\u1ebfu t\u1ed1 n\u00e0y v\u00e0 gi\u00fap kh\u1edfi \u0111\u1ed9ng ho\u1eb7c d\u1eebng m\u00e1y d\u1ec5 d\u00e0ng h\u01a1n. V\u00ec Sophos kh\u00f4ng th\u1ecfa hi\u1ec7p v\u1ec1 b\u1ea3o m\u1eadt, n\u1ebfu kh\u00f4ng c\u00f3 s\u1ef1 t\u01b0\u01a1ng \u1ee9ng \u0111\u00e3 bi\u1ebft, c\u00e1c y\u1ebfu t\u1ed1 s\u1ebd \u0111\u01b0\u1ee3c ph\u00e2n t\u00edch \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o an ninh cho h\u1ec7 th\u1ed1ng trong c\u00e1c giai \u0111o\u1ea1n n\u00e0y.<\/p>\n\n\n\n<p><strong>3.1.7. SafeStore &#8211; Qu\u1ea3n l\u00fd c\u00e1c t\u1eadp tin c\u00e1ch ly<\/strong><\/p>\n\n\n\n<p>V\u1edbi Quarantine Manager, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 cho ph\u00e9p m\u1ed9t s\u1ed1 t\u00e0i kho\u1ea3n ng\u01b0\u1eddi d\u00f9ng t\u1ef1 qu\u1ea3n l\u00fd c\u00e1c m\u1ed1i \u0111e d\u1ecda v\u00e0 do \u0111\u00f3 ti\u1ebft ki\u1ec7m \u0111\u00e1ng k\u1ec3 th\u1eddi gian. Ng\u01b0\u1eddi d\u00f9ng cu\u1ed1i c\u00f3 th\u1ec3 di chuy\u1ec3n ho\u1eb7c x\u00f3a c\u00e1c t\u1eadp tin b\u1ecb nhi\u1ec5m v\u00e0 \u1ee7y quy\u1ec1n c\u00f3 ch\u1ecdn l\u1ecdc c\u00e1c \u1ee9ng d\u1ee5ng kh\u00f4ng mong mu\u1ed1n. \u0110\u1ec3 l\u00e0m \u0111i\u1ec1u n\u00e0y, h\u1ecd ph\u1ea3i th\u00eam c\u00e1c \u1ee9ng d\u1ee5ng v\u00e0o danh s\u00e1ch lo\u1ea1i tr\u1eeb \u0111\u1ec3 ch\u00fang kh\u00f4ng b\u1ecb ch\u1eb7n sau \u0111\u00f3.<\/p>\n\n\n\n<p><strong>3.1.8. Peripheral Control &#8211; Qu\u1ea3n l\u00fd thi\u1ebft b\u1ecb ngo\u1ea1i vi<\/strong><\/p>\n\n\n\n<p>\u201cPh\u00f2ng b\u1ec7nh t\u1ed1t h\u01a1n ch\u1eefa b\u1ec7nh\u201d l\u00e0 nguy\u00ean t\u1eafc s\u1ed1 1 cho an ninh m\u1ea1ng. V\u00ec ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u0169ng c\u00f3 th\u1ec3 l\u00e2y lan qua c\u00e1c thi\u1ebft b\u1ecb ngo\u1ea1i vi, b\u1ea1n c\u00f3 th\u1ec3 c\u1ea5u qu\u1ea3n l\u00fd h\u00ecnh quy\u1ec1n truy c\u1eadp cho c\u00e1c thi\u1ebft b\u1ecb n\u00e0y th\u00f4ng qua Sophos Central.<\/p>\n\n\n\n<p>Peripheral Control cho ph\u00e9p b\u1ea1n t\u0103ng kh\u1ea3 n\u0103ng ki\u1ec3m so\u00e1t c\u00e1c thi\u1ebft b\u1ecb c\u00f3 nguy c\u01a1. Ki\u1ec3m so\u00e1t c\u00e1c thi\u1ebft b\u1ecb n\u00e0y bao g\u1ed3m h\u1ea1n ch\u1ebf c\u00e1c thi\u1ebft b\u1ecb l\u01b0u tr\u1eef dung l\u01b0\u1ee3ng l\u1edbn c\u00f3 th\u1ec3 th\u00e1o r\u1eddi (USB, CD Rom, \u1ed5 c\u1ee9ng ngo\u00e0i USB, iPod, m\u00e1y nghe nh\u1ea1c MP3, v.v.) v\u00e0 c\u00e1c thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i (Wi-Fi, Bluetooth, Modem, v.v.).<\/p>\n\n\n\n<p>N\u1ebfu m\u1ee5c \u0111\u00edch c\u1ee7a b\u1ea1n l\u00e0 ch\u1ec9 ch\u1eb7n m\u1ed9t thi\u1ebft b\u1ecb c\u1ee5 th\u1ec3 v\u00e0 cho ph\u00e9p ph\u1ea7n c\u00f2n l\u1ea1i, \u0111i\u1ec1u n\u00e0y c\u0169ng c\u00f3 th\u1ec3 c\u1ea5u h\u00ecnh \u0111\u01a1n gi\u1ea3n b\u1eb1ng c\u00e1ch th\u00eam thi\u1ebft b\u1ecb \u0111\u00f3 v\u00e0o m\u1ee5c Peripheral Exemptions.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-51.png\" alt=\"\" class=\"wp-image-4995\"\/><\/figure>\n<\/div>\n\n\n<p>Sophos Central cho ph\u00e9p b\u1ea1n quy \u0111\u1ecbnh m\u1ed9t ch\u00ednh s\u00e1ch qu\u1ea3n l\u00fd thi\u1ebft b\u1ecb c\u01a1 b\u1ea3n nh\u01b0ng c\u0169ng c\u00f3 c\u00e1c ch\u00ednh s\u00e1ch kh\u00e1c nhau cho m\u1ed7i ng\u01b0\u1eddi d\u00f9ng ho\u1eb7c nh\u00f3m ng\u01b0\u1eddi d\u00f9ng \u0111\u1ec3 \u1ee7y quy\u1ec1n ho\u1eb7c c\u1ea5m t\u1ea5t c\u1ea3 ho\u1eb7c m\u1ed9t ph\u1ea7n c\u1ee7a c\u00e1c thi\u1ebft b\u1ecb n\u00e0y.<\/p>\n\n\n\n<p>C\u00e1c h\u00e0nh vi c\u1ed1 g\u1eafng s\u1eed d\u1ee5ng thi\u1ebft b\u1ecb ngo\u1ea1i vi s\u1ebd \u0111\u01b0\u1ee3c log l\u1ea1i v\u00e0 th\u00f4ng b\u00e1o \u0111\u1ebfn ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb.<\/p>\n\n\n\n<p><strong>3.1.9. Application Control &#8211; Qu\u1ea3n l\u00fd \u1ee9ng d\u1ee5ng<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng ki\u1ec3m so\u00e1t \u1ee9ng d\u1ee5ng cho ph\u00e9p b\u1ea1n ph\u00e1t hi\u1ec7n v\u00e0 ch\u1eb7n c\u00e1c \u1ee9ng d\u1ee5ng kh\u00f4ng g\u00e2y ra m\u1ed1i \u0111e d\u1ecda b\u1ea3o m\u1eadt nh\u01b0ng c\u00f3 th\u1ec3 kh\u00f4ng ph\u00f9 h\u1ee3p \u0111\u1ec3 s\u1eed d\u1ee5ng trong m\u00f4i tr\u01b0\u1eddng doanh nghi\u1ec7p.<\/p>\n\n\n\n<p>Sophos c\u00f3 c\u01a1 s\u1edf d\u1eef li\u1ec7u c\u1ee7a h\u00e0ng ng\u00e0n \u1ee9ng d\u1ee5ng \u0111\u01b0\u1ee3c ph\u00e2n lo\u1ea1i theo 50 nh\u00f3m kh\u00e1c nhau. Gi\u00fap b\u1ea1n d\u1ec5 d\u00e0ng tuy ch\u1ecdn vi\u1ec7c qu\u1ea3n l\u00fd \u1ee9ng d\u1ee5ng theo m\u1ee5c \u0111\u00edch c\u1ee7a doanh nghi\u1ec7p.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-52.png\" alt=\"\" class=\"wp-image-4996\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.1.10. Web Control &#8211; B\u1ea3o v\u1ec7 truy c\u1eadp Web<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng b\u1ea3o v\u1ec7 truy c\u1eadp Web cho ph\u00e9p qu\u1ea3n l\u00fd vi\u1ec7c truy c\u1eadp Web c\u1ee7a ng\u01b0\u1eddi d\u1ee5ng. Ngo\u00e0i ra Sophos c\u00f2n qu\u00e9t c\u00e1c ti\u1ebfn tr\u00ecnh qu\u1ea3ng c\u00e1o hay \u0111\u00e1nh gi\u00e1 m\u1ee9c \u0111\u1ed9 nguy hi\u1ec3m c\u1ee7a c\u00e1c t\u1eadp tin do ng\u01b0\u1eddi d\u00f9ng t\u1ea3i xu\u1ed1ng khi duy\u1ec7t Web.