Sophos XG makes it easy to expose internal services to the public internet using the Server Access Assistant (DNAT) wizard. However, this does generate a lot of configuration that is not strictly required. By knowing your environment, some basic theory, and what is and is not required, you can configure clean concise DNAT rules. This article uses the example of exposing a Plex server on the public internet to understand Sophos XG's DNAT Rules and how to optimize them.
This article outlines how you can use Sophos XG to block searches and URLs that contain specific keywords. This is can be useful in preventing school students from wasting time searching for mobile phone wallpapers and/or looking for 'VPNs' that could potentially result in students or employees getting around your Sophos rules and policies altogether!
Decrypting TLS 1.3 is only available with Sophos XG's new XStream DPI engine. Unfortunately, some features are not supported with the XStream DPI engine such as SafeSearch enforcement and YouTube restrictions. Thankfully you can deploy a combination of Web Proxy and DPI rules to get the best of both methods. This article describes how.
With many people now working from home due to COVID-19, reporting on Sophos XG's VPN activity is top of mind for many overstretched IT teams right now. To help, we've made some additions to Fastvue Sophos Reporter to provide better visibility into Sophos XG's VPN connections and ensure your remote infrastructure is holding up. With Fastvue Sophos Reporter's new VPN Dashboard and VPN Report, you can monitor the number of active sessions throughout the day to help plan for extra capacity, or use the reports to find who has not connected recently. You can also easily see when most people connect and disconnect, and proactively respond to unexpected disconnections or excessive invalid login attempts.
Fastvue was invited as a guest presenter in a recent webinar hosted by Sophos to help demonstrate how Fastvue Sophos Reporter together with the Sophos XG platform can provide schools with everything they need to safeguard and detect students at risk of self-harm, extremism/radicalization, and anti-social/unacceptable online behavior.
Learn how to set up a Sophos SG Web Application Firewall testing environment where you can test and hone your WAF configuration skills. Step by step instruction on how to get started with a controlled security testing environment called Web Security Dojo.
Continuing our series on the Web Security Dojo, this time testing Sophos XG web application firewall. Step by step instruction on how to get started with a controlled security testing environment In Sophos XG.
Sophos UTM tcpdump information can be very useful in troubleshooting connectivity issues. In this article, I will show you how to use the tcpdump command on Sohpos UTM to verify if syslog packets are leaving your Sophos UTM appliance.
When you have an active-passive Sophos UTM cluster, the configuration is synchronized between the nodes, but if the Master fails, it may not sync all the log data to the Slave node. From the WebUI, there is no method to view the files on the Slave device, yet those log files can contain information about the cause of the failure. This guide takes you through how to retrieve log files from a Sophos UTM cluster slave node and copy the file(s) to your local machine for analysis.
Configure sandboxing with Sophos Sandstorm in Sophos UTM and Sophos XG. Learn the benefits of this new feature, and how it will provide additional security to your network.