Central - Platform
Key | Affected versions | Fix versions | Summary | Description | Workaround |
---|---|---|---|---|---|
CPLAT-48959 |
|
Central Dashboard: A Mobile-only Custom Administrator Role does not show the Central Dashboard People/Users section. | Sophos Engineering is aware of an issue with Custom Role creation in Central Dashboard. Global Settings > Role Management > Issue: A role that is defined for just Mobile (with any base-level permission) - When that administrator logs in, they will not see the main Central Dashboard ‘People’ page, and may not be able to perform steps needed in the administration workflow for Mobile Protection. |
Until the Mobile role set is updated to include access to the People page; one of the following additional product categories can be added to the custom rule in the interim: Endpoint Protection, Encryption, Phish Threat, or Email Gateway. |
|
CPUI-9001 | Central Dashboard: Partner assistance cannot be enabled | Issue:- Sophos Engineering is aware of an issue/behavior where a customer is unable to turn on Partner assistance in the Central dashboard. After allowing the toggle button for Partner assistance, customers are unable to ‘save’ the change. Impact:- Partners would be unable to manage the customer from the partner dashboard. An upcoming fix for this will resolve this issue. |
Workaround:- Sophos support is aware of a workaround, hence please report it to tech support in the interim of the fix. |
||
CPERF-7283 |
|
Central Email and AzureAD sync: Unwanted mailbox delegation | Sophos Engineering is aware of an issue/behavior where a user(s) could see a previously configured delegation user. The original delegation from ActiveDirectory (msExchDelegateListLink attribute for a User/Group or Shared Mailbox) still shows/exists even after migrating to our Azure AD directory syncing. Sophos Azure AD directory sync does not support delegation with directory objects (neither the original msExchDelegateListLink nor O365 mailbox permission configurations). The issue is that the original delegation is not able to be removed, and those users will received the quarantine digest for the user they were originally a delegate for. An upcoming fix for this will remove the leftover delegation attributes from the directory objects stored in Central. |
There are no workarounds for this issue in the interim of this being fixed |
|
CPLAT-48726 | Partner Dashboard: Administrator creation requires an email to have a top-level domain name that is longer than 4 characters long. | Sophos is aware of an issue/behavior in Sophos Central Partner Dashboard, under Settings & Policies > Administrators> - Partner is not able to add a new administrator if their email address has a Top Level Domain name that is longer than 4 characters. The message received: "Email is required" and the administrator is not able to be saved. |
This specific requirement will be updated in the future. In the interim, it is possible to first create the partner administrator within your Partner Portal, then update their role in PDB when it's added. |
||
CPLAT-37603 |
|
Central Dashboard: The UI performance is slower within the 'Custom Rules' user selection window in Federation login settings page when there are hundreds or thousands of users | When adding users on the Federation Global settings page (within the 'Custom Rules' user selection window), this can take longer than expected (minute +) when there are hundreds or thousands of users with logins to display. |
While the performance/slowness is currently expected for customers with a large amount of users; If your list of users fails to load at all, and you are not able to add any custom rules, please raise up a Support case with Sophos, so that we can help manually add these for you in the interim. Please provide us with the email addresses and login rule requested (Federated only, Central only, or Federated and Central) for those who you would like to have added. Please also reference 'CPLAT-44544'. Technical Support will be able to manually add these in, if it is not possible to do so by a customer. |
|
CPLAT-48387 | Some regions may see unreliable reception of SMS security codes for Sophos multi-factor authentication | The regulatory authorities in certain countries have specific SMS requirements, which may result in some customers not receiving SMS or receiving them as potential spam when signing in. List of countries with special SMS requirements: Belarus, Egypt, India, Jordan, Kuwait, Philippines, Qatar, Russia, Saudi Arabia, Sri Lanka, Thailand, Turkey, United Arab Emirates (UAE), Vietnam, and Singapore |
You may use the Multi-factor Authentication's authenticator app or the email and pin method to complete the sign-in process in any scenario where the SMS code is not being received. |
||
CSA-14025 |
|
Central Dashboard: Firewall report time out (spinning wheel) in UI | Sophos Engineering is aware of an issue where the Firewall Management Report Generator times out within Central Dashboard (by showing an indefinitely spinning wheel while ‘Gathering report data…’ is displayed). This is due to the requested data not being sent back to the UI within a 6-minute timeframe. |
If a customer has an Advanced Firewall reporting license, the report can be configured as a scheduled report which can be viewed separately in the interim of this being resolved. If a customer does not have an Advanced Firewall reporting license, it may be possible to select a smaller timeframe of data that will display, though if that does not work, there is no workaround for this issue. |
|
CPLAT-48265 |
|
Central Dashboard: Edit user Error "Please enter valid first & last name." when trying to make changes to a user's details. Seen when users have a 'dot' in their user name. | There is a known issue seen when attempting to make any changes to a user in Central Dashboard that has a ‘dot’ in its name (eg. First.last ). This is seen when going to People-->select the user in question--> select 'edit’-->attempt to make any changes from this modal box): Attempting to make any changes to a user that has a dot in their username will fail as the validation check ‘Please enter valid first & last name.’ will be displayed preventing the change from being saved. See ‘Workaround’ for alternative methods to make changes to the above areas. Note that currently, it is not possible to manually create a user where the user name has a dot in it. This is a security validation for manually created users but does not prevent users with a dot in their name from being imported via Directory Services. |
If you need to do any of the following for a user that has a dot in their user name: 1. Change Role: Go to People-->Groups tab (then select group you want to add or remove them from, and perform the action from there) |
|
CPLAT-47774 |
|
Enterprise Dashboard: Access not Allowed while trying to reset MFA | Enterprise Dashboard: Access not Allowed error while trying to reset MFA for an EDB Admin. Enterprise Dashboard: SuperAdmin trying to reset MFA for any EDB Admin. |
SuperAdmin can recreate the affected admin from the scratch, which gives him the ability for the affected EDB admin to recreate passwords and go through MFA steps. |
|
CPLAT-47518 |
|
Global Template (Enterprise/Partner Dashboards): Leaving a search term under the 'Assigned Customers' column within the Edit Customers modal will incorrectly reduce the total of assigned customers to that search result | Global Template: An administrator who removes a customer from within a Global Template, after using a search query may remove customers from the assigned column. The results of the search query are incorrectly seen as the number of customers. If the search team remains under the assigned column when selecting the save button, the subsequent confirmation dialog box will show you that you are removing many more customers than expected. Example: If you have 100 customers listed under the assigned column. Your search for the name of one customer and move it over to the unassigned. This leaves the Assigned column showing zero customers (because the name of the customer is no longer listed). When you select the ‘save’ button - the next confirmation dialog box will tell you that you will be unassigning 100 customers (instead of the expected 99). To avoid this in the interim this behavior is fixed, first clear the search term used before selecting the save button. |
To avoid this in the interim this behavior is fixed, first clear the search term used before selecting the save button. |
|
CPLAT-41625 | Central Dashboard: Save Remote Assistance may take longer than expected | The remote assistance enablement in Sophos Central Dashboard may take longer than expected if there are a lot of self-service user accounts/Admin user accounts exist. Reference KB Article: Sophos Central: Turn on Sophos Support remote access for either MSP/Flex or Enterprise Master-licensed Sophos Central accounts |
In the interim of this being fixed, please wait until you see a pop-up message/green message box "Remote Access Enabled" once click the Save button. You may experience a number of pop-up windows with "Remote Access Enabled" message. |
||
CPERF-4913 |
|
Central Dashboard: It is not possible to delete some users via Central API due to those users being unlinked from our Directory services. | Central API: “Error 409. You can't use this API to delete users synced from Active Directory” returned when trying to delete a user who was added to Central via Adsync before November 21st, 2021 and has been unlinked (https://developer.sophos.com/docs/common-v1/1/routes/directory/users/{userId}/delete ).
|
These users affected will need to be deleted manually within Central Dashboard UI |
|
CPLAT-46161 |
|
Central Dashboard: In environments with thousands of users, the User report may fail to load or export (HTTP ERROR 500) | Sophos Engineering is aware of a known issue seen in Central Dashboard where some environments with thousands of users, the User report may fail to load or export (HTTP ERROR 500) Where: Logs & Reports → Users ( https://cloud.sophos.com/manage/reports/protection/users/create/all ) What issues can be seen?
|
In the interim of this being addressed, please attempt sorting the page into smaller groups of users first via the 'Search by User Group' drop-down. Viewing users and exporting may be possible via the main People/User page to view/export users (Dashboard --> People) |
|
CPLAT-36758 |
|
Central Admin: 'Logs and Reports' date behaviour is based off of UTC backend and not customer/dashboard timezone | When viewing or exporting events based on Dates from the 'Logs & Reports' section of Sophos Central Admin; The resulting events will be shown based off of a 24 hour UTC day instead of a 24 hour period within the time zone of the user. |
"This is currently expected behavior though there are plans to have this changed in the future to better match the time zone of the user generating the report. Additional information can be found in KBA: https://support.sophos.com/support/s/article/KB-000036898 |
|
CPLAT-44954 |
|
Sophos Kaseya plugin reports 'Invalid credentials supplied' with valid API credentials | If the API credentials used are active and confirmed valid (this can be tested using postman or curl to do a basic whoami and tenent list query outside of Kaseya) and this continues to trigger this error - Please ensure that the following is open (without any regional restrictions) from your VSA server:
|
Please ensure that the following is open (without any regional restrictions) from your VSA server:
Documented in https://community.sophos.com/sophos-integrations/w/integrations/105/sophos-integration-with-kaseya-vsa |
|
CPLAT-41379 |
|
ADsync on-premise utility: Manual sync will trigger an error 409 / Conflict when another sync process is still running | Central Dashboard: ADsync on-premise utility - sync failures reported by some after the utility upgraded. Error = 409 Conflict Local ADsync log will show the following error with each sync attempt since the utility was upgraded to version 5: "error": "CONFLICT", "message": "Directory source should be active and no other sync should be running to trigger a new sync."} / HTTP 409: Conflict See workaround section for how to fix this |
Expected behavior when another sync is still running |
|
CPLAT-41524 |
|
Partner Dashboard: Sophos Customers page - A Cloud Optix trial icon may incorrectly show for next to some Customers. | The Partner Dashboard ‘Sophos Customers’ page, may incorrectly show an empty Optix trial icon for one or more customers. The customers' dashboard does not have an Optix trial enabled. |
In the interim of this being removed, the icon should be ignored. |
|
CPLAT-36682 |
|
CDB/EDB - Internet Explorer performance with Central Dashboards is slower | When using Internet explorer please note that you may experience longer than normal page load times working in Sophos Enterprise and/or Sophos Central dashboards. |
We expect to address this in the future, in the interim please use Chrome or Firefox to manage Sophos Dashboards. |
|
CSA-11622 |
|
Central Dashboard: Custom firewall reports are only able to be sent to local Central Administrators (not Partner or Enterprise administrators) | Central Dashboard: Custom firewall reports are only able to be sent to local Central Administrators (not Partner or Enterprise administrators) If a Partner or Enterprise Administrator attempts to add non local administrators to firewall reports (Firewall Management > Report Generator > (add or edit any report) > Available Recipients section. If you add any Partner or Enterprise Dashboard administrators, these will not receive the report via email. Additionally, when you reopen the report, these administrator names added will show as UUIDs. There is no workaround to this issue |
There is no workaround to this issue. Currently only local administrators are able to be used for Firewall report delivery at the Central Dashboard level |
|
CSA-10514 | Central Dashboard: Events Report - Server re-protected events remain visible, even after unticking Event type Computer and Server re-protected | There is a known behavior when viewing particular events on the Events Report page (https://cloud.sophos.com/manage/reports/protection/events/create). The Server re-protected events will remain visible, even after unticking the Event type ‘Computer and Server re-protected’ category. |
Until this is resolved, the “Computer or server re-protected” event needs to be ignored in the report. As we understand that this can be annoying, there is a limitation in our current design, and the fix required, unfortunately, needs a good amount of changes. We are in the transformative process of handling all events to go through a centralized workflow. |
||
CPERF-4307 | Times presented in exported reports look different between PDF and CSV formats. | "Reports that are exported as a PDF have times annotated as UTC Reports that are exported as CSV have times listed in the time zone of the user running the report. The times are the same in UTC " |
This difference in how the times are presented between reports will be addressed in a future version of Central Admin. This is an example of what to expect (all times are equal): 1. PDF is UTC time (Regardless of time zone where report is pulled) 2. CSV report pulled from system in EST 3. CSV report pulled from the system in PST |
||
CPLAT-36762 |
|
When logging into Central Partner Dashboard from the id.sophos.com page, you may sometimes get re-directed to a settings/text page instead of the Dashboard | When logging into Central Partner Dashboard from the id.sophos.com page, you may sometimes get re-directed to a settings/text page instead of the Dashboard |
Clearing the browser's cache will temporarily resolve this, though it may happen again until this is resolved. In the interim, you can avoid this by either logging in to either the Partner Portal first (https://partnerportal.sophos.com then select the 'Manage Sophos Central' link) or log directly into the Partner Dashboard (https://cloud.sophos.com/manage/partner/) Additional information can be found in KBA: https://sophserv.sophos.com/article/121583 (selecting the question "Why do I see a page of text after attempting to log into Partner Dashboard?") |
|
CSA-9819 |
|
Central Dashboard: Event report (both the UI and Exporting) results may contain extra events depending on Timezone in use. | When using custom date ranges within an Event report, the returned results incorrectly include events that go beyond the expected Timezone offset. |
Additional information can be found in our knowledge base article https://support.sophos.com/support/s/article/KB-000036898 |
|
CPLAT-40270 |
|
Sophos AutoMate plugin - The 'Computers' section performance can be very slow when there are thousands of computers to display. | There is a known issue/behavior where Partners who are managing thousands of computers within the Sophos Automate Plugin will see a dramatic delay when working within the ‘Computers’ section of our plug in (15 minutes to make a change/or see an update) |
There is no workaround in the interim of this being addressed. |
|
CPLAT-39841 |
|
Central Dashboard Audit log - "anonymous failed authentication" entry is due to an expected API Service Principal JWT renewal error. | When using API credentials (Service Principals) - certain jwt token refresh errors can be logged in the Central Dashboards Audit log as 'anonymous:' and 'failed authentication' with the IP of source. (eg. siem.py script/ ADsync utility/ etc). This is an expected logging event that can occur during normal operation and it does not require any follow up action. |
These entries can be ignored. See https://support.sophos.com/support/s/article/KB-000043845 for more information. |
|
CPLAT-37411 |
|
Enabling or Disabling Enterprise Dashboard can cause an 'Authentication failure' for the admin who triggered the process | Sometimes during the EDB enablement process, the conversion of the Central Super Admin to Enterprise Super Admin may fail. In that scenario, you will get an 'Authentication Failure' when trying to log back into your newly created Enterprise Dashboard. |
If you encounter this, please follow the 'Forgot Password' link/process which will repair your login and access for that account. |
|
CPERF-4306 |
|
If a CSV upload of users takes longer than 5 minutes to complete, this will timeout, and the loading/spinning wheel will continue indefinitely in the UI | While there is no limit given to the number of users that can be attempted to upload (outside of the 2MB file size limitation). It is recommended to upload users in batches of 1000 at a time. It is possible to upload more at once, though depending on the time of day (peak business hours) you may experience this timeout behavior. |
Additional information can be found in customer KBA https://support.sophos.com/support/s/article/KB-000038811?language=en_US |
|
CPLAT-36752 | Using certain browser extensions, error 403 or 404 is received during the selection of the authentication type during MFA setup | Using certain browser extensions, error 403 or 404 is received during the selection of the authentication type during MFA setup |
Additional information can be found in customer KBA https://support.sophos.com/support/s/article/KB-000038802?language=en_US |
Central Endpoint - Mac
Reference | Planned fixed version | Summary | Description | Workaround |
---|---|---|---|---|
MACEP-7926 |
|
Central Endpoint for macOS: Domain Name Override for reported users only works for Mobile accounts | The feature to enable domain name override for reported users on macOS, detailed in this KB: https://support.sophos.com/support/s/article/KB-000036151 , requires that the user account type is Mobile. By default, a direct Active Directory join uses this user type, however some other providers may not set it. Sophos’ detection of the user as a domain one requires the user account type to be mobile to trigger. There are no plans to change this behavior at this time. |
If the provider allows it, set the user account type to Mobile. Apple has provided information here: https://support.apple.com/en-ca/guide/mac-help/mh32157/mac |
MACEP-7832 |
|
_sophos user can end up with the SecureToken | If the _Sophos user is the first one created on the system, due to previous logins only being with remote accounts (eg: AD logins with no caching), it can be given the SecureToken. This can cause issues for other applications. This is the same underlying cause as is detained in the Sophos SafeGuard KB here: https://support.sophos.com/support/s/article/KB-000037137?language=en_US |
1: Uninstall Sophos |
MACEP-7802 | Apple iCloud Private Relay is not protected by Web Protection / Web Control | Apple iCloud Private Relay uses an isolated connection that the OS does not provide to Sophos for purposes of web protection or control. If a user enables this (paid subscription from Apple), we cannot provide web protection or control on the system for non-local traffic. |
None |
|
MACEP-6842 |
|
Heartbeat false positive alerts with macOS 12 Monterey | Multiple times per day the security heartbeat can report drops for macOS Monterey clients when they did not actually drop. |
None |
MACEP-6987 | Incompatibility with LightSpeed relay agent | When Sophos and LightSpeed relay agent are installed together, web browsing will fail to load webpages and installs will fail. |
Uninstall LightSpeed relay agent |
|
MACEP-6874 | Web Browsing may fail when running Ava Reveal alongside Sophos for MacOS | Ava Reveal’s web protection filter and the Sophos web protection filters may cause web browsing to fail when both are loaded. Sophos has worked with Ava and we have found that multiple content filters and a transparent proxy triggers an OS issue. As of August 2022, this is considered an incompatibility due to the OS. |
Turn off Ava Reveal extension or uninstall Sophos for MacOS |
|
MACEP-6851 |
|
MacOS name is incorrect in Sophos Enterprise Console after 9.13.0 update for Big Sur and Monterey | In the release 9.13.0 of the SEC-based Endpoint for macOS, the name of the OS no longer shows 11 or 12, but 10.16 in Sophos Enterprise Console This will not be fixed before the retirement of this Endpoint in July 2023. |
None |
Central Endpoint/Server - General
Reference | Planned fixed version | Summary | Description | Workaround |
---|---|---|---|---|
CESG-25447 | The device summary in Sophos Central lists ‘Endpoint Protection' or 'Server'Protection' as 'Pending...' | The device summary in Sophos Central lists ‘Endpoint Protection' or 'Server'Protection' as 'Pending...', when the Endpoint is assigned with a Special or Static Package via the Sophos Central 'Software Management’ functionality. This is a cosmetic issue as static or special packages no longer provide information about the legacy ‘Endpoint Protection' or 'Server'Protection' modules and can be ignored. |
None |
|
CESG-23660 | Cannot autofix policies with advanced settings turned off | Account Health Check “Autofix” cannot fix policies that have the advanced settings turned off/not on recommended. |
None |
|
CESG-23373 | Central decision to generate a new registration token is case sensitive causing unexpected duplicates | The checks performed by Sophos Central determining if a device is a duplicate or not is case sensitive. |
Sophos Central checks for the following information before making the decision to create a new entry or keep the existing one during the client registration: -Domain name All of the checks are case-sensitive. |
|
CESG-25605 |
|
Hero Report - Exporting PDF of Hero reports is empty when in dark mode | CDB Hero Reports export PDF contains no data when created with Central Admin Dark Mode enabled. |
Use light mode to generate a PDF report |
Central Endpoint/Server - Linux
Reference | Planned fixed version | Summary | Description | Workaround |
---|---|---|---|---|
LINUXDAR-7031 |
|
Linux 'auditd' service fails to enable when using the option [ --do-not-disable-auditd ] as part of SPL installation | When using the install option --do-not-disable-auditd when using SPL 2023.1, it does not enable auditd as expected. A workaround for this issue can be found detailed in the following KB: https://support.sophos.com/support/s/article/KB-000044934 |
see linked KBA |
Central Endpoint/Server - Windows
Reference | Planned fixed version | Installed Product | Summary | Description | Workaround |
---|---|---|---|---|---|
WINEP-47973 |
|
|
File Integrity Monitoring (FIM) setup fails due to SED Paths being mapped to an incorrect volume | The File Integrity Monitoring setup may file with the error “FIM service: Event Journals folder location could not be found atB:\ProgramData\Sophos\Endpoint Defense\Data\Event Journals: [FAILED]” if a drive letter mapping A: or B: exist on the system that matches the actual system root, causing it to mistakenly set A: or B: as the system drive. Example: B: "\Device\HarddiskVolume1" |
Change the "A:" or “B:” drive mapping to a different volume that would not match the system root or set the drive mapping to “D:” (or higher), so that the “C:” drive mapping will be matched first. |
WINEP-44388 |
|
|
Update Cache doesn't show all devices under the 'Using This Cache' list in Sophos Central | Even though updating correctly from an Update Cache, Endpoints running on Windows 7, Windows 8.x, or Windows 10 x86 as well as Windows Server 2012 R2 (and below) are not listed in the ‘Using This Cache’ list in Sophos Central. |
None |
WINEP-40999 |
|
|
Encryption of non-boot volumes fails on specific ARM64 devices | On ARM64 devices that are using the SCM or UFS storage bus type for the internal storage, the encryption of data volumes (non-boot volumes) does not start. However, system drives (boot volumes) get encrypted as expected. Known models affected by the issue: Lenovo Yoga C630, Samsung Galaxy Book S Other ARM64 devices utilizing SCM or UFS storage bus type are expected to be affected as well. |
For the time being, the only option is using the complete available space of the internal storage for the system volume. |
WINEP-46031 |
|
High CPU usage from SEDService.exe on computers running Sysinternals System Monitor (Sysmon) | On computers with Sysinternals System Monitor (Sysmon) installed and configured with a "FileDelete" rule targeting ".bin" files, Sophos Endpoint Defense Service (SEDService.exe) will constantly run with high CPU. This is caused by a conflict with Sysmon when SEDService.exe performs compression of Event Journal data and the subsequent deletion of the uncompressed *.bin Event Journal files. When .bin files are covered by a Sysmon FileDelete rule, Sysmon tries to rename/archive the Tamper Protected file and conflicts with Endpoint Defense Service, leaving the uncompressed file in place. |
Removing .bin files from the TargetFilenames of the FileDelete rule resolves the issue. For details, please see KB-000044827 |
|
WINEP-43484 |
|
Sophos update failing with Check Point VPN version 86.40. | Updates fail when Sophos Central Endpoint is installed alongside Check Point VPN version 86.40 |
Please see KBA for workaround steps - https://support.sophos.com/support/s/article/KB-000044497 |
|
WINEP-42331 |
|
|
Lockdown mitigation compatibility improvements for applications creating *.mdb files | The creation of *.mdb files may trigger a Lockdown detection. |
Disable Lockdown mitigation for MSAccess application via Threat Protection policy only to affected systems. |
WINEP-44348 |
|
|
On Domain Controllers, the Network Setup Service is stopping and starting every 30 seconds | The Sophos Network Threat Protection Service utilizes a routine that is called every 30 seconds, which creates a local variable when initialized, resulting in a start of the Network Setup Service. |
None |
WINEP-44278 |
|
|
Credential Guard alerts against tasklist.exe when creating a Diagnose Log in Monitor Mode | With ‘Monitor Mode’ enabled for the Sophos Central Account (Account Details -> Account Preferences -> Evaluation Modes -> Monitor mode), creating a Diagnose Log from Sophos Central will trigger a Credential Guard alert when Diagnose calls “C:\Windows\System32\tasklist.exe /M /FO CSV” This is a detection that only occurs in Monitor Mode. |
None |
WINEP-44248 |
|
High non-paged pool memory consumption from Sophos Endpoint Defense (pool tags Sg01 and Sg03) | Windows Servers might show an increased non-paged pool memory consumption from a pool tag labeled Sg01 or Sg03. The memory is allocated by the Sophos Endpoint Defense Data Content Records (used to keep track of PE-file information and SHA-256 values) which get loaded on boot. |
None |
|
WINEP-42333 |
|
|
Adding multiple thousand Exploit Mitigation exclusions may result in high CPU load for hmpalert.exe | HitmanPro.Alert Service (Hmpalert.exe) is consuming high CPU when multiple thousand Exploit Mitigation Exclusions are applied to an Endpoint and stored in the Endpoint registry (e.g. under HKEY_LOCAL_MACHINE\SOFTWARE\HitmanPro.Alert_policy_\java.exe). |
None |
WINEP-42332 |
|
|
Moving and overwriting files on a network location with Ransomware Protection enabled locally may slow down the move operation | Moving and overwriting files on a network location with Ransomware Protection enabled locally may slow down the move operation. |
None |
WINEP-42330 |
|
|
Ransomware Protection may raise a false alert due to linking unrelated files together, when an identical number of bytes is being read/written | Ransomware Protection may raise a false alert due to linking unrelated files together, when an identical number of bytes is being read/written |
None |
WINEP-42328 |
|
|
The HitmanPro.Alert logfile contains entries for non-normalized application paths | The HitmanPro.Alert logfile (located at C:\Programdata\HitmanPro.Alert\Logs\Sophos.log) contains entries for non-normalized application paths, which are often logged for compiler applications: Example: YYYY-MM-DDTHH:MM:SS.FFFZ [Protected] PID 1234, Features 007D2E3000000100 Silent 0020000000000100, c:\\msys64\\opt\\rtems-5-win\\bin\\..\\lib\\gcc\\arm-rtems5\\7.5.0\\..\\..\\..\\..\\arm-rtems5\\app.exe This can be relevant when defining exclusions for specific applications. |
None |
WINEP-42327 |
|
|
Ransomware Protection may raise a false alert against license documents (license.html and license.htm) | Ransomware Protection may raise a false alert against license documents (license.html and license.htm) |
None |
WINEP-42326 |
|
|
Ransomware Protection may raise an alert against Backup/Sync software if ransomware notes get restored from backup and therefore terminates the backup process | Ransomware Protection may raise an alert against Backup/Sync software if actual ransomware notes are restored from a backup and therefore terminates the backup/sync process. |
None |
WINEP-42324 |
|
|
Ransomware Protection may raise a false alert due to linking unrelated files together when files share the same name (but different file extension) | Ransomware Protection may raise a false alert due to linking unrelated files together when files share the same name (but different file extension) |
None |
WINEP-42322 |
|
|
Folder-based Ransomware Protection exclusion (Windows) cannot be applied to root drives (e.g. “C:\”) | Folder-based Ransomware Protection exclusion (Windows) cannot be applied to root drives (e.g. “C:\”) |
None |
WINEP-46970 |
|
Chrome or Edge (32-bit) may show error 0x80000001 on Endpoints running Intercept X with Data Execution Prevention mitigation enabled | Chrome or Edge (32-bit) may show error 0x80000001 on Endpoints running Intercept X with Data Execution Prevention mitigation enabled. This issue only impacts 32-bit versions of Chrome or Edge. The 64-bit version of Chrome or Edge is not impacted. |
The issue is addressed in the current version of the Intercept X cumulative hotfix, available in Knowledge Base Article KB-000038477. Alternatively, until a fix for the issue is available, the Data Execution Prevention mitigation may be disabled for the impacted browser process. |
|
WINEP-45827 |
|