<\/p>\n\n\n\n<p>Danh s\u00e1ch c\u00e1c trang Web v\u00e0 c\u00e1c h\u00e0nh \u0111\u1ed9ng b\u1ea3o v\u1ec7 \u0111\u01b0\u1ee3c Sophos ph\u00e2n lo\u1ea1i s\u1eb5n cho t\u1eebng nh\u00f3m Website. B\u1ea1n c\u0169ng c\u00f3 th\u1ec3 t\u1ea1o ra danh s\u00e1ch c\u00e1c trang Web v\u00e0 h\u00e0nh \u0111\u1ed9ng b\u1ea3o v\u1ec7 ri\u00eang cho t\u1eebng ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-54.png\" alt=\"\" class=\"wp-image-4998\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.1.11. Data Loss Prevention (DLP) &#8211; Ng\u0103n ng\u1eeba th\u1ea5t tho\u00e1t d\u1eef li\u1ec7u<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng DLP gi\u00fap ng\u0103n ng\u1eeba vi\u1ec7c th\u1ea5t tho\u00e1t d\u1eef li\u1ec7u c\u1ee7a ng\u01b0\u1eddi d\u00f9ng do v\u00f4 t\u00ecnh ho\u1eb7c c\u1ed1 \u00fd.<\/p>\n\n\n\n<p>DLP cho ph\u00e9p b\u1ea1n gi\u00e1m s\u00e1t v\u00e0 h\u1ea1n ch\u1ebf vi\u1ec7c chuy\u1ec3n c\u00e1c t\u1eadp tin ch\u1ee9a th\u00f4ng tin nh\u1ea1y c\u1ea3m. V\u00ed d\u1ee5: b\u1ea1n c\u00f3 th\u1ec3 ng\u0103n ng\u01b0\u1eddi d\u00f9ng g\u1eedi t\u1eadp tin ch\u1ee9a d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m v\u1ec1 nh\u00e0 b\u1eb1ng email.<\/p>\n\n\n\n<p>Ch\u00ednh s\u00e1ch DLP ch\u1ee9a m\u1ed9t s\u1ed1 quy t\u1eafc, m\u1ed9t t\u1eadp tin kh\u1edbp v\u1edbi b\u1ea5t k\u1ef3 quy t\u1eafc n\u00e0o trong ch\u00ednh s\u00e1ch DLP s\u1ebd vi ph\u1ea1m ch\u00ednh s\u00e1ch. M\u1ed9t quy t\u1eafc c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c bao g\u1ed3m trong nhi\u1ec1u ch\u00ednh s\u00e1ch. B\u1ea1n c\u00f3 th\u1ec3 th\u00eam v\u0103n b\u1ea3n v\u00e0o c\u00e1c th\u00f4ng b\u00e1o hi\u1ec3n th\u1ecb tr\u00ean c\u00e1c endpoint ho\u1eb7c m\u00e1y tr\u1ea1m Windows khi quy t\u1eafc \u0111\u01b0\u1ee3c k\u00edch ho\u1ea1t. C\u00f3 hai lo\u1ea1i tin nh\u1eafn:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Th\u00f4ng b\u00e1o x\u00e1c nh\u1eadn y\u00eau c\u1ea7u ng\u01b0\u1eddi d\u00f9ng x\u00e1c nh\u1eadn chuy\u1ec3n t\u1eadp tin.<\/li>\n\n\n\n<li>M\u1ed9t th\u00f4ng b\u00e1o kh\u00f3a th\u00f4ng b\u00e1o cho ng\u01b0\u1eddi d\u00f9ng r\u1eb1ng h\u1ecd kh\u00f4ng th\u1ec3 chuy\u1ec3n t\u1eadp tin.<\/li>\n<\/ul>\n\n\n\n<p>Sophos DLP c\u00f3 2 t\u00ednh n\u0103ng ch\u00ednh:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>T\u1ea1o c\u00e1c ch\u00ednh s\u00e1ch gi\u00e1m s\u00e1t d\u1eef li\u1ec7u theo \u0111\u1ecbnh d\u1ea1ng file: doc, docx, pdf, png\u2026.<\/li>\n\n\n\n<li>T\u1ea1o ch\u00ednh s\u00e1ch gi\u00e1m s\u00e1t d\u1eef li\u1ec7u d\u1ef1a theo t\u1eeb kh\u00f3a trong t\u00e0i li\u1ec7u: Content control list. B\u1ea1n c\u00f3 th\u1ec3 quy \u0111\u1ecbnh t\u1eeb kh\u00f3a n\u00e0y v\u00e0 ph\u1ea7n m\u1ec1m Sophos s\u1ebd qu\u00e9t trong t\u00e0i li\u1ec7u ho\u1eb7c n\u1ed9i dung email.<\/li>\n<\/ul>\n\n\n\n<p>B\u1ea1n c\u00f3 th\u1ec3 t\u1ea1o ch\u00ednh s\u00e1ch cho ng\u01b0\u1eddi d\u00f9ng v\u00e0 m\u00e1y t\u00ednh ho\u1eb7c cho m\u00e1y tr\u1ea1m. B\u1ea1n c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00e1c m\u1eabu ho\u1eb7c t\u1ea1o m\u1ed9t ch\u00ednh s\u00e1ch t\u00f9y ch\u1ec9nh. L\u01b0u \u00fd \u0111\u1ec3 s\u1eed d\u1ee5ng t\u00ednh n\u0103ng DLP c\u1ea7n b\u1ea3n quy\u1ec1n Sophos Intercept X Advanced.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-55.png\" alt=\"\" class=\"wp-image-4999\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.1.12. Server Lockdown &#8211; Kho\u00e1 m\u00e1y ch\u1ee7<\/strong><\/p>\n\n\n\n<p>Server Lockdown s\u1eed d\u1ee5ng c\u00f4ng ngh\u1ec7 ch\u1ec9 cho ph\u00e9p c\u00e1c \u1ee9ng d\u1ee5ng \u0111\u01b0\u1ee3c ph\u00ea duy\u1ec7t ch\u1ea1y tr\u00ean m\u00e1y ch\u1ee7 c\u1ee7a b\u1ea1n. Ki\u1ec3m so\u00e1t nh\u1eefng g\u00ec c\u00f3 th\u1ec3 ch\u1ea1y khi\u1ebfn k\u1ebb t\u1ea5n c\u00f4ng hack m\u00e1y ch\u1ee7 kh\u00f3 h\u01a1n. C\u0169ng nh\u01b0 c\u00e1c file virus c\u0169ng s\u1ebd kh\u00f4ng th\u1ef1c thi \u0111\u01b0\u1ee3c tr\u00ean m\u00e1y ch\u1ee7 c\u00f3 b\u1eadt Server Lockdown.<\/p>\n\n\n\n<p>Server Lockdown s\u1eed d\u1ee5ng c\u00e1c tr\u00ecnh \u0111i\u1ec1u khi\u1ec3n n\u1eb1m trong nh\u00e2n h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ch\u1ec9 cho ph\u00e9p c\u00e1c \u1ee9ng d\u1ee5ng \u0111\u00e1ng tin c\u1eady v\u00e0 c\u00e1c t\u1eadp tin li\u00ean quan c\u1ee7a ch\u00fang th\u1ef1c thi v\u00e0 s\u1eeda \u0111\u1ed5i c\u00e1c t\u1eadp tin.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-85.png\" alt=\"\" class=\"wp-image-5043\"\/><\/figure>\n<\/div>\n\n\n<p>Khi kh\u00f3a m\u00e1y ch\u1ee7, m\u1ecdi \u1ee9ng d\u1ee5ng hi\u1ec7n \u0111ang ch\u1ea1y \u0111\u1ec1u \u0111\u00e1ng tin c\u1eady. C\u00e1c \u1ee9ng d\u1ee5ng m\u1edbi \u0111\u01b0\u1ee3c th\u00eam v\u00e0o sau khi lockdown s\u1ebd kh\u00f4ng th\u1ec3 ch\u1ea1y tr\u1eeb khi \u0111\u01b0\u1ee3c qu\u1ea3n tr\u1ecb vi\u00ean Sophos Central cho ph\u00e9p.