SG UTM

Suggest, discuss, and vote on new ideas for SG UTM. The ultimate network security package.

SG UTM

Suggest, discuss, and vote on new ideas for SG UTM. The ultimate network security package.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Change Country Blocking so that it works by port.

    I want to allow email, especially cloud based email to come in. The advantage/disadvantage is that I do not know where the email server resides. However, I do want to block, ssh, VPN & RDP from specific countries.
    Please allow me to pick and choose which services get blocked or allowed.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  2. UTM - enable pattern matching in DLP extended rule creation over entire email

    Patterns/Strings specified in a rule for DLP matching should be matched against all of an email, not only subject/body. Currently only Patterns or strings in the Body or subject line will be matched.
    the immediate benefit would be inclusion of definable headers (such as sensitivity or confidentiality headers) that integrate seamless with existing email client infrastructure, such as Outlook, to trigger a dlp match. The trigger-header that exists ( X-Sophos-SPX-Encrypt ) is only reasonbly configurable in certain email Client applications.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  3. option to delete and add to blacklist in mail manager in UTM

    in Mail manager you can select email and then in the options below you can delete them but it would be great if you could delete and add to blacklist all in one go.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  4. Check Endpoint security against IPS before rolling out rulesets

    You should check if new rulesets for SNORT IPS are compatible with your own products BEFORE rolling them out. It happens every now and then, that the UTM IPS blocks Endpoint installations and/or updates.

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  5. There is no mechanism to transfer an EndPoint AV client from one UTM to another.

    When changing the UTM that End Points connect to, a client re installation is required. Can we not issue an instruction for Clients to check in to a new UTM? This would save alot of time.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  6. Stop encryption process after 3-4 files are encrypted

    As cryptolocker seems to bypass Sophos UTM E-mail filtering, UTM Endpoint and Web filtering - if you copy Trend by stopping any Encrytion process after 3-4 files are encrypted any where protected. This will require the end user and/or administrator to approve the continuation of encryptions if they started it, but if Cryptolocker started it, it can be stopped and minimise damage.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  7. Would like a feature to block outgoing traffic that exceeds a certain threshold.

    Our old software (SurfCop on TMG) had the ability to block outgoing traffic that exceeded a certain threshold. The thinking is that if we do get hacked, the hacker would only be able to upload a certain number of docs before being blocked. This was a 24 hour limit and the clock would reset. It was by person or IP address. It is a great tool to have.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  8. QoS for group

    We will require feature to allocate bandwidth speed to specific group or user in utm

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  9. Endpoint: Scan USB Dives when plugged in

    Force scan USB's when first plugged into a machine, not just when first accessed. This is required to meet SOP's

    19 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  10. Device Control - BitLocker - Encryption

    We are deploying Endpoint protection with device control and want to allow full access to encrypted drives and read only access to non-encrypted drives. We would like the device control to recognize BitLocker encrypted drives as encrypted devices.

    In addition, add SMTP notifications related to device control.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  11. Enterprise Console: Reporting on Device Control needs significant improvement to meet our business needs.

    We need to be able to easily find devices to add them as exemptions, as well as track the use of exempted (authorised) devices. I believe the following changes will suffice. Show activity that is allowed as well as blocks and alerts, so this would show the use of devices that are allowed by the policy, ie those that are Allowed or Read Only, as well as those that are exempt. This, for instance, allows you to find out who last used a stick that goes missing, or work out who is using a device that they perhaps are not…

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  12. include mac/apple with UTM endpoint protection

    There are lots of places that have both windows and macs in their business. Both need to be protected with endpoint protection so they can be managed. Why have one and not the other?

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  13. Endpoint Protection: Activity Report

    Client requesting the ability to create a recurring report (emailed daily/weekly) that lists all the systems by last update, with errors, and/ or those that differ from policy. Should be able to create a report on any tab or policy that exists in the product based on computer name, policy or container name

    18 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  14. multiple AV vendors

    I'd like the ability to add other AV vendors onto the UTM, as a 'Sophos house' we have the Sophos Endpoint on client devices but if we could add another AV vendor for scanning downloads then that would be ideal, so we can potentially have 2 different AV vendors on the UTM and then Sophos Endpoint on the desktop.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  15. I would like to suggest a feature which will enable me to manually clear a "Advanced Threat Protection" alert.

    I would like to suggest a feature which will enable me to manually clear a "Advanced Threat Protection" alert. In case of an alert I now have to wait 72 hours before the alarm will be cleared by itself.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  16. SUM UTM

    Buenos días, me gustaría que dentro del SUM en los detalles de cada UTM se visualizaran las actualizaciones disponibles o pendientes por instalar (overview).
    Tambien sugiero poder subir varias actualizaciones a la vez y se sincronicen en overview una por una.

    Gracias

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  17. Add a 2 month option on the Reporting Settings drop-downs.

    Add a 2 month option on the Reporting Settings drop-downs. 1month or 3 months is too bigger gap.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  18. User-level access control policy on Endpoint Protection

    I would like to be able to allow flash drive access to certain users on all computers but not all users on the computers in Endpoint Protection, and there is currently no AD sync for Endpoint Protection.

    Reference Case # 4857461

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  19. Endpoint Protection via MSI

    Can't believe that an 'Enterprise' grade product doesn't have the ability to push install the Endpoint client via MSI.

    Definitely a big issue.

    Please can we have this?

    11 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  20. ENDPOINT Protection MAC Adress should be shown in the SEC

    MAC Adress is collected -> as you can see in the DB of the SEC
    But MAC Adress is not Shown in the Computerdetails or in one of the Views

    Please add this

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  UTM Endpoint Protection  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

Feedback and Knowledge Base

icon-data-protection icon-endpoint-protection icon-phish-threat icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-mobile icon-sophos-utm icon-sophos-utm icon-sophos-utm icon-web-appliance icon-xg-firewall icon-xg-firewall icon-avid-secure icon-lightbulbCreated with Sketch.