Deploying a Sophos UTM HA Cluster can cause chaos when it comes to logging and reporting. This article shows how to overcome these limitations.
Not everyone who logs into Sophos UTM's web admin interface needs full admin access. Perhaps you need to provide read-only access to an auditor, or define separate roles and responsibilities for your operations team. This article takes you through configuring these different levels of access using Sophos UTM's Access Control feature.
When using a proxy (such as Sophos UTM) in Standard mode, enabling Skype is unfortunately not as simple as allowing the application in Application control. This article will take you [...]
The first article in this series discussed concepts and considerations for Two Factor Authentication, and why One-time Password (OTP) with soft tokens make a lot of sense. In the second [...]
In our introductory article, Two Factor Authentication with Sophos UTM - Concepts and Considerations, we discussed some of the options for choosing a Two Factor Authentication solution for your environment. We came [...]
Username and password has been with us for a long time, and has served us well. It is however no longer a guarantee of security or confidentiality. It is too [...]
The Sophos Remote Ethernet Devices (REDs) are a great way of securely expanding your network by connecting remote offices over the public Internet. The REDs come in two sizes: the [...]
At first look, Sophos UTM's DHCP server capabilities look very simple. However, you can unlock a more robust DHCP feature set if you know where to look and what to set. This [...]
In a previous article, I took you through how to connect remote networks with Sophos RED Devices. In this article, I will take you on a deep dive of the three [...]
This is an updated version of our previous article on the same topic, as the UI changed between Sophos UTM 9.2 and Sophos UTM 9.3. One of the biggest hurdles [...]