Do you recognize a good idea when you see one? We want to hear from you!
Header Image

UTM (Formerly ASG) Feature Requests

Do you have an idea for Sophos UTM? Do you recognize a good idea when you see one? We want to hear from you!

I suggest you ...

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Support OTP for more facilities

    We need OTP support for Cisco VPN and L2TP over IPsec VPN. These are the only supported configurations that can be pushed to Sophos Mobile Control and used on iOS devices out of the box.

    3 votes
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Authentication  ·  Flag idea as inappropriate…  ·  Admin →
    • Customize Hotspot POTD Message

      the mail sent should be customizeable like spx or whatever, we have to present the potd on infoscreens, so a basic layout wich is ci conform should be very helpfull to put it on a email enabled screen.

      1 vote
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        0 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
      • Fully disable Tamper protection from Manage Groups tab

        Currently the EP's own policy will override the group policy. It has been designed so that if you have one machine within a group that needs tamper protection disabled this can be done easily without having to create a new group and assign it a different policy. However when you need to migrate from UTM endpoints to Cloud endpoints this means you would have to go into each individual one and turn it off - not practical when you have over 1000 EPs.

        1 vote
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
        • dublicated object detection

          often when two admins work on the same utm they create rules with identical hosts but don't know the object name the other one gave, so they create their own object definition which points to an identical host.
          Please include a warning when trying to create an existing definition and provide an option to find dublicated definitions and to combine them into one object.

          6 votes
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            0 comments  ·  Usability/GUI  ·  Flag idea as inappropriate…  ·  Admin →
          • 1 vote
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              0 comments  ·  Flag idea as inappropriate…  ·  Admin →
            • RED PCI Compliance Changes

              PCI Compliance will always fail on current UTMs using RED. This is due to being unable to disable SSL v3 on this as well as being unable to change the certificates used (currently weak, not using at least 2048 bit keys). Please fix!

              117 votes
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                7 comments  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
              • Shorter AD Synchronization

                We like to have a much shorter period for the AD-Synchronisation.
                The sync interval is by default every 2 hours.
                We need a sync intervall of 5 minutes or to make it costumable.

                3 votes
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  0 comments  ·  Authentication  ·  Flag idea as inappropriate…  ·  Admin →
                • Live Log for color-blind People, New Column

                  Feature to Add a New Column witch represent the row color

                  3 votes
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
                  • to include the SMNP capability in the web appliances

                    to include the SMNP capability in the web appliances

                    1 vote
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      0 comments  ·  SNMP Monitoring  ·  Flag idea as inappropriate…  ·  Admin →
                    • Allow for the configuration of disabled features, such as Web Protection, so they're configured first before they're enabled.

                      If your UTM is in production, and you want to enable a new feature, you must first enable it before you can configure it. However, some features will start interacting with network traffic as soon as they are enabled even without configuration.
                      It would be beneficial to put features into "configuration" mode so that they can be configured and tweaked before being enabled fully for production.

                      6 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        0 comments  ·  Usability/GUI  ·  Flag idea as inappropriate…  ·  Admin →
                      • Allow Firewall rules to be members of multiple groups

                        Allow Firewall rules to be members of multiple groups so they can be associated with several rule sets.
                        Or even allow them to be given tags so all rules can be listed that have a particular tag assigned.
                        Sometimes it a firewall rule does not just fall under one group of rules.

                        3 votes
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
                        • NOT filtering for firewall rules (and anywhere else with rules)

                          Could we have the Firewall interface modified to allow us to apply an inverse rule - that is, filter traffic that does not match the criteria we have put forward. Especially since IPtables can do inverse filtering just fine.

                          It'd be nice if we could also do the same in the Exceptions tab for various protections, that would make them much more powerful.

                          3 votes
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
                          • Auto-create user objects based on Web SSO authentication

                            Allow UTM to create user objects based on Active Directory authentication rather than creating them manually. E.g. for unblocking websites, it can already see the
                            users in the web logs so should be able to add to the UTM?

                            This means as soon as a user opens a web browser on a system which has AD configured, the UTM would have an option to auto-create the user this way. Then, it would
                            be much simpler to add rules based on users or groups..

                            Even better, a fully integrated AD solution which would read Groups and Users so you could then…

                            1 vote
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                            • Support server-sent-events (HTML5)

                              SSE being blocked by web protection. When you switch off Web Protection SSE will work again. Server-sent-events use the text/event-stream MIME type and the connection remains open for long periods of time. No data gets to the client when Web Protection is enabled - I'm guessing because it is treating it as a download and waiting for it to finish before passing on to the client.

                              1 vote
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                              • Add support to copy/duplicate policy rules

                                Copernicus Project
                                This will help us to reduce time, management in this operation.
                                Policy Rules with the same same destination, ports, gateway through but with the source address different, could be easily cloned with based from other one.

                                22 votes
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  0 comments  ·  Networking  ·  Flag idea as inappropriate…  ·  Admin →
                                • Bulk User Account Creation

                                  For installations not leveraging Active Directory for user creation it would fantastic if you provided the ability to upload a CSV or similar file format with the requisite information for user creation.

                                  This would vastly improve the experience, speed and efficiency of initial user account creation and deployment.

                                  1 vote
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    1 comment  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
                                  • Clearly show that response from SPX Mail is encrypted or not.

                                    When a recipient of an SPX email sends a response, there is no indication that the response email is encrypted except in the header information. For litigation purposes, we must verify/validate that the senders' response/s and attachment/s are actually encrypted.

                                    3 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                    • Add regex support to Blacklisted Address Patterns

                                      We've got a problem with whaling attacks and I'd like to block domain names that are similar to our own. Attackers are sending us mail using juxtaposed letters, dropping vowels, or doubling a single letter in our domain name hoping to start a dialog with employees in control of finances or other resources.

                                      I can see this being shockingly easy to goof up leading to all mail being dropped, but there's also no easy way to guess and include combinations of domain names that could be used for this purpose.

                                      ^(?!example\.com)[example]{6,8}\..+$
                                      example.net
                                      example.com
                                      eaxmple.com
                                      exaample.com
                                      exmaple.com
                                      exampel.com

                                      3 votes
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                      • RED bridge to lan

                                        RED device does not currently bridge the existing 'internal' interface on the UTM. when you set it up you have to create a seperate ip from the 'internal' dhcp. therefore it does not show up on the same LAN. it is on a seperate LAN.

                                        bridge to lan feature like the AP devices would be a great addition. this way everything is on the same network and can view networked drives or computers or shares.

                                        i have made a workaround to fix it for now until there is an update. it is as follows.

                                        ***make backup prior***

                                        1: add red…

                                        12 votes
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          1 comment  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
                                        • Hi, i need in mail manager access to the clean mails, the same access like to mailware or spam.

                                          Hi, i need in mail manager access to the clean mails, the same access like to mailware or spam. Actually are mails in clean there i cant delete.
                                          Sorry for my very well english. I hope any understand me.
                                          Many thanks. Bye.

                                          1 vote
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                          • Don't see your idea?

                                          Feedback and Knowledge Base