The Sophos Network Threat Protection service may get stuck in the start pending state when a Microsoft Azure computer running Windows Server 2016 with a Mellanox network interface is started from the "Stopped (deallocated)" state | If a Microsoft Azure computer running Windows Server 2016 with a Mellanox network interface is started from the "Stopped (deallocated)" state, the Sophos Network Threat Protection service may get stuck in the start pending state. The service is pending a Windows Filtering Platform (WFP) call from the system which is not being returned when the system starts from a “Stopped (deallocated)” state, resulting in the issue. This is an environmental/driver issue. No solution is available from Sophos Central Endpoint. |
To prevent the issue on Windows Server 2016, avoid using the “Stopped (deallocated)” state when turning off the server. However, when the state has to be used, restart the server once again after it started from that state and is in the problematic state. This issue only occurs on Windows Server 2016. In Windows Server 2019 and Windows Server 2022, starting the server from the “Stopped (deallocated)” state correctly returns the WFP call to the Sophos Network Threat Protection service, which allows the service to start correctly. Please see KBA for additional information - https://support.sophos.com/support/s/article/KB-000044781 |
|
WINEP-42329 |
|
|
Browsing a website with Microsoft Edge on Windows 10 32-bit systems may result in error 0x80000001 | Browsing a website with Microsoft Edge on Windows 10 32-bit systems may result in error 0x80000001 |
Turn off Data Execution Prevention on Microsoft Edge for affected systems. 1. Sign in to Sophos Central. |
WINEP-43577 |
|
Citrix - Users profiles doesn't get deleted, sessions don't terminate, app doesn't launch. | After upgrading servers to Core Agent 2022.2 Citrix User Profile Manager process may fail to delete users' temp profiles. Possible symptoms: i. user profile is not deleted automatically ii. ongoing sessions (sessions not getting removed) iii. some applications fail to launch halfway |
Please raise a ticket with Sophos support with the reference https://sophos.atlassian.net/browse/WINEP-43577#icft=WINEP-43577/https://sophos.atlassian.net/browse/WINEP-43242#icft=WINEP-43242 and request to get the corresponding fix enabled. |
|
WINEP-45811 |
|
Endpoints with Data Loss Prevention enabled may freeze and eventually crash with stop code DRIVER_POWER_STATE_FAILURE (9f) when a security token (e.g. YUBIKEY) is attached to the system | Due to an issue in the enumeration function of the Sophos Endpoint, Endpoints with Data Loss Prevention enabled may freeze and eventually crash with stop code DRIVER_POWER_STATE_FAILURE (9f) when a security token (e.g. YUBIKEY) is attached to the system. |
Until a fix for the issue is available, exclude storage destinations from any Data Loss Prevention rule, to prevent the issue |
|
WINEP-42286 |
|
Using a WPAD with Firefox, Firefox fails to browse. | If Firefox is configured to use a WPAD for proxy configuration, it fails to browse. Affects Core Agent 2.20.13 and above. |
Use manual proxy configuration for Firefox. All other browsers handle WPAD fine. |
|
WINEP-42288 |
|
|
Unable to connect Wi-Fi after Core Agent update to version 2022.1.1.3 | Customers using some Qualcomm Atheros chipset network cards can fail to connect to wireless networks after updating to core agent version 2022.1.x. Other adapters use this chipset, including the Dell 1802 and 1702 network adapters. A full list of adapters we have seen impacted can be found here: https://support.sophos.com/support/s/article/KB-000042044?language=en_US |
Turn off IPS in the Central Threat Protection Policy |
WINEP-42285 |
|
|
Firefox intermittently does not load Gmail | Some customers have reported Firefox having issues loading Gmail intermittently. This is due to a connection reset issue. Applies to Core Agent version 2.20.13 and above. This has been improved in Core Agent 2022.2.1 |
In the Threat Protection policy, turn off Real-Time Scanning - Internet |
WINEP-42550 |
|
|
Web browsing and download speeds are slower when Web Control and / or Real-time scanning Internet in Threat Protection is enabled | Web browsing and download speeds are slower Web Control and / or Real-time scanning Internet in Threat Protection is enabled |
Turn off Web Control policy |
WINEP-42551 |
|
|
Uploading larger files to FileVine or other document management systems may fail | Uploading larger files to FileVine or other document management systems may fail. |
Turn off Web Control |
WINEP-42908 |
|
|
Unable to cast when HTTPS scanning is on to Chromecast | With HTTPS/SSL scanning turned on, unable to cast to Chromecast devices. |
Add website exclusion for both HTTPS and Threat protection website exclusion for the IP of the Chromecast device |
WINEP-43569 |
|
|
BSOD NETIO.SYS | After the update to Windows Core Agent 2022.2.1.9 a BSOD may occur with the faulting module being - NETIO.sys The issue is still under investigation, and improvements are expected in the next Core Agent version. |
Please see KBA for workaround steps - https://support.sophos.com/support/s/article/KB-000044389 |
WINEP-43578 |
|
|
Clicking on multiple links multiple times in Firefox generating error - ERR_SSL_BAD_RECORD_MAC_ALERT | When using Firefox and browsing a website (IE: Google) and clicking on different links quickly can generate an error: ERR_SSL_BAD_RECORD_MAC_ALERT |
1. Close and re-launch Firefox |
WINEP-43410 |
|
|
Couldn’t download - Network issue error with Senso.Cloud and iBoss | The download of large files fails when Senso Cloud, iBoss, and other third-party Windows Filtering Platform (WFP) programs are installed alongside Sophos Central Endpoint The error seen in the browser: |
Please see KB for workaround steps for reported product conflicts - https://support.sophos.com/support/s/article/KB-000044418 |
WINEP-43576 |
|
Devices being detected as a clone when using VMware Horizon with ClonePrep | The gold image switch is not working for VMware Horizon with ClonePrep environment. The issue occurs here because when using “ClonePrep” the device is snapshotted and then spun up - a snapshot is then created from this new machine before it's snapshotted and cloned again. As an example: The machine they use as the “GoldImage” GOLD-W10 is then renamed to W10-1 itself and then from W10-1 a new machine is created called W10-2 and this then repeats. The workaround is to use the older style gold image prep script |
The workaround is to use the gold image prep script during the shutdown. |
|
WINEP-44672 |
|
Systems running CryptoPro CSP trigger APCViolation alerts | Systems running CryptoPro CSP software ( |
Disable "Prevent APC violation" in the Threat Protection policy of the Endpoints that need to run CryptoPro CSP. |
|
WINEP-42321 |
|
|
Ransomware Protection compatibility improvements with eFlow | Improved Ransomware Protection compatibility with 3rd party software eFlow. |
Hotfix version 3.9.0.1222 can be applied as a workaround. |
WINEP-43580 | Various types of intermittent networking issues on platforms running Red Hat VirtIO Ethernet Adapter | Virtualization platforms (e.g. Red Hat KVM, Nutanix VM, Proxmox) running Red Hat VirtIO Ethernet Adapter Service with the default netkvm.sys driver (C:\Windows\system32\drivers\netkvm.sys from 11/08/2016) may show various types of intermittent networking issues when Sophos Network Threat Protection Service is running and the service may show as stuck in a starting state after rebooting the system. |
Update the Red Hat VirtIO Ethernet Adapter drivers to the latest version. |
||
WINEP-43570 |
|
Internet browsing stopping when resources are low | Endpoints may lose internet browsing capabilities when resources are low. Error seen in logs: 2022-04-27T13:43:18.079Z [ 4712: 4476] E Exception in input: Failed to read from device: Insufficient quota to complete the requested service. The investigation of this topic is ongoing. For the time being the workaround mentioned here can be applied. |
Turn off the following policies and settings: Web Control policy |
|
WINEP-42704 |
|
|
Folder-based Ransomware Protection exclusions that target a mapped network drive (e.g. X:\), do not apply | Folder-based Ransomware Protection exclusions that target a mapped network drive (e.g. X:\), do not apply. |
Apply the latest Sophos Intercept X cumulative hotfix from KB-000038477 and change the mapped network drive exclusion to point towards the network location, using a wildcard for the server name. Example: If "X:\" is mapped to"\\server1\share2\folder3", update the folder-based ransomware exclusion to target "**\share2\folder3" |
WINEP-41307 |
|
Servers running ConnectWise Automate trigger DynamicShellcode mitigation | ConnectWise Automate / LabTech Agent (LTAgent.exe) triggers Dynamic Shellcode mitigation on Servers running Intercept X with Exploit Mitigation and Dynamic Shellcode protection enabled. The ConnectWise Automate host server is unable to launch Automate Control Center as it relies on LTAgent.exe, which fails to launch. |
Check KB-000044124 - Dynamic ShellCode Detection on ConnectWise Automate host server |
Central Firewall Management
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NR-6502 |
|
|
Firewalls managed by central might show a wrong status if IPS is switched on without a valid Network Protection license | Firewalls managed by Sophos Central without enabled IPS might get a message that enabling IPS worked though there is no valid Network protection license. |
Get a valid Network Protection license |
|
NR-8295 |
|
|
Partner dashboard(PDB) customer inventory and PDB Firmware upgrade will not be supported for FSC regions such as India, Brazil, Canada, Japan, or Australia customers created by partner | If Customers are created by partner in any FSC region then PDB Customer inventory and PDB Firmware upgrade Functionality would not be available for the customers of FSC region. These functionalities would be available to customers of FSC region along with PDB firewall Template support for FSC region. |
||
NR-9049 | Sophos Central Manager: Scheduled upgrades using the v19.5 GA firmware are not applying to firewalls | Sophos Central may NOT upgrade Sophos firewalls to 19.5 GA even though the firmware is seen as on Sophos Central. As 19.5 GA is still in the staging phase (standard firmware releases phases), many firewalls would NOT have received the in-product firmware upgrade for this version. The firewall will NOT be upgraded from Sophos Central if the firewall hasn't received the 19.5 GA staging version. |
Refer KBA - https://support.sophos.com/support/s/article/KB-000044725?language=en_US |
|||
NR-6306 |
|
|
Default ips policies will not be pushed after upgrade to 18.5 MR 2 under certain circumstances | Default IPS policies will not be pushed to a Sophos FIrewall with version 18.5 MR2 if: The firewall is being just added to CM after the update There is a group configuration change affecting firewalls with 18.5 MR2 Basically, the full sync process will skip the IPS opcode configuration for these devices running on v18.5 MR2. |
On Sophos Central, go to Firewall Management > Intrusion Prevention > IPS policy > Edit the Default policy > Save, and it would then be pushed to the XG Firewall. |
|
NR-6214 |
|
|
|
Central management could not enable after switching firmware with previous version or after Factory Reset | From SF v18.5 MR2, when FIPS mode is enabled, the device will reboot with factory reset. If the Firewall is registered and central services are accepted by the Central Admin and Admin Enables FIPS mode, the device will boot with factory reset config. On Re-registration and Enable Central Management, Endpoint already known to the Central and Central Management API considers this as a Bad request as Central Services already approved. |
There are two workarounds: After factory reset, Remove the firewall from Central |
NR-6220 |
|
|
|
"Loading" error on Firewall rules page after importing WAF rule via config import/export | Steps to recreate:
Expected Output: "Loading" error should not show on Firewall rules page on Group, after importing WAF rule Actual Output: "Loading" error is there on Firewall rules page on Group, after importing WAF rule |
|
NR-6074 |
|
|
Central Orchestration Trial license devices are not appearing in SDWAN device list | Supporting only bundle license in an SDWAN connection group. Following bundles are supported:
This bundles are not supported:
|
||
NR-5313 |
|
|
Central Managed firewall display issues seen with more than 50 groups | Firewall display issues seen in Central with more than 50 groups. |
Collapsing the group and expanding again will solve this issue. |
|
NR-4642 |
|
|
Unable to reorder the firewall rule in GROUP Level of Central Management using move button | Firewall rule reordering in Sophos Central Management group policy page is not supported. User can reorder the rule in XG Firewall. |
||
NR-2287 |
|
|
When user try to upgrade the firmware after accessing XG Firewall from Sophos Central, it get fail in Sophos Firewall device | If the available bandwidth is limited, Firmware upgrades for Sophos firewall devices might fail if triggered via Sophos Central -> login -> Open XG firewall through RP tunnel -> Backup and Firmware -> Upload Firmware |
Central Firewall Reporting
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NCR-2547 |
|
|
Web-surfing reports | Web surfing Reports as PDF with more than 200 entries is not possible. Creating a web surfing report you can only get an output from the first 200 entries in the iview. This is applicable both iview1/iview2. Reason: The reason for this would be that PDF generation with all the records will impact the performance of iview. The only work around would be to generate the detailed report in Excel format. Excel would support upto 100000 entries. |
MDR
Reference | Summary | Description | Workaround |
---|---|---|---|
SPUI-2058 | MDR > 'Customize Preferences' tab does not reload the customer list if you navigate away and back. | Issue seen when in the MDR section > select ‘Customize Preferences’ |
Refresh the browsers webpage |
Phish Threat
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
PHISH-8741 | Shared mailboxes are not supported in the Outlook plugin | Shared mailboxes are not supported in the Outlook plugin. The plugin is shown in OWA, but the functionality is incomplete. It is able to report campaign/non-campaign emails but it's not deleting the emails after submission. |
||||
PHISH-8740 | Training reminder email sent on Sunday | Phish Threat currently uses the UTC timezone in all of its regions, there is also no logic defining the start of a work day. This means that there is a possibility that a Training reminder email is sent at 00:01 UTC on a Monday, which, depending on the timezone of the end-user, may be received during the day on a Sunday. |
||||
PHISH-8633 | First training reminder email not following UI config | The very first reminder e-mail is sent as quick as possible to make sure users finish their training sooner than later. Every subsequent reminder email will follow the value selected in the frequency drop-down. |
||||
PHISH-7960 | Training template Format is not showing correctly on the smartphone | Taking Phish Threat Training via Smart Phones is not currently supported due to format supportability issue. |
||||
PHISH-4159 |
|
|
Deleted Users repopulate after being removed | If a user is deleted from the Phish Threat Dashboard but repopulate automatically after sometime, this is expected behaviour if a campaign was sent to the user within the last 30 days. |
||
PHISH-4139 |
|
|
Campaigns which don't have a training associated do not work | Creating and sending a Phish Threat Campaign without associated training material results in a 404 page being displayed when the enrollee clicks the link. This allows a dry run of a campaign to be sent so that the admin can gauge how many of his employees are likely to need training. The admin should be able to check how many of the enrollees opened, and clicked on the email attack. But the enrollee should not see anything else, so they won't get suspicious when the new attack is sent. |
||
PHISH-5317 |
|
|
|
Macro Script needs to be adjusted to work properly on Mac OS' | The powershell script used to generate the macro within attachment attack documents is not working properly on Mac OS. |
|
PHISH-5879 |
|
|
Gsuite Categorizing tracking link as suspicious | The following warning message might show up when clicking on a link within a Phish Threat campaign for G Suite customers with Central accounts in the East region giving users preemptive warnings:
Unfortunately a request cannot be made to delist from google as it requires proof of ownership. As the links are generated using Amazon services, we cannot supply this. A complete rehaul of Phish Threat will need to be made to change URLs for campaigns. |
||
PHISH-6820 |
|
|
Microsoft Defender SmartScreen reporting Phish Threat URL as "unsafe" | Microsoft currently provides no effective way for us to monitor and remove domains/URLs from the Microsoft Defender SmartScreen list. This means that the aforementioned feature is not compatible with our Phish Threat product. |
||
PHISH-7369 |
|
Unable to select-all users in enrollment for users due to large number of available users | The "select all" functionality of the users selection fields in the "New Campaign creation - Enroll users" is limited to the first 40-50 users, unless the admin manually scrolls the user selection scroll box down to load the full user list into the browser and re-clicks the 'select all' function for adding/removing users to the campaign. |
|||
PHISH-7464 |
|
Attachment from Campaign does not render some special characters properly | The normal workflow for Attachment Campaigns involves the fact that once the attachment has been opened, and the link inside of it activated, the user already failed the campaign - regardless of what's in the document. Everything else about the Attachment Campaign should still work fine. |
|||
PHISH-7392 |
|
Unable to load the PhishThreat Awareness training from China users | The following URLs are officially blocked in China. https://sophos-phish-threat.go-vip.co/ This means that training content will not work properly. The only possible workaround would be for the affected users to use a tunnel-all VPN solution. |
|||
PHISH-4831 |
|
Phish thread pushing campaigns to groups | When using AD sync with Phish Threat you cannot push out campaigns to sub-groups. The user must be a direct member of the group in order to receive the campaign. |
|||
PHISH-4246 |
|
|
Central Admin goes super slow when creating campaign with a large number of users at a time | If a campaign is created with large number of users then there are chances of page gets hang and campaign never gets completed. Currently it is recommended to add less than 500 recipients at a time. |
||
PHISH-4002 |
|
|
Training link returning "Oops, that page can't be found" | In rare instances customers may report when sending a training campaign they get presented with a "Oops, that page can't be found" error when clicking the training links. The page may load after refreshing several times. Please wait and try the link again after some time. This scenario can be seen during a web server refresh on the hosting server, normally it takes a couple of minutes to refresh all the training and landing pages - if the link was clicked during that specific refresh time the error will be received. |
PureMessage for Unix (PMX)
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
PMX-765 |
|
|
Can't read modified policy script: cannot negate test pmx_delayed_mail | An error is display in the policy constructor of the Admin UI Can't read modified policy script: cannot negate test pmx_delayed_mail at /opt/pmx6/lib/site_perl/5.8.7/PureMessage/Manager/Policy.pm line 26 |
The error comes from combining another test with a negated pmx_delayed_mail test. Example |
|
PMX-236 |
|
The concurrency_limit_action option is ignored when running with the process pool enabled (the default setting) | The concurrency_limit_action option is ignored when running with the process pool enabled (the default setting). If the maximum allowed concurrency is reached, handling of subsequent SMTP connections is determined exclusively by the flags set in the INPUT_MAIL_FILTER option in sendmail.mc |
|||
PMX-248 |
|
Because per-recipient tests split a message into multiple messages, it is possible to scan the same message for spam and viruses more than once | Because per-recipient tests split a message into multiple messages (one for each recipient), it is possible to scan the same message for spam and viruses more than once. This puts an unnecessary load on the system. Therefore, it is advisable to perform per-recipient blacklist/whitelist/optout tests before scanning for spam. Also, these tests should have an associated 'stop' action, so that processing does not continue. (The default policy script is an example of the correct configuration.) Per-recipient rules that simply add a header or log some data should be avoided. This will minimize the amount of processing that PureMessage has to do. This is not a problem if no per-recipient tests are used. Per-recipient tests are:
|
|||
PMX-278 |
|
If the policy.siv file is deleted, the PureMessage Manager's Policy editor does not generate the require "PureMessage" command | If the policy.siv file is deleted, the PureMessage Manager's Policy editor does not generate the require "PureMessage" command. The workaround is to click "see the source", and then click on "/opt/pmx/etc/policy.siv", and add the line:
at the top of the file. (#24992) |
|||
PMX-292 |
|
When synchronizing publications via the Server Groups tab in the Manager, all subscribed edge servers are synchronized | When synchronizing publications via the Server Groups tab in the Manager, all subscribed edge servers (not just the selected edge server) are synchronized. To synchronize only one edge server, run the following command at the command line while logged in as the PureMessage user:
|
|||
PMX-294 |
|
PureMessage Manager will indicate that port 28080 is being used for the HTTPD Service | Regardless of whether PureMessage has been configured to use port 28443 (the default) or port 28080 for End User Web Interface and Groups Web Interface access, the Local Services tab of the PureMessage Manager will indicate that port 28080 is being used for the HTTPD (RPC/UI) service |
|||
PMX-326 |
|
No support for mail-filtering servers that have different time zone settings In PureMessage | In PureMessage configurations that use centralized quarantine digests, there is currently no support for mail-filtering servers that have different time zone settings. You must set all mail-filtering servers to Greenwich Mean Time (GMT). |
|||
PMX-328 |
|
View quarantined message bodies when querying the quarantine on the CSM | On multi-server deployments with Filter Role servers (that is, servers performing mail processing and quarantining) and a Central Server Manager (CSM), the Manager pmx-manager must be running on the edge servers in order to view quarantined message bodies when querying the quarantine on the CSM |
|||
PMX-332 |
|
If PureMessage is installed without a database server, pmx-qmeta-index may display an error | If PureMessage is installed without a database server, pmx-qmeta-index may display the following error when run:
|
|||
PMX-338 |
|
If the system has more than 8 GB of memory, pmx-pg-tune does not automatically set the shared buffers | For PostgreSQL 9.x, the pmx-pg-tune tool analyzes system settings and configures shared memory for PostgreSQL in order to improve database performance. If your system settings are not in the recommended range, this command attempts to make the necessary adjustments. However, if your system has more than 8 GB of memory, pmx-pg-tune does not automatically set the shared buffers. You will have to set these manually. For more information, see "Tuning PostgreSQL for PureMessage" in the Sophos Knowledgebase, or contact Sophos Technical Support. |
|||
PMX-344 |
|
Moving the UI pages to a different host when users already have a valid cached cookie may result in login failure | End User Web Interface (EUWI) authentication currently favors the value of the initially granted cookie over any login form values. One of the consequences of this is that moving the UI pages to a different host when users already have a valid cached cookie may result in login failure. The only available workaround is to have users clear the offending cookie from their browser cache |
|||
PMX-346 |
|
Quarantined messages (50,000 or more) may cause the httpd process to consume excessive amounts of RAM | A large number of quarantined messages (50,000 or more) may cause the httpd process to consume excessive amounts of RAM that is not released until MaxRequestsPerChild has been exceeded. If this becomes a problem, the workaround is to lower the default value that causes the httpd process to recycle this memory more often |
|||
PMX-362 |
|
Display problems in the PureMessage Groups Web Interface | Adjusting the font size setting in your browser may cause display problems in the PureMessage Groups Web Interface |
|||
PMX-370 |
|
When searching the quarantine via the PureMessage Groups Manager and selecting 500 or 1000 from the Results to Display drop-down list search results are not returned immediately | When searching the quarantine via the PureMessage Groups Manager, you can select the number of messages to be displayed per page. When selecting 500 or 1000 from the Results to Display drop-down list, the search results are not returned immediately. During the delay, PureMessage does not display a message indicating that results are being retrieved. |
|||
PMX-932 |
|
|
Postfix rejecting mail after upgrade to 6.4.8 | After upgrading to PMX 6.4.8 some configurations may experience Postfix rejecting mail with the following errors Aug 22 11:12:36 hostname postfix/smtpd[80254]: warning: unknown smtpd restriction: "ignore_policy_error" Aug 22 11:12:36 hostname postfix/smtpd[80254]: NOQUEUE: reject: RCPT from mail.domain.com[1.1.1.1]: 451 4.3.5 Server configuration error; from= to= proto=SMTP helo= This is caused by the following configuration option being present in the _/opt/pmx/postfix/etc/main.cf_ file: smtpd_client_restrictions = ignore_policy_error,check_policy_service inet:[127.0.0.1]:4466 To avoid this problem the above line should be replaced with the following 2 lines immediately after upgrade to 6.4.8: smtpd_client_restrictions = check_policy_service inet:[127.0.0.1]:4466 smtpd_policy_service_default_action = DUNNO |
This is caused by the following configuration option being present in the /opt/pmx/postfix/etc/main.cf file: smtpd_client_restrictions = ignore_policy_error,check_policy_service inet:[127.0.0.1]:4466 To avoid this problem the above line should be replaced with the following 2 lines immediately after upgrade to 6.4.8: smtpd_client_restrictions = check_policy_service inet:[127.0.0.1]:4466 |
|
PMX-936 |
|
|
Large list files may not display in the GUI when using RHEL7 | When running PMX on RHEL7 large list files ( > 58215 entries) may not display in the management GUI All the entries are still processed successfully by the mail filters however. |
Our recommendation is to always convert any lists that contain more than 5000 entries to a CDB file (rather than plain text list). Doing this will also resolve this issue and allow the list to display in the GUI |
|
PMX-952 |
|
Admin UI Users can not be disabled | A user created in the Admin UI for the Admin UI can not be disabled. |
Change the password so that the user cannot log in anymore |
||
PMX-911 |
|
|
searches for pmx_reason names with underscores returns no results | Doing a search on a custom log reason containing an underscore in it, displays "no result". This is by design as the underscore is the replacement character for the space. The system can not tell the difference between a natural underscore and a replaced space. |
||
PMX-907 |
|
|
%%PMX_VERSION%% Template not showing the correct SAVI Version | The PMX_VERSION template is updated on an AntiSpam Database reload and a restart of the milter. |
||
PMX-897 |
|
SPF support macros | Does PMX 6.x supports macros[1] in spf For example this SPF: “v=spf1 include:domain.com._nspf.XXXX.email include:%{i}._ip.%{h}._ehlo.%{d}._spf.xxxx.email ~all” Would that be successfully interpreted and resolved on a standard PMX installation. Yes anti-spam engine supports SPF macros |
|||
PMX-843 |
|
|
Milter rejects 452 too many recipients | Milter rejects messages returning error 452 too many recipients when setting the _default_destination_recipient_limit to 1050 smtpd_recipient_limit default_destination_recipient_limit the milter accepts a maximum number of 100 recipients, so a message of 1000 recipients into postfix will be split into 20 messages before being forwarded to the milter. Changing those values is dangerous as some sites will assume that a "properly configured postfix" will not send more than 50 recipients in one single mail. Logging/File Details Mar 8 18:15:49 scmx011cto postfix/smtp[31885]: 791723AA201: to= |
||
PMX-764 |
|
|
Redis not showing as service on the local services page | The status of the historian is not displayed on the Local services Page. |
||
PMX-226 |
|
Overriding log_to in a milter section of pmx.conf does not work | Overriding log_to in a milter section of pmx.conf does not work. The top-level setting is always used |
|||
PMX-306 |
|
Unless you have adjusted the settings of either _pmx-qindex_ or _pmx-queue-run_, these scheduled jobs will no longer be displayed in the list of jobs on the *Local Services* tab | Unless you have adjusted the settings of either pmx-qindex or pmx-queue-run, these scheduled jobs will no longer be displayed in the list of jobs on the Local Services tab upon upgrade to PureMessage 5.5 or later. They have been replaced by the Queue Runner service |
|||
PMX-246 |
|
Per-recipient tests have significant overhead | Per-recipient tests have significant overhead. Therefore, adding many per-recipient tests to the policy script may degrade performance. It is advisable to minimize the number of per-recipient tests to optimize throughput |
|||
PMX-240 |
|
Template variables are not evaluated in tests that do matching | Template variables are not evaluated in tests that do matching. Any test that takes a MATCH-TYPE argument (such as, 'is', 'contains', 'matches', 'memberof') does not expand templates in the match expression, since this expression is compiled at startup time |
|||
PMX-410 |
|
Certain operating systems, such Debian and SUSE, specify more than one "127" IP address in /etc/hosts | Certain operating systems, such Debian and SUSE, specify more than one "127" IP address in /etc/hosts (for example, 127.0.0.1., 127.0.1.1 and 127.0.0.2). Since some PureMessage functions depend on a certain internal host setting, you should make sure that _/etc/hosts _contains the same "127" addresses as /opt/pmx6/etc/internal-hosts |
|||
PMX-408 |
|
Some PureMessage updates are extracted into your system's /tmp directory | Some PureMessage updates are extracted into your system's /tmp directory. It is therefore important to control the size of this directory through appropriate system maintenance to avoid consuming excessive disk space |
|||
PMX-406 |
|
Shifting to and from Daylight Saving Time (DST) creates a gap in PureMessage reports and causes errors to be logged | Shifting to and from Daylight Saving Time (DST) creates a gap in PureMessage reports and causes errors to be logged. For complete details on the impact of DST, see the Sophos Knowledgebase entry 23877: |
|||
PMX-404 |
|
The pmx-quarantine reindex --forget-old command does not operate properly | The pmx-quarantine reindex --forget-old command, which schedules cleanup of index entries that correspond to removed messages, does not operate properly. This command is not normally required, as the expired messages are automatically scheduled for removal. In cases when this functionality is needed, the workaround is to use the pmx-quarantine reindex --purge command, which purges the existing indexes and schedules existing messages for re-indexing. Note that the subsequent invocation of pmx-qmeta-index may result in re-indexing of the entire quarantine and may take a long time for large quarantines |