<\/p>\n\n\n\n<p><strong>3.1.13 &#8211; Anti-Exploit &#8211; Ph\u00f2ng ch\u1ed1ng khai th\u00e1c v\u00e0o m\u00e1y tr\u1ea1m ch\u01b0a c\u1eadp nh\u1eadt b\u1ea3n v\u00e1<\/strong><\/p>\n\n\n\n<p>Sophos Anti-Exploit l\u00e0 t\u00ednh n\u0103ng ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng c\u00f3 ch\u1ee7 \u0111\u00edch &nbsp;(signatureless), ng\u0103n ch\u1eb7n khai th\u00e1c do l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m. C\u00e1c khai th\u00e1c nh\u01b0 Stack Pivot v\u00e0 Caller\/Stack-based ROP Stack \u0111\u01b0\u1ee3c theo d\u00f5i. N\u00f3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng zero-day, c\u00e1c bi\u1ebfn th\u1ec3 \u0111e d\u1ecda v\u00e0 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng th\u01b0\u1eddng tr\u00fa trong b\u1ed9 nh\u1edb ngay c\u1ea3 khi kh\u00f4ng th\u1ef1c hi\u1ec7n qu\u00e9t t\u1eadp tin.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-57.png\" alt=\"\" class=\"wp-image-5001\"\/><\/figure>\n\n\n\n<p><strong>3.1.14. CryptoGuard &#8211; Ng\u0103n ng\u1eeba virus m\u00e3 ho\u00e1<\/strong><\/p>\n\n\n\n<p>CryptoGuard l\u00e0 t\u00ednh n\u0103ng c\u1ee7a Intercept X. Gi\u00e1m s\u00e1t \u1edf c\u1ea5p h\u1ec7 th\u1ed1ng t\u1eadp tin, n\u00f3 li\u00ean t\u1ee5c b\u1ea3o v\u1ec7 c\u00e1c m\u00e1y tr\u1ea1m v\u00e0 gi\u00e1m s\u00e1t c\u00e1c h\u00e0nh vi c\u1ed1 g\u1eafng thay \u0111\u1ed5i t\u1eadp tin. Khi ph\u00e1t hi\u1ec7n h\u00e0nh vi m\u00e3 h\u00f3a d\u1eef li\u1ec7u, n\u00f3 s\u1ebd d\u1eebng ti\u1ebfn tr\u00ecnh m\u00e3 h\u00f3a v\u00e0 quay ng\u01b0\u1ee3c l\u1ea1i t\u1eadp tin v\u1ec1 tr\u1ea1ng th\u00e1i an to\u00e0n m\u1eb7c \u0111\u1ecbnh ban \u0111\u1ea7u. N\u00f3 ng\u0103n ch\u1eb7n m\u00e3 h\u00f3a h\u00e0ng lo\u1ea1t c\u00e1c t\u1eadp tin c\u1ea3 tr\u00ean th\u01b0 m\u1ee5c n\u1ed9i b\u1ed9 v\u00e0 c\u1ea3 th\u01b0 m\u1ee5c chia s\u1ebb file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-58.png\" alt=\"\" class=\"wp-image-5002\"\/><\/figure>\n<\/div>\n\n\n<p>Khi CryptoGuard nghi ng\u1edd r\u1eb1ng m\u1ed9t ti\u1ebfn tr\u00ecnh th\u1ef1c thi kh\u00f4ng ph\u00f9 h\u1ee3p v\u1edbi quy tr\u00ecnh d\u1ef1 \u0111\u1ecbnh c\u1ee7a n\u00f3, v\u00ed d\u1ee5 nh\u01b0 v\u1eeba m\u1edf file v\u1eeba t\u1ea1o l\u1ec7nh copy v\u00e0 delete. Sophos Data Recorder b\u1eaft \u0111\u1ea7u l\u01b0u tr\u1eef file d\u1eef li\u1ec7u m\u00e0 ti\u1ebfn tr\u00ecnh \u0111\u00f3 \u0111ang th\u1ef1c thi. K\u00edch th\u01b0\u1edbc t\u1ed1i \u0111a hi\u1ec7n t\u1ea1i c\u1ee7a tr\u00ecnh ghi d\u1eef li\u1ec7u CryptoGuard l\u00e0 300MB v\u00e0 k\u00edch th\u01b0\u1edbc t\u1eadp tin t\u1ed1i \u0111a ri\u00eang l\u1ebb m\u00e0 n\u00f3 s\u1ebd ghi l\u00e0 75 MB. B\u1ed9 nh\u1edb cache s\u1ebd ghi \u0111\u00e8 l\u00ean c\u00e1c t\u1eadp tin c\u0169 h\u01a1n.<\/p>\n\n\n\n<p>CryptoGuard ch\u1ea1y nh\u01b0 tr\u00ecnh \u0111i\u1ec1u khi\u1ec3n b\u1ed9 l\u1ecdc t\u1eadp tin v\u00e0 t\u1ea1o c\u00e1c b\u1ea3n sao c\u1ee7a 1 c\u00e1c t\u1eadp tin \u0111\u00f3 trong th\u01b0 m\u1ee5c c: \\ windows \\ cryptoguard.<\/p>\n\n\n\n<p>Khi Sophos Safeguard ph\u00e1t hi\u1ec7n v\u00e0 d\u1eebng ti\u1ebfn tr\u00ecnh m\u00e3 h\u00f3a l\u1ea1i, m\u1ed9t ph\u00e2n t\u00edch s\u1ebd \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n gi\u1eefa t\u1eadp tin hi\u1ec7n t\u1ea1i v\u00e0 b\u1ea3n sao thu \u0111\u01b0\u1ee3c tr\u01b0\u1edbc \u0111\u00f3. N\u1ebfu t\u1eadp tin \u0111\u01b0\u1ee3c coi l\u00e0 m\u00e3 h\u00f3a \u0111\u1ed9c h\u1ea1i, CryptoGuard \u0111\u00e1nh d\u1ea5u \u0111\u1ecba ch\u1ec9 IP ho\u1eb7c qu\u00e1 tr\u00ecnh g\u00e2y ra n\u00f3 v\u00e0 duy tr\u00ec b\u1ea3n sao v\u00e0 kh\u00f4i ph\u1ee5c b\u1ea3n sao v\u1ec1 v\u1ecb tr\u00ed ban \u0111\u1ea7u c\u1ee7a ch\u00fang.<\/p>\n\n\n\n<p><strong>3.1.15. Deep Learning &#8211; C\u00f4ng ngh\u1ec7 m\u00e1y h\u1ecdc<\/strong><\/p>\n\n\n\n<p>Tr\u00ed th\u00f4ng minh nh\u00e2n t\u1ea1o \u0111\u01b0\u1ee3c t\u00edch h\u1ee3p trong Intercept X s\u1eed d\u1ee5ng c\u00f4ng nghe Deep Learning, m\u1ed9t h\u00ecnh th\u1ee9c h\u1ecdc m\u00e1y ti\u00ean ti\u1ebfn, ph\u00e1t hi\u1ec7n c\u1ea3 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u00e3 bi\u1ebft v\u00e0 ch\u01b0a bi\u1ebft m\u00e0 kh\u00f4ng c\u1ea7n d\u1ef1a v\u00e0o c\u01a1 s\u1edf d\u1eef li\u1ec7u (signatures).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-60.png\" alt=\"\" class=\"wp-image-5004\"\/><\/figure>\n<\/div>\n\n\n<p>Deep Learning gi\u00fap Intercept X th\u00f4ng minh h\u01a1n, c\u00f3 kh\u1ea3 n\u0103ng m\u1edf r\u1ed9ng h\u01a1n v\u00e0 hi\u1ec7u su\u1ea5t cao h\u01a1n c\u00e1c gi\u1ea3i ph\u00e1p b\u1ea3o m\u1eadt ch\u1ec9 s\u1eed d\u1ee5ng ph\u01b0\u01a1ng ph\u00e1p h\u1ecdc m\u00e1y truy\u1ec1n th\u1ed1ng ho\u1eb7c ph\u00e1t hi\u1ec7n d\u1ef1a tr\u00ean c\u00e1c d\u1ea5u hi\u1ec7u vi ph\u1ea1m.