Do you recognize a good idea when you see one? We want to hear from you!
Header Image

UTM (Formerly ASG) Feature Requests

Do you have an idea for Sophos UTM? Do you recognize a good idea when you see one? We want to hear from you!

I suggest you ...

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can vote and comment on it.

If it doesn't exist, you can post your idea so others can vote on it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  1. Backup databases/reports/data on the Sophos UTM in addition of the system configuration.

    Backup databases/reports/data on the Sophos UTM in addition of the system configuration.

    17 votes
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      I agree to the terms of service
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
    • SPX Encryption > Receiver Password Portal Setup & Reset

      A way to remove the need for Password Notifications send to User, Administator or Other. An external facing portal page that allows a notice to be sent to the receiver for them to register w/ e-mail verification to setup to access their password for the SPX attachment. Basically allowing a local service similar to Cisco RES for messages sent from your Sophos UTM. Obviously, this could be limited in that if a per-email password is used by the sender it would not be able to work. Also a password reset would only work for future e-mails as the PDF is…

      61 votes
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        I agree to the terms of service
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        5 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
      • Import IP addresses from txt or CSV file to network definitions in Web Manager

        I have over 3500 IP addresses I need to add into my network definitions. I need to add them all to firewall definitions. It would save me so much work if I could just import these IP addresses as a CSV into a bunch of network definitions.

        It would be even more advantageous if I could import the IP addresses to network definitions and have them all automatically go into a network group.

        33 votes
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          I agree to the terms of service
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          2 comments  ·  Usability/GUI  ·  Flag idea as inappropriate…  ·  Admin →
        • Sort Domains in various fields

          It would be nice if we would be able to Sort the Domain-Lists in fields like Webserver Protection - virtuell Webserver
          Web Protection - Filtering Options
          etc.

          5 votes
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            I agree to the terms of service
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            0 comments  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
          • Data control for Office 2013

            Log and/or Block attachments in Outlook 2013 (re: data control policy). Worked in Outlook 2010 which is one of the reasons we selected your product for our needs. Disappointed
            that it’s stopped working in Outlook 2013 as we now have to select a product replacement that will provide us this protection.

            2 votes
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              I agree to the terms of service
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
            • SPX

              Now that UTM 9.2 supports outgoing SPX email encryption i'd like it to also offer the same recipient self registration portal for password management based on user similar if not exactly the same as the existing Sophos Email Appliance.

              I think this would get many of my clients with existing firewall/vpn infrastructure who are also looking for email encryption off the fence and buy into the UTM. Unfortunately the encryption piece as it stands now is a bit tedius and isn't as user friendly as it could be

              31 votes
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                I agree to the terms of service
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
              • Enhance Application Control App Categorization

                Lot of people would like to be able to easily block advertisers, web trackers and analyzers to enhance their surf experience in general and to enhance privacy too by blocking all those trackers and analyzers.

                There are already >150 of such advertisers, trackers and analyzers as apps in the UTM's application control. Sadly all of them are categorized as "web services", which is misleading andunhelpful, as in this category are also CNET and Mozilla downloadservers, CDN's as Akamai etc., whic disallows a simply general block af that category.

                I propose, that this "web services" category will be splitted further into …

                100 votes
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  I agree to the terms of service
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  0 comments  ·  Application Control  ·  Flag idea as inappropriate…  ·  Admin →
                • WAF Reverse Authentification: several Windows domains

                  When we create an Authentification Service of type Active Directory, we can use only one Windows Domain. We can configure several Domain Controllers, but since the authentification progres fails at the first deny it does not male sense to configure DCs from several domains (am I right)?
                  So when we could configure several domains (and in the WAF the possibility to choose which ones to use) we could build multi-domain scenarios: one that's very common is a corporate domain for stuff like exchange, intranet and so on - and a DMZ domain for extranet portals, usually with a one-way domain…

                  6 votes
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    I agree to the terms of service
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                  • Update dyndns hostname with the public IP address used by RED to connect to UTM

                    UTM already shows in the main RED tab the IP addresses used by the RED devices do connect to the UTM. It would be great if this IP address could be used to update a dyndns host name and thus allow monitoring if the internet link of the remote side of the tunnel, when dynamically assigned IP are used on the remote side. Today, on a dropped RED connection, there is no way to know if the problem is with the remote internet link or the tunnel between sites.

                    15 votes
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      I agree to the terms of service
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      0 comments  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
                    • Server Load Balancing: Alternate internal port than external

                      Just like NAT allows, let us choose an alternate port to redirect traffic to on the internal servers. Right now, whatever is external is internal, and it forces us to use NAT which kills any option to have high-availability and load balancing.