|||
PMX-402 |
|
The pmx-qman utility currently does not enforce exclusive access to the message quarantine | The pmx-qman utility currently does not enforce exclusive access to the message quarantine. This may result in errors when running multiple instances of this program on the same mail-processing host. For example, an attempt to approve messages by a second instance of pmx-qman may fail if the messages have been deleted by a first instance |
|||
PMX-400 |
|
The pmx-quarantine and pmx-quarantine list commands only work on the cur and trash folders | The pmx-quarantine count [folder] and pmx-quarantine list [folder] commands only work on the cur and trash folders. Use operating system commands to examine the contents of other quarantine folders |
|||
PMX-398 |
|
The cantscan.tmpl and approve-failure.tmpl templates include technical reasons that have not been translated | The cantscan.tmpl and approve-failure.tmpl templates include technical reasons that have not been translated |
|||
PMX-396 |
|
When using the --earliest option with pmx-qdigest, the timestamp option value must be enclosed in quotes | When using the --earliest option with pmx-qdigest, the timestamp option value must be enclosed in quotes. Otherwise, only the first part of the option value (the date) is used as the timestamp, instead of both the date and the time |
|||
PMX-394 |
|
If a digest template file is missing during digest generation, subsequent digests may include messages that were included in previous digests | If a digest template file is missing during digest generation, subsequent digests may include messages that were included in previous digests. When a digest template is missing, the digest program does not save the identifiers of messages as they are scanned. Therefore, when the digest is re-run (after fixing the missing template), messages are re-scanned. Aside from the duplicate digest entries, there is no other operational impact |
|||
PMX-392 |
|
If non-ASCII characters are present in the digest, the digest fields may not be aligned correctly | If non-ASCII (specifically multi-byte UTF-8) characters are present in the digest, the digest fields may not be aligned correctly. This problem is only seen in the text/plain parts of the digests |
|||
PMX-390 |
|
When pmx-qdigest is run in centralized mode, it only scans messages that have been indexed by pmx-qmeta-index | When pmx-qdigest is run in centralized mode, it only scans messages that have been indexed by pmx-qmeta-index. This is because the centralized digest works with metadata stored in the centralized (DBMS-based) quarantine; pmx-qmeta-index inserts this metadata into the centralized quarantine. This behavior varies from that of pmx-qdigest when run in local mode, which is able to scan all messages that have been processed by pmx-qindex (that is, those that exist in the filesystem-based quarantine on the server that's running the pmx-digest program) |
|||
PMX-388 |
|
Memory usage is incorrectly reported by pmx status and ps | Memory usage is incorrectly reported by pmx status and ps. Memory used for blocklist data is no longer reported in vmsize of the parent pmx-milter process (which is correct), but the vsz for each individual pooled process includes memory that is actually shared between all pooled processes |
|||
PMX-386 |
|
Big5-HKSCS is wrongly interpreted as Big5 | Big5-HKSCS is wrongly interpreted as Big5 |
|||
PMX-384 |
|
Adding a Japanese word to the suspect attachment list may not trigger when the word is in the body of the message | Adding a Japanese word to the suspect attachment list may not trigger when the word is in the body of the message. This is only the case if you use \b in the regular expression, as the UTF-8 support does not handle word boundaries well |
|||
PMX-382 |
|
The 'Blocked' field in the table view of the 'Messages Blocked by the Policy' report does not display correctly if pmx_blocklist is not in the PureMessage policy | The 'Blocked' field in the table view of the 'Messages Blocked by the Policy' report does not display correctly if pmx_blocklist is not in the PureMessage policy |
|||
PMX-380 |
|
MTA-level and Policy-level blocking reports display an invalid total count in multi-server deployments | MTA-level and Policy-level blocking reports display an invalid total count in multi-server deployments |
|||
PMX-378 |
|
When creating a policy setting for the Groups Web Interface using the pmx-group-policy command, only lowercase characters are allowed | When creating a policy setting for the Groups Web Interface using the pmx-group-policy bcommand, the value specified with the --id option must contain all lowercase characters (for example --id policy_id and not --id Policy_ID). If the ID contains any uppercase characters, clicking the associated policy option check box in the Groups Web Interface results in an "invalid permission" message |
|||
PMX-376 |
|
When you create a group list using the pmx-group-list command, the wrong list name is added to the lists selection drop-down in the Policy Constructor | When you create a group list using the pmx-group-list command, the wrong list name is added to the lists selection drop-down in the Policy Constructor. The group-specific list should use the name specified with the --name option. Instead, it uses the text specified with the --description option |
|||
PMX-374 |
|
Even if a group administrator has not been granted permission for the Save button in the Message Details dialog box, the button is always visible | Even if a group administrator has not been granted permission for the Save button in the Message Details dialog box, the button is always visible. If permission for this button has not been granted, clicking it will have no effect. The same is true of the Forward button that appears at the bottom of each Search Results page |
|||
PMX-372 |
|
clicking the Delete All button on the quarantine Search Results page does not cause the status icon to immediately turn red | Under certain conditions, clicking the Delete All button on the quarantine Search Results page does not cause the status icon to immediately turn red. Refresh the page to update the status |
|||
PMX-368 |
|
The page count displayed with the paging controls at the top right of the Search Results page is only approximate | The page count displayed with the paging controls at the top right of the Search Results page (for example, 1 of 49) is only approximate. For instance, clicking the >> button may not display the last page of results, or it may display a blank page that is beyond what is actually the last page. |
|||
PMX-366 |
|
Subject and Relay text boxes of the Search Parameters sidebar are case-sensitive | Search strings entered in the Subject and Relay text boxes of the Search Parameters sidebar are case-sensitive |
|||
PMX-364 |
|
Date Range of the Report Parameters musst be spelled with two zeros after the hour value | When entering the hour portion of start or end time in the date range fields of the Report Parameters sidebar, you must add two zeros after the hour value in order to return the correct results. For example enter "23:00", not "23". Other irregularities with the date range fields have also been experienced |
|||
PMX-360 |
|
Input validation is not strictly enforced for the text boxes | Input validation is not strictly enforced for the text boxes on the Search Parameters and Report Parameters sidebars |
|||
PMX-358 |
|
Pages in the Message Details dialog box may load slowly | Pages in the Message Details dialog box may load slowly if the associated message has a large attachment |
|||
PMX-356 |
|
The EUWI treats the quarantine reason as mixed case, while the manager and digest do not | The EUWI treats the quarantine reason as mixed case, while the manager and digest do not. For example, if you quarantine a message for the reason "MiXeDcAsE" it will show up in the manager UI and the digest as "mixedcase" and will not show up in the EUWI. To resolve this, change all End User Options "Quarantine Reasons" to lower case and restart the HTTPD process |
|||
PMX-354 |
|
Messages deleted from the quarantine via the Manager or command line are still accessible via the EUWI | Messages deleted from the quarantine via the Manager or command line are still accessible via the EUWI |
|||
PMX-352 |
|
When the EUWI is configured to display in French, the date order on the Options page is incorrect | When the EUWI is configured to display in French, the date order on the Options page is incorrect |
|||
PMX-350 |
|
End users may experience an HTTPD error instead of a well-formatted error message when critical RPC errors occur | End users may experience an HTTPD error instead of a well-formatted error message when critical RPC errors occur. If this occurs, examine the rpc_error.log file to determine the root cause of the error and correct it. |
|||
PMX-348 |
|
The EUWI pages sometimes display errors in English instead of in the localized language | The EUWI pages sometimes display errors in English instead of in the localized language |
|||
PMX-342 |
|
The user preference settings are currently not synchronized by default | The user preference settings are currently not synchronized by default. The workaround is to use Server Groups to publish these settings.
Or:
Synchronize user preference settings |
|||
PMX-340 |
|
Duplicate entry for Chinese in the Default Language drop list under Quarantine > Configure End User Features | Customers who have manually configured support for Chinese in the End User Web Interface (EUWI) may see a duplicate entry for Chinese in the Default Language drop list under Quarantine > Configure End User Features . To prevent this, remove the file named tw from the /opt/pmx/etc/manager/lang/installed/ directory, and change to the new Traditional Chinese language package with the following command: pmx-config language cht |
|||
PMX-336 |
|
pmx-policy inject fails with an error when used with centralized quarantine | pmx-policy inject fails with an error ("Queries using field 'm_pmx_test' for retrieval are not supported in pmdb message sets") when used with centralized quarantine. For testing the policy use the_ -dry-run_ option. This option uses an alternative message-store that does not interfere with the centralized quarantine |
|||
PMX-334 |
|
The PureMessage-PostgreSQL install fails if another process has bound the port that PostgreSQL uses | The PureMessage-PostgreSQL install fails if another process has bound the port that PostgreSQL uses (TCP port 5432 by default). Either stop the other process or change the port PostgreSQL uses. The pg.log file in the _postgres/ _directory will contain either: LOG: could not bind Unix socket: Address already in use if PostgreSQL failed to bind to its port |
|||
PMX-330 |
|
The size of the quarantine database may double during the upgrade | When upgrading a PostgreSQL-based quarantine server, make sure you have plenty of free hard drive space; the size of the quarantine database may double during the upgrade |
|||
PMX-324 |
|
pmx-pg-switch command is failing | The /opt/pmx/postgres location must be on the same device as the base PureMessage installation, or the pmx-pg-switch command will fail |
|||
PMX-322 |
|
Uninstall does not restore the old MTA if you let the PureMessage-Sendmail installer "override existing sendmail" | Uninstall does not restore the old MTA if you let the PureMessage-Sendmail installer "override existing sendmail". The workaround is to delete the stale symlinks manually and move the *.save files back after uninstalling PureMessage. This should not be a problem on systems with update-alternatives |
|||
PMX-320 |
|
Uninstall does not clean up the PureMessage user's mailbox on Solaris | Uninstall does not clean up the PureMessage user's mailbox on Solaris. The /var/spool/mail/ |
|||
PMX-318 |
|
If PureMessage-Sendmail is installed under /opt on Solaris it may display an error message when the /opt directory is group writable | If PureMessage-Sendmail is installed under /opt on Solaris it may display an error message when the /opt directory is group writable. The workaround is to add this line to the sendmail.mc file: define(`confDONT_BLAME_SENDMAIL',`GroupWritableDirPathSafe') |
|||
PMX-316 |
|
Postfix and sendmail are not automatically shut down by pmx-setup | Postfix and sendmail are not automatically shut down by pmx-setup. The MTA must be stopped manually before upgrading Postfix or sendmail components and restarted after the upgrade is complete |
|||
PMX-312 |
|
Sendmail can cause errors with QueueRunner.pm if resolving the senders domain takes a long time | Sendmail can cause errors with QueueRunner.pm if resolving the senders domain takes a long time. To resolve the issue, add the following to backend.mc _define( confDONT_EXPAND_CNAMES', True') |
|||
PMX-314 |
|
For systems using Oracle Communications Messaging Exchange Server, mail transfer agent upgrades must be performed as the root user from the command line | For systems using Oracle Communications Messaging Exchange Server, mail transfer agent upgrades must be performed as the root user from the command line. These packages cannot be upgraded from the Manager interface |
|||
PMX-310 |
|
If logsearch recovery indexing is interrupted before completion and logsearch indexing restarts indexing will skip archived logs | If logsearch recovery indexing is interrupted before completion and logsearch indexing restarts (pmx-logsearch-index start), indexing will skip archived logs if the daemon detects that it is more than 60 MB behind. Logsearch recovery must continue until done |
|||
PMX-308 |
|
it is possible to adjust the Scheduler so that PureMessage data updates from Sophos run less frequently than every five minutes | Although it is not recommended, it is possible to adjust the Scheduler so that PureMessage data updates from Sophos run less frequently than every five minutes. Furthermore, selecting only a single value in any of the scheduling scroll boxes causes the timing of the scheduled update job to be randomized. The intervals set at the smallest increment take precedence over larger increments. So, for example, if you create intervals under Minutes but not under Seconds, the seconds are randomized. This degree of randomization ensures that multiple processes do not start at the same time, reducing the chances of a load spike. It also reduces the likelihood of a network load spike caused by data downloads that occur at the same time |
|||
PMX-304 |
|
The pmx-queue run scheduled job uses the same configuration file as the Queue Runner background service | The pmx-queue run scheduled job uses the same configuration file (/opt/pmx/etc/queuerunner.conf) as the Queue Runner background service. This could cause unexpected results when running pmx-queue run manually. |
|||
PMX-302 |
|
If you are running PureMessage behind a proxy server, the _pmx-mlog-stats_ scheduled job will not be able to send statistical feedback to Sophos | If you are running PureMessage behind a proxy server, the pmx-mlog-stats scheduled job will not be able to send statistical feedback to Sophos |
|||
PMX-300 |
|
The PureMessage Manager will allow you to create a scheduled job that is invalid without issuing a warning | The PureMessage Manager will allow you to create a scheduled job that is invalid without issuing a warning. For instance, if you were to create a scheduled job for pmx-release (which is invalid) instead of pmx-qrelease, there will be no warning in the Manager or in the logs. |
|||
PMX-298 |
|
If there are no scheduled jobs on the system the Scheduler service will not start up | If there are no scheduled jobs on the system (this is very rare, since all of the PureMessage roles come with scheduled jobs), the Scheduler service will not start up; instead of starting, it will exit silently |
|||
PMX-296 |
|
Text on the MTA IP Blocking page of the Local Services tab incorrectly instructs you to start the Blocker Service after enabling IP blocking | Text on the MTA IP Blocking page of the Local Services tab incorrectly instructs you to start the Blocker Service after enabling IP blocking. Instead, when prompted, you must restart both your mail transfer agent and the Scheduler Service |
|||
PMX-290 |
|
In the Manager's Policy Constructor, clicking on Add main rule or Add rule anywhere adds a new rule, even if the user clicks Cancel | In the Manager's Policy Constructor, clicking on Add main rule or Add rule anywhere adds a new rule, even if the user clicks Cancel. If this happens, the new rule can easily be deleted by clicking on the rule and then clicking Delete |
|||
PMX-288 |
|
Characters outside the ASCII range are currently not considered to be "word" characters, which has significance when attempting to match the \w and \b escapes within regular expressions | Characters outside the ASCII range are currently not considered to be "word" characters, which has significance when attempting to match the \w and \b escapes within regular expressions. This should be considered particularly carefully when writing regular expressions that may be used to match against data containing accented characters common in non-English languages |
|||
PMX-286 |
|
An administrator must manually enter list/map IDs in the Policy Constructor for the _pmx_notify_ and _pmx_map_recipient_ actions | An administrator must manually enter list/map IDs in the Policy Constructor for the pmx_notify and pmx_map_recipient actions |
|||
PMX-284 |
|
Errors may occur when two or more administrators edit the policy file at the same time | Errors may occur when two or more administrators edit the policy file at the same time |
|||
PMX-282 |
|
The Manager's Policy Constructor does not preserve comments in the policy script that are attached to commands | The Manager's Policy Constructor does not preserve comments in the policy script that are attached to commands; it only preserves comments attached to rules ('if' or 'elsif' statements). The workaround is to only attach comments to rules if you want to use the Policy Constructor. Also, a command effectively becomes a rule when enclosed in an "if true" block: if true { |
|||
PMX-280 |
|
The ordering of the policy actions can be misleading in the PureMessage Manager's Policy Constructor | The ordering of the policy actions can be misleading in the PureMessage Manager's Policy Constructor. New actions are added at the end of the rule, but the Policy Constructor always displays them before all nested rules. You can see the true order by viewing the source of the script |
|||
PMX-276 |
|
Existing publications may no longer work after upgrading | Existing publications may no longer work after upgrading. The location of some support/configuration files are modified, but publications are not automatically migrated to use these new locations. The workaround is to delete and then recreate all affected publications |
|||
PMX-274 |
|
PureMessage Manager user account names are limited to ASCII letters and numbers | PureMessage Manager user account names are limited to ASCII letters and numbers |
|||
PMX-272 |
|
The "Send Support Request" page in PureMessage Manager generates messages that will be sent via the server configured by the _mail_sender_ option | The "Send Support Request" page in PureMessage Manager generates messages that will be sent via the server configured by the mail_sender option. If that server runs PureMessage, the request is subject to spam checks and may be quarantined. One workaround for this is to configure the mail_sender option to point to an internal mail server that does not run PureMessage. Another is to add the sender address for such messages to the whitelist |
|||
PMX-270 |
|
There is no way to select an LDAP list to be added to the policy publication | There is no way to select an LDAP list to be added to the policy publication. As a workaround, manually copy the lists.conf entry to each edge server |
|||
PMX-268 |
|
When adding or editing custom anti-spam rules, the pop-up dialog that displays a description of the message parts does not paste the selected part into the Policy Constructor | When adding or editing custom anti-spam rules, the pop-up dialog that displays a description of the message parts does not paste the selected part into the Policy Constructor |
|||
PMX-266 |
|
The PureMessage Manager reports that changes to CDB lists will take effect in 1 minute but the changes do not take effect | The PureMessage Manager reports that changes to CDB lists will take effect in 1 minute. These changes to not actually take effect until the pmx-makemap command is run |
|||
PMX-264 |
|
The redirect policy action does not work with multiple recipients | The redirect policy action does not work with multiple recipients |
|||
PMX-262 |
|
When modifying the PureMessage policy by editing the Sieve code directly it is not recommended that the attachment-specific tests be combined using |
When modifying the PureMessage policy by editing the Sieve code directly, it is not recommended that the attachment-specific tests (pmx_attachment_name, pmx_attachment_size, pmx_attachment_type, and pmx_suspect_attachment) be combined using |
|||
PMX-260 |
|
Non-ASCII characters are not permitted in the ID fields of lists, maps, and per-recipient lists | Non-ASCII characters are not permitted in the ID fields of lists, maps, and per-recipient lists |
|||
PMX-258 |
|
The pmx_add_header and pmx_replace_header actions allow non-ASCII characters to be entered into header names | The pmx_add_header and pmx_replace_header actions allow non-ASCII characters to be entered into header names, but doing so violates RFC 2822 (which prescribes internet message format), and could cause loss of data. The workaround is to not use non-ASCII characters in the header-name parameters passed to these actions |
|||
PMX-256 |
|
If pmx_replace_body, pmx_notify and pmx_add_banner are passed verbatim data from the Sieve script, these actions add the data with non-ASCII characters encoded with UTF-8 | If pmx_replace_body, pmx_notify and pmx_add_banner are passed verbatim data from the Sieve script (rather than being passed a filename), these actions add the data with non-ASCII characters encoded with UTF-8. The workaround is to always pass a filename to these actions - the contents of the file can be in any character set |
|||
PMX-254 |
|
Non-ASCII custom marks are not supported in PureMessage | Non-ASCII custom marks (using the pmx_mark and_ pmx_mark1_ actions) are not supported in PureMessage. They will not show up in the PureMessage Manager Policy Hit Report |
|||
PMX-252 |
|
Non-ASCII characters are not supported in the "Quarantine Reason" | Non-ASCII characters are not supported in the "Quarantine Reason" parameter passed to the pmx_quarantine and pmx_file actions. |
|||
PMX-250 |
|
The pmx-policy inject and qinject commands cannot be used with the centralized quarantine | The pmx-policy inject and qinject commands cannot be used with the centralized quarantine. For the purpose of testing changes to the policy script, use the --dry-run option with pmx-policy inject, or use the 'Policy Test' interface in the Manager |
|||
PMX-244 |
|
If a per-user list and a regular list have the same name, PureMessage will always quietly select the regular list rather than the per-user list with the same name | If a per-user list and a regular list have the same name, PureMessage will always quietly select the regular list rather than the per-user list with the same name |
|||
PMX-242 |
|
The pmx_map_recipients policy action does not affect the per-user preferences applied to a message | The pmx_map_recipients policy action does not affect the per-user preferences applied to a message. The per-user preference for the original recipient is used, rather than the preferences for the mapped recipient. The workaround is to use the recipient-aliases map. The pmx_map_recipients action should only be used to change the message recipient |
|||
PMX-238 |
|
The pmx-store-expire script does not remove stale mset/* files | The pmx-store-expire script does not remove stale mset/* files. These files can be manually removed if they have not been accessed for some days |
|||
PMX-234 |
|
The quarantine report collector can take a long time on large quarantines | The quarantine report collector can take a long time on large quarantines. This can lead to missing data for some time periods because the execution of report collectors cannot overlap. It is possible to alter the report collector's scheduled job so that it runs less frequently (for example, every other hour) to keep the information gaps consistent. The report collector can also be configured to skip scanning the quarantine (thereby not generating quarantine reports) by setting the --collector command-line option to MessageLog |
|||
PMX-232 |
|
PureMessage's Log Search Index service does not index messages that have been generated by the pmx-test command | PureMessage's Log Search Index service, which allows for faster log searches when using the search functionality in the Groups Web Interface, does not index messages that have been generated by the pmx-test command |
|||
PMX-230 |
|
Test messages generated by the pmx-test program are included in reports | Test messages generated by the pmx-test program are included in reports. This can make the reports less useful, especially if load tests were performed (as they generate thousands of test messages) |
|||
PMX-228 |
|
List IDs (such as the 'whitelisted-hosts' list) are limited to ASCII characters | List IDs (such as the 'whitelisted-hosts' list) are limited to ASCII characters |
|||
PMX-224 |
|
A machine that only has the EUWI role installed will issue warnings at startup | Links to pmx-queue-runner are incorrectly installed in the /opt/pmx/etc/init.d directory if you install only the EUWI role |
|||
PMX-206 |
|
|
PMX not installing with locale not english | PureMessage Unix will not properly install if the locale is not set to english. |
||
PMX-222 |
|
Issue downloading the latest installer during upgrade | When upgrading to the latest version of PureMessage, you may be prompted to retrieve the newest version of the PureMessage installation/upgrade program. This could result in the following error: |
|||
PMX-220 |
|
Different usernames within a Puremessage Unix installation | The PureMessage user needs to have the same username on each server in your deployment. If you need to support different usernames across servers, execute the following command on the machine that includes the Database Server role: |
|||
PMX-218 |
|
Issues with terminal environment | If the installer does not display properly, set the $PMX_TERM environment variable to 'xterm' and run the installer again. If 'xterm' does not work, try other values. |
|||
PMX-216 |
|
Issue with curses | If you have trouble viewing the curses interface, it is still possible to install a new license. To upgrade to a new PureMessage license, save the license to the PureMessage user's home directory and run the command: |
|||
PMX-214 |
|
Keyboard setting during installation | Using the number pad on your keyboard causes values to be entered incorrectly in the fields of the PureMessage installer. When entering numeric values in the installer, use the row of number keys instead. |
|||
PMX-212 |
|
Customized httpd2.conf | When upgrading to PureMessage 6, any previous customizations to httpd2.conf will be lost. If you have made customizations to this file you will need to manually incorporate them into your PureMessage 6 installation. |
|||
PMX-210 |
|
Unsupported plattform warning | The installer may warn about an unsupported plattform. If you have the proper prerequisites and libraries installed you can proceed. |
SafeGuard Enterprise
Reference | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
DPFEE-695 | SGN 8.10 | n/a | All file encryption modules | When a file has 0 size and is opened by an IN-Application it will be decrypted on write. | When a file has 0 size and is opened by an IN-Application it will be decrypted on write. | n/a |
DPFEE-847 | SGN 8.10 | n/a | All file encryption modules | When the destination file of a copy operation already exists and the destination file is encrypted but no key is available the destination file is deleted. The copy aborts with an Access denied message | When the destination file of a copy operation already exists and the destination file is encrypted but no key is available the destination file is deleted. The copy aborts with an Access denied message | n/a |
DPSGN-10553 | All | n/a | Client - Filevault | Mac computers get registered in the ".Auto registered" node | Mac clients are ending up in the workgroup/ .Autoregistered section of the Management Center, even though they seem to be joined to a domain. The issue occurs if the OS built-in mechanisms are not used to join the domain (e.g. using Quest Authentication Services). | Use the OS X built-in function (directory util) to join OS X clients to an AD. |
DPSGN-1095 | All (OS X) | Not planned, this is by design | File Encryption - Mac | Over-mounted folders show wrong folder size | The over-mounted folders are displayed in Finder with a size information which is not correct. Normal folders do not have a size information in the folder view, only when the information window is opened. The displayed size of the folders is usually used space on the system disk. | n/a |
DPSGN-1114 | All (OS X) | Not planned, this is by design | File Encryption - Mac | Folders with encryption rule cannot be shared via SMB or AFP | Folders with encryption rule cannot be shared via SMB or AFP | n/a |
DPSGN-13115 | All | n/a | Client - Base | Login fails with an error message: The
current Sophos SafeGuard@ policies do not allow you to log on . |
Login to the SafeGuard "Other User" Credential Provider fails with an error message: The
current Sophos SafeGuard@ policies do not allow you to log on if a local user account
name
starts with a '#'-sign and no network connection is available |
For more details and available workarounds see KB-000037066 |
DPSGN-13274 | All | Not planned | Management Center / LPE | Default values might not be shown when changing tabs in the RSOP section of the Management Center. | Default values button has to be toggled off and then on again to function when changing tabs in the RSOP section of the Management Center | Enable and disable the "Show default values" button after changing a tab of the RSOP. |
DPSGN-14505 | SGN 8.10 | 8.10.2 | All file encryption modules | Sporadic Local Cache Corruption. | Under certain circumstances you might see sporadically occurring Local Cache corruptions on systems running SafeGuard 8.10 file encryption. | Install the SafeGuard Client Patch 1901 (KB-000038562) to address the issue. |
DPSGN-14546 | 8.1 | 8.10.2 | Server / MC | Client registration fails. | Auto registration is blocked while AD-sync is running. New clients do not complete the initialization and certificates are not not sent. | Install the SafeGuard Backend Patch 1901 (KB-000038556) to address the issue. |
DPSGN-14552 | SGN 8.0, 8.10 | 8.10.2 | SyncEnc, DX, FE | Outlook Add-In: Several seconds freeze when sending mails | When sending mails with enabled SafeGuard Outlook Add-In there can be a delay of about 5 seconds under certain circumstances. | Install the SafeGuard Client Patch 1901 (KB-000038562) to address the issue. |
DPSGN-14564 | SGN 8.0, 8.10 | 8.10.2 | MC | Group-Memberships of universal groups are no longer synchronized. | Memberships of universal groups are no longer synchronized across domains during the Active Directory synchronization, following the update to SafeGuard Enterprise 8.x. | Install the SafeGuard Backend Patch 1901 (KB-000038556) to address the issue. |