<\/p>\n\n\n\n<p>\u01afu \u0111i\u1ec3m c\u1ee7a Deep Learning so v\u1edbi Machine Learning:<\/p>\n\n\n\n<p><strong>Nhanh h\u01a1n<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deep Learning ph\u00e1t hi\u1ec7n trong 20-100 mili gi\u00e2y m\u1ed7i t\u1eadp tin<\/li>\n\n\n\n<li>Machine Learning c\u1ea7n 100-500 mili gi\u00e2y tr\u00ean m\u1ed7i t\u1eadp tin<\/li>\n<\/ul>\n\n\n\n<p><strong>M\u1eabu h\u1ecdc nh\u1ecf h\u01a1n<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dung l\u01b0\u1ee3ng m\u1eabu h\u1ecdc c\u1ee7a Deep Learning kho\u1ea3ng 10-20 MB<\/li>\n\n\n\n<li>Dung l\u01b0\u1ee3ng m\u1eabu h\u1ecdc Machine Learning kho\u1ea3ng 500 MB-10 GB<\/li>\n<\/ul>\n\n\n\n<p><strong>Th\u00f4ng minh h\u01a1n<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deep Learning cung c\u1ea5p t\u1ef7 l\u1ec7 ph\u00e1t hi\u1ec7n cao h\u01a1n 10% so v\u1edbi Machine Learning<\/li>\n<\/ul>\n\n\n\n<p><strong>3.1.16. Root Cause Analysis &#8211; Ph\u00e2n t\u00edch nguy\u00ean nh\u00e2n g\u1ed1c r\u1ec5 c\u1ee7a s\u1ef1 c\u1ed1<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng ph\u00e2n t\u00edch chi ti\u1ebft l\u00e0m s\u00e1ng t\u1ecf nguy\u00ean nh\u00e2n g\u1ed1c r\u1ec5 c\u1ee7a c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0 \u0111\u01b0\u1eddng l\u00e2y nhi\u1ec5m c\u1ee7a ch\u00fang. RCA hi\u1ec3n th\u1ecb \u0111\u1ea7y \u0111\u1ee7 v\u1ec1 c\u00e1ch th\u1ee9c t\u1ea5n c\u00f4ng, n\u01a1i virus \u0111\u00e3 \u0111i qua, \u0111\u00e3 t\u00e1c \u0111\u1ed9ng v\u00e0o nh\u1eefng file n\u00e0o v\u00e0 \u0111\u1ec1 xu\u1ea5t c\u00e1ch x\u1eed l\u00fd cho b\u1ea1n.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-62.png\" alt=\"\" class=\"wp-image-5006\"\/><\/figure>\n\n\n\n<p><strong>3.1.17. File Integrity &#8211; Gi\u00e1m s\u00e1t thay \u0111\u1ed5i tr\u00ean m\u00e1y ch\u1ee7<\/strong><\/p>\n\n\n\n<p>T\u00ednh n\u0103ng File Integrity gi\u00fap kh\u00e1ch h\u00e0ng tu\u00e2n th\u1ee7 theo quy tr\u00ecnh PCI DSS. Sophos s\u1ebd gi\u00e1m s\u00e1t to\u00e0n b\u1ed9 c\u00e1c d\u1eef li\u1ec7u quan tr\u1ecdng tr\u00ean m\u00e1y ch\u1ee7 v\u00e0 c\u1ea3nh b\u00e1o ngay khi c\u00f3 b\u1ea5t k\u00ec s\u1ef1 thay \u0111\u1ed5i g\u00ec tr\u00ean c\u00e1c d\u1eef li\u1ec7u, kh\u00f3a registry.<\/p>\n\n\n\n<p>Ngo\u00e0i ra b\u1ea1n c\u00f2n c\u00f3 th\u1ec3 t\u00f9y ch\u1ecdn gi\u00e1m s\u00e1t s\u1ef1 thay \u0111\u1ed5i tr\u00ean c\u00e1c folder \u0111\u01b0\u1ee3c ch\u1ec9 \u0111\u1ecbnh.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-87.png\" alt=\"\" class=\"wp-image-5045\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.1.18. Sophos Clean &#8211; T\u1ef1 \u0111\u1ed9ng xo\u00e1 m\u00e3 \u0111\u1ed9c h\u1ea1i kh\u1ecfi d\u1eef li\u1ec7u b\u1ecb nhi\u1ec5m<\/strong><\/p>\n\n\n\n<p>Trong khi c\u00e1c ph\u1ea7n m\u1ec1m di\u1ec7t virus kh\u00e1c ch\u1ec9 \u0111\u01a1n gi\u1ea3n l\u00e0 lo\u1ea1i b\u1ecf c\u00e1c t\u1eadp tin b\u1ecb d\u00ednh m\u00e3 \u0111\u1ed9c. Sophos Clean cung c\u1ea5p kh\u1ea3 n\u0103ng lo\u1ea1i b\u1ecf m\u00e3 \u0111\u1ed9c ra kh\u1ecfi c\u00e1c t\u1eadp tin v\u00e0 kh\u00f4i ph\u1ee5c t\u1eadp tin cho ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n\n<p><strong>3.2. T\u00ednh n\u0103ng k\u1ef9 thu\u1eadt s\u1ea3n ph\u1ea9m Endpoint Detection and Response (EDR) for Endpoint<\/strong><\/p>\n\n\n\n<p>EDR l\u00e0 t\u00ednh n\u0103ng cao c\u1ea5p. Sophos EDR s\u1ebd thu th\u1eadp t\u1ea5t c\u1ea3 c\u00e1c event tr\u00ean m\u00e1y tr\u1ea1m v\u00e0 s\u1eed d\u1ee5ng tr\u00ed th\u00f4ng minh nh\u00e2n t\u1ea1o \u0111\u1ec3 ph\u00e2n t\u00edch, gi\u00fap t\u00ecm ra c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u00e3 x\u1ea3y ra m\u00e0 ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb kh\u00f4ng bi\u1ebft \u0111\u1ebfn. C\u0169ng nh\u01b0 ph\u00e1n \u0111o\u00e1n tr\u01b0\u1edbc c\u00e1c m\u1ed1i nguy c\u00f3 th\u1ec3 x\u1ea3y ra trong h\u1ec7 th\u1ed1ng t\u1eeb s\u1edbm. Gi\u00fap l\u00e0m gi\u1ea3m thi\u1ec3u t\u1ed1i \u0111a r\u1ee7i ro cho h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p><strong>C\u00e1c l\u1ee3i \u00edch c\u1ee7a EDR<\/strong><\/p>\n\n\n\n<p><strong>Add Expertise and not Headcount \u2013 C\u00f3 kh\u1ea3 n\u0103ng nh\u01b0 chuy\u00ean gia m\u00e0 kh\u00f4ng c\u1ea7n th\u00eam nh\u00e2n s\u1ef1<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware expertise<\/strong>:<\/li>\n<\/ul>\n\n\n\n<p>H\u1ea7u h\u1ebft c\u00e1c t\u1ed5 ch\u1ee9c \u0111\u1ec1u d\u1ef1a v\u00e0o c\u00e1c chuy\u00ean gia ph\u00e2n t\u00edch m\u00e3 \u0111\u1ed9c \u0111\u1ec3 ph\u00e2n t\u00edch c\u00e1c t\u1eadp tin \u0111\u00e1ng ng\u1edd. C\u00e1ch ti\u1ebfp c\u1eadn n\u00e0y kh\u00f4ng ch\u1ec9 t\u1ed1n th\u1eddi gian v\u00e0 nh\u00e2n l\u1ef1c m\u00e0 c\u00f2n kh\u00f3 \u0111\u1ea1t \u0111\u01b0\u1ee3c hi\u1ec7u qu\u1ea3 v\u00ec kh\u1ea3 n\u0103ng c\u1ee7a m\u1ed9t ng\u01b0\u1eddi l\u00e0 gi\u1edbi h\u1ea1n trong khi Virus th\u00ec ph\u00e1t tri\u1ec3n li\u00ean t\u1ee5c m\u1edbi h\u00e0ng tr\u0103m ng\u00e0n bi\u1ebfn th\u1ec3 m\u1ed7i ng\u00e0y. Intercept X Advanced v\u1edbi EDR cung c\u1ea5p c\u00e1ch ti\u1ebfp c\u1eadn t\u1ed1t h\u01a1n b\u1eb1ng c\u00e1ch t\u1eadn d\u1ee5ng Deep Learning Malware Analysis, t\u1ef1 \u0111\u1ed9ng ph\u00e2n t\u00edch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u1ef1c k\u1ef3 chi ti\u1ebft, ki\u1ec3m tra c\u00e1c thu\u1ed9c t\u00ednh t\u1eadp tin v\u00e0 so s\u00e1nh ch\u00fang v\u1edbi h\u00e0ng tri\u1ec7u t\u1eadp tin kh\u00e1c t\u1eeb \u0111\u00f3 c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng xem c\u00e1c thu\u1ed9c t\u00ednh v\u00e0 ph\u00e2n \u0111o\u1ea1n m\u00e3 n\u00e0o t\u01b0\u01a1ng t\u1ef1 nh\u01b0 c\u00e1c t\u1eadp tin x\u1ea5u hay t\u1eadp tin t\u1ed1t \u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn v\u00e0 \u0111\u1ec3 c\u00f3 th\u1ec3 x\u00e1c \u0111\u1ecbnh xem m\u1ed9t t\u1eadp tin n\u00ean b\u1ecb ch\u1eb7n ho\u1eb7c cho ph\u00e9p.