Do you recognize a good idea when you see one? We want to hear from you!
Header Image

UTM (Formerly ASG) Feature Requests

Do you have an idea for Sophos UTM? Do you recognize a good idea when you see one? We want to hear from you!

I suggest you ...

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can vote and comment on it.

If it doesn't exist, you can post your idea so others can vote on it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  1. encrypt a message released from quarantine

    Make it so a message that is released from quarantine could be encrypted

    For instance, outbound message has credit card numbers in it, so it is quarantined. The Admin see this and knows the email must go through, but it should be encrypted, so encrypt then release.

    1 vote
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      I agree to the terms of service
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
    • ability to block/drop mail from blacklisted senders?

      there is no such option for this, except option to drop spam/confirmed spam alltogether, which we dont want.
      we still want to see/check what's coming in, except for those sender's already on the blacklist - they still go into quarantine however wich makes no sense except to make the quarantine log harder to work with.
      thanks!

      1 vote
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        I agree to the terms of service
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        0 comments  ·  Flag idea as inappropriate…  ·  Admin →
      • Detailed process usage log

        Problem: I have spikes in CPU usage at random times that cause outages in phone service. There is no way, that I know of, to determine what caused these spikes.

        Solution: Log snapshots of all Process's running, along with other information that can be used to determine cause of high CPU spikes. This would allow users to look back and see what process were running and what they were doing to cause a CPU/memory spike.

        1 vote
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          I agree to the terms of service
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
        • support Websockets compatability in UTM 9

          Support websockets for google chrome and firefox. For some reason we are not seeing the issue in Internet Explorer 11,,

          1 vote
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            I agree to the terms of service
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
          • Sophos Endpoint for Mac OS (Sophos UTM 9 appliances)

            Provide an endpoint client for Mac OS which can be managed by UTM 9 as Windows operating system can.

            6 votes
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              I agree to the terms of service
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              0 comments  ·  Operating System  ·  Flag idea as inappropriate…  ·  Admin →
            • Firewall Order of Operations

              Firewall Order of Operations

              Based on testing and additional information found in other request, it appears that the proxies/security services have a higher order of operation over the firewall. As such, even with firewall rules in place, the security services override those settings. With email protection, this essentially opens up SMTP on the Sophos UTM to anyone on ALL interfaces. This, thus, increases the surface attack area of the device to an unacceptable level.

              Changing the order of operation would allow the administrator of the device to dictate, via firewall rules, what can and can not access the Sophos UTM…

              10 votes
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                I agree to the terms of service
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
              • Allow IP address ranges to be used in Web Profile Allowed Networks

                Currently, in a web profile, you can add networks and hosts to the allowed networks but not IP address ranges. Our customers typically want to have easily-recognisable ranges that go outside the 24-bit mask (eg 172.16.200.1 - 172.16.209.254) so this has to be converted to networks and hosts, which is messy.

                1 vote
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  I agree to the terms of service
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                • Provide a DC Authentication Agent

                  Have an agent which polls Active Directory Domain Controllers for user logon events to determine which user is logged onto each machine. This would allow for all users on the domain to be authenticated without requiring any settings on their machines. There would need to be an option to exclude logon events for service accounts.

                  6 votes
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    I agree to the terms of service
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    0 comments  ·  Authentication  ·  Flag idea as inappropriate…  ·  Admin →
                  • RED: USB Tethering from iPhone / android

                    We want the ability to use an iPhone ( or Android ) as a modem via USB tethering in the event of an internet outage at the site.

                    Instructions from IT would then be as simple as asking the Branch manager to plug their iphone into the red and turn hot spotting on.

                    1 vote
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      I agree to the terms of service
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      0 comments  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
                    • Configurable port for full transparent web filtering of http traffic - not only 80

                      Would be useful for example to use this feature for web filtering in front of an existing web proxy that has already been configured for other port than 80 (e.g. 8080) without changing for all the clients/applications the proxy settings (e.g. from 8080 to 80).

                      3 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        I agree to the terms of service
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                      • spx portal should not use webadmin certificate

                        When answering an E-Mail through the SPX Portal an certificate error occurs. And it seems that the WebAdmin certificate is used.
                        It would be better when you could upload an custom certificate

                        6 votes
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          I agree to the terms of service
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                        • App for Windows Phone

                          In Windows Phone 8.1 you can setup a VPN. But only with ikeV2. But Microsoft offers the possibility of using an App, to aply more autentication-standards. Now there are only 2 Apps, who can handle this. Its JUNOS PULSE VPN and SONICWALL MOBILE CONNECT. Both are incompatible with Sophos UTM. So please add IKEv2 Support or an App to the Winodws Phone Store

                          6 votes
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            I agree to the terms of service
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            0 comments  ·  VPN  ·  Flag idea as inappropriate…  ·  Admin →
                          • 1 vote
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              I agree to the terms of service
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              0 comments  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
                            • FTP SITE CHANGE

                              changing the way the FTP site works

                              Essentially as the .md file in the FTP directory is from the same FTP site, it doesn't mean or validate anything (e.g. cannot be relied upon to validate the trustworthiness of the file). Reason being if the site is spoofed (e.g. via DNS) then we cannot validate the identity of the remote server, given it is clear-text FTP (no mechanism to validate the site's identity, such as via SSL/TLS). Further, if the site has been compromised, an attacker merely has to place the MD5 hash there for the malicious ISO file they replaced.

                              21 votes
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                I agree to the terms of service
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
                              • Option to configure Log Severity \ Format

                                Currently the Web Server Protection logs\syslog are very difficult to understand\parse.

                                I have a website hosted in my server facility with a huge traffic and I cannot analyze the log properly.

                                You should add an option to control the log severity and format.

                                This would be a great improvement to your product.

                                1 vote
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  I agree to the terms of service
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
                                • Publish LDAP Server with server protection

                                  Will like to publish an internal LDAP Server with protection like the Web Server protection

                                  1 vote
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    I agree to the terms of service
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    0 comments  ·  Network Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                  • Web Applikation Firewall: Web-Access for Remote Desktop

                                    Please add Web-Access for Remote Desktop-Feature for Win2012 R2 to the WAF and make it working with an additional OTP-Formbased-Auth.

                                    Would be very very great!

                                    3 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      I agree to the terms of service
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      0 comments  ·  Web Server Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                    • Customization for sent mail, which are quarantined

                                      Customization for sent mail, which are quarantined

                                      because normal users do not respond to English emails
                                      or they can not read

                                      3 votes
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        I agree to the terms of service
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                                      • E-Mail notifications include external ip address if its change

                                        E-Mail notifications include external ip address if its change

                                        1 vote
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          I agree to the terms of service
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          0 comments  ·  Reporting  ·  Flag idea as inappropriate…  ·  Admin →
                                        • Kensington physical lock for Accesspoints AP30

                                          Protect your AP from theft with a physical cable like you can with notebooks This is one way to secure this small device better

                                          9 votes
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            I agree to the terms of service
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                                          1 2 6 8 10 96 97
                                          • Don't see your idea?

                                          Feedback and Knowledge Base