2103, 2017

Filtering and Forwarding Sophos UTM Syslog Data with Syslog-ng

Sophos UTM enables you to specify multiple destination syslog servers, but they will all receive the same syslog information. This is inefficient when some of your syslog servers only require certain log messages for specific purposes. This article explains how to configure syslog-ng to filter and forward Sophos UTM syslog data to multiple syslog servers with different data requirements.
More
2112, 2016

How to Configure Multiple Site-to-Site SSL VPNs with Sophos UTM

In a previous article we covered how to use  Sophos UTM to establish an IPSEC VPN tunnel. IPSEC VPNs are great for a number of reasons, but they have a […]

More
1406, 2016

Deploying Endpoint Protection with Sophos UTM and Enterprise Console

In this article we will show how to integrate Sophos Endpoint Protection's Web Control module with Sophos UTM using Sophos Enterprise Console (SEC) policies. This method is suitable for large deployments that utilize one or more SECs.
More
1406, 2016

Deploying Endpoint Protection Web Control with Sophos UTM

This article dives into how small to medium sized organizations can use Sophos UTM Endpoint Protection to protect and manage their endpoints without any additional management infrastructure. It explains the features and limitations of using Endpoint Web Control policies vs the UTM's full Web Protection policies, as well as how to report on web browsing activity of both on and off premises devices.
More
3005, 2016

Active Directory SSO Authentication in Transparent Proxy Mode

When deploying Active Directory SSO Authentication in Transparent Mode, there are couple of limitations you need to know about. This article takes you through them so you can avoid some headaches troubleshooting authentication issues.
More
2405, 2016

How Google Data Saver Affects Security, Privacy and Reporting

Google's Data Saver feature can reduce the amount of data Chrome browsers download in order to load a web page. It sounds useful and harmless. Who wouldn't want to save some bandwidth, speed up web browsing and save on mobile data charges? Before rolling out or promoting the feature to your users, read this article first to be aware of how Google Data Saver works, and its implications on security, privacy and web activity reporting in your organization.
More
905, 2016

How to Accurately Monitor and Improve Sophos UTM CPU Performance

This article provides useful tips on how gain accurate real-time visibility into Sophos UTM's resource usage, and how to reduce the CPU usage of Sophos UTM's web protection feature.
More
1702, 2016

Overcoming Sophos UTM HA Cluster Logging and Reporting Issues

Deploying a Sophos UTM HA Cluster can cause chaos when it comes to logging and reporting. This article shows how to overcome these limitations.
More
2801, 2016

How To Allow Skype Through Sophos UTM in Standard Proxy Mode

When using a proxy (such as Sophos UTM) in Standard mode, enabling Skype is unfortunately not as simple as allowing the application in Application control. This article will take you […]

More
1609, 2015

A Simple Guide To Deploying A Site To Site VPN Using Sophos UTMs

In a previous article we showed how easily you could expand your network out to remote sites using the Sophos RED devices. These little guys are great and they really […]

More
Load More Posts