SG UTM

Suggest, discuss, and vote on new ideas for SG UTM. The ultimate network security package.

SG UTM

Suggest, discuss, and vote on new ideas for SG UTM. The ultimate network security package.

Suggest an Idea...

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Flow Monitor: Ability to show outbound traffic only

    At the moment when you click on the Out or In bandwidth in Dashboard, you are taken to the tabular view of the Flow Monitor. This shows Total bandwidth only.

    Need to be able to show only outbound or inbound traffic. We are saturating our outbound limit and there is no way to find out which client is culprit.

    Apparently this functionality used to exist.

    So, if you click on the Out bandwidth in Dashboard, it should take you to the flow monitor showing outbound traffic. If you click on the In bandwidth it should show Inbound traffic in the…

    4 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  2. Log of traffic based on outgoing interface

    Create a menu showing the kind and amount of traffic based on incoming/outgoing interface in a scenario with more uplink interfaces

    1 vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  3. 2 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  4. TLS (SSL) Encrypting remote syslog

    Hi please implement TLS (SSL) Encrypting for remote syslog.
    It is an important feature to send encrypted syslog messages to the remote syslog server: http://www.rsyslog.com/doc/rsyslog_tls.html
    A Cisco ASA, Synology NAS and Linux supports this feature. Please implement this also into your great UTM Firewall !!

    13 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  5. Option to configure Log Severity \ Format

    Currently the Web Server Protection logs\syslog are very difficult to understand\parse.

    I have a website hosted in my server facility with a huge traffic and I cannot analyze the log properly.

    You should add an option to control the log severity and format.

    This would be a great improvement to your product.

    2 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  6. FTP SITE CHANGE

    changing the way the FTP site works

    Essentially as the .md file in the FTP directory is from the same FTP site, it doesn't mean or validate anything (e.g. cannot be relied upon to validate the trustworthiness of the file). Reason being if the site is spoofed (e.g. via DNS) then we cannot validate the identity of the remote server, given it is clear-text FTP (no mechanism to validate the site's identity, such as via SSL/TLS). Further, if the site has been compromised, an attacker merely has to place the MD5 hash there for the malicious ISO file they replaced.

    9 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  7. Detailed process usage log

    Problem: I have spikes in CPU usage at random times that cause outages in phone service. There is no way, that I know of, to determine what caused these spikes.

    Solution: Log snapshots of all Process's running, along with other information that can be used to determine cause of high CPU spikes. This would allow users to look back and see what process were running and what they were doing to cause a CPU/memory spike.

    1 vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  8. need a Health Summary - summary of errors from all areas of UTM

    A summary of all errors would help to identify deficiency in rules, conflicts after multiple rounds of firmware updates, etc.

    1 vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  9. search across ALL Logs as single search

    Need to be able to search all logs in a single search effort. When attempting to troubleshoot an attack or UTM problem a Wild Card or other search of all logs would best serve the troubleshooting process. Need controls of All Logs in day increment as searching all logs forever would be time consuming versus a aid to the daily / weekly troubleshooting process.

    3 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  10. I'd like to see a way to port logs over to CloudShark in one click

    I'd like to see a way to port logs over to CloudShark in one click

    1 vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  11. Can trace user to find the data retrospectively

    We always want to know who using the bandwidth, who take all resource at the moment, but it is very hard, we need it to trace easier

    1 vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  12. email appliance: search export

    the ability to export search results in the email appliance "search" section to excel or similar format

    7 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  13. 4 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  14. Log Management

    Log management like there was in 8.x.
    See also the video 2 minutes explainer: http://www.youtube.com/watch?v=vANKDgEazNk

    1 vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  15. email appliance: adjust column widths under search

    ability to adjust the column widths for results within the "Search" section of the email appliance. Long information gets truncated, no current way to adjust the column widths

    1 vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  16. Change Notification for WebAdmin

    i'm looking for a method to receive all changes by mail that's made in a WebAdmin Session by an admin. We have up to 3 administrators that allows to administrate our firewall and it's much easier for the other administrators if they're known which changes are made.

    3 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  17. Increase SSHd LogLevel to VERBOSE

    Using SSH public key authentication for loginuser/root does not log which key was used to authenticate, because the sshd_config LogLevel is set to INFO.
    It should be increased to VERBOSE, so you could determine who accessed the shell.

    2 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  18. Logging: Include Generic Proxy activity in Firewall Log

    I have found out that packets forwarded by the Generic Proxy is not shown in the live log.
    When i use the firewall live log I want to see ALL packets passing the firewall, regardless of direction or anything else.

    7 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  19. report on detection specifics based on how the potential threat is detected, i.e. – on-access or scheduled scans

    Client is looking to report on detection specifics based on how the potential threat is detected, i.e. – on-access or scheduled scans. It appear much of the pre-reqs should already be in placed as the endpoints report this data in the alerts they email out and the fields appear to exist in the database however they do not correlate properly. The field is specific is the 'ScannerType' in the ThreatEvents table. The 2XX data fields in the database do not accurately reflect anything

    2 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  20. Logging: Tamper-proof logs via Hashing

    Companies have to prove to the law that the logs are not manipulated. Hence device must hash the log files with the time stamp. We need a menu for that on UTM. For example, customers should be able to choose the needed logs through WebAdmin, and make hashing with required logs. When needed they should be able to download the hash and log files.

    20 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Logging  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

Feedback and Knowledge Base

icon-data-protection icon-endpoint-protection icon-phish-threat icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-mobile icon-sophos-utm icon-sophos-utm icon-sophos-utm icon-web-appliance icon-xg-firewall icon-xg-firewall icon-avid-secure icon-lightbulbCreated with Sketch.