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat intelligence expertise:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Khi Intercept X Advanced v\u1edbi EDR th\u1ea5y m\u1ed9t t\u1eadp tin \u0111\u00e1ng ng\u1edd, c\u00e1c qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 thu th\u1eadp th\u00eam th\u00f4ng tin c\u1ee7a t\u1eadp tin n\u00e0y b\u1eb1ng c\u00e1ch g\u1eedi th\u00f4ng tin \u0111\u1ebfn Sophos Labs, n\u01a1i nh\u1eadn v\u00e0 x\u1eed l\u00fd kho\u1ea3ng 400.000 m\u1eabu ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ch\u01b0a t\u1eebng th\u1ea5y tr\u01b0\u1edbc \u0111\u00e2y m\u1ed7i ng\u00e0y. V\u1edbi vi\u1ec7c n\u00e0y th\u00f4ng tin v\u1ec1 m\u1ed1i \u0111e d\u1ecda kh\u00e1c \u0111\u01b0\u1ee3c thu th\u1eadp, t\u1ed5ng h\u1ee3p v\u00e0 t\u00f3m t\u1eaft \u0111\u1ec3 ph\u00e2n t\u00edch d\u1ec5 d\u00e0ng. \u0110i\u1ec1u n\u00e0y c\u00f3 ngh\u0129a l\u00e0 c\u00e1c doanh nghi\u1ec7p kh\u00f4ng c\u00f3 chuy\u00ean gia ph\u00e2n t\u00edch c\u00e1c m\u1ed1i \u0111e d\u1ecda v\u1eabn c\u00f3 th\u1ec3 l\u1ea5y \u0111\u01b0\u1ee3c th\u00f4ng tin t\u1eeb m\u1ed9t trong nh\u1eefng nh\u00f3m nghi\u00ean c\u1ee9u khoa h\u1ecdc d\u1eef li\u1ec7u v\u00e0 an ninh m\u1ea1ng h\u00e0ng \u0111\u1ea7u tr\u00ean th\u1ebf gi\u1edbi.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security expertise*:<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Intercept X Advanced v\u1edbi EDR n\u00e2ng cao chuy\u00ean m\u00f4n b\u1ea3o m\u1eadt c\u1ee7a c\u00e1n b\u1ed9 CNTT b\u1eb1ng c\u00e1ch t\u1ef1 \u0111\u1ed9ng ph\u00e1t hi\u1ec7n v\u00e0 \u01b0u ti\u00ean c\u1ea3nh b\u00e1o c\u00e1c m\u1ed1i \u0111e d\u1ecda ti\u1ec1m \u1ea9n.<\/p>\n\n\n\n<p>S\u1eed d\u1ee5ng tr\u00ed tu\u1ec7 nh\u00e2n t\u1ea1o, c\u00e1c s\u1ef1 ki\u1ec7n \u0111\u00e1ng ng\u1edd \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh v\u00e0 th\u00f4ng b\u00e1o ngay \u0111\u1ebfn ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb \u0111\u1ec3 \u0111\u01b0\u1ee3c ch\u00fa \u00fd ngay l\u1eadp t\u1ee9c. Ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb c\u00f3 th\u1ec3 nhanh ch\u00f3ng nh\u00ecn th\u1ea5y n\u01a1i n\u00e0o h\u1ecd c\u1ea7n t\u1eadp trung s\u1ef1 ch\u00fa \u00fd v\u00e0 hi\u1ec3u \u0111\u01b0\u1ee3c m\u00e1y t\u00ednh n\u00e0o c\u00f3 th\u1ec3 b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi c\u00e1c m\u1ed1i nguy n\u00e0y.<\/p>\n\n\n\n<p><strong>3.2.1. Guided Incident Response &#8211; H\u01b0\u1edbng d\u1eabn \u1ee9ng ph\u00f3 s\u1ef1 c\u1ed1<\/strong><\/p>\n\n\n\n<p>Quy tr\u00ecnh c\u1ee7a EDR<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Detect &#8211; Ph\u00e1t hi\u1ec7n<\/strong><\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-64.png\" alt=\"\" class=\"wp-image-5010\"\/><\/figure>\n<\/div>\n\n\n<p>Khi m\u1ed9t h\u1ed3 s\u01a1 c\u1ee7a Virus \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh tr\u00ean EDR. Ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb c\u00f3 th\u1ec3 ngay l\u1eadp t\u1ee9c t\u00ecm hi\u1ec3u nguy\u00ean nh\u00e2n v\u00e0 con \u0111\u01b0\u1eddng l\u00e2y lan c\u1ee7a Virus th\u00f4ng qua giao di\u1ec7n \u0111\u1ed3 h\u1ecda RCA<\/p>\n\n\n\n<p>Ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb c\u00f3 th\u1ec3 t\u00ecm ki\u1ebfm th\u00f4ng tin v\u1ec1 m\u1ed1i nguy \u0111\u00f3 tr\u00ean to\u00e0n h\u1ec7 th\u1ed1ng v\u1edbi t\u00ednh n\u0103ng Threat Search.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Investigate &#8211; \u0110i\u1ec1u tra<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Sau khi x\u00e1c \u0111\u1ecbnh m\u1ed1i \u0111e d\u1ecda ti\u1ec1m \u1ea9n, y\u00eau c\u1ea7u ph\u00e2n t\u00edch c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c g\u1eedi \u0111\u1ebfn Sophos Labs \u0111\u1ec3 \u0111i\u1ec1u tra th\u00eam v\u1ec1 v\u1ee5 vi\u1ec7c. T\u1ea1i c\u00e1c ph\u00f2ng th\u00ed nghi\u1ec7m, c\u00e1c t\u1eadp tin \u0111\u00e1ng ng\u1edd \u0111\u01b0\u1ee3c ph\u00e2n t\u00edch v\u00e0 d\u1ef1a tr\u00ean k\u1ebft qu\u1ea3 t\u1eeb Sophos Labs, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 \u0111\u01b0a ra quy\u1ebft \u0111\u1ecbnh.