DPSGN-14622 | SGN 8.10 | 8.10.2 | MC | New devices cannot be added to device white list. | After the upgrade to SGN 8.10 or fresh installations of SGN 8.10, new devices can no longer be added to white lists (used as encryption target). | Install the SafeGuard Backend Patch 1901 (KB-000038556) to address the issue. |
DPSGN-14639 | SGN 8.10 | 8.10.2 | All file encryption modules | Bluescreen Bugcheck 0x3b (SYSTEM_SERVICE_EXCEPTION) on Windows 10 version 1809
endpoints |
Sophos internally discovered issue which can lead to a bluescreen (BSOD) on endpoints running a SafeGuard 8.10 file encryption module.The issue can for example occur when applying Windows Updates. | Install the SafeGuard Client Patch 1901 (KB-000038562) to address the issue. |
DPSGN-14702 | 8.0, 8.10 | 8.10.2 | MC | Unable to assign Key: An error has occured during key generation | When trying to assign a key to an object (e.g. or recovery purposes) the MC might return an error code. | Install the SafeGuard Backend Patch 1901 (KB-000038556) to address the issue. |
DPSGN-14778 | as of 8.10.x | n/a | All file encryption modules | Access denied when saving files in a folder that has NTFS file compression enabled | User gets an access denied message when saving files in a folder that has NTFS file compression enabled | Disable NTFS File Compression. |
DPSGN-14853 | 8.1 | 8.2 | All file encryption modules | Cannot open encrypted Quickbooks project (other applications potentially affected as well),when SafeGuard File Encryption filter driver is active. | Opening encrypted Quickbooks projects might fail on network shares (other applications potentially affected as well),when the SafeGuard File Encryption filter driver is active. | Install the SafeGuard File Encryption Engine Update build 23 or later (KB-000038421) to address the issue. |
DPSGN-14957 | All | 8.2 | Client | User still displayed as logged in after signing out. | Under certain circumstances, usually with 3rd party sowftware involved, signing out a user does not complete and the user is still shown as logged in. | A hotfix is available on request. As of version 8.20 there is a configuration option in the registry to adapt the behavior of the Credential Provider, contact support for details. |
DPSGN-14991 | All | Not planned | Cloud Storage / File Encryption | Issues in combination with "Box" cloud storage | Files cannot be encrypted or transparently opened when stored in a "Box" cloud storage. | No workaround available. After changes in the Box client, this can no longer be supported. As of SafeGuard 8.20 the SafeGuard file filter driver does no longer attach itself. |
DPSGN-14995 | 8.1 | 8.2 | All file encryption modules | High performance impact when accessing files not covered by an encryption rule (requires BypassFilesWithoutPolicyVolumes registry key) | High performance impact when accessing files not covered by an encryption rule (requires BypassFilesWithoutPolicyVolumes registry key) | Install the SafeGuard File Encryption Engine Update build 24 or later (KB-000038421) to address the issue. |
DPSGN-15016 DPSGN-14987 | 8.1 | 8.2 | All file encryption modules | User gets file in use error when opening or saving xlsx files on network location. | User gets file in use error when opening or saving xlsx files on network location. | Install the SafeGuard File Encryption Engine Update build 24 or later (KB-000038421) to address the issue. |
DPSGN-15051 | 8.1 | 8.2 | All file encryption modules | File Encryption driver slows down Windows explorer and search operations on network shares. | File Encryption driver slows down Windows explorer and search operations on network shares. | Install the SafeGuard File Encryption Engine Update build 24 or later (KB-000038421) to address the issue. |
DPSGN-2757 | All (OS X) | Not planned, this is by design | File Encryption - Mac | The path of an encryption rule must not contain a comma | An encryption rule that contains a comma "," will not be applied on an OS X client. | Don´t use commas in the encryption rule definition. |
DPSGN-3720 | All | n/a | File Encryption - Windows | Trusted application configuration not working anymore after upgrade of configured application. | Scan services for AV products have to be defined as trusted applications with full path. Some AV products have the full version number in the path, so every time the version changes, the trusted application definition has to be updated. | n/a |
DPSGN-4735 | All | Not planned | Client - Base | When logging on to a computer using the SafeGuard Credential Provider in an environment that requires 802.1x authenticated access, the logon fails. | When logging on to a computer for the first time (no cached credentials available) using the
SafeGuard Credential Provider in an environment that requires 802.1x authenticated access, the
logon fails and shows: There are currently no logon servers available to service the logon
request . The issue is caused by the SafeGuard Credential Provider that is not fully
compatible
with 802.1x authenticated access. |
Use the Microsoft Credential Provider to logon at the operating system and authenticate to SafeGuard using the SafeGuard Authentication application afterwards. |
DPSGN-6310 | All | Not planned, this is by design | Cloud Storage | sent to dropbox function leaves files unencrypted |
If you use the "send to dropbox" function in the context menu, the file does not get encrypted. The reason is that this function uses the excluded "Dropbox.exe" | n/a |
DPSGN-7718 | All | n/a | Management Center / LPE | Adding members to SGN groups confusing if more than 1000 members are in the group | A hardcoded filter option set to 1000 which limits the number of returned objects that can be assigned. | n/a |
DPSGN-9683 | All | n/a | File Encryption - Windows | Outlook search does not return results in pst archives that are encrypted using file based encryption | Outlook search does not return results in pst archives that are encrypted using file based encryption | Don´t encrypt outlook pst or ost files. |
DPSGN-9709 | All | Not planned, this is by design | Data Exchange | The file access report for writing files on optical media fails, if medium is burned in mastered mode | The File Tracking feature of SafeGuard Enterprise does not support "Mastered Disc Format". | Use the "Live File System" when File Tracking on optical media is required. |
DPSGN-15116 | SGN 8.10, 8.20 | n/a | File Encryption - Windows | Potential file corruptions when using Google File Stream | Google File Stream usage on systems with SafeGuard file encryption modules there is a risk of file corruptions. | Google File Stream (and also Google drive as encryption target) is not supported any more. See (KB-000038851) for details and things to consider. |
DPSGN-737 | SGN all versions | n/a | SGN Server | Task Scheduler does not adjust for daylight savings time (DST) | Last and next run times are calculated based on UTC and than converted to the local time of the actual system the MC is running on. Depending on teh used OS, the ToLocalTime method recognizes only the current adjustment rule when converting from UTC to local time. As a result, conversions for periods before the current adjustment rule came into effect may not accurately reflect the difference between UTC and local time. | n/a |
DPSGN-15562 | SGN 8.10 / 8.20 / 8.30 | File Encryption Engine build 32 | File Encryption - Windows | Compatibility issues with Adobe InDesign and File Encryption. | Saving or opening files using Adobe InDesign in a share covered by an encryption rule does not work. | Install File Encryption Engine build 32 (or newer). See (KB-000038421). |
DPSGN-15553 | SGN 8.10 / 8.20 / 8.30 | File Encryption Engine build 31 | File Encryption - Windows | Printing documents on a remote printer (e.g. via RDP) fails. | When trying to print on a redirected remote printer, the SafeGuard File Encryption Filter Driver tries to obtain the file information for the redirected printer stream which can cause the print operation to fail with an error message: Printer is in an error state. | A workaround is available in KB-000039209 |
DPSGN-15715 | SGN 8.10 / 8.20 / 8.30 with FEE build 31 | File Encryption Engine build 32 | File Encryption - Windows | A file might show as corrupt when opening it from the SGPortable tool. | When using SGPortable on a system with a File Encryption module installed, a file might show as corrupt when opening it from the SGPortable tool. Closing the tool and refreshing the explorer solve the issue. | Install File Encryption Engine build 32 (or newer). See (KB-000038421). |
DPSGN-15696 | SGN 8.10 / 8.20 / 8.30 | n/a | File Encryption - Windows | 3rd party software conflict with applictaions verifying licenses from a network resource (e.g. Axys). | 3rd party software, that accesses a network resource for license verification upon start, might show issues in combination with the SafeGuard minifilter (part of all file encryption modules as of SafeGuard version 8.10). | A workaround is available via support. |
DPSGN-15937 | SGN 8.10 / 8.30 | File Encryption Engine build 37 | File Encryption - Windows | Windows Updates might fail on Windows 11 clients. | Windows Update on Windows 11 clients might fail when the SafeGuard file filter drivers are active. | Install File Encryption Engine build 37 (or newer). See (KB-000038421). |
Sophos Access Points
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NAF-241 |
|
|
Traffic interruption has been seen between wireless clients that are connected to the same SSID on the same APX and one client starts roaming | Roaming from one APX to another APX can cause 15 seconds of network disconnection for traffic between hosts connected to the same APX.
Internet-bound connections and packets which need a next hop (XGS/XG) do not experience the same disruption in connectivity. If both wireless clients connect to different Sophos APX access points this issue is not present. |
Sophos Connect
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NCL-1377 |
|
|
IPsec connection downloaded via provisioning file, does not automatically update policy when a policy change is made on XG | There are two cases where the IPSec connection downloaded via the provisioning file might not be updated once a change is made on the XG 1) The Sophos Connect Client has an active connection 2) The Sophos Connect client is not connected to XG when the XG policy is modified. When the Sophos Connect client will try to connect to XG, the connection will fail due to a policy mismatch error. The client will not automatically trigger a update policy request. The user has to manually trigger a "Update policy" request from the settings menu. This might happen with a greater probability if the allowed networks are changed in the policy. Also this will happen if a policy is changed from tunnel all to split network and the network list is not identical on both ends. |
Trigger a "Update policy" to re-synchronize the policy |
|
NCL-1618 |
|
|
"Failed to validate certificate" when importing/connecting with Sophos Connect Client | This relates to Sophos Connect Client configuration of the SFOS appliance using 3rd party signed certificate. When using 3rd party signed certificate on the “remote side” of the configuration, and "ApplianceCertificate" on the local side, the connection will import fine and connect the first time. After reboot of the workstation or restart of the services related to Sophos Connect, an error message will pop up stating "Failed to validate server certificate" when trying to connect again. |
Use a self-signed certificate, signed by the SFOS appliance on the “remote” side. Use PSK instead of certificates. |
|
NCL-837 |
|
Sophos Connect: Cannot authenticate user with german umlauts | Sophos Connect for the time being only supports Ascii characters, no umlauts or UTF-8 or UTF-16. |
|||
NCL-834 |
|
|
Sophos Connect failed to start due to port 60110 used for HTTP server is already in use on the system | Sophos Connect Client uses Port 60110 on the local host to communicate with the local webserver. If this port is used by some other service before Sophos Connect Client starts, then Sophos Connect Client will fail to start. |
||
NCL-1378 |
|
|
If XG has configured both IPsec and SSL VPN policy, Only the SSL VPN policy has the "Update policy" option available in the settings menu | When both the IPsec and SSL VPN policy is configured on XG, the connect client will connect to the user portal and download both the policies on the end user computer. But ONLY the SSL VPN policy will have the option of "Update policy" in the settings menu. In order to trigger a policy update for IPsec policy, the user will have to trigger the same via the SSL VPN policy. |
||
NCL-1382 |
|
|
Getting error “OpenVPN service is not available” not available while connecting SSL VPN from windows 7 and 8. | SSL VPN is not supported for Windows 7/8 in Sophos connect. You may get the error "Openvpn service is not available" while connecting SSL VPN from Sophos connect. As a workaround, you may use a legacy SSL VPN client. |
Use a legacy SSL VPN client. |
|
NCL-1391 |
|
After deploying Sophos Connect provisioning file on SC 2.1 the first authentication to vpn always fails when OTP is enabled | Issue: After deploying the Sophos Connect provisioning file on SC 2.1 the first authentication always fails when OTP is enabled. *Behavior:* The Client will use the OTP the first to connect to the User Portal. Then it has to use a new OTP, but the OTP is generated by the Sophos Authenticator and the user has to enter the new OTP after the first one rotates. The client does not wait for that to happen. Instead, it uses the same OTP and that will fail and the user is prompted for authentication again. So the user has to enter the credentials again and they should be connected to VPN. This is a known issue. ** |
Enter the credential and OTP again. |
||
NCL-836 |
|
|
[Mac] Not able to import connection files which has non-ASCII characters in file name | Sophos Connect is unable to import files containing UTF-8 / UTF-16 characters e.g. |
||
NCL-835 |
|
|
Sophos Connect : [Windows] {Intermittent] Getting "Failed to load connection" error after wakeup from sleep | This issue is occasionally seen mainly when the computer wakes up from sleep and the connection is set for Auto-connect and user is not on the domain network. The system recovers automatically so user intervention is not necessary. |
||
NCL-833 |
|
|
Unable to unzip Sophos Connect generated TSR zip file on Mac OS 10.12.6 | -> Go to About page on Sophos Connect UI -> Click Generate TSR buttong tsr.zip file is downloaded to the default download location. Tried to unzip the zip file but not able to unzip on 10.12.6 Mac OS version. Tried it on Mac 10.13, zip opens up. |
||
NCL-839 |
|
|
DNS server(s) are not updated on the network monitor page of Sophos Connect Client | If the DNS servers in the Sophos Connect Client policy on the XG firewall are changed while there is a VPN connection established, then the DNS Servers display on the Network Monitor page are not updated to the changed DNS servers. |
Disconnect the existing connection and then re-establish it. |
Sophos Email
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
XGE-8023 |
|
|
We don't send NDRs for accepted inbound emails. | Sophos Email Security doesn't create non-delivery reports (NDR) for emails going to valid mailboxes that it can't deliver to their final internal destination. |
||
XGE-28323 |
|
|
Specific emails received in unreadable content if a smart banner on | Scenario: Emails from the backup-generating system are received in unreadable format if a smart banner is on. This issue can be observed if there is an issue with the email content via the sender’s system. i) If the content is a UTF-16 HTML document that is base64 encoded. But the ‘charset’ field in the tag is saying ‘UTF-8’. ii) As per standard (https://www.w3.org/International/questions/qa-html-encoding-declarations#utf16 ), if using a UTF-16 HTML document, the document should begin with the UTF-16 BOM. If this is missing in the email content, it will create such an issue. This needs to be fixed from the originating system. |
||
XGE-27373 |
|
|
Public Google groups email rejected by Central | Scenario: An external domain emails a google group. The inbound email will be scanned and delivered to google. When email reaches the google group it will be forward to any external and internal email addresses. For the external email addresses that forward back to central as outbound email they will be block, because the sender of these emails is external. Sophos Central email only supports the following
|
||
XGE-27625 |
|
The central daily malware report detected as Malicious URLs | In situations where customer has setup a Daily malware report to “Attach the report to the email” Sophos Central Email may detect the email as “Malicious URLs” cause the report contains Malicious URLs. The work around is to configure the report to “Send a link to the report (secure)” instead of “Attach the report to the email” |
The work around is to configure the report to “Send a link to the report (secure)” instead of “Attach the report to the email” |
||
XGE-23995 |
|
Quarantined messages missing from Quarantined Messages report. | Emails quarantined because of Data control violations can't be released because they don't appear in Quarantined Messages. You can see them in Message History, with the quarantine reason "Data control". |
Please ask Sophos Support to release these emails. |
||
XGE-25028 |
|
SPF soft fail | Sophos Email Security only generates an SPF-Fail on a hard fail if the SPF-String is terminated with "-all". SPF-Strings terminated with "~all" (note the tilde character) that don't match the senders IP address don't cause an SPF-Fail. |
|||
XGE-23768 |
|
Unable to send outbound email if an email address includes "!".td> | Sophos Email Security doesn't send emails if there's an exclamation mark in the email address. It's rejected with "Relay access denied". |
Remove the " " character. |
||
XGE-24715 |
|
Inbound email attachment is removed if it's uuencoded. | If an inbound email has attachments that use uuencoding, the attachments are removed. This is because messages with uuencoded attachments, and the attachments, are processed as text messages. |
|||
XGE-23508 |
|
Sophos Email Security doesn't accept addresses with the "!" character. | Emails with addresses containing the "!" character (exclamation mark) in the local part of the email address aren't supported, and are rejected. For example: |
Remove the " " character. |
||
XGE-10569 |
|
|
SSP Quarantine and Emergency Inbox are empty. | A user has been given access to the Sophos Email SSP. They have mail in quarantine and the Emergency Inbox is turned on. But when using SSP the Quarantine and Emergency Inbox pages have no items. This might happen when more than one user is assigned the same email address, and at least one of those users has no mailbox. |
-Filter users by the email address of the affected user. -Click each user to find the one that doesn't have a mailbox. -Use "Delete User" to delete the user without a mailbox. -Go to "People" and filter by the email address again. -Select the user in question. -Click "Email Setup Link" and select Sophos Central Self Service Welcome. The user can then access the Self Service Portal using the instructions in their inbox. |
|
XGE-18900 |
|
|
Unable to add more than 129 URLs | The Sophos Email Security URL allow list can only contain up to 129 URLs. |
||
XGE-19011 |
|
Language selection for QS email in Sophos Email Security. | All mailboxes use the same language for the QS email. This can't be changed for individual mailboxes. |
|||
XGE-17643 |
|
|
Outbound emails sent from the eu-central region to Microsoft-hosted domains go to the junk folder. | The junk categorization isn't a result of the emails coming from Sophos Email Security, because other emails are succesfully delivered to inboxes of addresses on Microsoft-hosted domains, for example Although Microsoft does not publicly share how it classifies email as junk, anecdotal evidence suggests that it learns from the recipient's actions. If customers' emails are repeatedly marked as junk by recipients in Microsoft-hosted email domains, then future customer emails might automatically be marked as junk. |
Inform and educate customers sending emails to Microsoft-hosted domains to exercise caution with the type of emails they send, to prevent recipients from reporting emails as junk. |
|
XGE-17740 |
|
|
Central changes formatting of inbound email. | Reflexion has a Message Format Options feature which allows you to attach a control panel to the bottom of all incoming messages. This changes the content type of incoming emails to Sophos Email Security doesn't have an equivalent feature so it doesn't change the content type and character encoding of incoming emails. |
||
XGE-18940 |
|
Sophos Self Service Portal has no emails when signing in. | This happens if a user's account has been linked to a user without a mailbox. |
Delete both the user account without a mailbox and the one with the mailbox. Then create a new user and mailbox. If the email address was used under a different Sophos Central account, it should be removed there first. If you can't do this, raise a case with Sophos Support. Note: Quarantine repositories and emergency inboxes are linked to user accounts via an ID. You can't remove an ID from these repositories and attach a different one. |
||
XGE-19247 |
|
|
TLS versions on Sophos Email. | We constantly evaluate the TLS versions and ciphers we support. We accept versions and ciphers earlier than TLS 1.2 because a significant number of customers haven't upgraded. We don't support PFS for TLS versions earlier than 1.2 because the ciphers available in TLS 1.0 and 1.1 that support PFS are unauthenticated. These ciphers use SHA1 on its own, or with MD5, and they're vulnerable to man-in-the-middle (MITM) attacks. |
We recommend customers migrate to TLS v1.2 or later. |
|
XGE-19982 |
|
|
Sophos Email Security doesn't send quarantine summary emails to distribution lists. | Sophos Email Security only sends quarantine summary emails to user mailboxes. We don't send them to mailboxes for distribution lists. |
||
XGE-20166 |
|
|
Not all quarantined messages appear in Quarantine Summary (QS) emails. | QS emails don't include messages quarantined because they failed impersonation or Date control rules. |
||
XGE-10116 |
|
|
QS shows no data | QS is empty, although a user received a quarantine summary email. This can happen with Microsoft's Safe Links feature in Defender for Office 365. This feature clicks links in our notification emails to test them, which can remove the emails from quarantine. |
||
XGE-12394 |
|
|
Outbound Google Workspace (formerly G Suite) emails with aliases in different domains aren't sent. | The "envelope from" and "data from" headers in outbound emails sent through Sophos Email Security must be in the same domain. When using Google Workspace as an email service provider, if an outbound email is sent with an alias from a different domain, it won't be relayed outbound. This is because when sending as an alias in Google Workspace the "envelope from" header is the primary account. For example If the primary account email address is This email is rejected as the "envelope from" and "data from" headers don't match. |
Contact Google Workspace support to ask for the "envelope from" and "data from" headers to be matched for outbound emails, regardless of the alias used. |
|
XGE-15756 |
|
Files with the .P7B extension blocked when the Certificates category is enabled in a Data control (DLP) policy. | If a Data control policy has the Certificates category selected, alerts are raised for .p7b files, even though the .p7b extension isn't in the Certificates category. This is because Data control blocking uses True File Types and .p7b files share a file type with the .crt exception. |
|||
XGE-15018 |
|
|
Errors received in Sophos Central about rate limits or mail flooding. | If users send more emails than Sophos Email Security allows, emails are rejected. You see the following error:
|
If senders regularly send high volumes of emails, for legitimate reasons, you can ask Sophos Support to classify the mailbox as a bulk sender. Bulk senders have a higher sending limit than standard users. |
|
XGE-14604 |
|
|
Quarantine message may display incorrect values at the bottom of the page. | Quarantine message may display incorrect values at the bottom of the page. Eg Displaying 0 of 100 messages / 0 Selected. There are no missing messages, this is a cosmetic issue with the widget displaying the correct information. |
There are no missing messages, this is a cosmetic issue with the widget displaying the correct information. |
|
XGE-13386 |
|
|
Sophos Email Security can't read QS emails on mobile devices. | The subject line of a message in the QS email is compressed to such a small column width, and the text is so small, that users can't easily read it. |
Users should log into the Sophos Self Service Portal to check their quarantine summary messages. |
|
XGE-13116 |
|
Azure AD Sync isn't available to MSP customers or partners. | MSP customers can't use Azure AD Sync because of limitations with Azure AD Sync and non-email products. We'll try to resolve this. |
|||
XGE-11180 |
|
|
Smart banner not applied to plain text emails. | If an email arrives without an HTML body part, a smart banner isn't added. Smart banners are applied if the following conditions are met: Smart banners are turned on in the policy. The email contains text/html content in the body. |
||
XGE-8099 |
|
|
Sophos Email Security application of DKIM checks. | There is no industry standard for deciding if a DKIM (DomainKeys Identified Mail) check passes or fails. To find out how Sophos applies DKIM checks, see Known Behavior of DKIM (DomainKeys Identified Mail). |
Sophos Email Appliance (SEA)
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
SEA-1760 |
|
Quarantined messages do not get Additional rules apply | Quarantined messages do not get additional actions applied like adding banner to message. This is because the rule copies the message to quarantine before preforms the additional actions on the original message. |
Create duplicate rule before that does additional actions first and main action to continue |
||
SEA-1051 |
|
|
Table formatting broken within SPX encrypted mails | When an outbound SPX encrypted mail is sent that contains a table, the formatting of the table is removed within the resultant PDF This only applies to the mail content being viewed within the PDF file itself. If the option to attach the original email to the PDF is selected, the formatting within the attached mail will be correct |
While creating outbound policy for SPX encrypted mail, select the option "Attach original email to PDF" from Main Action Tab. |
|
SEA-1320 |
|
|
Quarantine digest mail inconsistent with quarantine portal | Mails shown in the quarantine digest mail and the quarantine portal are inconsistent in the following situation:
The attachment is stripped by the AV rule, the mail then hits the AS rule which puts it into quarantine. The mail then appears in the quarantine digest but not in the quarantine user portal. |
||
SEA-1524 |
|
|
Appliances not picking up repo changes if Software Auto Update is set to Off | In the following rare situation the SEA may be unable to process mail:
The combination of the above results in the appliance being unable to detect the repository change when it is moved back to the mainline repository. This causes the AV Engine to be out of date which means the appliance is unable to scan mail and therefore quarantines all mail as 'cantscan' |
Allowing the appliance to update AV engine without updating the software version could results in incompatibilities. The workaround for this is to either enable auto-updates, or to temporarily turn on auto-updates periodically to ensure that the appliance adjusts it's repository |
|
SEA-1578 |
|
|
Using policies to whitelist files leads to unexpected block/allow behaviour | When attempting to use policies to whitelist filetypes, unexpected behaviour may be observed when processing archive files. When archives (.zip, .docx etc) are being processed they will have multiple filetypes within that one attachment SAVI does the filetype analysis on a given attachment and returns this to SEA. This will result in a true or false returned for each attachment. If the policy is being used to whitelist a filetype then True (allow action) will be returned as soon as ONE whitelisted filetype is found within an given archive This will result in the archive being delivered even though it contains many other filetypes that are not on the whitelist |
Ideally policy should be used to blacklist filetypes that you want to protect against. Partial workaround would be to create a policy above the 'whitelsiting filetypes' policy that blocks common archive files. This doesn't completely solve the problem, but will reduce how frequently the scenario occurs. |
|
SEA-1655 |
|
|
NDR mails will indicate mail could not be delivered to 'one or more' of the recipients | If the SEA is unable to deliver an outbound mail that is destined for multiple recipients NDRs will not be generated for individual recipients. The NDR will be sent back to the original sender indicating that the mail could not be delivered to one or more of the intended recipients. |
||
SEA-1523 |
|
|
HTML content & Encrypting Mails using SPX | SPX Encrypted PDFs only supports plain text, html content such as images will be converted to plain text. |
||
SEA-1606 |
|
Search results are partial matches instead of exact | Search results are partial matches instead of exact When doing a search example abc@domain in Quarantine queue it will show up all email that contain abc not all email that have abc@domain example 1234abc123@domain instead of just all emails for abc@domain |
|||
SEA-1547 |
|
|
DMARC reports generated from the Sophos Email Appliance are not getting signed with DKIM | DMARC reports are not signed by DKIM as the reports are system generated (same as SPX and other system generated mails). |
||
SEA-1575 |
|
On very rare occasions SEA may not record the subject of an outbound mail in the UI | On very rare occasions SEA may not record the subject of an outbound mail in the UI. This occurs if there is a property of the mail causes a delay in it's processing, the logging daemon is then unable to update the message details and add the subject information This has no impact on message is processing or mail delivery |
|||
SEA-749 |
|
|
SPX emails are not DKIM signed | When encrypting E-Mails with SPX, they will not be DKIM-signed, |
||
SEA-1418 |
|
|
inconsistent logging of time in audit.log | Times for login and logout in /var/log/audit.log are inconsistently logged. Sometimes they show UTC and others they show local time. The issue is known, but will not be fixed. |
||
SEA-1484 |
|
|
SPX changes file names when 'dash number' is in the name | When emailing attachments with '-' # like test-1 SPX encryption will change the name of the file. Example: When sending attachments named e.g. : test-1, test-2, test-3, test-4 The recipient would get the following attachment names in the encrypted email: test, test-1, test-2, test-3 |
Do to not send any files with '-'# as the file name. |
|
SEA-1392 |
|
|
Non-English characters are not accepting by SEA in Block / Warning Page for Time-of-Click Protection | Hi Team, We have a case, in which customer is trying to customize Block / Warning Page for Time-of-Click Protection from “SampleTemplates.zip”. However, when customer is trying to modify template with German characters, and found he is getting error as
For test, customer tried to add the below line: Before “Sophos Time-of-Click Protection reports that….” And save the sample template. We tried to perform as well and found we can reproduce the scenario at local appliance by adding “Sophos Dies ist eine verschlüsselte Nachricht!” line in our template. If we replace “ü” with “u” in “verschlüsselte”, then appliance accept the template and we able to get updated template in “Preview”.
