Do you recognize a good idea when you see one? We want to hear from you!
Header Image

UTM (Formerly ASG) Feature Requests

Do you have an idea for Sophos UTM? Do you recognize a good idea when you see one? We want to hear from you!

I suggest you ...

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Improve reporting for Advanced Threat Protection

    Presently ATP reports the IP of the advanced threat. It does not report the DNS name.

    In most larger networks, all DNS requests go through an internal DNS server, Domain Controller or whatever. Therefore any alert from the ATP will identify the DNS server as the requesting host.

    For Windows DNS logging the brief logging does not capture the IP address returned from the resolver, only the DNS name submitted. Whilst it is possible to turn on complete logging which will return this information such logging is very, very verbose, and it is generally impractical to have permanently turned on.

    32 votes
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
    • IEEE 802.1X authentication on RED devices

      It would be great if you could define MAC-based authentication on the RED devices with 802.1X and a RADIUS server to ensure that just our own notebooks and phones on the remote locations can enter our company network. Foreign MAC-adresses should not be authenticated and blocked.

      12 votes
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        0 comments  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
      • Reverse proxy add encodedslashes option

        Please provide the option in the Reverse proxy to enable encodedslashes for a specific virtual webserver.

        Because some web applications use for example %2F for a slash and the reverse proxy cannot translate this back to / because of allowencodedslashes is not enabled by default. So this results in a 404 error.

        http://httpd.apache.org/docs/current/mod/core.html#allowencodedslashes

        When changing the configuration file of the reverseproxy it is working fine, but the configuration is overwritten all the time. So a checkbox in the Webadmin to enable this option would be nice.

        15 votes
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          0 comments  ·  Web Server Protection  ·  Flag idea as inappropriate…  ·  Admin →
        • Allow both RADIUS and Local Authentication for L2TP VPN Connections

          Allow L2TP VPN connections to use both RADIUS authentications for local domain users and LOCAL authentication for external (vendor/contractors) use.

          1 vote
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            0 comments  ·  VPN  ·  Flag idea as inappropriate…  ·  Admin →
          • traffic dashboard

            Add Network Usage graphs to dashboard. The current day network usage graphs should be able to be added to the dashboard just like the concurrent connections.

            3 votes
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              0 comments  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
            • UTM Legacy Encryption support for Web Filtering in Decrypt & Scan mode

              When using Web Filtering in Decrypt & Scan mode websites that use legacy encryption (ie TLSv1, TLSv1.1) report certificate warnings. The sites are inaccessible unless the Intermediate CA's are imported under Web Protection > Filtering Options > HTTPS CA's. Customer's need an option to support legacy encryption in Decrypt & Scan mode to allow access to these websites if they choose.

              1 vote
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
              • Add Dropcam traffic to Application Control

                Dropcam is a WIFI camera by a company called Nest. Nest creates the Nest thermostat, and the Nest Protect smoke alarms.
                Here is a link to what Dropcam is: https://www.dropcam.com/

                Sophos UTM shows Dropcam traffic as "OpenVPN" using TCP 443
                It would be helpful if we could see this traffic as Dropcam traffic

                7 votes
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  2 comments  ·  Application Control  ·  Flag idea as inappropriate…  ·  Admin →
                • To add a feature for identifying & understanding the "Severity of Threat" (Virus, spyware, adware, webrep, PUA)

                  We used to analyse the threats. It could be either virus / spyware / adware / PUA. For a specified threat, we need to know the severity of the same. Help us to create a new feature for this ASAP.

                  1 vote
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                  • Support for more Windows Active Directory login formats

                    Please support more allowed AD login formats for pre authentication and/or implement the possibility to rewrite (with regex) the login strings before authentication.

                    I have lot of ActiveSync users in a multiple domain environment for example and they are pre authenticated with a TMG. At the moment it isn’t possible to move the service to the UTM. Our ActiveSync clients (iPhone/Windows Phone) authenticate in most cases with the following formats:

                    NT4-domain\username
                    W2K-domain\username

                    With a rewriting feature I would rewrite W2K-domain\username” to username@W2K-domain (UPN-Style). The user could be authenticated with LDAP now.

