2103, 2017

Filtering and Forwarding Sophos UTM Syslog Data with Syslog-ng

Sophos UTM enables you to specify multiple destination syslog servers, but they will all receive the same syslog information. This is inefficient when some of your syslog servers only require certain log messages for specific purposes. This article explains how to configure syslog-ng to filter and forward Sophos UTM syslog data to multiple syslog servers with different data requirements.
More
711, 2016

Easy WAN Emulation for Application Testing

Anyone who has ever had to deliver application traffic over a WAN has no doubt run into the issue of trying to determine how their application would perform for a […]

More
211, 2016

Configure a URL Redirect with Sophos UTM’s Web Application Firewall

Sophos UTM is a great Reverse Proxy solution. However, it currently lacks the capability to redirect a request.

There are several reasons you might want to redirect a site, but the […]

More
1406, 2016

Deploying Endpoint Protection with Sophos UTM and Enterprise Console

In this article we will show how to integrate Sophos Endpoint Protection's Web Control module with Sophos UTM using Sophos Enterprise Console (SEC) policies. This method is suitable for large deployments that utilize one or more SECs.
More
2405, 2016

How Google Data Saver Affects Security, Privacy and Reporting

Google's Data Saver feature can reduce the amount of data Chrome browsers download in order to load a web page. It sounds useful and harmless. Who wouldn't want to save some bandwidth, speed up web browsing and save on mobile data charges? Before rolling out or promoting the feature to your users, read this article first to be aware of how Google Data Saver works, and its implications on security, privacy and web activity reporting in your organization.
More
2305, 2016

The Role of HTTPS Inspection in Google Search and YouTube Reports

Since Google made the decision to implement HTTPS across all their web properties (including YouTube), you can report that someone has been to youtube.com, but not what videos they were watching. Likewise, you can report that someone has visited google.com, but not what they searched for. Fortunately, many Next Gen Firewalls, UTMs and Secure Web Gateways have a HTTPS Inspection feature that gets around this problem.
More
905, 2016

How to Accurately Monitor and Improve Sophos UTM CPU Performance

This article provides useful tips on how gain accurate real-time visibility into Sophos UTM's resource usage, and how to reduce the CPU usage of Sophos UTM's web protection feature.
More
1802, 2016

Publishing PowerShell over SSH Using Sophos UTM’s HTML5 VPN Portal

What?! Securely manage servers using PowerShell over SSH from the public Internet using a web browser? Why not! Find out how, using Sophos UTM's HTML 5 VPN.
More
1702, 2016

Overcoming Sophos UTM HA Cluster Logging and Reporting Issues

Deploying a Sophos UTM HA Cluster can cause chaos when it comes to logging and reporting. This article shows how to overcome these limitations.
More
2910, 2015

Two Factor Authentication with Sophos UTM – Concepts and Considerations

Username and password has been with us for a long time, and has served us well. It is however no longer a guarantee of security or confidentiality. It is too […]

More
Load More Posts