Customer gave another word to get test “Привет”, which is causing same behavior and throwing error to us. I only get below logs during that time from admin_access.log ==> /opt/pmx/var/log/apache2/admin_access.log <== 172.16.32.2 - admin [02/Jul/2018:11:12:07 +0000] "POST /component/Popup/ConfigureBlockedUrlPage.html?/Config/Policy/FilteringOptions HTTP/1.0" 200 3318 57295µs 172.16.32.2 - admin [02/Jul/2018:11:12:10 +0000] "POST /ajax/Widget/LogStatus/GetLogStatus HTTP/1.0" 200 505 122549µs 172.16.32.2 - admin [02/Jul/2018:11:12:18 +0000] "POST /cgi-bin/fileadd_blocked.cgi HTTP/1.0" 302 - 163641µs 172.16.32.2 - admin [02/Jul/2018:11:12:18 +0000] "GET /Config/Policy/FilteringOptions HTTP/1.0" 200 21744 202710µs 172.16.32.2 - admin [02/Jul/2018:11:12:26 +0000] "POST /ajax/Page/FilteringOptions/SaveData HTTP/1.0" 200 349 53232µs 172.16.32.2 - admin [02/Jul/2018:11:12:29 +0000] "POST /ajax/Widget/LogStatus/GetLogStatus HTTP/1.0" 200 505 97308µs I tried to collect the logs for same, but couldn’t find any logs during time of error occur. How, we can fix this and customer can use non-English characters in template? |
||
SEA-1226 |
|
|
Subject/Client will not be displayed for dmarc reporting mail in log search | Dmarc report mails those are sent by SEA to domain owners will be displayed in log search UI. But the client and subject column will be "-". |
||
SEA-1084 |
|
|
SPX encrypted emails can not be printed using the Mac OS Preview App | Mac OS Sierra can not print SPX encryted E-Mails using the preview app |
Use Adobe Acrobat Reader to open and print the message |
|
SEA-1038 |
|
|
Updatepath and Connection Test URI Mismatch | The connectiontest currently checks a different part of the contentdeliverynetwork then the appliance retrieves its updates from. |
Allow the Email Appliance to connect to any HTTP/S destination on the internet. |
|
SEA-1046 |
|
|
SPX reply fail SPF checks | The secure copy option from the SPX portal reply page sends the copy as the email address of the sender. (the person doing the reply). When that message leaves the email appliance to the receiving server on the internet it may reject the message because the email appliance is not the owner of that domain. Detailed explanation Client is requesting that the secure reply (secure copy) FROM header is configurable or written with "@yourdomain.com" instead of using the repliers address to avoid rejects due to spoofing OR completely remove the option Send me a secure copy. Also note that the secure reply (copy) is not encrypted when sent back to client (person doing reply from portal) This would possibly mean that the original message that they wanted encrypted could be in the reply. The copy should be encrypted. One option to resolve this is spx encrypt the secure copy and have the from address the postmaster address or an address that can be set. Issue Reproduction 1. Turn on SPX encryption and ensure that you allow a "Include Reply All button in encrypted messages" is checked and allowed (enable the Secure reply portal in the SPX template). |
||
SEA-985 |
|
|
BULK Mail volume not counted for TOC-Mails | The Bulk Mail check is performed before the Time-of-Click check. During the processing of the message the Rule-variable is first set by the Bulk-Check and later overwritten by the Time-of-Click check. |
||
SEA-858 |
|
|
remote assistance failed message in gui | In a clustered environment while connected to Admin UI with Remote Assistance enabled, the Admin clicks the Dashboard button and sees "Remote assistance CONNECTED" at the top of the page - but then after clicking on the Configuration button it shows "Remote assistance FAILED" In a clustered environment the Admin UI correctly shows the Remote Assistance status at the top of the page. If the Remote Assistance fails on the master, but succeeded on the slave, the slave will display the correct status at the top of the page, and "failed" on the configuration page. |
||
SEA-705 |
|
|
|
DOCS UPDATE: email addresses starting with # are getting rejected by ldap recipient validation | Email addresses that start with "#" will be rejected by ldap recipient validation, because they are interpreted as comments. |
|
SEA-709 |
|
|
NDRs are quarantined by milter when Outbound policy action is reject | If an outbound policy has been configured with a main action of "reject", a non-delivery report (NDR) message will be generated, but the NDR will not be delivered to the original sender. You should instead configure your outbound policy with a main action of "discard", then configure an additional action to notify the sender that the message was not delivered |
. |
|
SEA-748 |
|
|
Truncated URLs in SPX encrypted E-Mails | Adobe Acrobat will truncate URLs in SPX-encryped E-Mails after the first ';'-character. |
||
SEA-747 |
|
|
Double-byte messages forwarded from quarantine may not be displayed correctly in Microsoft Outlook | Double-byte messages forwarded from quarantine may not be displayed correctly in Microsoft Outlook |
||
SEA-745 |
|
|
Search: Status bar displays previous message after click Forward, then click Search | After forwarding a message on the Search In page ( Search > Quarantine ), and then performing a new search, the status bar does not indicate the updated number of search results. |
||
SEA-743 |
|
|
Policy Wizard - Selected groups - behaviour of Available groups when switching tabs | When configuring the Users & Groups page in the Policy Wizard, it is possible to add an Available group to the list of Selected groups on either the Include Recipient or Exclude Recipient tab. If this group is not explicitly removed from the Selected list, it will not become available in the other tab when the user selects the Custom Groups option. This behavior also occurs with the Include Sender and Exclude Sender tabs in the same section. |
||
SEA-741 |
|
|
Clearing 'Outbound mail proxy' value insists on having a valid port number | An error is displayed if the Port field is cleared when trying to remove a previously configured outbound mail proxy ( Configuration > Routing > Internal Mail Hosts ). However, clearing the Hostname field, but leaving the Port field filled results in the outbound mail proxy being cleared |
||
SEA-739 |
|
|
Deleting a rule after reaching max number of rules does not re-enable the add button | When the maximum number of rules (20 for anti-spam and anti-virus and 40 for content) has been exceeded, the Add button is disabled. Then, if a rule is deleted, the Add button is not re-enabled. |
||
SEA-737 |
|
|
invalid Static IP config breaks install | If you enter an invalid static IP address when using the Install Wizard, it is not possible to continue to the next page of the wizard. |
||
SEA-735 |
|
|
Search Mail Logs - There are duplicate "Scanned" lines for the message with multiple recipients | When a message has multiple recipients, duplicate Scanned lines may appear when performing a mail log search. |
||
SEA-733 |
|
|
Reports incorrect for day/hour boundary period | Some thirteen-week reports do not return accurate results for timezones other than GMT. |
||
SEA-731 |
|
|
Jump to page input box works inconsistently and incorrectly in different list editors | When there are several pages of entries in a list editor, navigating to a different page of entries may work inconsistently. |
||
SEA-723 |
|
|
SNMP tables in the UI incorrectly display multiple spaces in the Community Strin | If a community string contains one or more space characters, the multiple space characters are displayed as single spaces in the user interface. The correct string is displayed in the mouseover popup. |
||
SEA-729 |
|
|
Certain keyword entries may occasionally cause slow processing of large attachments | Certain keyword entries may occasionally cause slow processing of large attachments |
||
SEA-727 |
|
|
Logsearch issue when messagesplitting occurs | In some instances, a message with multiple recipients may have end-user specific settings. Such messages are split and sent to several destinations. In this case, a mail log search only displays the last triggered policy rule triggered; this may not be accurate. |
||
SEA-725 |
|
|
Police rule change doesn't change historical data | If a policy rule description is changed, the description is not updated retroactively for previously logged data, which displays the original rule description. |
||
SEA-721 |
|
|
EDN is not sent when all non-degraded appliances have failed ldap sync when an appliance is down | No alerts are sent and LDAP synchronization fails when an appliance drops out of a cluster. The alert is only sent when the missing appliance rejoins the cluster, but LDAP synchronization continues to fail. |
||
SEA-719 |
|
|
Microsoft Outlook Express cannot view messages which contain attached messages, forwarded from the quarantine | Microsoft Outlook Express cannot view messages which contain attached messages, forwarded from the quarantine. |
||
SEA-717 |
|
|
Many screens cannot be updated when the admin TZ is displaced from the system TZ by 15 or 30 minutes | If the system timezone and the admin timezone are different, and the difference of hours is not a whole number, administrators may be unable to change time and date settings. |
||
SEA-715 |
|
|
Special Character in Quarantine Search fields | When using certain special characters in quarantine search fields, the characters will match anything in the quarantine, resulting in searches that return all messages in the quarantine. The special characters include, but are not limited to: !@#$%^() . |
||
SEA-713 |
|
|
deal with non-alphanumeric ascii characters in local part of email addresses consistently | Quarantined email messages that contain & in the local part of the recipient email address will not be processed correctly if they are released from the quarantine. Instead, the part of the address preceding the & will be truncated. |
||
SEA-711 |
|
|
SPX Secure Reply | For the purposes of SPX secure reply, the appliance determines whether a message is inbound or outbound by comparing whether the recipient's domain appears in the list of incoming mail domains. A message to an external recipient may be considered inbound if you have configured your appliance to use an incoming mail domain that is the same as the recipient's domain name. This in turn may affect any policy rules that are configured to use SPX encryption only for outbound messages. |
||
SEA-696 |
|
|
Hard Drive Replacement Issues | If you need to remove or replace a hard drive in the ES4000, ES5000 or ES8000, the hard drive must be replaced with a new, formatted hard drive. |
Sophos Firewall
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NCL-1769 |
|
Unable to download Sophos Network Agent for Android from the Google Play store | An issue was found where the existing version of the Sophos Network Agent is using an older version of the Google API’s. This prevents the Sophos Network Agent from being downloadable for devices running the latest version of the Android OS. The Sophos Network Agent will continue to function on devices running the older version of Android OS. |
|||
NC-113650 |
|
|
|
Web Policy Quota does not work in active-active HA deployment | In 19.0 MR2 and 19.5 GA there is an update to an underlying library (called redis) that causes a node synchronization problem with the Web Policy Quota feature for customers who are using High Availability in Active/Active mode.
Customers with HA in A/A who have already upgraded to 19.0 MR2 or 19.5 GA and are experiencing a problem with Web Quota are recommended to change their configuration to use Warn policy instead. They should upgrade to 19.5 MR1 when available, which again supports Web Quota. Customers who are using HA A/A in an affected version may see this in the debug logs (/log/redis/quota.log): |
|
NC-115005 |
|
|
|
After upgrade to V19.5 GA separate zone wireless network stops working | There is an issue reported by customers that after upgrading to V19.5 GA separate zone wireless network stopped working and wireless clients are unable to access the Internet. In this case, the wireless interface shows unplugged. |
Workaround 1. Remove and re-add the affected separate zone SSID from AP/APX. Workaround 2. Restart the awed(This will disconnect all connected AP/APX(s) and connect back). service service awed:restart -ds nosync |
NC-101780 |
|
|
|
Small var partition created for VM platforms | Var partition is created with 3.7G size in a freshly installed version of v19 GA. |
There are two workaround solutions for this issue. |
NC-47523 |
|
|
Auxiliary unit sending reports about its own scheduled report | In an HA configuration pair, with a scheduled report configured, the auxiliary unit will also generate a report containing data about emails being sent from the unit. These emails being sent as per the attached report, from the auxiliary unit is the report itself. |
There is no workaround. |
|
NC-116989 |
|
|
|
The Clientless SSL VPN Policy RDP access shows cursor as Cross instead of Arrow | Starting with version 19, Sophos Firewall includes several security improvements to prevent attackers from accessing sensitive information. One of these changes is an upgrade to the RDP component to the latest version, which helps to improve overall security. However, this new component library does have a minor behavior difference: in versions 19 and later, the cursor is displayed as a cross instead of an arrow. |
|
NC-114932 |
|
|
|
Update or Create HA is not working when the bridge interface is configured in the Peer Administrator setting | Admin is unable to update or create HA when the bridge interface is configured in the Peer Administrator setting. |
Need to remove the bridge interface from the Peer Administrator setting in the HA config. |
NC-114087 |
|
|
Log Suppression tick mark not remaining applied on UI | Once we tick select “All” option , tick mark will be disappeared and all individual modules / components will be enabled. Current behaviour of “All” button is since inception as short cut to select all the relevant component. The result of actions is transferred to individual buttons and stored in backend as separate status for each component. As it is only UI action button and not the summary of status all button - it is expected behaviour. |
||
NC-94863 |
|
|
|
HA zero downtime upgrade is not supported if the firmware upgrade is scheduled on Central Management | When a scheduled firmware upgrade from Central Management is run, both devices are rebooted at the same time in case of an HA setup. |
Use the firewall WebAdmin to run an HA zero downtime upgrade. |
NC-106986 |
|
|
|
Wildcard and multiple IP address FQDN firewall rules failing sporadically | When using Wildcard or Multiple IP address FQDN hosts in firewall rules, it might occur that they are properly resolved to the corresponding IP addresses on the Sophos Firewall GUI, but the corresponding traffic is dropped. This behavior applies to Sophos Firewall 18.5.4 MR4, 19.0 GA and 19.0.1 MR1. |
Enable IP-eviction on SFOS . Once it is enabled , on re-learning of FQDN/wildcard FQDN will solve the problem. |
NC-99867 |
|
Error received when trying to add entry to blocked senders list when list is large | Issue: When the blocked senders list get large it can fail to add new entries. The exact number of entries will very as it depends on the length of each email address. We have seen issues when lists get over 2400. Users will see warning message saying The operation will take time to complete. The status can be viewed from the "Log viewer" page Checking csc.log will show a line like this “ |
Replace duplicate entries with wild cards to reduce the number on the blocklist where possible. Entries like smith@domain1 and joe@domain1 can be reduced to entries like *@domain1, which will cover a wider range of addresses anyway. |
||
NC-115839 |
|
|
NAT ID is not getting updated at re-routing | The NAT information for Source NAT gets updated for existing connection (re-route) when the failover occurs on IPsec tunnel. Currently for re-route of existing connection Source NAT information isn’t updated as NAT occurs only when new connection is initiated. ( Known behaviour ) NAT id and Source NAT information doesn’t change when re-route occurs. For ICMP traffic, the ongoing traffic should be terminated first then wait for 30 seconds to delete/destroy the ICMP conntrack. New ICMP traffic will be forwarded via updated NAT ID. |
For TCP: NAT ID will be applied on new connection |
|
NC-85063 |
|
|
WAF does not permit file uploads in OWA greater than 1 MB | If a file is uploaded which is larger then the limit then message similar to this is visible in the log: [Fri Aug 14 15:41:22.414802 2020] [security2:error] [pid 14238:tid 140229323249408] [client 109.91.34.26:44831] [client 109.91.34.26] ModSecurity: Request body no files data length is larger than the configured limit (q).. Deny with code (413) …. |
For a workaround please contact support. |
|
NC-59800 |
|
|
Creation of new firewall rules (manually via VPN auto creation) resulting in emails being held on the appliance | When utilizing the XG Email protection module in MTA mode, this creates an automatic firewall rule for the SMTP traffic at the top of the policy list. If additional rules are created above this rule, this can result in the XG accepting SMTP traffic but then being unable to deliver the mail onto the next hop. This can be seen by the mail queuing on the appliance and time out errors in the /log/smtpd_main.log: 2369 == john.doe@example.com R=default_mx_router T=remote_smtp defer (110): Connection timed out This can occur with:
We plan to improve on this behaviour in an upcoming software release |
Ensure that any manually created firewall rules are created below the automatic MTA rule In the event that mail has already become queued on the appliance prior to the moving of the above rules, contact support for assistance in utilizing the /scripts/mail/replace_firewall_id.pl script to rectify the issue. |
|
NC-112998 |
|
|
Traffic Quota may be exceeded due to accounting | The accounting of processed traffic is run every three minutes. A user may exceed his quota by using more bandwidth than his quota allows between accounting runs. |
There is no workaround |
|
NC-113973 |
|
|
|
Traffic does not pass to the correct gateway with SDWAN routes | Traffic does not pass to the correct gateway if a combination with SDWAN Profile and Gateway based SDWAN routes are being used. |
Update the affected SDWAN route to solve this issue |
NC-113646 |
|
|
Traffic fails with v4inv6 tunnel when compression is enabled on all XGS platforms | The traffic fails when compression is enabled for v4inv6 IPSec tunnel. The issue is seen on all XGS platforms and is consistently reproducible. With ipsec-acceleration disabled on both the DUTs, traffic runs fine with compression enabled, in v4inv4 IPSec tunnel. STEPS TO REPRODUCE- |
Disable ipsec-acceleration, traffic runs fine with compression enabled in v4inv4 IPSec tunnel. |
|
NC-111087 |
|
|
Not able to establish HA when logical port(bridge/lag) is selected as admin port ("Peer administration settings" ) | Steps To Recreate: Not able to establish Quick HA if one of the appliances has a bridge interface as an admin port |
If both the appliance have the same logical interface which is selected as "Peer administration settings" then it will work |
|
NC-113082 |
|
|
OSPF not redistributing remote side network of L2TP tunnel | OSPF does not propagate /32 network configuration of P-t-P interfaces e.g. PPTP, L2TP, PPPoE and GRE. |
1. Redistribute Connected |
|
NC-44003 |
|
|
SNMP query for supportSubStatus and appExpiryDate return unexpected values | SNMP query for supportSubStatus and appExpiryDate return unexpected values. MIB indicates that supportsubstatus should be 1 or 2, but 3 is returned.
|
This will be resolved in the upcoming XG v18 release |
|
NC-53886 |
|
|
40Gbit QSFP+ Flexiport module is not recognized in SG/XG 430/450 | Sophos 40Gbit QSFP+ Flexiport module is not recognized at all in SG/XG 430/450 due to power sequence issues. A fix is in progress. |
No Workaround |
|
NC-94073 |
|
|
|
XGS 10G interface not working when interface speed is set to Auto-negotiation (Physical or LAG) | Issue: XGS 10G interface is not working when interface speed is set to Auto-negotiation (Physical or LAG) Affected Product: Only XGS hardware with 10G interface |
Set interface speed to Manual 10000 Mbps - Full-Duplex (Applicable for Physical, LAG interfaces). |
NC-94355 |
|
|
Device goes into failsafe when upgraded to v19.0.0 GA | If your device is using a configuration previously restored from a Cyberoam backup, and you have NOT regenerated the appliance certificate on SFOS, upgrading to SFOS v19 will result in operation in fail safe mode. The appliance certificate generated in cyberoam devices uses a weak signature algorithm (MD5) that is NOT supported for appliance certificates in SFOS v19. How to verify before upgrading: Check the Signature Algorithm of the Appliance certificate by running the following command on the advanced shell: “openssl x509 -in /conf/certificate/ApplianceCertificate.pem -text -noout” If the output shows the signature algorithm as "md5WithRSAEncryption", DO NOT upgrade to v19. |
Please refer the KBA: https://support.sophos.com/support/s/article/KB-000044122?language=en_US |
|
NC-94354 |
|
|
Upgrade to v19.0GA results in factory reset | If you have changed SSL/TLS Inspection Log retention period (Monitor & Analyze > Reports > Show Report Settings > Data management > Retain SSL/TLS inspection logs of the past) from the default value of 1 month, Upgrade to SFOS v19 will result into factory reset default. |
Change SSL/TLS Inspection Log retention period under Reports > Show Report Settings > Data management > Retain SSL/TLS inspection logs back to the default value of 1 month before upgrading and then after upgrading to SFOS v19, you can change the setting back to the desired value. |
|
NC-84517 |
|
|
firewall rule is not applied for terminal server traffic from Server Protection SATC | Situation: The traffic from the terminal Server is not being marked by the User ID as a result that the correct firewall rule is not being applied. Customer need to join the EAP for New Server Protection Features and confirm the machine is added to the EAP. Details here: https://support.sophos.com/support/s/article/KB-000038634?language=en_US |
Customer need to join the EAP for New Server Protection Features and confirm the machine is add to the EAP |
|
NC-109642 |
|
|
WWAN - Export/Import is failed to import the WWAN configuration even though import event was successful. | WWAN - Export/Import is failed to import the WWAN configuration even though import event was successful. |
||
NC-110072 |
|
|
UTF-8 character in the backup file name causes issue of the user unable to download the backup file. | UTF-8 character in backup file name causes issue of user unable to download the backup file. Nothing happens when the user tries to download the backup file with file name contain UTF8 characters. |
We do not have any workaround or solution at the moment, Please do not use UTF-8 characters for the backup filename. |
|
NC-106896 |
|
XGS 116(w) r1 & r2 units are having wrong PoE default values. Default should be AT(30W), but it is AF(15). | There is an issue with XGS 116 r1, 116Wr1, 116r2 & 116Wr2 units related to default power settings for the PoE Port. The default PoE power setting on this models should be AT(30W). But instead the units in the field are running with default PoE power setting as AF(15W). Also there is no mechanism right now in xgs-poe utility for this models to increase the power setting from AF to AT. This issue is being fixed in SFOS 19.0.2 MR2, 19.5 MR1. Customer when upgrading the units to this version, its default PoE power setting will be set to AT(30). Then customer can also change PoE power from AF to AT & vice-versa using the xgs-poe utility. |
|||
NC-106815 |
|
|
/conf is gradually filling up if on box reports of appliance is off. | /conf partition on the appliance gradually filling up if On box reports of appliance is disabled/off. While conf partition gets 100% unable to login to GUI. Issue will be resolved in 19.0.2 MR 2 and 19.5 GA |
If on box reports are off, Need to turn on On-box reporting from console. console> set on-box-reports on |
|
NC-107248 |
|
|
|
Unable to activate evaluation licenses - Error XG-00351 | Situation:
|
Activate eval license in "My Sophos" portal |
NC-103820 |
|
|
|
Clipboard's not working in RDP bookmark | In v19 and later, there have been several security improvements in Sophos Firewall to prevent attackers from getting hold of sensitive information. One of the changes we did was upgrading the RDP component to the latest version to improve the overall security posture. The clipboard functionality is not directly compatible with the latest RDP components making it non-supported with versions 19 and later. |
|
NC-84972 |
|
|
/tmp might get full due to 0x1XXXXXX files on XG85 with web content cache enabled | Issue: Determining if the system is affected by this issue: du -c /tmp/0x1* Impact: |
Either disable web content caching: Go to Web > General settings > Enable web content. Disable the option. Note that this option is disabled by default. |
|
NC-103261 |
|
Unable to set DNAT from Central using "Server access assitant (DNAT)" | To enable NAT or WAF through web admin, you must specify an Original Destination Port (NAT) or Hosted Address (WAF). This is normally set to the IP addressed associated with ‘Port B’ which is the WAN Port. For CM managed autoscaling instances, there’s no way to identify the original destination as each firewall will have it’s own IP address for the WAN port. This makes it impossible to setup DNAT for a CM managed instance. Even if someone creates a “Dynamic Interface”, it is not available during the “Public IP Address” step. |
The "Server access assistant (DNAT)" cannot be used to configure DNAT but the manual method of creating a "New NAT rule" can still work. As the WAN Interface isn't available, you can create an IP range that will be translated to the private IP of the private Server. To setup DNAT: 1. Navigate to "Firewalls" under "Manage Firewalls" in the left sidebar |
||
NC-99835 |
|
|
MyFirewall.co Sophos DDNS cannot be deleted | MyFirewall.co Sophos DDNS cannot be deleted. The Sophos owned DDNS Provider is End of Life and cannot be deleted by the administrator. |
||
NC-46108 |
|
DHCP relay configured on an interface containing another DHCP server doesn't function | Configuring multiple DHCP Relays where the 'listening' interface in one corresponds to the interface that the DHCP server is connected to in another of the configured relays will cause one of the relays to cease to function. This is not a supported scenario and is expected behaviour. A DHCP Relay should not be setup on an interface that hosts a DHCP server. |
|||
NC-98205 |
|
|
RadiusSSO roaming not working | When using RadiusSSO and roaming between APX’s the client has to reauthenticate in order to connect again. This is a limitation with the current deployment. RadiusSSO currently cannot handle roaming between access points |
||
NC-89077 |
|
|
Unable to connect IPsec with IOS with Local ID defined. | The issue is happening when Sophos Firewall is configured Sophos IPsec connect with Local ID. This configuration is not supported by IOS. The IOS profile does not support any parameters with Local ID/Remote ID and which causes a failure to authenticate the connection. |
Clear the Local ID value/Field and re-download the configuration file. |
|
NC-79348 |
|
|
awarrensmtp & warren services are getting DEAD after CR backup restore | If a customer restores a Cyberoam backup which does not have Default CA certificate generated or configured, then after restoring the backup in v19 EAP0 or later, awarrensmtp & warren services will be found DEAD. |
After restoring the cyberoam backup, regenerate the Default CA certificate
|
|
NC-93678 |
|
|
SASI detection problems when too many hits are returned | SASI engine can appear to fail if the returned value from the engine is too larger for the buffer. This returned value includes the spam rule hits that were detected on the message itself. If there are too many returned hits if can be greater then the buffer and cause the “spam scanning failed” smtp_main.log will show this error if this is the case “ng_buffer_read: reach buffer limit 2048” You will then see “spam scanning failed, unable to connect local antispam:” The result of this issue is that message that were spam would be delivered when they should have been blocked/quarantined. |
Please contact Sophos Support. |
|
NC-29517 |
|
|
Timezone showing different in GUI and CLI | GUI time differs from the CLI time The files /conf/TZ and /etc/zoneinfo/ |
1. Copied content from /etc/zoneinfo/ |
|
NC-52129 |
|
Limitation Avira Scan for encrypted and split archives | When scanning an encrypted split archive with Avira, there is the following limitation: 1) If an encrypted split file was scanned, only the first part contains all information about the archive (includes also the encrypted flag) Additional information: Also a unpacker will not ask for a password when try to extract an encrypted split file not by using the first part of that file. The unpacker will return, its not a archive. |
Use Sophos AV |
||
NC-43145 |
|
|
HA pair becomes unstable if shared port used as the dedicated link is on XG106 | When the user configures HA on XG105r3, XG115r3, XG106r1 shared port (Port4), the HA pair becomes unstable. After the enablement of HA service, Auxilary rebooted first as usual. But the Primary appliance goes in the rebooting phase because of the shared port which takes more time to wake up. |
Do not to use the shared port (Port 4) as HA dedicated link. |
|
NC-84054 |
|
|
Configuration Migration Failed due to invalid byte sequence "UTF8" | The backup will not be restored if there is an error with the database tblappstoeps as it may contain invalid byte sequence for encoding "UTF8" Logs will be seen in Postgres.log 772 2022-01-08 03:01:18.064 GMTERROR: invalid byte sequence for encoding "UTF8": 0xb1 6772 2022-01-08 03:01:18.064 GMTCONTEXT: COPY tblappstoeps, line 23612 6772 2022-01-08 03:01:18.064 GMTSTATEMENT: COPY tblappstoeps (app_id, uuid, app_path, occurrence, last_seen) FROM stdin; |