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-65.png\" alt=\"\" class=\"wp-image-5011\"\/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Response &#8211; Ph\u1ea3n h\u1ed3i<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Khi x\u00e1c \u0111\u1ecbnh m\u1ed1i \u0111e d\u1ecda, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 ch\u1ecdn c\u00e1c h\u00e0nh \u0111\u1ed9ng nh\u01b0 Clean &amp; Block, c\u00e1ch ly thi\u1ebft b\u1ecb ngay t\u1eeb tr\u00ean giao di\u1ec7n qu\u1ea3n tr\u1ecb<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-67.png\" alt=\"\" class=\"wp-image-5013\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.2.2. Client Isolation &#8211; C\u00e1ch ly m\u00e1y tr\u1ea1m<\/strong><\/p>\n\n\n\n<p>Ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb c\u00f3 th\u1ec3 c\u00e1ch ly m\u00e1y t\u00ednh b\u1ecb nghi ng\u1edd ra kh\u1ecfi m\u1ea1ng b\u1eb1ng nhi\u1ec1u c\u00e1ch kh\u00e1c nhau:<\/p>\n\n\n\n<p><em>C\u00e1ch ly ngay tr\u00ean giao di\u1ec7n Threat Case<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-69.png\" alt=\"\" class=\"wp-image-5017\"\/><\/figure>\n<\/div>\n\n\n<p>C\u00e1ch ly t\u1eeb trang qu\u1ea3n l\u00fd m\u00e1y tr\u1ea1m<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-70.png\" alt=\"\" class=\"wp-image-5018\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.2.3. Live Discover &#8211; T\u00ecm ki\u1ebfm th\u00f4ng tin theo th\u1eddi gian th\u1ef1c<\/strong><\/p>\n\n\n\n<p>Live Discover cho ph\u00e9p qu\u1ea3n tr\u1ecb vi\u00ean t\u00ecm ki\u1ebfm th\u00f4ng tin tr\u00ean m\u00e1y tr\u1ea1m th\u00f4ng qua SQL Query. Khi c\u00f3 m\u1ed9t y\u00eau c\u1ea7u ki\u1ec3m tra th\u00f4ng tin tr\u00ean m\u00e1y tr\u1ea1m, v\u00ed d\u1ee5: Ki\u1ec3m tra c\u00e1c b\u1ea3n patch c\u1eadp nh\u1eadt, c\u00e1c c\u1ed5ng \u0111ang m\u1edf tr\u00ean m\u00e1y tr\u1ea1m, s\u1ed1 l\u1ea7n \u0111\u0103ng nh\u1eadp trong ng\u00e0y\u2026 qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng truy v\u1ea5n th\u00f4ng qua c\u00e1c t\u1eadp l\u1ec7nh c\u00f3 s\u1eb5n ho\u1eb7c t\u1ef1 vi\u1ebft ra m\u1ed9t t\u1eadp l\u1ec7nh theo nhu c\u1ea7u c\u1ee7a m\u00ecnh.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-71.png\" alt=\"\" class=\"wp-image-5020\"\/><\/figure>\n\n\n\n<p><strong>3.2.4. Live Response &#8211; X\u1eed l\u00fd s\u1ef1 c\u1ed1 t\u1eeb xa<\/strong><\/p>\n\n\n\n<p>Live Response cho ph\u00e9p qu\u1ea3n tr\u1ecb vi\u00ean k\u1ebft n\u1ed1i t\u1eeb xa v\u1edbi c\u00e1c thi\u1ebft b\u1ecb th\u00f4ng qua giao di\u1ec7n command line ngay tr\u00ean trang qu\u1ea3n tr\u1ecb Sophos Central. Trong tr\u01b0\u1eddng h\u1ee3p m\u00e1y tr\u1ea1m x\u1ea3y ra s\u1ef1 c\u1ed1, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3 kh\u00e1c ph\u1ee5c ngay l\u1eadp t\u1ee9c d\u00f9 \u0111ang \u1edf nh\u00e0 hay b\u00ean ngo\u00e0i.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-72.png\" alt=\"\" class=\"wp-image-5022\"\/><\/figure>\n<\/div>\n\n\n<p>S\u1eed d\u1ee5ng Live Response, qu\u1ea3n tr\u1ecb vi\u00ean c\u00f3 th\u1ec3<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kh\u1edfi \u0111\u1ed9ng l\u1ea1i thi\u1ebft b\u1ecb<\/li>\n\n\n\n<li>Xem danh s\u00e1ch c\u00e1c ti\u1ebfn tr\u00ecnh \u0111ang ch\u1ea1y, v\u00e0 ng\u0103n ch\u1eb7n c\u00e1c ti\u1ebfn tr\u00ecnh \u0111\u00e1ng nghi<\/li>\n\n\n\n<li>C\u00e0i \u0111\u1eb7t v\u00e0 x\u00f3a c\u00e1c \u1ee9ng d\u1ee5ng, t\u1ea1o ng\u01b0\u1eddi d\u00f9ng m\u1edbi, t\u00f9y ch\u1ec9nh th\u00f4ng s\u1ed1 h\u1ec7 th\u1ed1ng<\/li>\n\n\n\n<li>Ki\u1ec3m tra Log tr\u00ean m\u00e1y tr\u1ea1m<\/li>\n<\/ul>\n\n\n\n<p><strong>3.3. T\u00ednh n\u0103ng k\u1ef9 thu\u1eadt s\u1ea3n ph\u1ea9m Sophos Intercept X Advanced for Endpoint with MTR Advanced<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-73.png\" alt=\"\" class=\"wp-image-5023\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.3.1. \u0110\u1ed9i ph\u00e2n t\u00edch \u0111\u1ed9c l\u1eadp<\/strong><\/p>\n\n\n\n<p>MTR l\u00e0 d\u1ecbch v\u1ee5 gi\u00e1m s\u00e1t h\u1ec7 th\u1ed1ng 24\/7. V\u00ec v\u1eady \u0111\u1ed9i ng\u0169 nh\u00e2n l\u1ef1c r\u1ea5t quan tr\u1ecdng. <strong>Sophos Managed Threat &amp; Response (Rook Securities) <\/strong>l\u00e0 1 trong 4 nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 n\u1eb1m trong top Gartner report v\u00e0 thu\u1ed9c top \u0111\u00e1nh gi\u00e1 c\u1ee7a Forrester<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-75.png\" alt=\"\" class=\"wp-image-5025\"\/><\/figure>\n<\/div>\n\n\n<p>\u0110\u00e1nh gi\u00e1 t\u01b0 Forrester<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-76.png\" alt=\"\" class=\"wp-image-5026\"\/><\/figure>\n<\/div>\n\n\n<p><strong>3.3.2. V\u1eadn h\u00e0nh b\u1edfi c\u00e1c chuy\u00ean gia an ninh m\u1ea1ng<\/strong><\/p>\n\n\n\n<p>V\u1edbi Sophos MTR, c\u00f4ng ty c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c h\u1ed7 tr\u1ee3 b\u1edfi \u0111\u1ed9i ng\u0169 chuy\u00ean gia ph\u1ea3n \u1ee9ng 24\/7. C\u00e1c chuy\u00ean gia n\u00e0y s\u1ebd:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ch\u1ee7 \u0111\u1ed9ng s\u0103n l\u00f9ng v\u00e0 x\u00e1c th\u1ef1c c\u00e1c m\u1ed1i \u0111e d\u1ecda v\u00e0 s\u1ef1 c\u1ed1 ti\u1ec1m \u1ea9n<\/li>\n\n\n\n<li>S\u1eed d\u1ee5ng t\u1ea5t c\u1ea3 th\u00f4ng tin c\u00f3 s\u1eb5n \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh ph\u1ea1m vi v\u00e0 m\u1ee9c \u0111\u1ed9 nghi\u00eam tr\u1ecdng c\u1ee7a c\u00e1c m\u1ed1i \u0111e d\u1ecda<\/li>\n\n\n\n<li>\u00c1p d\u1ee5ng ng\u1eef c\u1ea3nh th\u00edch h\u1ee3p cho c\u00e1c m\u1ed1i \u0111e d\u1ecda<\/li>\n\n\n\n<li>Cung c\u1ea5p l\u1eddi khuy\u00ean h\u1eefu \u00edch \u0111\u1ec3 gi\u1ea3i quy\u1ebft nguy\u00ean nh\u00e2n g\u1ed1c r\u1ec5 c\u1ee7a s\u1ef1 c\u1ed1 v\u00e0 tr\u00e1nh t\u00e1i di\u1ec5n<\/li>\n\n\n\n<li>B\u1eaft \u0111\u1ea7u c\u00e1c h\u00e0nh \u0111\u1ed9ng \u0111\u1ec3 ph\u00e1 v\u1ee1, ng\u0103n ch\u1eb7n v\u00e0 v\u00f4 hi\u1ec7u h\u00f3a c\u00e1c m\u1ed1i \u0111e d\u1ecda t\u1eeb xa.