Do you recognize a good idea when you see one? We want to hear from you!
Header Image

UTM (Formerly ASG) Feature Requests

Do you have an idea for Sophos UTM? Do you recognize a good idea when you see one? We want to hear from you!

I suggest you ...

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Let's Encrypt Integration

    It would be very nice if Let's Encrypt CA start with public certificates (letsencrypt.org), that we can get certs throug the UTM Gui. So that the "Let's Encrypt Client" is integrated in the UTM. Would it be possible?
    Best Regards

    1,166 votes
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      67 comments  ·  Web Server Protection  ·  Flag idea as inappropriate…  ·  Admin →
    • Don't have the RED device reboot constantly when tunnel between it and the UTM is down.

      It would be nice to have the RED device NOT rebooting constantly when the Tunnel between it and the UTM is down. That way users can at least access the internet. Right now they are completely down.

      61 votes
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        0 comments  ·  Flag idea as inappropriate…  ·  Admin →
      • IMAP Proxy for UTM/SG 9

        Implement an IMAP proxy for UTM/SG 9. Provides filtering and scanning functionality for those that use this type of mail retrieval.
        IMAP becomes more and more important for mail clients. The use of POP3 declines. On the other hand, threads caused by malicious mail attachments like crypto trojans or macro viruses are more dangerous than ever. By not implementing sufficient security for IMAP protocol Sophos leaves an increasing part of UTM/SG customers alone.

        50 votes
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          1 comment  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
        • Redirect Quarantine Reports to other mailadress

          possibility to redirect quarantine reports for e.g. ticketing system to administrator (to not create tickets for quarantine reports)

          61 votes
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            1 comment  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
          • Mail Protection: Non-delivery report for blocked incoming messages

            If incoming Mails are blocked because of the file-extension,
            the external Users should get a Non-delivery report.

            30 votes
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              2 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
            • Change the Active Directory login behavior with multiple DCs

              With the current code handling the Active Directory authentication of users, if you add multiple domain controllers as authentication sources, any error with the user's authentication will cause the authentication to be attempted on the next DC.

              Unfortunately, this is also the case with failed passwords. The LDAP protocol has a built-in error message to tell the client that the failure was due to a bad password and not a server or communication issue (LDAPMessage bindResponse(3) invalidCredentials (80090308: LdapErr: DSID-0C090334, comment: AcceptSecurityContext error, data 52e, vece)).

              This causes issues when users make mistakes on their passwords, it causes the AD…

              21 votes
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                0 comments  ·  Authentication  ·  Flag idea as inappropriate…  ·  Admin →
              • Managing black list of local Sophos Email Security via Microsoft Outlook Add-In

                Sophos Email Protection: Sophos already offers an MS Outlook add-in which allows the users to mark emails as junk mails. When users marks an emails as junk, an email is sent to Sophos Labs, gets analyzed and sometimes the sender is added to a global black list.

                We would like to have another option when using this add-in. Whenever one of our users marks an email as junk, we want the sender added to the black list of our locally installed Sophos Email Security, not sent to Sophos Labs.
                Other solutions like SonicWall Email Security offer this functionality already.

                Right…

                136 votes
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                • Web Protection: Use Network Range objects in allowed network list for filter profiles

                  Enable web filtering profile to use range objects for the allowed network list.
                  Web Protection → Web Filter Profiles → Filter Profiles

                  25 votes
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    8 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                  • Advanced Web Application Firewall - Enable HttpOnly flag for Cookie Signing

                    Enable HttpOnly flag for Cookie Signing for Cookies containing a Hash

                    25 votes
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      0 comments  ·  Web Server Protection  ·  Flag idea as inappropriate…  ·  Admin →
                    • remotely reboot a red device

                      It would be handy if you could use the UTM console to reboot a remote ethernet device (RED). Right now always someone on the other side is needed in case a RED needs a power cycle.