Please contact Support for a workaround. |
|
NC-85343 |
|
|
Unable to use "port", "eth" or "ge" when editing interfaces | • The interface display name starting from “port” or “eth” or “ge“ are not allowed. • The restriction was added for add/edit interface only. This is an intentional change and customers will not be able to edit/change interface names starting with “port”, “eth” and “ge”. |
||
NC-85313 |
|
|
No Statuscode in API response | If no |
Always use one of these tags after the |
|
NC-84550 |
|
There is a difference between Sophos Firewall local reports and CFR Reports | The LogViewer can’t log values where bytes values are greater than 32 bit. and reporting is unable to store value, due to which there is a drastic difference between SF reports and CFR reports. In case the number of bytes transferred exceeds the limit which can be accommodated in U32, then it shows the truncated value in the log viewer. |
|||
NC-83527 |
|
|
Unable to register Firewall with Sophos Central account due Amazon certificate not present in /conf/ | Customers may face an issue related to the Sophos central registration due to an Amazon certificate not being present in /conf/ directory and gets an error similar to this- 32021-11-25 17:28:36 WARN API.pm[13476]:119 SFOS::Common::Central::API::send_request - 500 Can't connect to dzr-utm-amzn-eu-west-1-9af7.upe.p.hmr.sophos.com:443 (certificate verify failed) Details here: https://support.sophos.com/support/s/article/KB-000043494?language=en_US |
Check if an amazon cert is present. Use this command- openssl crl2pkcs7 -nocrl -certfile /conf/certificate/internalcas/cloud-ca.crt | openssl pkcs7 -print_certs -text -noout | grep Issuer mount -o rw,remount / Note: No downtime is required for any of the above steps. |
|
NC-84171 |
|
|
L2TP :multiple clients behind NAT'd device causes traffic issues | We can not connect multiple L2TP connections behind the same NAT'd device. Example:- |
||
NC-81039 |
|
|
SFOS gets stuck after a reboot as hyperthreading enabled on hardware blocked the kernel to boot | Behavior observed: SFOS gets stuck after a reboot as hyperthreading enabled on hardware blocked the kernel to boot The issue will only happen when the SFOS RAM/CPUs are lesser than purchased in the license and hyperthreading is enabled on Dell hardware. SFOS was not able to apply RAM and CPU limit on that hardware if hyperthreading is enabled. This will block the kernel to boot. The issue is observed on SFOS v18.5 MR1 Build 326 installed on Dell R330 hardware. |
Disable hyperthreading on the server. |
|
NC-83108 |
|
|
Upgrade to v18.5MR1 from v18.0MR6 results in factory reset | *Reported Issue:*Upgrading from v18MR6 to v18.5MR1 results in factory default configuration being applied to the device. |
Downgrade back to previous firmware and upgrade to v18.5MR2. Alternatively you can upgrade to v18.5GA and then v18.5MR1. |
|
NC-13934 |
|
|
Auxiliary sends only some of the configured scheduled reports | In Auxiliary appliance if the report don't contain any data then we don't send any report notification to customer. This is intended behavior. |
||
NC-16462 |
|
|
Only displayed result will be included while exporting data into HTML/ PDF / CSV | Only displayed result will be included while exporting data into HTML/ PDF / CSV We can download current page records which is displayed on page through HTML/ PDF/CSV. Example : Web report total pages 20. If current page 3 then we can download page 3 records through HTML /PDF /CSV. We can download report which display on current page. |
||
NC-82331 |
|
Missing heartbeat issue in some cases after upgrade to 18.5 MR2 | In 18.5 MR2 we have introduced key encryption for the certificate on FW used by endpoints to heartbeat with firewall. During the upgrade to 18.5 MR2 a certificate refresh has to be done as key has to be encrypted. And this certificate need to be made available to endpoints. If endpoints are unable to get the new certificate from Central, then heartbeat will start failing. This might happen when private DNS Servers are being used. To avoid this ensure that the endpoints have network connectivity during the upgrade. Also disable the checkbox “Block clients with no heartbeat" in the firewall rule in case endpoints need access to the internal DNS server to get updates (new certificate) from Central. |
If the system is showing missing heartbeat after the upgrade: |
||
NC-81520 |
|
|
Password is not printed on hotspot voucher for bridge to AP LAN and bridge to AP VLAN | Situation: When downloading the voucher from the user portal, then the WLAN password is not printed on hotspot vouchers for the types: bridge to AP LAN and bridge to AP VLAN. The wireless password is only printed on hotspot vouchers for the interface link of "Separate Zone interface(bridge) of Wireless Protection." It is known behavior that a hotspot voucher doesn't contain the WLAN password for Bridge to AP LAN and bridge to AP VLAN. |
Configure Hotspot voucher for interface link type 21 i.e. "Separate Zone interface(bridge) of Wireless Protection". |
|
NC-80953 |
|
|
|
Sophos CAA client though seems connected to XG , repeatedly sends "Administrator disconnected you" messages for remote users - Timor.Frag | Sophos CAA client though seems connected to XG , repeatedly sends "Administrator disconnected you" messages and the CAA agent is grayed out. The user still shows under live users on the firewall, and is able to access the internet. This is only happening for customers who upgraded to 17.5 MR16. |
Workaround for 17.5 MR16: |
NC-77971 |
|
|
|
Sophos CAA client though seems connected to XG , repeatedly sends "Administrator disconnected you" messages. | Sophos CAA client though seems connected to XG , repeatedly sends "Administrator disconnected you" messages. |
Workaround for 17.5 MR16: |
NCL-1394 |
|
|
CAA takes 2-3 minutes to login user on MAC when it comes back from Sleep | Issue description : When MAC books comes up from the Sleep mode its takes 2-3 minutes for the user to be able to browse the internet . This happens only incase we have a User based firewall rule . It takes CAA around 2-3 minutes to authenticate the user . Workaround : The user can disconnect and reconnect the client . |
Disconnect the CAA , Reconnect |
|
NC-76186 |
|
|
4X10G FlexiPort Module with new Intel 700 series NVM data and driver not recognized | Issue : The 4x10G FlexiPort Modules are not being recognized on Sophos Firewall, the interfaces are being detected as "eth0,eth3" Only SFOS (Sophos Firewall is affected ) Affected Sophos Part Number – “XGMOD410PUR” |
||
NC-62786 |
|
|
Enabling/disabling firewall-acceleration will bounce the ports | If the firewall-acceleration is changed on the cli the link state of the affected ports will bounce. |
||
NC-9124 |
|
|
STAS not working when AD servers are reachable on WAN | STAS is not working if the AD server is only reachable over a WAN conneciton. |
||
NC-73174 |
|
|
|
LogViewer shows twice DDNS events for Success/Failure. | LogViewer shows twice DDNS events for Success/Failure. |
|
NC-69491 |
|
|
Unable to access GUI after auto reboot | *Issue:* If there is a high number of Radius SSO users logging in at the same time and the firewall reboots then sometimes this may result in web admin is not being reachable after the reboot. |
||
NC-67790 |
|
|
DHCP Not Assigning multiple IP's to same MAC | Description: There is a requirement in certain case's where a multiple IP addresses would need to be assigned for a MAC address from different scopes . One of the use case is that or the captive portal to work over the bridged interface with a vlan , the AP creates a virtual interface and needs an IP address from the VLAN . If one scope is set to static and other to dynamic , the IP assignment doesn't work . Solution : Set both the scopes to dynamic . Set both the scopes to Static . |
||
NC-68438 |
|
|
Web policy rule does not support Users with backslash in the name | Web policy rules do not support users with a backslash in the name. Example: in webadmin -> Authentication -> users : Creating a user with username a\b and saving it will succeed. Using this user in a web policy wont work. |
Create a username without backslash or single quote |
|
NCL-1392 |
|
Do we support Secure LDAP port 636 in STAS for Novell eDirectory configuration ? | *Question:* Do we support Secure LDAP port 636 in the Novel eDirectory configuration of STAS? Answer: Secure LDAP port 636 is not supported in the Novel eDirectory configuration of STAS. |
|||
NC-71401 |
|
|
Unable to register XG with Central Manager with email address that contains more than 50 characters | Registering XG with Central Manager for remote management functionality fails with error "Temporary error while accessing Sophos Central, please try again". Root Cause: |
Shorten email address and try again. If you have tried more than 5 times in the last 1hr, the account will be blocked for up to 5 hours. Please wait and try again. |
|
NCL-1309 |
|
|
STAS Users are getting disconnected frequently if dead entry timeout configured other than zero. | STAS Users are getting disconnected frequently if dead entry timeout configured other than zero. Dead Entry Timeout does not work and it MUST be set to zero. If the value for the dead entry timeout is configured anything other than zero then such behavior encountered and users may get disconnected randomly. |
Need to set the dead entry timeout to zero to avoid user disconnection due to dead entry timeout. It is recommended to use the WMI mechanism in STAS for log-off detection. |
|
NC-71178 |
|
|
Unable to activate or register the XG firewall device with v17.0 MR-10 EAL4+ certified firmware | Unable to activate or register the XG Firewall device with v17.0 MR-10 EAL4+ certified firmware |
1. Customer needs to upgrade the XG Firewall firmware to SF v17.5.MR7 or later and activate the appliance. |
|
NC-13946 |
|
|
STAS users with special characters (' , / ") in their name do not show up on XG | STAS users with special characters (' , / ") in their name do not show up on XG. SFOS doesn't support a username containing special characters. |
The user needs to remove the special characters in the username to make it work. |
|
NC-69439 |
|
|
Policy tester is incorrect for Internet Scheme Web Policy | The policy tester is just showing Matched firewall rule ID, matched source, and destination zone. It does not return the webfilter id. |
||
NC-69633 |
|
Wildcard Exceptions FQDN host are not visible in SMTP exceptions. - Need clear indication | A user interface issue exists in SFOS, reported in v17.5MR9 but also exists in later versions. If an Admin adds a wildcard SMTP exception for an FQDN host (Email->Policies and exceptions->Exceptions), the FQDN wildcard entry is accepted and is visible in the UI, Email -> Policies, and exceptions. However, if the Admin attempts to edit this exception the added wildcard entry will not be visible. This is confirmed as a UI issue and we are currently investigating. We have no fixed date or version at this time. |
NA |
||
NC-70369 |
|
|
Auto interface cost calculation not working | Issue description : Auto Cost Calculation does not work for OSPF Workaround : |
||
NCL-1342 |
|
|
SATC not compatible with Chrome version 84 and newer | In July 2020, Google Chrome, the new Microsoft Edge, and other Chromium-based browsers moved to version 84. This version removed support for the ForceNetworkInProcess feature used as a workaround for previous versions as per NCL-1114. Workaround is described here (public link): https://support.sophos.com/support/s/article/KB-000038634?language=en_US |
Downgrade to version below 84 and apply workaround or move to Firefox. |
|
NCL-1119 |
|
|
SATC provides wrong source port in UDP port 6060 packets while server has InterceptX installed. | SATC installed on a server having Sophos InterceptX, installed reports wrong port information in new session details to the XG. Impact : |
https://support.sophos.com/support/s/article/KB-000036880?language=en_US |
|
NC-55068 |
|
|
|
XG 115 Rev. 3 HDMI ports do not appear to be enabled unless a monitor is plugged in at boot | XG 115 rev3 models will show no HDMI output unless a monitor is connected before boot up. |
|
NC-67688 |
|
|
NC-62850 causes large backup file | With 18.0 MR1 there was a case where a backup contained redundant information increasing the size of the backup. This was fixed with 18.0 MR3 in all cases. There was no functional impact for this. If a larger backup was taken and restored then /conf might be larger then expected. In such cases please use the described workaround. Backups after 18.0 MR 3 are not facing this. |
Run commands: |
|
NC-65961 |
|
|
Misleading Firewall and Web filter logs in log viewer | Log viewer for 'Firewall' & 'Web filter' component shows 'Allowed' in logging for all the port 80/443 traffic, initiated from WAN to WAN/LAN zone. The user (client) who has initiated traffic from the WAN side will be displayed a 'blocked' page. Note: The actual traffic is being blocked and not forwarded by XG. |
||
NC-19628 |
|
|
Not able to browse internet using IE 11 in protective mode if authenticated through SATC | Using SATC with IE11 in protective mode is not supported. |
||
NC-65625 |
|
|
OpenVPN CN size limited to 64 characters | OpenSSL limits the CN to be 64. OpenVPN limits the size of the CN to 63 + 1 (null character). This limits the |
Only use usernames + domain with max 51 characters |
|
NC-63535 |
|
Modsecurity not allowing block email senders list modification | If the user tries to add any domain or email address on the Page 'Email>> general setting>> block senders', then he'll get the error "Request could not be completed" and the domain or email address would not be added. |
The best possible way to avoid/resolve this is to remove any one of the domain/email address from the block senders list and re-add them again. This resolves the issue. |
||
NC-63913 |
|
|
When XG device in FETCH mode in SFM and user change "Advanced Threat" setting with template, though setting was applied correctly in XG Firewall, SFM event log show failure message | When the XG device is set to FETCH mode in SFM and user changes the "Advanced Threat" setting with template, though setting was applied correctly in XG Firewall, SFM event log show failure message This is known issue for FETCH mode configured devices in SFM only. In PUSH mode config XG Firewall devices, this issue is not observed. |
||
NC-60294 |
|
|
[CA] user not removed from Liveuser table when logging out | When using the Sophos Network Agent (iOS or Android) logout could take up to 2h. The APP itself gets disconnected immediately but on the UTM the user is still live which actually means he can still access network resources which should be blocked. |
Workaround is update and reboot safe |
|
NC-60381 |
|
|
DHCP Blocked with Heartbeat on SFOS | **This scenario is observed when the DHCP request comes via a bridge interface and Heartbeat is set to block endpoint communication with RED heartbeat status on the firewall rule with inter-zone communication rule i.e. rule configured for Bridge interface. The MAC address is blocked this would also include the DHCP traffic for affected client machines. When packets enter into the bridge interface, we are entering into Netfilter stack from L2 and all the decisions related to packet/connection taken at Layer 2. Now here, what happened is that Packet dropped by Firewall when it enters from the L2 stage. So traffic never submits to L3 (bridge interface) where the DHCP server is listening and DHCP will never get the packet. This issue will only for the client behind the bridge and will not happen for any other interface. |
Create a Firewall rule which is positioned on top with Service: DHCP and with no heartbeat settings applied. |
|
NC-60104 |
|
|
Live connection is not shown in Live Connection table for DNAT rule | Description: Live connections shown in the live view would not show a connection table entry for DNAT rules. Reason: While handling the connection table the connection to ZoneID 4 would not be considered in the live connection table. But this would show in Log Viewer and Reporting. |
The issue was sorted out due to architecture changes in V18. |
|
NC-60401 |
|
|
Unable to deregister Firewall or enable "Sophos Central Services" v18 | If the Firewall is registered and central services are accepted by the Central Admin and somehow firewall lost its Central Registration information due to Factory-Reset/Firmware Downgrade. |
Work-Around 1: Workaround 2: |
|
NC-59839 |
|
|
XG showing incorrect IP in the outbound email logs and CLI conntracks | When checking email logs for bounced emails in the UI, IP addresses might be shown as source address which are not configured in the UI. The log entry is generated for connection table entries, not from the actual routing. That means the original source is not necessarily used for routing. |
||
NC-9106 |
|
|
Mail Notification not working with Microsoft Office365 | Sophos XG does only support the following authentication methods. PLAIN Digest MD5 CRAM MD5 To authenticate agains Microsoft Office 365, one of these authentications methods need to be configured on both ends. |
||
NC-27452 |
|
|
GES Question : Do we Support method="RDG_IN_DATA" or method="RDG_OUT_DATA" for RD in WAF | We don't have protocol support for Microsoft's RDG protocol suite which they added with Windows Server 2012 (we only support the "old" MSRPC suite). Whenever such a RDG (2012) connection fails the log contains line stating WAF only supports RPC_IN_DATA and RPC_OUT_DATA, these are the only types enabled when Pass Outlook Anywhere is turned on. All other methods are unsupported |
||
NC-58684 |
|
|
Upgrade from v17.5.x to v18 Build_354 would take more time (approximately 50 minutes) | XG would take more time (approximately 50 minutes) to upgrade the firmware from v17.5.x to v18 Build_354. This because v18 Build_354 is doing additional checks for file system correction, which would take more time based on the hard disk size and state. |
||
NC-13632 |
|
|
Unable to do offline provisioning of RED 50 device using USB device | It is not possible to do offline provisioning for RED50 devices using an USB device without doing an online provisioning first. RED50 keeps on rebooting continuously. |
Do an online provisioning somewhere central. After first online provisioning is done offline provisioning is possible. |
|
NC-42227 |
|
|
Question: Are we not supporting SATC with Edge browser | We currently don't support SATC with the Edge browser. |
||
NC-55423 |
|
|
Difference in Data Transfer Traffic usages between WAN Link Manager and WAN Zone report. | +Behavior:+ There will be difference in Data Transfer Traffic usages between WAN Link Manager and WAN Zone report. WAN Link Manager: Go to Network > WAN Link Manager and click the Manage icon next to the IPv4 or IPv6 Gateway to view data transfer graphs related to that Gateway. **
Below statistics of WAN Link Manager and WAN Zone reports explain reason about different Data Transfer traffic usages. 1) WAN Link Manager statistics: This is the statistics of data transfer at interface level – that is per physical or virtual gateway 2) WAN Zone Report statistics: This is the statistics of traffic passed through Firewall rules per Zone The attached logical diagram would also explain difference between WAN Link Manager and WAN Zone reports.
|
||
NC-33997 |
|
|
SSO client install does not appear to work with RDP sessions | Setup sso client agent following KB 123159 log into a machine and it works correctly. When they try and login to the same machine through RDP they get a popup windows that just say default Logs will show the following 05/08/18 17:23:17 Return Message Code From Server Is -- > 5 05/08/18 17:24:35 Console has been disconnected. Switch user detected. logging out user 05/08/18 17:24:35 Posting End Session.... Using the SSO client agent with RDP is not supported |
||
NC-53986 |
|
|
|
For VM deployments, PCnet32 driver shows incorrect negotiation speed (10mbps Half Duplex) on XG UI | The UI in v18 shows a wrong negotiation speed for virtual machines using the PCnet32 driver. This is only a UI issue. |
|
NC-25733 |
|
|
Can not see any custom configured IPSec Profiles "that's using PSK and having Aggressive mode enabled" listed after upgrading to V17MR1 although it's being used as a policy in the IPSec Connectiont | You can not find/select an IPsec Profile from within an IPsec connection when this IPsec Profile has Aggressive mode enabled and the Connection is using PSK after you upgrade from any version to V17 VPN > IPsec connections> select an upgraded vpn connection> Under Encryption > click on Policy, the old custom policy used for this connection is not listed Reason: Strongswan is not supporting PSK and Aggressive mode for security reason. |
Either disable Aggressive mode on the IPsec Profile or Use RSA/Cert for Authentication instead of PSK. |
|
NC-25749 |
|
|
IPSec v16 to v17 update does not set SHA2 truncation on custom Policy's | IPSec v16 to v17 update does not set SHA2 truncation on custom policy. Impact *How to Identify the issue * The tunnel status could be verified from the GUI , The Status and Connection will be Green . #ipsec statusall |
The workaround is to enable the SHA2 with 96-bit truncation on v17 policy. |
|
NC-48871 |
|
|
|
Username with backslash "\" character are unable to authenticate when logging with domain via L2TP | Username with backslash "\" character are unable to authenticate when logging with domain via L2TP The character "\" is not supported as part of the username in XG Firewall. User can simply check this by creating new user manually having "\" character in username, XG firewall will not allow you to create such user. XG Firewall supports authentication with the sAMAccountName username (i.e. asystest) or with the fully qualified username (i.e. asystest@xyz.local) which works, but not with the NETBIOS format, indifferent of the server. |
|
NC-42226 |
|
|
Self signed certificate support as SSL Server certificate in SSL VPN. | Self Signed certificates are not supported as SSL server certificate in SSL VPN . You cannot issue the certificate for yourself but requires a CA to sign / approve server certificate. A certificate signed by local CA i.e. issued by default certificate authority (CA)is supported i.e. certificate "ApplianceCertificate" shown in below screenshot is supported. |
||
NC-54667 |
|
|
Maximum number of simultaneous CAA users | XG firewall supports a maximum of 3042 Corporate Authentication Agent connections at the same time. If the number of users is exceeding this then logs like "Failed to establish connection! Too many open files" will appear in access server log file. |
||
NC-54697 |
|
|
"show ips-settings" command display only 8 firewall rules if more are configured | The "show ips-settings" command in the console only displays 8 firewall rules in case you have configured more. |
||
NC-33500 |
|
|
Unable to get the file that was scanned by sandstorm | When a file is scanned by sandstorm, Admin get a cannot reach page after scanning (throw by Sophos XG captive portal). This is observed When Any to Any firewall rule is configure as DROP. |
Create Specific LAN/WAN zone instead of Any zone for DROP firewall rule |
|
NC-53094 |
|
|
WAN gateway becomes "active" causing RED S2S tunnels to flap | When multiple WAN gateways are configured on the XG, any action that causes the backup gateway or the gateway not being used by the RED tunnel to reconnect will cause all RED tunnels to reconnect. |
None |
|
NC-47092 |
|
|
SSH Session to a target behind a SFOS Firewall show up in LogViewer with delay | There might be a delay before an SSH session is shown in the LogViewer. |
||
NC-42570 |
|
|
Unable to access WAF server from LAN if browser proxy is configured in LAN systems | When LAN users want to use a webserver protected by a WAF in the LAN zone than those requests don't work. Reason is that requests from the LAN zone will reach the webserver(s) directly without passing the XG. |
||
NC-38227 |
|
|
|
RED functionality can't be enabled with a DHCP for the RED on the DHCP page | *ISSUE -* Trying to start the RED results in unknown internal error: *BACKGROUND -* The customer upgraded the XG 135 to v17.1.2 MR2 and thereafter out of 2 red tunnels only one was showing up on the GUI. INVESTIGATION: Following rebind issue logs were found Mon Sep 17 04:02:36 2018 REDD ERROR: Rebind of RED devices failed: Failed to get config of all devices: Expected reply from get_object_by_hash() with status 200 but got 500 without error message. $VAR1 = { 'status' => 500, 'Records' => [] }; REDD: Red::Backend->enable_feature_event failed; result 520 Browser debug shows the following: {transactionID: "5690", status: 520, message: "", opcodeMessage: "Enabling RED feature failed",…} entity : {map: {country: "AU", Entity: "redconfiguration", ___serverport: 65003, ___component: "GUI",…}} map : {country: "AU", Entity: "redconfiguration", ___serverport: 65003, ___component: "GUI",…} APIVersion : "1701.1" Entity : "redconfiguration" Event : "UPDATE" city : "Narangba" country : "AU" currentlyloggedinuserid : 4 currentlyloggedinuserip : "127.0.0.1" email : "licensing@ahe1.com.au" mode : 1320 organization : "Atlas Heavy Engineering" status : "1" transactionid : "5690" ___component : "GUI" ___serverip : "127.0.0.1" ___serverport : 65003 ___serverprotocol : "HTTP" ___username : "support" message : "" opcodeMessage : "Enabling RED feature failed" redirectionURL : "" status : 520 transactionID : "5690" Looks quite similar to the JIRA NC-27578 for the following : and CSCHELPER Backup of the unit - ACCESS ID 05894141-f8b9-3615-ba4d-cb876759c539 |
|
NC-51322 |
|
|
Chinese characters in mail subject not displayed correctly within the quarantine digest mail | Chinese characters in the subject of quarantined mail are not displayed correctly within the quarantine digest mail. The display in the GUI itself is correct, but appears garbled in the quarantine digest email only. |
Changing the encoding used in the end user's mail client to encoding to UTF-8 acts as a workaround for this issue. We also have plans to resolve this in a future software update but no timelines on this currently. |
|
NC-43721 |
|
|
Half duplex not working on upper four ports of XG125/135 Rev.3 | XG125/135 Rev.3 does not work with Halfduplex in any setting on Port 1,2,3,4. |
||
NC-39407 |
|
|
Policy Based Routing on Reply/Return Traffic Only Is not Supported | We do not support Policy Based Routing (PBR )on return traffic on any version prior to v18 |
||
NC-43682 |
|
Mail queue being delayed/failed after update to v17.5 | Any manual change to the disable_offline_relate is lost during a firmware upgrade. If, prior to an upgrade, the /static/proxy/smtp/scanner.conf file has been changed to set the disable_offline_relate setting to 'no' this will be lost during a firmware update and will need setting again. We plan to introduce a GUI option to set this option that will persist through a firmware upgrade in a future release |
Once firmware upgrade is complete edit /static/proxy/smtp/scanner.conf and update the disable_offline_relate again |
||
NC-42364 |
|
|
IPSEC route precedence not applying as expected | System route_precedence is configured to give VPN Routes a higher priority than Static Routes however the XG firewall is not sending the expected traffic over the IPSEC tunnel and instead routing it via a matching static route. This occurs if there is a static or local route that directs this traffic to a non-WAN zone. The route precedence command only applies to traffic that is destined for a WAN zone
|
In this scenario manually creating an IPSEC route for the remote subnet will resolve the issue. E.g Hitting tab twice after tunnelname will show a list of available tunnels. |
|
NC-13637 |
|
|
Route Precedence not followed in case of PBR and RED S2S | Policy based routes for RED interfaces are not working. |
||
NC-19478 |
|
|
Access of websites (HTTP/HTTPS) containing UTF-16 chars in the URL by bookmark is not possible | Clientless Access feature requires rewrites HTML links within the response document, to ensure that links work for users outside the proxy. If website contains URL links with UTF-16 encoded special characters like example below, then site will not open properly using Clientless Access(HTTP/HTTPs) feature Example:. http:\u002f\u002fportal.example.com -> contains character encoded in UTF-16 format |
||
NC-35231 |
|
|
Limit on adding Threat Exceptions. |
Let us know if there is any limit on adding Threat Exceptions under Protect - Advanced Threat - Advanced Threat Protection. *Web Admin:* _Protect - Advanced Threat - Advanced Threat Protection_
|
||
NC-35230 |
|
|
Maximum number of Wireless Networks that can be created | Limit on adding number of wireless networks. Web Admin: Protect - Wireless - Wireless Networks
|
||
NC-13659 |
|
|
Host information on ATP Flipside not updated | On ATP flipside, host information for blocked sources is displayed. This information is not updated, the flipside needs to be manually reloaded/re-opened to see changes (e.g. host states green, red, missing) |
||
NC-13639 |
|
[CaptivePortal] Problems with UTF8 names | Local user with names that contains umlauts (ööööööö) cannot login (if the login is happening via AD / STAS then a login is possible.) |
|||
NC-19476 |
|
|
Unable to access SSL VPN Clientless Access Connection via HTTP(s) bookmark | Access of HTTTP/s bookmark to web servers which contains JavaScript based dynamically generated URLs is not possible. |
||
NC-32298 |
|
Random slow down of the SG430/SG450 with busy disk and less disk I/O | a small percentage of SG and XG 430/450 Rev.1 appliances not being accessible anymore except via serial. This is caused by a SSD software/firmware issue. The serial console output shows the errors:
