Do you recognize a good idea when you see one? We want to hear from you!
Header Image

UTM (Formerly ASG) Feature Requests

Do you have an idea for Sophos UTM? Do you recognize a good idea when you see one? We want to hear from you!

I suggest you ...

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. URL re-writing of links within all suspicious emails

    A frequent tactic has been to send users socially engineered emails that are designed to entice the user to click a URL within the email. The URL web destination either automatically initiates a download, or tricks the user to enter sensitive or private information.

    Also there are employees which actually do not fall in to protection of firewalls and other mechanism since they are on the road. Having this capability in UTM would increase capability a lot for some serious deployments. However, even SMB has these needs since their endpoints are often compromised for some other stuff to be done.…

    4 votes
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      I agree to the terms of service
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
    • copy / paste firewall and web filter rules and or import/export per rule would be great (like TMG)

      In TMG it's possible to import/export per rule or object. Also you can copy/paste rules or objects from one TMG to another. It would be great to have this on the Sophos UTM.

      1 vote
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        I agree to the terms of service
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        0 comments  ·  Application Control  ·  Flag idea as inappropriate…  ·  Admin →
      • It would be beneficial to be able to trace by which Apple ID, the ipad’s are registered with.

        We use Sophos MDM for iPads and androids. We would like a feature where we can trace and ensure that iPads are registered with GEH Email address. This will help in resetting the device if user leaves. Thanks.

        1 vote
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          I agree to the terms of service
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          0 comments  ·  Flag idea as inappropriate…  ·  Admin →
        • Configurable http-port for WPAD configuration file download

          Web browsers automatic configuration feature uses wpad as hostname and http-port 80 (http://wpad/wpad.dat) to get the wpad.dat file.

          Unfortunately the UTM publish the wpad.dat file on the proxy-port (typically 8080) only.

          Please implement the possibility to setup the http-port for WPAD publishing.

          Thank you!

          11 votes
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            I agree to the terms of service
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            1 comment  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
          • Encryption free zones / APT detection

            It would be nice (not sure if technically possible) if there was the ability to detect and block known encryption techniques on the local LAN.

            Discussed here http://searchsecurity.techtarget.com/tip/Using-crypto-free-zones-to-thwart-advanced-attacks

            Advisories use encrypted tunnels to communicate with C&C servers. The blocking/Alerting of any kind of none white-listed encryption would help prevent C&C communication and signify infection.

            Any device requiring encryption would need to be white listed, other connections (like web browsing) would need to be performed by the UTM.

            1 vote
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              I agree to the terms of service
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              0 comments  ·  Application Control  ·  Flag idea as inappropriate…  ·  Admin →
            • Probe network for rogue or conflicting DHCP servers

              The DHCP Server built into Windows will only start if no other DHCP server is detected on the network segment. I would suggest incorporating this function into the UTM by sending out a DHCP lease request and waiting for a reply before enabling the internal server. If a reply to the request is received indicate to the user that another DHCP server is already active on the network and must be shutdown prior to enabling it on the UTM.

              In addition to probing before enabling the internal DHCP server periodic requests should be sent out on the network to look…

              3 votes
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                I agree to the terms of service
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
              • Policy test for non-domain environment with SAA (Sophos authentication agent)

                Policy test does not work with SAA (Sophos Authentication Agent), therefore you cannot test access in non-domain environment, when you use authentication.

                3 votes
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  I agree to the terms of service
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                • WebAdmin: Related objects/configurations should be directly clickable

                  When clicking the "Show where this object is in use and its last change" button, a list of related objects and configurations is shown.

                  These related objects and configurations should be clickable to be taken directly to the specified object or configuration.

                  12 votes
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    I agree to the terms of service
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    0 comments  ·  Usability/GUI  ·  Flag idea as inappropriate…  ·  Admin →
                  • telegram

                    A filter for Telegram messaging app

                    1 vote
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      I agree to the terms of service
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      0 comments  ·  Application Control  ·  Flag idea as inappropriate…  ·  Admin →
                    • Provide Admins a way to Disable 802.11b

                      I've had several customers ask for the ability to disable 802.11b, etc. for wireless networks they have deployed. This is to increase performance (less radio "noise", etc.

