Client asked for an option in reporting, where he can see a more detailed bandwidth usage based on URLs and if applicable subdomains to check the total bandwidth/volume/bytes/hits consumed for everyone globally going through the web appliance.
At this point, bandwidth for domain xyc.com already can be checked, but cannot differenciate the bandwidth usage for (examples) abc.xyz.com, bca.xyz.com and cba.xyz.com
Thanks for considering!3 votes
Customer is requesting for Automatic generation of reports via backend as manual generation per user/site iis tedious given the number of our internet users2 votes
I would like to see the ability to block custom file extensions and not just the predefined ones.9 votes
I would like the appliance to send emails securely. That is, I could use ssmtp, tls, starttls, for sending alerts and reports.
Currently you can only use SMTP.
We recently tried to whitelist a VPN connection in Secure Web Gateway, using the DNS name did not whitelist the VPN, we had to put the actual IP address in to the whitelist to get it to work.3 votes
When a URL is Blocked, the log should have more detail as to why the URL was blocked. We should be able to see these details so we can troubleshoot and fix the issue instead of calling support.7 votes
Time should include one thousandth of a second when searching user web history. When endpoint security products detect malicious web activity it would be helpful to have the Web Gateway display to the thousandth of a second in the Date/Time column so we can match the time with the event that occurred on endpoint security. That way we can block the URL by adding it to the local site list. I know the Web Gateway can do this because I see this detail in my SIEM when the Web Gateway sends events to the SIEM.
Thank you!2 votes
The ability to block newly registered websites would be great. So many new sites are created with malicious intent. Say 30 days or 60 days. The Sophos Firewall has the ability to do this, so should the Web Gateway.
We have customer here requesting to have option to enable quarantine summary to specific users only1 vote
When a user attempts to visit an invalid URL (does not resolve in DNS) and the Uncategorized category is set to Block on the WS, the user will incorrectly be shown a “Blocked due to category” error page. While the URL is likely ‘Uncategorized’, it would be more correct to show the user a splash screen for “Server Error Page” that explains “The web address you entered could not be found.” The “Blocked due to category” error page allows the user to submit a request for access to a URL that doesn’t exist, creates additional IT work orders, and wastes time.
When a user attempts to visit an invalid URL (does not resolve in DNS) and the Uncategorized category is set to Block on the WS, the user will incorrectly be shown a “Blocked due to category” error page. While the URL is likely ‘Uncategorized’, it would be more correct to show the user a splash screen for “Server Error Page” that explains “The web address you entered could not be found.” The “Blocked due to category” error page allows the user to submit a request for access to a URL that doesn’t exist, creates additional IT work orders, and wastes…4 votes
If possible, delete a specific user's proxy logs without deleting the logs of the others2 votes
It would be very useful to have a tool to download and view the configuration fo the web appllainces, mainly the policy configuration.
Right now it seems the only way to get the policy configuration is to extract the policy.xml file from a backup but it's nearly unreadable3 votes
I'd suggest removing the Web Gateway logs readability and search from the Help Desk and Read-only Roles. I need help desk folks to be able to troubleshoot the end-point by disabling the tamper protection, call into support, etc. What I don't want is the ability for all the help desk personnel to see and search the browsing history of any user, especially VIPs. Is there already a way to do this?2 votes
Audit/System configuration log in order to determine when changes are made by a user. The log should be able to identify time of access to the web appliance, who accessed it, and what changes to the appliance, policies, and other configurations were made by that user. The report/log should also would be useful if the Administrator could export the log (i.e PDF, CSV, etc)1 vote
Currently if a user has a problem with a certain site because a file type is blocked it is not displayed in the reports.
So have to investigate this in the syslog if you have set it up or call Sophos support which takes too much time.
Can the reason for the file type block be added in the reports?6 votes
Product "Email Appliance" is not available so posting it hear instead.
Sometimes we receive e-mails which have the headers "Disposition-Notification-To: " and "Return-Receipt-To: " set.
I would like to remove those 2 headers (only for certain recipients) and sent the mail through.2 votes
There are various problems in terms of performance of Sophos Virtual Web Appliance hardware version vmx4.
Its always better to be on latest version for better efficiency and performance.
Our environment recommended to upgrade the Sophos Web Appliance hardware version from vmx4 to VMX10 but Unfortunately the vmx10 officially you have not tested the hardware version 10 with the Sophos Web Appliance.
and its not recommended as of now. could you please test the vmx10 version and make it officially supported
I am not able to connect with some of the sites like moneycontrol.com, karvyonline.com. these sites are only for stock trading nothing else. And I am investor in share market and I want to watch those sites regularly as it is my field of studying and also I am having financial interests in them. kindly remove the blockage to access them, so could I use them.
thanking you1 vote
at the moment it is only possible to block ALL encrypted and unscannable files under Filtering Options -> Misc
It would be great to get an option in the Exceptions to deactivate the blocking for encrypted files by URL.3 votes
The standard Web Gateway install exhibits the following behaviour that really should be fixed.
Revoked leaf certificate - treats as trusted.
Bad HPKP pin - treats as trusted.
SHA-1 signed certificate - treats as trusted.
Invalid SCT - treats as trusted.
I mean come on, not checking for revoked certificates is pathetic in what's meant to be a security product.4 votes
- Don't see your idea?