This issue is based on problems with the Solid State Disk (SSD) firmware. If you have an SG or XG 430/450 Rev.1 that is experiencing issues like those shown above, please contact Sophos Support for further instructions. If possible go ahead and make a backup with one of the KBA's mentioned below:
|
|||
NC-13636 |
|
L2TP connection with PSK to mobile phones not possible | No L2TP connection is possible to mobile phone with Android (5.0.1 on Samsung S4) or iOS (10). Oct 06 10:46:33 "l2tp"[1] 10.147.34.103 #15: STATE_MAIN_R2: sent MR2, expecting MI3 Oct 06 10:46:33 "l2tp"[1] 10.147.34.103 #15: Main mode peer ID is ID_IPV4_ADDR: '10.147.34.103' Oct 06 10:46:33 "l2tp"[1] 10.147.34.103 #15: I did not send a certificate because I do not have one. Oct 06 10:46:33 "l2tp"[1] 10.147.34.103 #15: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Oct 06 10:46:33 "l2tp"[1] 10.147.34.103 #15: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha group=modp1024} Oct 06 10:46:33 "l2tp"[1] 10.147.34.103 #15: Dead Peer Detection (RFC 3706): enabled Oct 06 10:46:33 "l2tps"[1] 10.147.34.103 #15: ignoring informational payload, type IPSEC_INITIAL_CONTACT Oct 06 10:46:33 "l2tp"[1] 10.147.34.103 #15: received and ignored informational message Oct 06 10:46:34 "l2tp"[1] 10.147.34.103 #15: cannot respond to IPsec SA request because no connection is known for 10.8.18.51:17/1701...10.147.34.103:17/%any Oct 06 10:46:34 "l2tp"[1] 10.147.34.103 #15: sending encrypted notification INVALID_ID_INFORMATION to 10.147.34.103:500 Oct 06 10:46:37 "l2tp"[1] 10.147.34.103 #15: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x635c829e (perhaps this is a duplicated packet) |
|||
NC-18385 |
|
WAF - redirect to original requested path after form-based auth (SFOS) | After the successful form-based authentication the user is always redirected to the defined path in the corresponding site path routing profile and not to the original requested path of the user. |
|||
NC-19479 |
|
|
Some websites could not be accessed through clientless access | Website which strictly require the destination domain in the URL host part could not be accessed through Clientless Access. An example for this is CNN.com |
||
NC-13618 |
|
|
Unable to take GUI access of local appliance via clientless http(s) bookmark | Webadmin access through an clientless access VPN bookmark on the same appliance is not possible. |
||
NC-9641 |
|
|
RPC not working when Common threat filter is enabled | Outlook Anywhere is not working when CTF (Common Threat Filter) is enabled in Business Application Rule. |
Disable CTF (Common Threat Filter) in *Web App Protection Policies |
|
NC-9132 |
|
|
Websockets not supported for WAF | WebSockets is an advanced technology that makes it possible to open an interactive communication session between the user's browser and a server. Sophos XG Firewall only supports WebSocket passthrough starting from version 17.0, in earlier versions this functionality of Webserver Protection is not availableos XG. |
||
NC-9102 |
|
|
Custom Logo is not displayed in Hotspot login page if Hotspot name contains whitespace | A Custom logo is not displayed if the Hotspot name is including a whitespace. |
Dont use whitespaces in Hotspotnames |
|
NC-9063 |
|
|
Error message while creating Hotspot | Its not possible to create a Hotspot with an HTML file name through SFM which contains a space. ------------------------------------------------------------------------------------------------------------------------------------- |
Dont use spaces in file names. |
|
NC-8888 |
|
|
IPSec site to site between SFOS and SonicWall is not working in Aggressive mode | IPSec Site-to-Site VPN with SonicWall is not supported with Aggressive mode |
Use Main Mode |
|
NC-13598 |
|
|
10G SFP+ Network cards on Software Appliance are not recognized | – After installation of SFOS v15 MR3 on Super Micro X10SDV-TP8F, the Dual 10G SFP+ Network cards from D-1500 SoC are not recognized anymore. More about device specifications can be found here : https://www.supermicro.com/products/motherboard/Xeon/D/X10SDV-TP8F.cfm – Output of Dmesg related to Ethernet is shown below [ 6.505941] e100: Intel(R) PRO/100 Network Driver, 3.5.24-k2-NAPI [ 6.512798] e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI [ 6.523049] e1000e: Intel(R) PRO/1000 Network Driver - 2.3.2-k [ 6.538388] i40e: Intel(R) Ethernet Connection XL710 Network Driver - version 1.1.23 [ 6.547374] igb: Intel(R) Gigabit Ethernet Network Driver - version 5.0.5-k [ 6.587508] igb 0000:07:00.0: Intel(R) Gigabit Ethernet Network Connection [ 6.634442] igb 0000:08:00.0: Intel(R) Gigabit Ethernet Network Connection [ 6.819952] igb 0000:0b:00.0: Intel(R) Gigabit Ethernet Network Connection [ 7.002801] igb 0000:0b:00.1: Intel(R) Gigabit Ethernet Network Connection [ 7.190630] igb 0000:0b:00.2: Intel(R) Gigabit Ethernet Network Connection [ 7.378468] igb 0000:0b:00.3: Intel(R) Gigabit Ethernet Network Connection [ 7.380785] igbvf: Intel(R) Gigabit Virtual Function Network Driver - version 2.0.2-k [ 7.386529] ixgb: Intel(R) PRO/10GbE Network Driver - version 1.0.135-k2-NAPI [ 7.397845] Intel(R) 10 Gigabit PCI Express Network Driver - version 3.17.3 [ 7.399517] ixgbevf: Intel(R) 10 Gigabit PCI Express Virtual Function Network Driver - version 2.12.1-k [ 7.481665] QLogic/NetXen Network Driver v4.0.82 [ 7.586272] tehuti: Tehuti Networks(R) Network Driver, 7.29.3 |
No workaround available |
|
NC-14880 |
|
|
SFOSv16 : 'Enforce Safe Search' is applied globally in v16 | – Safe search is enforced globally and on all the policies without any exception once it is enabled. Issue reproduction : Now disable 'Enforce Safesearch' option and do the same search with caution. You will see all the related results which is explicit in content. |
||
NC-17457 |
|
|
username for PPPOE interfaces is limited to 50 characters. | The username field for PPPOE interface configuration is limited to 50 characters. If the username is more than 50 characters for eg: john.doe0123456789012345678901234567890123456789@example.com Use the workaround described below |
Insert any dummy username in the GUI PPPOE interface config where username is less than 50 characters Goto the advanced shell and enter:=> psql -U nobody -d corporate (Go to corporate DB) After applying the above command do disconnect the pppoe connection and reconnect again to bring the changes into effect. |
|
NC-17808 |
|
Wrong decoding if a policy with 'Change prefix Subject' is configured with Umlauts. |
|
|||
NC-22206 |
|
|
Bookmark of websites that require NTLM authentication don't work in clientless authentication | Bookmark of websites that requires NTLM authentication in clientless access will not work. |
||
NC-22372 |
|
Missing Prefix Subject with IMAP and several Mail Clients | When using IMAP, prefix subject (Spam) is not visible in many e-mail clients unless specifically selecting the message. |
Some of the Mail Clients download only root header's from Server before downloading full Mail. SFOS IMAP proxy doesn't scan headers for spam checking as headers are not enough information to detect spam. IMAP proxy scan Mail for spam when mail client download full Mail. |
||
NC-22697 |
|
|
Citrix Base web application (www.bimco.org) is not working with Allow ALL Web Policy | Issue: Citrix Base Web Application (www.bimco.org) is not working with Allow ALL Web Policy In transparent mode, Citrix clients are not aware of the fact that there is an http/https proxy in between, thus it starts talking a proprietary protocol (not http/https) using http/https ports which is not understood by the proxy, which in turn results in a kind of stalemate (proxy is waiting for client request, while Citrix client is expecting something from server first). Due to the above behavior, launching an .ica file with any Citrix web or application based will fail. |
For workaround, user must have a hole punched in firewall to the bimco.org ip address(es) to launch the ica file.. 1: Allow none web policy in LAN-WAN for destination addresses associated with www.bimco.org and launching the ica file. |
|
NC-27906 |
|
Legacy mode doesn't support retry of E-Mail | If greylisting is enabled on server side all subsequent mails are getting rejected. This is because Legacy Mode doesn't support retry of E-Mail. If E-Mail fails to send, Legacy Mode Proxy generates Notification and inform Sender. So, as per greylisting, failed E-Mail should retried but this is rejected with Log entry "451 Temporary local problem, please try again!" |
|||
NC-29363 |
|
|
|
Unable to boot XG's in HA when using 4x10GE SFP+ flexi module | Issue : The device doesnt boot up after HA takeover when the unit is equipped with 4x10GE SFP+ flexi modules How to identify :
Root cause and Fix : This is caused due to old BIOS versions. The latest BIOS version of XG devices is R1.02, this is not affected by this issue. This can be verified during the startup or by interrupting the startup by pressing TAB or DEL. For older devices we have the steps to upgrade BIOS manually. Please contact Sophos support. |
|
NC-30324 |
|
|
Internal hosts cannot ping remote access SSL VPN | SSL VPN user can ping to LAN but LAN can not ping to SSL VPN. If both SSL VPN and Policyrouting is configured for a destination network then by default policyrouting is enabled That is because routing precende by default is doing policyrouting first. To change this routing precendence needs to be changed. This could be done via console:
To reach the destination through SSL VPN the static route precendence has to be the firste entry in the routing precendence table. Checking the actual status could be done via console : console> system route_precedence show Routing Precedence: 1. Static routes 2. Policy routes
|
||
NC-8891 |
|
CHAP or CHAPV2 in L2TP & PPTP VPN with AD Configuration is not working | VPN Authentication for IPSec / L2TP / PPTP is not working with AD. |
Use Authentication method PAP instead |
||
NC-26865 | Link/Act LED glowing on Port3 & Port4 even ports are disabed in XG85/w, XG125/135/w | For XG85/w and 125/135/w Port 3 and Port4 Link/Act LEDs are glowing without the port being enabled and configured. |
||||
NC-29938 |
|
|
Issue with Static Route. | A static route cannot apply to the system for the connected network i.e. any static route cannot be configured for connected networks. Ex:- Any interface configured with IP 192.168.115.115/24 then system kernel will not add the route for static route
|
||
NC-30996 |
|
|
|
Random NIC order with more than 3 NICs on VMware vSphere | Due to a VMware Issue on vSphere a random network interface mapping occurs with more than 3 network interfaces on SFOS. This happens only on vmxnet3 and e1000e NIC driver. |
Use e1000 or flexible (pcnet32) NIC driver |
Sophos Firewall Manager
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NCCC-3576 |
|
|
HA is not supported in Virtual SFM |
|
No Workaround |
|
NCCC-10142 |
|
|
SFv17.5Compatibility: Device is un-sync after adding/updating IPS rule | Device is shown as unsynced for upto 5 minutes after changing/adding an IPS rule in SFM at device level. Note: Device comes in sync after few minutes and configuration is applied. |
||
NCCC-10121 |
|
|
SFM and SCFM do not support upgrade to v18 firmware | You are unable to upload v18 firmware to SFM devices to deploy to XGs running v17.5.x devices. Trying to upload the file gets to 97% and then nothing happens. This is a known issue. |
Load firmware manually to XG |
|
NCCC-10092 |
|
|
Red Configuration is not pushed at group level | When applying RED configuration from CFM group level in the System services module the configuration will fail with the error message: _Data is invalid and cannot be synchronized on the device._ This issue is observed for SF 17.5.MR11 onwards because of UI for SF 17.5.MR11 onwards for RED configurations has been changed. |
Use single device management by selecting device from Select devices and then applying configuration for RED |
|
NCCC-9355 |
|
|
XG signature compatibility issue with SFM | SFM has default IPS signature set and XG appliance supports signature set based on RAM size. If Admin pushes signatures from SFM then signature will be displayed on XG based on RAM size and other signatures wouldn't be display even Admin see the success message on SFM UI. |
||
NCCC-10100 |
|
|
User unable to download and upgrade Cyberoam firmware from CCC | User unable to download and upgrade Cyberoam firmware from CCC |
User can upgrade the Cyberoam firmware from Cyberoam UI. |
|
NCCC-10088 |
|
|
CCL logs are not being populated with changes applied to a CCL enabled device in SCFM | CCL not being populated with changes applied to CCL enabled device in SCFM Example: XG has CCL enabled on it,
|
||
NCCC-8757 |
|
|
CCC Template import is not working with 10.6.6 MR-5 | CCC Import Template is not working with 10.6.6 MR-5. Template is imported successfully but it is imported without any configuration Data. |
||
NCCC-9498 |
|
|
CFM is not communicating at all with all XGs on syslog | SCFM connection tracking gets full which results in XGs working with syslog port/protocol from being able to sync fully or templates to be pushed. |
Use https instead of syslog |
|
NCCC-9147 |
|
|
SCFM doesn't push the template to XG | In some cases it seems like SCFM can't push the template to the device. In fact it just takes a very long time to do this ( could be a few hours). |
||
NCCC-8270 |
|
|
Compatibility 17.5: Web Proxy Configuration General setting is not supported for SFOS v17.5 in SFM/CFM template import functionality. | In SFM/CFM import template support for Web Proxy Configuration General setting is not supported for SFOS v17.5. Web Proxy Configuration import template does not support for Web - General Settings - HTTPS Decryption and Scanning and Web-General Settings for SFOS v17.5. |
||
NCCC-5288 |
|
|
No option to 'Create Network' in SFM , VPN | There's no option to 'Create' a network for Local or Remote S2S VPN, only choosing from the one manually created before, same behavior also in the Firewall rule. |
Sophos Intercept X for Mobile
Key | Components | Summary | Description | Workaround |
---|---|---|---|---|
SMSECAND-4635 |
|
Security & Antivirus guard app cannot be installed on devices running Android 10 or higher | The “Security & Antivirus Guard” app is not available anymore on devices running Android 10 or higher. After recent changes made by Google apps that haven’t been updated for a while cannot be installed anymore. There have been several changes to the Android operating system and the Intercept X app, reducing the need for the Security & Antivirus Guard app. |
|
SMSECAND-4561 |
|
Issues with sending log and trace files with Gmail | For some Android versions and devices, Gmail doesn’t attach log and trace files to the email you send to Sophos support. |
Send log and trace files with a different email app than Gmail. |
SMSECAND-4563 |
|
Web Filtering only supports specific browsers | Web Filtering supports the following browsers:
|
|
SMSECAND-4562 |
|
Issue with Android Backup Service | On some devices, Android doesn’t restore Sophos Intercept X for Mobile app settings when you reinstall the app or install it on another device using the same Google account. This issue is caused by the Android Backup Service. |
|
SMSECAND-4569 |
|
App Protection limitations | Because of Android limitations, App Protection can only prevent user interaction with a password-protected app via the app’s user interface. Users can still interact with the app via other apps like Google Assistant or Android system functionality. Also, App Protection can’t prevent interaction with an app that runs in a multi-window mode, such as split-screen, floating windows, or tiny windows. For details, see Sophos Mobile - Access to protected / controlled apps still possible by 3rd party apps. |
|
SMSECAND-4568 |
|
Sophos Accessibility Service turned off on some devices during an update | On some devices (such as the Asus Zenpad 10), Android turns off the Sophos Accessibility Service, which Web Filtering requires, when Sophos Intercept X for Mobile is updated. |
Either turn on the service in the Android settings or restart the device. |
SMSECAND-4567 |
|
Sophos Accessibility Service turned off on some devices | On some devices, Android turns off the Sophos Accessibility Service, which Web Filtering requires. Sophos Intercept X for Mobile detects this and asks the user to turn on the service again. |
|
SMSECAND-4566 |
|
App Protection doesn’t work with Samsung pop-up view | App Protection can’t protect apps running in Samsung pop-up view. Pop-up view is a feature of some Samsung devices, such as the Samsung Galaxy S7 and S8. |
|
SMSECAND-4565 |
|
QR Code Scanner limitations with changing the Wi-Fi password | On Android 6.0 and later, an app isn’t allowed to change a Wi-Fi configuration added by another app or by the user. Therefore, QR Code Scanner can only change the Wi-Fi password of networks added by Sophos Intercept X for Mobile. |
|
SMSECAND-4564 |
|
“Monitor SD card” limitations | On Android 6.0 and later, Sophos Intercept X for Mobile can’t monitor copying files to the device at all times. This is a known issue of the Android functionality we use for monitoring SD card access. For example, the app can’t detect copying files from a computer connected via USB. This limitation doesn’t affect copy operations initiated by the user on the device, such as downloading files from the internet to the SD card. |
|
SMSECAND-4560 |
|
App Protection does not work correctly on Xiaomi devices | The App Protection feature on Xiaomi devices only works if the client was once opened and if the Display pop-up windows while running in the background permission in App info > Other permission is turned on. |
Please find details on how to enable the "Display pop-up windows while running in the background" permissions in this KB: |
SMSECAND-4571 |
|
Chrome OS limitations | You can install Intercept X for Mobile from Google Play on Chrome OS devices supporting Android apps, such as all Chromebooks launched after 2019. When Intercept X for Mobile runs on Chrome OS, the following limitations apply:
|
|
SMSECAND-4570 |
|
Wi-Fi Security can’t detect ARP Spoofing on Android 10 or later | Wi-Fi Security can’t detect ARP Spoofing on devices running Android 10 or later. This is an Android limitation. |
Sophos Mobile
Key | Components | Summary | Description | Workaround |
---|---|---|---|---|
SMCAND-2995 |
|
Client certificate secured WiFi connection lost on WiFi only devices after updating policy | If WiFi-only devices are used and a certificate-secured WiFi connection is distributed via Sophos Mobile, the connection will be lost after the assigned policy is changed. |
|
SMCSRV-13893 |
|
"Send message" task in enrollment task bundle might fail | When a “Send message” task is included in the enrollment task bundle, it might fail with an error message indicating that APNS or FCM information is missing. |
There is currently no workaround available. A fix might be included in a future update of the Sophos Central Mobile backend. |
SMCSRV-13849 |
|
Checkboxes are cleared when opening an email policy | When opening an email policy after navigating through the Sophos Central Mobile user interface the checkboxes for the enabled services are sometimes cleared. |
|
SMCIOS-895 |
|
Automatic synchronization of the Sophos Mobile Control app against the server doesn’t work reliably | In some cases, the silent trigger sent by Sophos Mobile doesn’t result in automatic background synchronization. |
Let your users synchronize the app manually. |
SMCIOS-894 |
|
When Safari is restricted via a profile, recommended and required apps can’t be installed via an iTunes link | Installing a recommended or required app via an iTunes link on an iOS device requires the Safari web browser. When you restrict Safari, users can’t install recommended and required apps via an iTunes link. |
|
SMCAND-2933 |
|
App Protection and App Control can only control direct interaction through the user interface | Due to technical limitations of the Android platform, the App Protection and App Control features can only prevent direct interaction with an app through its user interface. Users can still interact with a protected app via other apps like Google Assistant or via Android system functionality. Also, note that App Protection can’t stop interaction with an app that runs in multi-window mode, for example, split-screen, floating windows, or tiny windows. For details, see support article 135017. |
|
SMCAND-2932 |
|
Can’t turn on Factory Reset Protection (FRP) on some Android Enterprise devices | On some devices capable of Factory Reset Protection (FRP), we’ve noticed an FRP is not supported error when you turn on FRP via Sophos Mobile. This issue isn’t caused by Sophos Mobile. |
|
SMCAND-2931 |
|
Android Enterprise: Chrome app enabled in work profiles by default | There’s a known Android issue related to the work profile. Starting with Android 8, the Android internal WebView app is disabled by default. As a result, apps in the work profile that rely on the WebView app might stop working. Google resolved this issue by enabling the Chrome app, which enables the internal WebView app. However, you might not want to allow a browser app in the work profile. For more information regarding this issue, see the Google article https://support.google.com/work/android/answer/7506908. |
To disable Chrome in the work profile, use the App Control configuration of your Sophos Mobile Android Enterprise policy. |
SMCSRV-13808 |
|
"401 Unauthorized" errors when connecting to a third-party service with Chrome | In rare cases, binding Sophos Mobile with a third-party service such as Microsoft Intune Mobile Threat Defense fails with a |
Open Sophos Central in a different internet browser than Google Chrome. |
SMCIOS-897 |
|
Restricting app removal doesn’t work reliably | On some devices, users can uninstall apps even if you turn off the Allow app removal restriction in the iOS device policy. This is an issue in iOS. |
|
SMCIOS-896 |
|
Single App Mode profile changes don’t affect the device | Updating an iOS Single App Mode profile doesn’t update all contained settings. The Disable… options are updated correctly. All other options only work on the first installation of the profile. This is an issue in iOS. |
To change the settings, remove and reinstall the profile. |
SMCSRV-13801 |
|
Detecting deactivated Defender on Windows 10 computers doesn’t work in some cases | In some cases, Windows 10 computers might be reported as compliant even if Windows Defender is turned off. This is because the Defender activated compliance rule can only check if the Defender service is running. It doesn’t check if real-time protection is turned on. |
|
SMCSRV-13800 |
|
Task bundle tasks for profile removal don’t list the current profile names in some cases | When you rename profiles, removal tasks might show the old profile name. |
|
SMCSRV-13799 |
|
Pages layout corrupted after Sophos Mobile update | Some pages of Sophos Mobile Admin might look corrupted after an update of Sophos Mobile. |
Clear your browser cache and reload the page. |
SMCSRV-13802 |
|
Removing duplicated Android profiles using a task bundle doesn’t work | An Android profile that has been created by using the Duplicate command in an older version of Sophos Mobile can't be removed from devices using a task bundle. |
|
SMCAND-2927 |
|
On Sony devices, it’s not possible to protect or control small apps | “Small apps” are Sony-specific apps on Sony devices that overlay existing apps. You can’t control or protect these apps with the Sophos Mobile Control app or App Protection. |
|
SMCAND-2926 |
|
Preventing additional device administrators on Samsung Knox devices | The device ignores the Knox premium restriction Prevent installation of another administrator app on a device if there’s already another device administrator activated. |
Make sure Sophos Mobile Control is the only device administrator before you assign the restriction. |
SMCAND-2925 |
|
Some Samsung Knox devices require a restart to turn on Kiosk Mode | You must restart Samsung devices with Knox Standard (formerly called SAFE) SDK version earlier than 5.4 after installing a Kiosk Mode profile. If you don’t, users can stop all running apps in the task manager and switch to the default launcher home screen. |
|
SMCSRV-13805 |
|
Not possible to save HTML-formatted text | In some cases, you get a This issue is caused by an error in the HTML parser library. |
Change the font size of underlined text and delete any styling attributes. |
SMCSRV-13804 |
|
Number of users invited to Apple VPP at the same time is limited | When you invite too many users to the Apple Volume Purchase Program (VPP) at once, Apple might reject further requests for a few minutes. We will fix this issue in a future version of Sophos Mobile. |
Reduce the number of users included in the invitation. |
SMCSRV-13803 |
|
Some Windows 10 devices don’t register correctly for push notifications | Some Windows 10 computers don’t register correctly for the Windows Notification Service (WNS). There’s a time-out of their push registration after 30 days, and the devices fail to renew the registration automatically. Although the Sophos Mobile server enforces the renewal, some devices send the old, invalid push registration information to the Sophos Mobile server when they re-register. As a result, the Sophos Mobile server can't send push notifications to these devices to synchronize the built-in MDM agent. This is a known issue in Windows 10. |
|
SMCAND-2930 |
|
No compliance violation “Installation from unknown sources” on Android 8 | Starting with Android 8, the installation of apps from unknown sources isn’t a device setting. It’s a permission setting for apps that can install other apps. For example, a file manager app. Sophos Mobile can’t check if any third-party app has this permission. Devices with Android 8 ignore the Apps from unknown sources compliance rule. |
|
SMCAND-2929 |
|
Removing mail accounts from the Android work profile | When you transfer an Exchange mail account to an Android work profile, the account remains configured in the profile when you remove the policy. You can assign a policy with a different Email configuration to the device. The device always uses the latest Email configuration. However, you can’t remove the configuration from the work profile. |
To remove the configured account, remove the whole Android work profile from the device. |
Sophos Secure Email
Key | Components | Summary | Description | Workaround |
---|---|---|---|---|
SSEAND-986 |
|
Email size limited to 3 MB | Sophos Secure Email for Android can’t show messages that are larger than 3 MB. |
|
SSEAND-987 |
|
Mail encryption and signature verification not supported | Sophos Secure Email for Android doesn’t support email encryption such as S/MIME or PGP. Also, Sophos Secure Email for Android doesn’t support the verification of digitally signed emails. You can view S/MIME-signed emails, but you can’t verify the signature. You might not be able to view emails at all that are signed with a different certificate, such as PGP. |
|
SSEAND-985 |
|
Extra notifications for “Real push notification” or “New email without information” | When you select the Real push notification or New email without information notification setting, Sophos Secure Email for Android shows a second, unrelated notification for each New email notification. |
Select a different notification setting. |
SSEIOS-665 |
|
Calendar might stop syncing when running for a long time with a poor network connection | In rare cases, the calendar might stop syncing when Sophos Secure Email for iOS runs for a long time with a poor network connection. |
Close the app (double-press the Home button and swipe up on the app in the app list) and restart it. |
SSEIOS-664 |
|
Searching for local contacts with special characters not supported | When searching for local contacts, entries with accented characters in their name, such as umlauts, aren't found. |
|
SSEIOS-669 |
|
App badge not displayed with Microsoft Exchange | There’s no badge displayed on the app icon when you’re using a Microsoft Exchange server. |
|
SSEIOS-668 |
|
Some emails have disabled actions | In search results, Sophos Secure Email for iOS disables actions (reply, forward, delete, etc.) for emails stored on the server but not on the device. |
|
SSEIOS-666 |
|
Sophos Secure Email only supports plain-text emails | Sophos Secure Email for iOS only supports writing plain-text emails. Support for RTF and HTML emails is planned for a future app version. |
|
SSEIOS-671 |
|
Authenticating issues with Exchange Online | If the password contains special characters such as umlauts, authentication with Exchange Online (Microsoft 365) might fail. |
|
SSEIOS-667 |
|
Notifications not shown | In rare cases, Sophos Secure Email for iOS doesn’t show email and appointment notifications, although you turned on notifications. |
Close the app (double-press the Home button and swipe up on the app in the app list) and restart it. |
SSEIOS-670 |
|
Spelling mistakes not marked | Sophos Secure Email for iOS doesn’t mark spelling mistakes in email text. |
|
SSEAND-976 |
|
Sophos Secure Email doesn’t work with insecure screen lock | Sophos Secure Email for Android only works when you configured a secure screen lock method such as PIN, Pattern, or Password. The app might fail to open if you set no or an insecure screen lock method such as Swipe. |
|
SSEAND-974 |
|
PDF documents don’t open in Google PDF Viewer | Currently, Sophos Secure Email for Android doesn’t support viewing PDF documents in Google PDF Viewer. |
Open PDF documents in a different app, for example in Adobe Acrobat Reader. |
SSEAND-975 |
|
Sophos Secure Email stops responding while unenrolling | On some devices, Sophos Secure Email for Android stops responding while unenrolling from Sophos Mobile. |
Stop the app (remove it from the list of recent apps) and restart it to check that it’s unenrolled. |
SSEAND-972 |
|
Sophos Secure Email shows container policy check window every time it starts | On some devices, Sophos Secure Email for Android might show the policy check window every time it starts. This issue can be caused by a poor network connection with recurring connection losses. |