                      6 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        I agree to the terms of service
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        0 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
                      • OCSP Stapling Support for WAF

                        Please can you Support OCSP Stapling.

                        The obvious advantage to OCSP Stapling is the improvement in
                        speed and availability of the OCSP certificate status check.

                        OCSP Stapling helps maintain the privacy of the end user, since a CA can see which web sites a user has visited (only those web sites that have certificates issued by the CA). If OCSP Stapling is used, the CA will see OCSP requests
                        only from the web site, not the web site’s end users.

                        Many wi-fi hotspots use Captive Portals to control access to the
                        Internet, sometimes requiring entry of a credit card number…

                        9 votes
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          I agree to the terms of service
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          0 comments  ·  Web Server Protection  ·  Flag idea as inappropriate…  ·  Admin →
                        • Improvement on hotspot vouchers: device numbers and better cutting lines

                          Hello,
                          at the moment vuouchers does not show the number of devices that are allowed to connect using the passcode. I think It would be useful to add this information. We set 2 devices for each code, but users does not know this info and they often take 2 vouchers, 1 for laptop 1 for smartphone.

                          Also the format of cutting lines should be improved. They should be smaller and positioned at the borders of page, not in the middle. We have some difficulties cutting them correctly and all of the same size.

                          1 vote
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            I agree to the terms of service
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            2 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
                          • UTM up2date proxy

                            Would be great if a central UTM can act as a proxy for other UTM

                            4 votes
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              I agree to the terms of service
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              1 comment  ·  Flag idea as inappropriate…  ·  Admin →
                            • PDF

                              The Web protection report was exported to PDF.
                              When copy and paste the contents of the PDF to text file, garbled occurs.

                              It is hoped to be changed so as not to generate the garble.

                              2 votes
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                I agree to the terms of service
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                1 comment  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                              • WAN links multipath on RED

                                Recently I come across a situation where on WAN 1, it is connected to a ADSL connection with a very slow upload speed, on WAN2, it's connected to a 4G network. It would be great if there is a feature like multipath so that all the upload traffics go through WAN 2 on a faster upload speed.

                                1 vote
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  I agree to the terms of service
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  0 comments  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
                                • Additional supported 4G devices for 3G/UTMS failover RED50

                                  With the wide use of 4G network around the world, I would like to see the REDs have better supported 4G devices for failover rather than just only 1 at the moment which is not very common and hard to find.

                                  1 vote
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    I agree to the terms of service
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    0 comments  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
                                  • multiple SUM instances

                                    The current central management interface in a UTM allows for two SUM servers. However this is really for a primary and secondary scenario.

                                    We have customers that have their own instance of SUM, it would be nice if they could add the UTM in our datacenter to their own SUM, if we could somehow limit their access to areas of the config we deem manageable by the customer.

                                    3 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      I agree to the terms of service
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      0 comments  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
                                    • Route All traffic from Endpoint to UTM Proxy (like TMG agent)

                                      At this moment (UTM 9.2), Sophos Authentication Agent have only one function - map IP and User.

                                      But TMG customers like to use a TMG agent, which can route all outbound traffic from host (not only http/s) to TMG proxy.

                                      If we will have such functionality, this will allow us:
                                      - have all traffic on UTM from host (even UTM not as Default GW).
                                      - use this agent for Terminal servers (separate different users by ranges of ports).

                                      10 votes
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        I agree to the terms of service
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        0 comments  ·  Application Control  ·  Flag idea as inappropriate…  ·  Admin →
                                      • SPX Reply Portal Attachments

                                        The built in "Reply Portal" for SPX should allow the recipient to attach files with their reply.

                                        106 votes
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          I agree to the terms of service
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          4 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                        • Ability to choose syslog severity

                                          I cannot believe this is not possible it is a standard feature of most networking/security products.

                                          The ability to define what level of severity you want output to your syslog server. Currently its either ALL or NOTHING. When running log correlation you do not want the syslog server filled up with noise.

                                          RFC 5424 defines the ability to set severity levels, can this be implemented ASAP along with any other logging improvements.

                                          Thank you

                                          2 votes
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            I agree to the terms of service
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
                                          • Don't see your idea?

                                          Feedback and Knowledge Base