<\/li>\n<\/ul>\n\n\n\n<p><strong>3.3.3. C\u00e1c g\u00f3i d\u1ecbch v\u1ee5 MTR<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>MTR Standard<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>MTR Advanced<\/strong><\/td><\/tr><tr><td>24\/7 Lead Driven Threat Hunting<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>Security Health check<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>Activity reporting<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>adversarial detection<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>24\/7 Leadless Threat hunting<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>Enhanced Telemetry<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>Dedicated Threat response lead<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>Direct call in Support<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><tr><td>Asset Discovery<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00b0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>3.3.4. Cam k\u1ebft v\u1ec1 th\u1eddi gian \u0111\u00e1p \u1ee9ng v\u00e0 ph\u1ea1m vi c\u00f4ng vi\u1ec7c<\/strong><\/p>\n\n\n\n<p>N\u1ed9i dung d\u1ecbch v\u1ee5 v\u00e0 th\u1eddi gian \u0111\u00e1p \u1ee9ng \u0111\u01b0\u1ee3c mi\u00eau t\u1ea3 chi ti\u1ebft theo link \u0111\u00ednh k\u00e8m<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-77.png\" alt=\"\" class=\"wp-image-5028\"\/><\/figure>\n<\/div>\n\n\n<p><strong>IV. Ki\u1ebfn tr\u00fac v\u00e0 c\u1eadp nh\u1eadt &#8211; Architecture and Updates<\/strong><\/p>\n\n\n\n<p><strong>4.1. Ki\u1ebfn tr\u00fac ho\u1ea1t \u0111\u1ed9ng c\u1ee7a Sophos Central<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-78.png\" alt=\"\" class=\"wp-image-5029\"\/><\/figure>\n<\/div>\n\n\n<p>Ki\u1ebfn tr\u00fac c\u1ee7a Sophos Central r\u1ea5t \u0111\u01a1n gi\u1ea3n.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sophos Central l\u00e0 Cloud Base. Truy c\u1eadp v\u00e0o giao di\u1ec7n qu\u1ea3n tr\u1ecb th\u00f4ng qua HTTPS tr\u00ean c\u1ed5ng 443.<\/li>\n\n\n\n<li>Vi\u1ec7c c\u1eadp nh\u1eadt ch\u00ednh s\u00e1ch v\u00e0 update t\u1eeb m\u00e1y tr\u1ea1m \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n qua c\u1ed5ng 80 v\u00e0 443<\/li>\n\n\n\n<li>\u0110\u1ed1i v\u1edbi h\u1ec7 th\u1ed1ng kh\u00f4ng c\u00f3 truy c\u1eadp Internet. C\u00f3 th\u1ec3 t\u00f9y ch\u1ecdn t\u00ednh n\u0103ng Update Cache v\u00e0 Message Relay \u0111\u1ec3 th\u1ef1c hi\u1ec7n update offline.<\/li>\n<\/ul>\n\n\n\n<p><strong>4.2. Th\u00f4ng tin v\u1ec1 Update c\u1ee7a Sophos<\/strong><\/p>\n\n\n\n<p>Chu k\u1ef3 c\u1eadp nh\u1eadt \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 cho ph\u00e9p t\u1ea5t c\u1ea3 c\u00e1c t\u1ed5 ch\u1ee9c th\u1ef1c hi\u1ec7n c\u1eadp nh\u1eadt m\u1ed9t c\u00e1ch nhanh ch\u00f3ng cho ng\u01b0\u1eddi d\u00f9ng cu\u1ed1i v\u00e0 kh\u00f4ng \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn hi\u1ec7u su\u1ea5t.<\/p>\n\n\n\n<p>C\u00e1c b\u1ea3n c\u1eadp nh\u1eadt \u0111\u01b0\u1ee3c chia th\u00e0nh 3 lo\u1ea1i: h\u00e0ng ng\u00e0y, h\u00e0ng th\u00e1ng v\u00e0 th\u01b0 vi\u1ec7n g\u1ed1c<\/p>\n\n\n\n<p><strong>C\u1eadp nh\u1eadt h\u00e0ng ng\u00e0y<\/strong><\/p>\n\n\n\n<p>T\u1ea7n su\u1ea5t: trung b\u00ecnh 5 \u0111\u1ebfn 10 l\u1ea7n m\u1ed9t ng\u00e0y<\/p>\n\n\n\n<p>K\u00edch th\u01b0\u1edbc: thay \u0111\u1ed5i theo t\u1ea7n su\u1ea5t, trung b\u00ecnh 150KB m\u1ed7i ng\u00e0y, \u0111\u01b0\u1ee3c chia th\u00e0nh nhi\u1ec1u l\u1ea7n ph\u00e2n ph\u1ed1i trung b\u00ecnh t\u1eeb 10Kb \u0111\u1ebfn 30 Kb.<\/p>\n\n\n\n<p>Khi SophosLabs x\u00e1c \u0111\u1ecbnh m\u1ed1i \u0111e d\u1ecda kh\u00f4ng x\u00e1c \u0111\u1ecbnh c\u00f3 th\u1ec3 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn kh\u00e1ch h\u00e0ng, c\u00e1c c\u1eadp nh\u1eadt s\u1ebd \u0111\u01b0\u1ee3c c\u00f4ng b\u1ed1. C\u00e1c b\u1ea3n c\u1eadp nh\u1eadt n\u00e0y c\u00f3 k\u00edch th\u01b0\u1edbc nh\u1ecf \u0111\u1ec3 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c ph\u00e2n ph\u1ed1i nhanh ch\u00f3ng v\u00e0 kh\u00f4ng \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng m\u1ea1ng. Vi\u1ec7c ph\u00e2n ph\u1ed1i n\u00e0y c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1ea5t c\u1ee9 l\u00fac n\u00e0o v\u00ec ch\u00fang l\u00e0 m\u1ed9t b\u1ea3n c\u1eadp nh\u1eadt kh\u1ea9n c\u1ea5p.<\/p>\n\n\n\n<p><strong>C\u1eadp nh\u1eadt h\u00e0ng th\u00e1ng<\/strong><\/p>\n\n\n\n<p>T\u1ea7n su\u1ea5t: m\u1ed9t l\u1ea7n m\u1ed7i th\u00e1ng<\/p>\n\n\n\n<p>K\u00edch th\u01b0\u1edbc: t\u1eeb 0,5 \u0111\u1ebfn 5 MB, bao g\u1ed3m c\u1eadp nh\u1eadt c\u01a1 s\u1edf d\u1eef li\u1ec7u virus, c\u00e1c \u1ee9ng d\u1ee5ng kh\u00f4ng mong mu\u1ed1n v\u00e0 c\u00e1c \u1ee9ng d\u1ee5ng c\u1ea7n ki\u1ec3m tra (tr\u00f2 ch\u01a1i, v.v., t\u00f9y ch\u1ecdn).<\/p>\n\n\n\n<p>B\u1ea3n c\u1eadp nh\u1eadt th\u00e1ng ch\u00ednh l\u00e0 b\u1ea3n t\u1ed5ng h\u1ee3p c\u00e1c b\u1ea3n h\u00e0ng ng\u00e0y th\u00e0nh m\u1ed9t t\u1eadp tin. Gi\u00fap c\u00e1c m\u00e1y m\u1edbi c\u00e0i \u0111\u1eb7t d\u1ec5 d\u00e0ng up-to-date nhanh nh\u1ea5t.