                    17 votes
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      0 comments  ·  Authentication  ·  Flag idea as inappropriate…  ·  Admin →
                    • Set RTS and CTS Thresholds

                      Often to troubleshoot hidden node and near/far problems the best method is to change RTS and CTS thresholds. These are often configurable on the router at the AP level. This should be possible through the Wireless Protection settings.

                      3 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        0 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
                      • Sophos able to capture email and forward to recipient

                        Option to be able to forward all incoming mail to a particular email address so the user can then interrogate and forward to the relevant party. I believe this currently exists in the ES.

                        4 votes
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                        • Sophos UTM quarantine of email attachments of a certain size.

                          UTM able to quarantine email attachments of certain sizes, so users can visit the user portal and release/reject large files.

                          4 votes
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                          • SUM: Central Certificate Managment

                            It will be nice, when it will be possible to organize own Certificates via SUM for all Sophos UTMs.
                            At the moment, I have to connect to all UTMs manual to install some root certifiacte manually (for example for this problem: https://www.sophos.com/en-us/support/knowledgebase/122257.aspx )

                            3 votes
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              0 comments  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
                            • Provide ability to configure de-authorization timeout on wireless.

                              We have recently run into an issue with out older Spectrum barcode scanning guns when deploying Wireless APs. On the old APs, we were able to configure the de-authorization timeout value and set it to a high enough threshold to keep the guns active even when idle for a short time. This is not configurable on the Sophos APs and devices are becoming de-authorized in too short of a time, less than 60 seconds when no active.

                              3 votes
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                0 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
                              • kl

                                Generate an email alert for high CPU and RAM usage

                                It would be nice to be alerted via email (or other methods) when the CPU usage or CPU usage of the Sophos appliance gets above a certain threshold. We have had issues where our customers suffer from slow internet speeds that are caused by high device utilization. It would be nice to be alerted to this.

                                3 votes
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  0 comments  ·  Reporting  ·  Flag idea as inappropriate…  ·  Admin →
                                • Users are able to login via SSL VPN (when password expired for example weekend) without any IT intervention.

                                  This is very important, because many company use this type of password policy and in this from of SSL VPN is usable. For example, at the weekend there aren’t AD sysadmin at many company so in this time, when password expired the users unable to login via SSL VPN.

                                  1 vote
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                                  • Agentless authentication

                                    Hello, is it plan to implement something like agentless authentication of clients computers? For example- Some agent service in active directory supervising the kerbos tickets and by this way using them in group or user based firewall rules?
                                    THX a lot for answer

                                    3 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      0 comments  ·  Authentication  ·  Flag idea as inappropriate…  ·  Admin →
                                    • By adding an option to mark as spam emails with no “From” field, this gives the administrator more control over blocking such emails.

                                      How will this new feature address your business requirements?: By adding an option to mark as spam emails with no “From” field, this gives the administrator more control over blocking such emails. At the moment, blank From fields
                                      are getting through the Pure Message Filter. It would also be valuable for Pure Message to display machines sending emails out as this would identify machines on the network with a potential problem.

                                      How would you rate the importance of this feature?; 1 = Critical, 5 = Nice-to-have: 1 – If someone crafts an email with no From field, linking to malware…

                                      1 vote
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                                      • QoS for group

                                        We will require feature to allocate bandwidth speed to specific group or user in utm

                                        1 vote
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                        • Allow SG115 bridged to LAN network

                                          Currently it's not possible to use the integrated AP on the SG 115 for a bridged to LAN SSID. Most customers have purchased this unit to use it in this way rather than as a separate zone AP. Could the UTM be updated so we can use it as bridged and separate zone.

                                          16 votes
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            1 comment  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                          • Don't see your idea?

                                          Feedback and Knowledge Base