                      67 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        I agree to the terms of service
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        2 comments  ·  Flag idea as inappropriate…  ·  Admin →
                      • Make the notification editable and fix the typo in the "Notification of potentional leak of data"

                        I just setup a new UTM and enabled SPX encryption. The sender receives a notification with a subject of "Notification of potentional leak of data". First off, the word in the subject is misspelled. Users are slamming my department for this "mistake". Secondly, the title of the notification sounds so ominous and negative to the end user. Everyone is worried they are doing something wrong when the action is completely legitimate. I would love to have the ability to customize this notification or just simply turn it off. With the notification turned off the sender still receives the email that…

                        1 vote
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          I agree to the terms of service
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          1 comment  ·  Notifications  ·  Flag idea as inappropriate…  ·  Admin →
                        • Hitcount for Firewall policies

                          to show how often a firewall policies got hits it would nice to see it in a dashboard or a report. So it is easier to clean up older policies

                          6 votes
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            I agree to the terms of service
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
                          • Devices based firewall rules

                            In Present Era of BYOD,would be great to have device based firewall rules & UTM controls..eg: Android devices in network could be blocked,Windows devices to be allowed etc

                            3 votes
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              I agree to the terms of service
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
                            • Web Filter - Bypass Users - Specific Sites

                              Current - A user listed in Bypass Users is able to bypass any site for which Unblock URL button is enabled.

                              Desired - A user listed in Bypass Users is able to bypass SPECIFIC sites for which Unblock URL button is enabled.

                              Rationale - Certain users need to access certain sites which should otherwise be blocked. However, adding them to the Bypass Users group allows them access to ANY blocked sites, which is too much power.

                              4 votes
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                I agree to the terms of service
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                              • Add a spam score for domain age

                                A lot of the spam that is getting through our current mail filtering is coming from .US domains that are less than an hour old (definitely less than a day). Since blacklisting works when something is known to be bad, this class of spam is harder to hit as the domains are still wearing diapers.

                                Any chance of having a score that checked the domain registration date? If it were weighted high on our system, I would've been spared seeing my last dozen spammy offers for car insurance, russian brides and bogus gift cards from Amazon, JC Penny(their spelling, not…

                                4 votes
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  I agree to the terms of service
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  1 comment  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                • Implement a console type interface into the UTM for controlling the endpoints.

                                  The UTM endpoint protection should have a way to view the quarantine items on the endpoints and authorise or clean what it has discovered. If the application is to be authorised there should be a way to auto add this directly to the exceptions policy. The ability to run a scan of the endpoint from the UTM should also be included. Currently the UTM implementation of the endpoint protection is more like a notice than a central management point, meaning the admin has to go to the machines in question (either physically or with a remote connection) to investigate the…

                                  17 votes
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    I agree to the terms of service
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    2 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                  • Mobile Control

                                    Fully integrate Sophos Mobile Control into the UTM WebAdmin console.

                                    8 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      I agree to the terms of service
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      0 comments  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
                                    • Active Directory backed groups to be usable in the Firewall configuration

                                      We require the Active Directory backed groups to be usable in the Firewall configuration. In our environment we have a secure data centre housing our customers servers. Our support manager or IT team assign rights to individual members of staff on a ticket by ticket basis for access to various parts of the hosted environments. For example one support ticket may require Remote Desktop access, whereas another may
                                      require SQL server access.

                                      We have configured the relevant rules in the UTM to allow people in a specific AD group to connect to the Remote Desktop ports over the VPN. The…

                                      1 vote
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        I agree to the terms of service
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        1 comment  ·  Flag idea as inappropriate…  ·  Admin →
                                      • Use Splunk for all of your reporting of logs

                                        Index any machine data regardless of format or location--logs, clickstream data, configurations, sensor data, traps and alerts, change events, the output of diagnostic commands, data from APIs and message queues, and even multi-line logs from custom applications. With no predefined schema, data can be indexed from virtually any source, format or location. Then it's available for troubleshooting, security incident investigations, network monitoring, compliance reporting, business analytics and other valuables uses. I'm sure a deal could be worked out with them, you get 500mb/day of indexing for free

                                        1 vote
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          I agree to the terms of service
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          0 comments  ·  Reporting  ·  Flag idea as inappropriate…  ·  Admin →
                                        • Add IPv4 and IPv6 selection to DynDNS

                                          When adding a dyndns provider, there is no way to specify the IPV4 or IPV6 address of an interface. This is a legacy carry over as one interface traditionally could only have one DHCP IP address, but this is no longer true.

                                          Having a choice would allow us to create two different dyndns entries to update A and AAAA records.

                                          3 votes
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            I agree to the terms of service
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            0 comments  ·  Networking  ·  Flag idea as inappropriate…  ·  Admin →
                                          • Don't see your idea?

                                          Feedback and Knowledge Base