Do you recognize a good idea when you see one? We want to hear from you!
Header Image

UTM (Formerly ASG) Feature Requests

Do you have an idea for Sophos UTM? Do you recognize a good idea when you see one? We want to hear from you!

I suggest you ...

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can vote and comment on it.

If it doesn't exist, you can post your idea so others can vote on it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  1. add the ability to receive an email notification whenever a user connects via SSL VPN for Remote Access.

    add the ability to receive an email notification whenever a user connects via SSL VPN for Remote Access. It would be nice to also have the option for a disconnect notification.

    1 vote
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      I agree to the terms of service
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Notifications  ·  Flag idea as inappropriate…  ·  Admin →
    • Add IP PBX subscription

      I have a lot of customers that need to install an IP PBX inside their network,
      instead of installing a third party solution,
      Why not Sophos Sg series integrates with Asterisk, as it is open source

      6 votes
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        I agree to the terms of service
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        0 comments  ·  Flag idea as inappropriate…  ·  Admin →
      • WAF Reverse Proxy with authentication: add authenticated username in http header

        If WAF authentication is selected to be done by the UTM, the username of the authenticated user should be added in the http request header sent to the backend web server. Im addition the groups should be added in another header attribute. That would be a function comparable to IBM Webseal and it's http hread iv-user and iv-groups.

        For security, this feature should be combined with mutual https authentication, i.e. adding a https client certificated by the UTM to prevent modification of the http request header between UTM and backend.

        1 vote
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          I agree to the terms of service
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          0 comments  ·  Web Server Protection  ·  Flag idea as inappropriate…  ·  Admin →
        • Allow to disable the tray icon from the UTM console

          I don't want the end users to touch or interact with the endpoint protection in any way. For this I usually disable the icon and balloons modifying the endpoint configuration file.

          It would be very convenient to disable this icon from the UTM console, to avoid having to login in the endpoints and modify that file manually.

          3 votes
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            I agree to the terms of service
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
          • Configurable http-port for WPAD configuration file download

            Web browsers automatic configuration feature uses wpad as hostname and http-port 80 (http://wpad/wpad.dat) to get the wpad.dat file.

            Unfortunately the UTM publish the wpad.dat file on the proxy-port (typically 8080) only.

            Please implement the possibility to setup the http-port for WPAD publishing.

            Thank you!

            3 votes
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              I agree to the terms of service
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              0 comments  ·  Web Protection  ·  Flag idea as inappropriate…  ·  Admin →
            • SPX Encryption: Every sender should receive the saved password if they all mail one recipient

              If multiple senders write mails to one recipient, every sender should receive the generated password per mail, not just the first.

              3 votes
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                I agree to the terms of service
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
              • Allow strict RDNS checks in the Anti-Spam module to be bypassed by an exception rule

                Allow strict RDNS checks in the Anti-Spam module to be bypassed by an exception rule
                See case previously logged with Sophos support [#4752249]

                1 vote
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  I agree to the terms of service
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  0 comments  ·  Mail Protection  ·  Flag idea as inappropriate…  ·  Admin →
                • Monitor memory usage for each process

                  I've seen to much systems with excessive memory usage.
                  When there is a memory leak, or for example a massive usage of swap,
                  this often isn't noticed before a customer problem arises.

                  Create a baseline of memory usage by process.
                  When a user changes configuration options,
                  or after an upgrade the process goes behond a treshold,
                  it should automatically be noticed.