                      104 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        0 comments  ·  Remote Ethernet Device (RED)  ·  Flag idea as inappropriate…  ·  Admin →
                      • SG / XG / RED with integrated WAN Modem / Slot for WAN-Modem-Module (DSL / Cable / LTE / GSM / etc)

                        New SG / XG / RED with either integrated WAN Modem (for example DSL / Cable / Wireless) or with an Slot (like FleXiPort) that could handle WAN-Modem-Modules (DSL / Cable / Wireless like LTE, GSM, UMTS, etc)

                        23 votes
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          0 comments  ·  Appliance Hardware  ·  Flag idea as inappropriate…  ·  Admin →
                        • Web Protection: Realtime Per-User Bandwidth Monitor

                          For the purpose of analyzing the current outgoing traffic usage we need a live view of the users’ HTTP connections via the Web Protection proxy along the possibility to sort it by bandwidth.

                          14 votes
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                          • Cache Intermediate HTTPS issuer certificates

                            When browsing to poorly configured web sites that don't provide a complete certificate chain, the UTM certficate validation will block the site as untrusted.

                            Browsers can work around these poorly-configured servers by caching intermediate issuer certificates from well-behaved servers.

                            Let site A and site B have certificates issued by intermediate issuer Z. Site A provides the full chain, site B is badly configured and does not.

                            If a user browses to site B first, the browser will issue a security warning because it can't find the issuer certificate to validate the certificate chain.

                            If a user browses to site A,…

                            8 votes
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              5 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                            • Add a comment to every email coming in from the outside, that way we know that it is definetly from an external sender.

                              For incoming emails that go through extra scrutiny or come in a second time on grey listed add the following comment inside the email:

                              The e-mail below is from an external source. Please do not open attachments or click links from an unknown or suspicious origin.

                              9 votes
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                2 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                              • Notifications: Role based Notifications

                                Implement the ability to create multiple E-Mail recipience for various UTM Notifications

                                Depending on Roles it would be greate to create different Notifiction selections.

                                Roles:
                                Support Ticketing: System relevant Notifications
                                IT Administrator: Everything
                                SuperUser from Company: Just Warnings and Critical Notifications

                                33 votes
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  0 comments  ·  Notifications  ·  Flag idea as inappropriate…  ·  Admin →
                                • prompt for credentials when using NLA with HTML5 VPN Portal

                                  Instead of having to enter static credentials in the Admin Portal for RDP connections with NLA, the user should be prompted for their credentials when using the connection. Having static credentials doesn't make sense when only admins can enter them (meaning the admin has to know everyone's credentials) and passwords are changed on a regular basis (meaning the admin has to update the password on every connection every x days).

                                  19 votes
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    2 comments  ·  VPN  ·  Flag idea as inappropriate…  ·  Admin →
                                  • bulkmail exceptions

                                    The ability to allow bulk messages and not include them as spam.

                                    12 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                    • Option to redirect to port 80 when SSL certificate is invalid

                                      I am finding blocked sites because the server has port 443 open even though SSL is not used. Most often, the site is hosted on akamai, and the server has a default certificate for a248.e.akamai.net. Sometimes this occurs because the user does a Google search and Google's search result uses HTTPS. I suspect that their search database favors HTTPS over HTTP when both are available.

                                      When I contact site owners, they are generally not motivated to close port 443, and the Google search database will be slow to update even if they are responsive.

                                      It would be helpful to have…

                                      1 vote
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        5 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                      • WebAdmin: ACL / Role for Time Period Definitions

                                        We are a service provider, fully managing a Sophos HA cluster at a customer site. Customer logins to the system should be limited to ONLY change Time Period Definitions, because
                                        we created several firewall-rules that are used to allow external third parties (eg. software and hardware support providers) access to internal client systems at the customers network. These are temporarily activated and deactivated using time period definitions.

                                        Now it would be very beneficial if there would be an ACL to grant access to our customer to only modify the time period definitions so they can enable access to their external…

                                        36 votes
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          0 comments  ·  Usability/GUI  ·  Flag idea as inappropriate…  ·  Admin →
                                        • discover if ,doc attached file contain macro

                                          i'd like to know if is possible analyzer doc file attached to an email and discover if it contain macro and if has it put the message in quarantine

                                          62 votes
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            5 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                          ← Previous 1 3 4 5 135 136
                                          • Don't see your idea?

                                          Feedback and Knowledge Base