<\/p>\n\n\n\n<p><strong>C\u1eadp nh\u1eadt th\u01b0 vi\u1ec7n<\/strong><\/p>\n\n\n\n<p>T\u1ea7n su\u1ea5t: trung b\u00ecnh 2 l\u1ea7n m\u1ed9t n\u0103m<\/p>\n\n\n\n<p>K\u00edch th\u01b0\u1edbc: t\u1eeb 5 \u0111\u1ebfn 20 th\u00e1ng<\/p>\n\n\n\n<p>C\u1eadp nh\u1eadt th\u01b0 vi\u1ec7n ch\u00ednh l\u00e0 t\u1ed5ng h\u1ee3p c\u00e1c b\u1ea3n c\u1eadp nh\u1eadt th\u00e1ng. B\u1ea3n c\u1eadp nh\u1eadt n\u00e0y th\u01b0\u1eddng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 n\u00e2ng c\u1ea5p gi\u1ea3i ph\u00e1p Endpoint Protection, ch\u1eb3ng h\u1ea1n nh\u01b0 chuy\u1ec3n t\u1eeb phi\u00ean b\u1ea3n 10.3 sang phi\u00ean b\u1ea3n 10.6.<\/p>\n\n\n\n<p><strong>V. B\u1ed9 ti\u00eau chu\u1ea9n tu\u00e2n th\u1ee7 c\u1ee7a Sophos<\/strong><\/p>\n\n\n\n<p>C\u00e1c gi\u1ea3i ph\u00e1p Sophos \u0111\u1ec1u \u0111\u00e1p \u1ee9ng tu\u00e2n th\u1ee7 c\u00e1c ti\u00eau chu\u1ea9n b\u1ea3o m\u1eadt qu\u1ed1c t\u1ebf<\/p>\n\n\n\n<p><strong>5.1. HIPAA<\/strong><\/p>\n\n\n\n<p>Sophos \u0111\u1ea3m b\u1ea3o b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m trong m\u1ecdi l\u00fac v\u00e0 trong m\u1ecdi tr\u01b0\u1eddng h\u1ee3p. \u0110i\u1ec1u n\u00e0y ph\u00f9 h\u1ee3p v\u1edbi y\u00eau c\u1ea7u c\u1ee7a HIPAAA \u0111\u1ec3 b\u1ea3o v\u1ec7 th\u00f4ng tin h\u1ec7 th\u1ed1ng. Sophos UTM, T\u01b0\u1eddng l\u1eeda XG, B\u1ea3o v\u1ec7 m\u00e1y tr\u1ea1m, M\u00e3 h\u00f3a SafeGuard, M\u00e3 h\u00f3a email SPX, thi\u1ebft b\u1ecb di \u0111\u1ed9ng, Wi-Fi, B\u1ea3o v\u1ec7 Web, Sophos Sandstorm, Security Heartbeat v\u00e0 SophosLabs l\u00e0 nh\u1eefng s\u1ea3n ph\u1ea9m ch\u00ednh c\u1ee7a Sophos \u0111\u1ec3 gi\u00fap b\u1ea1n tu\u00e2n th\u1ee7 HIPAA<\/p>\n\n\n\n<p><strong>5.2. DSS PCI<\/strong><\/p>\n\n\n\n<p>Sophos c\u0169ng h\u1ed7 tr\u1ee3 \u0111\u00e1p \u1ee9ng ti\u00eau chu\u1ea9n b\u1ea3o m\u1eadt d\u1eef li\u1ec7u thanh to\u00e1n (PCI DSS)<\/p>\n\n\n\n<p><strong>5.3. CIS<\/strong><\/p>\n\n\n\n<p>\u0110\u01b0\u1ee3c ph\u00e1t tri\u1ec3n b\u1edfi Center for Internet Security, CIS Critical Security Controls, \u0111\u01b0a ra c\u00e1c h\u01b0\u1edbng d\u1eabn v\u00e0 c\u00e1c b\u01b0\u1edbc \u0111\u1ec3 ph\u00f2ng th\u1ee7 kh\u00f4ng gian m\u1ea1ng. Sophos c\u00f3 nhi\u1ec1u kinh nghi\u1ec7m v\u00e0 kh\u1ea3 n\u0103ng \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c tu\u00e2n th\u1ee7 n\u00e0y.<\/p>\n\n\n\n<p><strong>VI. \u0110\u00e1nh gi\u00e1 c\u1ee7a b\u00ean th\u1ee9 3 v\u00e0 so s\u00e1nh<\/strong><\/p>\n\n\n\n<p>Sophos \u0111\u00fang v\u1ecb Top 1 trong b\u00e0i test th\u1ef1c t\u1ebf kh\u1ea3 n\u0103ng nh\u1eadn d\u1ea1ng virus c\u1ee7a NSS Labs 2019<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-79.png\" alt=\"\" class=\"wp-image-5030\"\/><\/figure>\n<\/div>\n\n\n<p>Sophos c\u00f3 13 n\u0103m li\u00ean t\u1ee5c n\u1eb1m trong nh\u00f3m Leader c\u1ee7a Gartner v\u1ec1 gi\u1ea3i ph\u00e1p Endpoint Protection<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-80.png\" alt=\"\" class=\"wp-image-5031\"\/><\/figure>\n<\/div>\n\n\n<p>T\u1ed5ng h\u1ee3p c\u00e1c \u0111\u00e1nh gi\u00e1 c\u1ee7a b\u00ean th\u1ee9 3<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-81.png\" alt=\"\" class=\"wp-image-5032\"\/><\/figure>\n<\/div>\n\n\n<p><strong>So s\u00e1nh v\u1edbi c\u00e1c gi\u1ea3i ph\u00e1p kh\u00e1c ( Vui l\u00f2ng li\u00ean h\u1ec7 Sophos \u0111\u1ec3 c\u00f3 b\u1ea3ng so s\u00e1nh chi ti\u1ebft)<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/assets.vacif.com\/2023\/04\/image-83.png\" alt=\"\" class=\"wp-image-5034\"\/><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>I. Gi\u1edbi thi\u1ec7u 1.1. Gi\u1edbi thi\u1ec7u v\u1ec1 Sophos Ng\u00e0y nay, c\u00e1c doanh nghi\u1ec7p \u0111ang ph\u00e1t tri\u1ec3n theo xu h\u01b0\u1edbng v\u1eadn h\u00e0nh h\u1ec7 th\u1ed1ng d\u1ef1a tr\u00ean c\u00f4ng ngh\u1ec7 v\u00e0 c\u00e1c d\u1ecbch v\u1ee5 cloud \u0111\u1ec3 d\u1ec5 d\u00e0ng tri\u1ec3n khai h\u1ec7 th\u1ed1ng c\u0169ng nh\u01b0 t\u1ed1i \u01b0u h\u00f3a chi ph\u00ed. V\u00ec v\u1eady vi\u1ec7c b\u1ea3o m\u1eadt h\u1ec7 th\u1ed1ng c\u0169ng tr\u1edf [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":971,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"enable","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[4,80],"tags":[],"class_list":["post-869","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-giai-phap","category-huong-dan-tai-lieu","entry","has-media"],"_links":{"self":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts\/869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/comments?post=869"}],"version-history":[{"count":1,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts\/869\/revisions"}],"predecessor-version":[{"id":871,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts\/869\/revisions\/871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media\/971"}],"wp:attachment":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media?parent=869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/categories?post=869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/tags?post=869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}