                  Of course, this could be used also for physical, swap cpu and disk

                  1 vote
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    I agree to the terms of service
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    0 comments  ·  Operating System  ·  Flag idea as inappropriate…  ·  Admin →
                  • Log of traffic based on outgoing interface

                    Create a menu showing the kind and amount of traffic based on incoming/outgoing interface in a scenario with more uplink interfaces

                    1 vote
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      I agree to the terms of service
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
                    • 3 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        I agree to the terms of service
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        0 comments  ·  Networking  ·  Flag idea as inappropriate…  ·  Admin →
                      • web application firewall rewrite rules

                        - Change the Rewrite from domain.de/ to domain.de/index.php with site path routing activated.
                        - WAF rewrite rules for files like *.php or *.xml

                        3 votes
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          I agree to the terms of service
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          0 comments  ·  Web Server Protection  ·  Flag idea as inappropriate…  ·  Admin →
                        • Set a default language/keyboard setting for user portal remote access via HTMLv5 - having to change from US to UK everytime

                          Can you set a default language/keyboard setting for user portal remote access via HTMLv5 - having to change from US to UK everytime is very annoying and confusing for users

                          1 vote
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            I agree to the terms of service
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                          • Use Splunk for all of your reporting of logs

                            Index any machine data regardless of format or location--logs, clickstream data, configurations, sensor data, traps and alerts, change events, the output of diagnostic commands, data from APIs and message queues, and even multi-line logs from custom applications. With no predefined schema, data can be indexed from virtually any source, format or location. Then it's available for troubleshooting, security incident investigations, network monitoring, compliance reporting, business analytics and other valuables uses. I'm sure a deal could be worked out with them, you get 500mb/day of indexing for free

                            1 vote
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              I agree to the terms of service
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              0 comments  ·  Reporting  ·  Flag idea as inappropriate…  ·  Admin →
                            • Sort Domains in various fields

                              It would be nice if we would be able to Sort the Domain-Lists in fields like Webserver Protection - virtuell Webserver
                              Web Protection - Filtering Options
                              etc.

                              5 votes
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                I agree to the terms of service
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                0 comments  ·  Management  ·  Flag idea as inappropriate…  ·  Admin →
                              • Add IPv4 and IPv6 selection to DynDNS

                                When adding a dyndns provider, there is no way to specify the IPV4 or IPV6 address of an interface. This is a legacy carry over as one interface traditionally could only have one DHCP IP address, but this is no longer true.

                                Having a choice would allow us to create two different dyndns entries to update A and AAAA records.

                                3 votes
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  I agree to the terms of service
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  0 comments  ·  Networking  ·  Flag idea as inappropriate…  ·  Admin →
                                • Data control for Office 2013

                                  Log and/or Block attachments in Outlook 2013 (re: data control policy). Worked in Outlook 2010 which is one of the reasons we selected your product for our needs. Disappointed
                                  that it’s stopped working in Outlook 2013 as we now have to select a product replacement that will provide us this protection.

                                  2 votes
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    I agree to the terms of service
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                  • waf report

                                    The executive report could show the attacks detected and blocked by the WAF.

                                    9 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      I agree to the terms of service
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      0 comments  ·  Reporting  ·  Flag idea as inappropriate…  ·  Admin →
                                    • In MDM to block users from deleting apps

                                      Today the restriction on avoiding users from deleting apps can't be controlled from Sophos MDM (today this requires Apple Configurator that can only run on Apple computers).
                                      Without this restriction users can actually delete the Sophos Control app as well as any other app on the device.

                                      1 vote
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        I agree to the terms of service
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
                                      • Additional interfaces at 1:1 NAT

                                        Automatic definition of additional interfaces at 1:1 NAT or the possibility of additional interfaces to define in a range.

                                        1 vote
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          I agree to the terms of service
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          0 comments  ·  Networking  ·  Flag idea as inappropriate…  ·  Admin →
                                        • Connect SUM with Sophos iView Appliance or make SUM configure SYSLOG for all devices.

                                          Could be nice if the SUM is reinvented so that SYSLOG traffic is sent to SUM and the SUM can be connected to iView OR SUM can configure UTM's SYSLOGGING service to point all to Sophos iView appliance.

                                          3 votes
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            I agree to the terms of service
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            0 comments  ·  Reporting  ·  Flag idea as inappropriate…  ·  Admin →
                                          ← Previous 1 3 4 5 97 98
                                          • Don't see your idea?

                                          Feedback and Knowledge Base