BEST PRACTISE SECURITY POLICIES. 3.1 As part of the Subscription, the Supplier will enforce secure, best practise threat protection policies for endpoint protection. to These policies will dictate the automated behaviour of the software for the purposes of; 3.1.1 detection of known malware; 3.1.2 “in-cloud” checks to allow detection of the latest malware known to Sophos; 3.1.3 proactive detection of malware that has not been seen before; 3.1.4 automatic clean-up of malware; and 3.1.5 server endpoints only, automatic exclusion of activity by known applications from scanning. 3.2 If the Customer requires changes to be made to any automated policy, amendments can be made by the Supplier: either (i) by way of Professional Services on a time and materials basis, or (ii) if Managed Security Support, where purchased by the Customer pursuant to an Order. 3.3 The Sophos Intercept X Essentials product does not have the functionality to make changes. An upgrade to Intercept X Advanced must be purchased from the Supplier or Sophos.
Appears in 7 contracts
Sources: Service Agreement, Services Agreements, Services Agreements