Stop the app (remove it from the list of recent apps) and restart it. |
SSEAND-973 |
|
Sophos Secure Email stops responding while showing the registration window | In rare cases, Sophos Secure Email for Android stops responding while showing the registration window that is part of the enrollment process. |
Stop the app (remove it from the list of recent apps) and restart it. |
SSEIOS-675 |
|
Users locked out after password reset | In rare cases, users might get locked out of Sophos Secure Email after you reset the Sophos container password. Users can’t open the app to set a new password. |
To resolve the issue, do as follows: |
SSEIOS-674 |
|
Dictation not supported | Because Sophos Secure Email for iOS doesn’t support the voice control system added with iOS 13, the dictation feature isn’t available. |
|
SSEIOS-673 |
|
Mail encryption and signature verification not supported | Sophos Secure Email for iOS doesn’t support email encryption such as S/MIME or PGP. Also, Sophos Secure Email for iOS doesn’t support the verification of digitally signed emails. You can view S/MIME-signed emails, but you can’t verify the signature. You might not be able to view emails at all that are signed with a different certificate, such as PGP. |
|
SSEAND-979 |
|
Mail and Calendar notifications don’t work reliably if date and time aren’t set correctly | Sophos Secure Email for Android uses the Firebase Cloud Messaging notification service. This service only works reliably when you set the date and time on the device correctly. |
We recommend that you use the automatic date and time setting. |
SSEIOS-672 |
|
Push notifications don’t work with HCL mail servers | Sophos Secure Email for iOS doesn’t receive “New email available” notifications when using an HCL Domino or Traveler mail server. |
|
SSEAND-978 |
|
Samsung DeX Pad not supported | Sophos Secure Email for Android doesn’t support the Samsung DeX Pad docking stations or similar devices. The app might stop responding when running in the DeX UI, which the device uses when connected to a DeX Pad docking station. |
|
SSEAND-977 |
|
IPv6 not supported | Currently, Sophos Secure Email for Android only supports the IPv4 protocol and can’t be used with IPv6 networks. |
|
SSEAND-984 |
|
Can’t attach “Original size” photos to emails | When you take a photo and attach it to a new email, you can select the photo’s quality and size. If you select the Original size option, Sophos Secure Email for Android doesn’t send the attached photo. |
Select a lower quality. |
SSEAND-983 |
|
Low-quality photos on some devices | On some devices, photos that you take with Sophos Secure Email for Android and attach to a new email are of low quality. We’ve seen this issue on a Huawei Mate 10 and a Samsung Galaxy Tab A. |
|
SSEAND-981 |
|
You can’t view large PDF attachments | You can’t view PDF attachments that are larger than about 10 MB. |
Open the PDF file in Sophos Secure Workspace. |
SSEAND-982 |
|
No notification alarm on some Samsung tablets | Some Samsung tablets don’t play the configured alarm for calendar event notifications. We’ve seen this issue on a Samsung Galaxy Tab 4 and a Samsung Galaxy Tab A. |
|
SSEAND-980 |
|
Unqualified error if the Exchange server’s SSL certificate isn’t signed by a trusted certificate authority | When Sophos Secure Email for Android registers with an Exchange server whose SSL certificate isn’t signed by a trusted CA, the app shows a general connection error instead of a more specific error that indicates the certificate issue. |
Sophos Secure Workspace
Key | Components | Summary | Description | Workaround |
---|---|---|---|---|
SMENCAND-3462 |
|
Sharing encryption keys not possible | Sharing an encryption key as explained in the online documentation is currently not possible. The option is not available at all. |
Users can share an encrypted file that is secured with the key in question. |
SMENCIOS-3719 |
|
Adding a OneDrive account not possible | Adding a Microsoft OneDrive account to Sophos Secure Workspace for iOS is not possible. |
There is no workaround available. |
SMENCAND-3450 |
|
Wrong status of OneDrive files | Sophos Secure Workspace sometimes shows the OneDrive ID instead of the file name for OneDrive files in Favorites. Also, Sophos Secure Workspace sometimes shows OneDrive files twice after you copied multiple files. |
Open the file’s location in the OneDrive view to refresh the information. |
SMENCIOS-3718 |
|
Sophos Secure Workspace becomes unmanaged after an update | In rare cases, Sophos Secure Workspace managed by Sophos Mobile becomes unmanaged after an update. This is caused by a problem with the iOS mechanism used for managing the app. The managed settings are lost. |
Install the profile again for the device in Sophos Mobile Admin. |
SMENCAND-3449 |
|
Dropbox favorites might have incorrect icon after an update | After an update, Sophos Secure Workspace sometimes shows Dropbox files you added to Favorites with an outline star icon, as if they’re not a favorite. When you tap the icon, you create a duplicate entry in Favorites. |
Remove the duplicate entry by tapping its solid star icon in Favorites. |
SMENCAND-3447 |
|
Can’t share files with some third-party apps | Some third-party apps can’t open Sophos Secure Workspace files because of permission problems. Sophos Secure Workspace grants permissions for displaying the file content, but some third-party apps require universal access and thus can’t open the file. We’ve seen this issue with ASTRO Image Viewer and ES Image Browser. |
|
SMENCAND-3448 |
|
Third-party apps might show out-of-date favorites | When you change a file from the Favorites list in Sophos Secure Workspace and then open it with a third-party app, some apps show an out-of-date version of the file. This issue is caused by the third-party app, which doesn’t notice the change and shows a cached version of the file. We’ve seen this issue with Android Gallery. |
Stop the app and restart it to clear its cache or use a different app. |
SMENCIOS-3717 |
|
Saving file or photo to Secure Workspace does not work | When trying to save a picture or file to Sophos Secure Workspace. the app shortly opens and then automatically closes again. |
|
SMENCAND-3451 |
|
Issue with “Don’t keep activities” developer setting | Suppose you turn on the Don’t keep activities Android developer setting. In that case, Sophos Secure Workspace might close or stop responding while interacting with a cloud storage provider (for example, when signing in). |
As recommended by Google, don’t turn on “Don’t keep activities” during everyday use of the device. |
SMENCAND-3452 |
|
Sophos Secure Workspace forgets some WebDav favorites after an update | After an update, Sophos Secure Workspace forgets favorites from a WebDAV provider if the file name contains special characters or spaces. |
|
SMENCAND-3457 |
|
Some characters displayed incorrectly in office documents | When you view or edit office documents (Word, Slides, or Sheets), Sophos Secure Workspace might display some characters incorrectly. You can view the document without issues in other apps. This issue is caused by a third-party library Sophos Secure Workspace uses. We’ve seen it with specific Samsung and LG devices. |
|
SMENCAND-3456 |
|
Sophos Secure Workspace resets container password if updated before Sophos Mobile Control | Suppose you install Sophos Secure Workspace in the Sophos container. In that case, you must update the Sophos Mobile Control app to version 6.1 before updating Sophos Secure Workspace. If you don’t, Sophos Secure Workspace resets the container password and asks you to set a new one the next time you start the app. |
|
SMENCAND-3453 |
|
File size limits for viewing and editing text files | When viewing unencrypted text files larger than about 3 MB, Sophos Secure Workspace might show the content truncated. Also, you can’t edit unencrypted text files larger than about 50 KB. These limitations are caused by a third-party library Sophos Secure Workspace uses. |
|
SMENCAND-3454 |
|
Animated GIFs don’t work | Sophos Secure Workspace shows animated GIFs as static images without animation. This limitation is caused by a third-party library Sophos Secure Workspace uses. |
|
SMENCAND-3459 |
|
Sophos Secure Workspace on Samsung devices might stop responding when opening large image files | When you open large image files with Sophos Secure Workspace on Samsung Galaxy devices, the app might stop responding. |
Sophos Switch
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NSW-3702 |
|
|
Switch site firmware upgrade from Central fails and swaps the firmware partition | When we schedule a firmware upgrade of multiple switches at the site level from Central, the upgrade to the expected version could fail for some of them, and a firmware partition swap is called instead. For individual switches, the firmware upgrade is working fine. |
You can schedule upgrades for one switch at a time (at the switch level not at the site level). |
|
NSW-3712 |
|
|
Uplink tick is randomly being lost though internet gateway is reachable | The uplink identification intermittently goes away in the local GUI even though the gateway and Internet are reachable from the switch. |
||
NSW-3711 |
|
|
Switch ping response latency is higher compare to XG or XGS | The ping response time from the Sophos switch may show a higher response time that other devices in the network. |
||
NSW-3710 |
|
|
[SSL key Import] By clicking on the Reset button gives 'Unknow Error' instead of ‘Applied the configuration’ | On the local switch GUI, when you click the SSL key import reset button an 'Unknown error' is displayed instead of 'Applicated the configuration.' |
||
NSW-3684 |
|
High latency when pinging switch management interface and other internal networks connected via switch | Problem Statement: High latency when pinging switch management interface. This latency is isolated to management plane and does not impact the user plane where the user traffic is managed. |
|||
NSW-2179 |
|
|
Port management: Central UI uplink port identification is not being updated when the local UI uplink tick is lost or updated with delay | [ Intermittent issue ] When moving an uplink cable from one port to another, sometimes it might take more time for the uplink tick to come, even in the local UI. Under these circumstances, the port status event is sent, but the uplink status moves to 0; after a few seconds, the uplink status changes in the local UI, but, at that time, no events are sent to the Central UI. The faulty status won’t change until the user will update something or a port refresh event will trigger the uplink state refresh on Central UI. |
||
NSW-2178 |
|
|
Any configurations on the switch local UI are not synched with Central | VLANs created in the switch local UI are not synched with Central. Central to switch config sync is allowed, but the reverse sync is not available currently. User common observation: I have three VLANs in my switch, but Central does not show them correctly. |
||
NSW-2436 |
|
|
Switch Firmware (01.2.1091) does not synch LAG into Central | Switch Firmware (01.2.1091) will not synch locally created LAG into Sophos Central configuration. Any locally created LAG interface needs to be de-activated locally and re-created in the Central UI. |
||
NSW-2177 |
|
Cloud UI - Switch alert counter doesn’t go beyond 100 from switch list page. | The Switch alert counter doesn’t show beyond 100 from switch list page. Whenever there unread alert count number increases beyond 100 then UI doesn’t get increment. However alerts continue to generate and get updated in Central alert page. This is just alert counter increment issue but functionality will continue to work.
Switch alerts in summary page is limited to a count of max 50. When there is the 51st alert for a switch, the admin doesn't get notified from the Switch inventory page/Switch details page. The count remains 50. However new alerts ( 51th ) will be displayed on the Central alerts/Dashboard page. If admin acknowledges the previously received alerts then the count will reduce ( New alert no. = 50 - no. of alerts acked ) and new alerts count will increase thereafter. If admin doesn't Ack the alerts and just reads from the dashboard, the alert count on the inventory page will reach the max of 50 and will never show additional alerts. Those alerts are still visible on the Central Dashboard page. |
Whenever unread alert counter reaches to 100, switch list page doesn't show further incoming alert count. In this case admin can view the latest alert from Central dashboard - Alert section and view the latest/all the unread alerts. This section will list alerts beyond hundred count. |
||
NSW-1788 | Switch Registration screen regarding SSL/TLS Decryption | Sophos Switch must be able to reach the following FQDN domains in order to successfully register the switch: sophos.jfrog.io Using SSL/TLS Description will cause the connection to fail due to certificate chain handling, as a result, the decryption must be disabled on appliances between the switch and the internet or the domains added to exclusions on those appliances. Note: Refer additional info added in comment section |
Sophos UTM Manager
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NSU-357 |
|
|
Unable to schedule SUM update past 31/dec/2019 | Unable to schedule SUM updates from the Management > Up2date section past 31/dec/2019. |
Inspect the year select element in your browser and change any year to 2021 in the source. Select that year and click save. |
|
NSU-344 |
|
|
SUM only accepting weak ciphers on ACCD port 4433 which fails the PCI compliance check |
|
For security hardening, UTM's should be accessing the SUM locally or through a VPN only. The SUM access from the direct external network should be blocked. |
|
NSU-343 |
|
|
Filter action pushed with 1000+ URLs is not working | Pushing URL filter list with 1000+ URLs may not work in all cases. On the UTM side they will appear all gibberish and will not apply to web traffic. Note this may not affect every web filter policy over 1000+ URLs. It is possible to have some that are over 1000+ and not have the issue. |
Patch is available through support |
|
NSU-325 |
|
|
Importing web exception with 'Refer to Sandstorm' enabled generates error | When importing a web exception from UTM into SUM that has the "Refer to Sandstorm" options ticked a "Syntactic object verification" error is displayed |
Temporarily disabling the "Refer to Sandstorm" from the exception should allow the exception to be imported |
|
NSU-292 |
|
|
|
IPv4/IPv6 Icons missing for objects deployed by SUM | After activation of IPv6 (on UTM), SUM deployed IPv4/IPv6 Network Objects will have a placeholder icon on Webadmin. |
|
NSU-212 |
|
|
object import fails because the system encountered an internal error | In some cases the object import from a gateway via the Gateway manager fails. "The system encountered an internal error. Please contact your administrator if the issue persists". Those messages appear if a not fully qualified hostname is used, like e.g. Testsystem10. |
use a fully qualified domainname as hostname |
Sophos Web Appliance (SWA)
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NSWA-1718 |
|
|
Cannot download root certificate from the Setup Wizard | In the Setup Wizard, clicking 'Install Root Certificate' does not prompt the admin to download the certificate. |
The certificate can be downloaded after setup by visiting the 'HTTPS Scanning' section in the configuration. |
|
NSWA-1665 |
|
|
Full web control client fails to load policy | SEC management endpoints using full web control with the web appliance failing to pull policy correctly and do not apply the policy any more On endpoint it keeps trying to register with the swa Issue occurs when policies have rules for special hours but no default special hours enabled. The policies should show a yellow ! mark on them saying they are not in use. To resolve the issue just remove the special hour rules from additional polices, or enable the default special hours again. |
||
NSWA-1356 |
|
|
CIDR exclusions not honored in HTTPS-Scanning exceptions | With HTTPS-Scanning active, HTTPS-Scanning exclusings in CIDR-Notation will only be honored if the HTTPS-Request is via IP and not via FQDN. Example. 10.1.2.0/8 is exluded Site server.internal.domain resolves to 10.1.2.3 Accessing the server via it's IP of 10.1.2.3 will be excluded from HTTPS-Scanning Accessing the server via it's fqdn of server.internal.domain will have the traffic scanned |
||
NSWA-992 |
|
|
Reports do not show graphs for the first hour after midnight. Graphical reports will not show values between 12AM and 1AM. | Reports do not show graphs for the first hour after midnight. Graphical reports will not show values between 12AM and 1AM. |
||
NSWA-1034 |
|
need to whitelist talk.google.com from HTTPS scanning | Users who want to be able to communicate using the stand-alone version of Google Talk, you must add both talk.google.com and www.google.com to the HTTPS scanning exemption list. |
|||
NSWA-1028 |
|
|
AIM and HTTPS Scanning | Users will not be able to access AOL Instant Messenger (AIM) if you have HTTPS scanning or certificate validation enabled. The workaround for this problem is to either set the site as globally allowed or add the AOL Instant Messaging server(s) to your Configuration > Group Policy > Local Site List and set the Risk Level to Trusted. Also, you must either turn Certificate Validation Off, or add that server's certificate authority by entering the AOL Instant Messenger server's Site address and clicking Get Certificate in the Add certificate from a web site section of the Configuration > Global Policy > Certificate Validation page. As the URL and IP address(es) of the AOL Instant Messaging server(s) may differ depending on your geographical region, and may change over time, you must discover this information by disabling HTTPS Scanning and Certificate Validation, and then having one of your users access this service (use AOL Instant Messaging). You can then check the Search > Recent Activity Search > By User for that user to find the AOL Instant Messaging server's URL(s) and IP address(es). |
||
NSWA-1064 | When AD Detect is looking for the AD domain, only the primary DNS is used | When the DNS servers in the* Configuration > Network > Network Interface* page are specified manually, only the first DNS server is used to lookup the Active Directory domain when you run Verify Settings in the Configuration > System > Active Directory page. The first DNS server configured in the Configuration > Network > Network Interface page must be able to resolve the Active Directory domain. |
||||
NSWA-1262 |
|
|
CIDR in LSL is not properly evaluated | Currently if one assigns a Tag to a non-/32 IP, the policy will not pick up the Tag and follow the additional policy set. Workaround: Assign the tag "MasterCIDR" to IP-Address 0.0.0.0/32 Add an additional policy that grants access to the tag MasterCIDR and place it at the end of the Policy. |
||
NSWA-1122 |
|
Local Site List entries disappearing without aparent reason | When modifying the Local Site List in two or more TABs/Windows, it is possible to overwrite the changes made in the first session by a second session. |
To avoid this, verify that only one active Session is managing the Local-Site-List |
||
NSWA-996 |
|
|
Create Auth Bypass rule for CRL in Portal Certificates | When using a portal certificate, Safari on Mac will attempt to connect to the certificate revocation list (CRL) URL before displaying the portal. Because authentication is not complete, the URL is blocked by the appliance, and the portal is not displayed. To resolve this: |
||
NSWA-1084 | Alert messages to Sophos are not sent when email is hosted externally | Alert messages are not sent from the appliance to Sophos Support if your email is hosted externally, such as by an ISP, and SMTP authentication with that mail server is required. |
||||
NSWA-1082 | Notification Page on IE | The notification page for HTTPS blocked pages are always displayed in English on Internet Explorer 7 despite any localization setting. |
||||
NSWA-1080 | Firefox develops a memory leak when displaying the Web Appliance Administrator web interface. | Firefox develops a memory leak when displaying the Web Appliance Administrator web interface. |
||||
NSWA-1078 | Active Directory page doesn't work with credentials with utf8 characters | If the administrator's Username entered in the Configuration > System > Active Directory page contains UTF8 characters, the username will not be saved properly and it will cause "Invalid Credentials" errors on subsequent logins. To prevent such errors ensure that the administrator username you select does not contain any UTF8 characters. |
||||
NSWA-1076 | Known limitation with Autodesk | In order to use certain Autodesk applications, such as Land Desktop, AutoCAD Map, Raster Design, Survey, Viz, Architectural Desktop, Revit, and Civil 3d, autodesk.com must be added to the Local Classifications as a trusted site. |
||||
NSWA-1074 | when downloading a malware in one window, firefox does not display company logo/message on another window for eicar.com | If the Web Appliance attempts to display notification pages in more than two tabs of Internet Explorer, only the first two notification pages will display. This is a deliberate Internet Explorer limitation—only two connections are allowed per server—, documented in http://support.microsoft.com/kb/282402, which therefore cannot be addressed by the Web Appliance. |
||||
NSWA-1072 | "SPN" formatted username not supported | Service Principal Name (SPN) formatted usernames (for example, user@domain) are not supported when applying policy to a user. Usernames must be in the Down-Level Logon Name format (for example, DOMAIN\username). |
||||
NSWA-1070 | HTTPS does not work if ISA Server is used as upstream proxy | If an ISA Server is used as upstream proxy of a Web Appliance, you will be unable to:
|
||||
NSWA-1068 | Explain why the patience page always displays in English when ftp-over-http in IE6 and IE7 | The patience page that is displayed when using FTP-over-HTTP in Internet Explorer is always in English as Internet Explorer does not include the “Accept-Language” attribute-value pair in the HTTP request. (For an explanation, see the FTP-over-HTTP glossary entry.) |
||||
NSWA-1066 | WS1000 does not display blocked pages when elements of a website come from blocked sources | Occasionally, web pages from an allowed site will contain images or other resources that are linked in from blocked sites. These content resources will be blocked, which may leave the resulting page looking broken. This is the expected behavior and can only be changed by either allowing the content from the blocked site or blocking the allowed site that contains the blocked resources. |
||||
NSWA-1062 | Unable to signin to Yahoo! instant! messenger! when certificate validation enabled | Access to Yahoo! Messenger is disabled when certificate validation is turned on. To enable access to Yahoo! Messenger, Certificate Validation must be turned Off in the Configuration > Global Policy > Certificate Validation page. Alternatively, Certificate Validation can be turned On, but you must add the certificate used by Yahoo! Messenger in the Configuration > Global Policy > Certificate Validation page. Yahoo! Messenger uses multiple servers, but each of these use the same certificate, so you can get this certificate from any of the following servers: 216.155.194.149, 98.136.113.168, or 98.136.113.173. |
||||
NSWA-1060 | FTP over HTTP limitations with IE | A limitation in Internet Explorer prevents usernames of the forms DOMAIN\username, domain.tld\username or username@domain.tld from working with FTP sites that require authentication. Instead, only the simple username should be used for FTP sites. If it is necessary to use one of the three listed forms, you should use the Firefox browser instead. For more information, see the associated Microsoft knowledgebase article. |
||||
NSWA-1058 | eDirectory Authentication | When the Sophos Web Appliance uses eDirectory to identify users, the following issues may occur:
|
||||
NSWA-1056 | In transparent mode, with AD auth on, credentials are not taken if first transaction is https | When an appliance configured in transparent mode and with HTTPS scanning enabled reboots, users who have their default page set to an HTTPS site will not be properly authenticated to Active Directory. To avoid this, users can configure their default homepage as an HTTP site rather than an HTTPS site. |
||||
NSWA-1054 | Reports with missing hour | Reports do not show graphs for the first hour after midnight. Graphical reports will not show values between 12AM and 1AM. |
||||
NSWA-1052 | Google chat is not working with IE if IE is not configured to use HTTP 1.1 through proxy connection | Various software, including Quicktime and Yahoo Messenger, may require HTTP 1.1 through proxy connections. To enable this for Internet Explorer: |
||||
NSWA-1050 | Blocking of internal sites | To block access to internal sites (ones that your internal DNS will resolve to an internal domain), you will need to create multiple entries in the local classifications for each applicable FQDN. If you do not do this, users will be able to bypass filtering by entering the unqualified internal hostname. For example, for a server on your network called testbox that is available on two domains, you would need to add testbox.domain1.com, testbox.domain2.com and testbox to the Local Classifications. |
||||
NSWA-1048 | Web Appliance Webinterface may slow down when activating the Remote Assitance | The Web Appliance web interface can slow down or freeze when enabling Remote Assistance. Once the request succeeds or times out it will return to normal. Proxy usage is not affected. |
||||
NSWA-1046 | Firefox and NTLM authentication | Various sites generate occasional credential pop-ups when using Firefox with NTLM authentication turned on, and configured to Authenticate all requests. |
||||
NSWA-1044 | Reports may hang if appliance under heavy load | While the appliance is under heavy load, the Blocked Sites and various Users reports may take up to a minute to generate. |
||||
NSWA-1042 | local Windows Update Servers should be trusted | If you have an internal Windows update server, add its hostname as a trusted site to the appliance local classifications to ensure that there are no interruptions in your local Windows update service. Automatic Windows Updates via Microsoft's sites are unaffected. |
||||
NSWA-1040 |
|
ISA 2000 issues with upstream proxy | There can be a performance problem when using the ISA 2000 with an upstream proxy, such as the Web Appliance. For the solution, see http://support.microsoft.com/kb/317822/en-us. |
|||
NSWA-1038 |
|
User is asked for credentials when trying to open stream media | Users may be prompted to login when trying to open stream media with Windows Media Player 9. This issue is related to two Microsoft knowledge base issues: |
|||
NSWA-1036 |
|
MS Office Activation on Vista will not work with NTLM when not joined to the correct Domain | Users that are not connected to the same Active Directory domain to which the Web Appliance is connected will experience problems using applications (such as Microsoft Office Activation) that do not prompt for credentials. These applications will fail to connect to the internet through the proxy because they do not automatically provide the correct domain user credentials for the domain used by the Web Appliance, nor do they prompt (like a browser would) for the user to enter their correct name and password. Either have these clients connect to the proper Active Directory domain or add the IP address of the problem system to the Allow unauthenticated browsing for the following IP addresses list in the Configuration > System > Active Directory page. |
|||
NSWA-1032 |
|
|
WS1000 KI to mention the importance of MS08-024 for IE | In Internet Explorer, some websites or pop-ups may not display properly and the user may receive "Web page cannot be displayed" or "Object expected" error messages. This is a known Internet Explorer issue, and is due to an Internet Explorer update not getting installed. To remedy this issue, please ensure that you have installed cumulative security update MS08-024. For more information, see Microsoft KB947864. |
||
NSWA-1030 |
|
|
Real Player | When a RealPlayer client is operating behind a strict firewall, you must configure RealPlayer to use the "HTTP Only" option to connect to the Internet, even though this option tends to deliver a more intermittent playback than other options. Alternatively, you can open port 554 on your firewall. |
||
NSWA-1026 |
|
|
Need to document workaround to access ESx000 UI w/ certificate validation turned on | Enabling certificate validation blocks access to Sophos Email Appliances that are using self-signed certificates. To enable access to Sophos Email Appliances, add them to the HTTPS scanning exemption list in the Configuration > Global Policy > HTTPS Scanning page. |
||
NSWA-1024 |
|
|
Saving settings on Network Interface page produces 'Problem Saving Settings' message when proxying through WSA | If you are proxying through the Web Appliance to access the Web Appliance's Administrator web interface, saving settings in the Configuration > Network > Network Interface page may cause an erroneous "Problem Saving Settings" message to be displayed in the status bar at the bottom of the page. To avoid this and other subsequent problems, it is strongly advised that you access the Administration Web Interface through a direct, non-proxied, connection. |
||
NSWA-1022 |
|
|
Improve documentation on why we are blocking range requests | HTTP range requests, or partial-content requests, are used by download accelerators and for large PDF files to download partial "ranges" of a file. These are only allowed by the Web Appliance for trusted sites. This is by design. Partial files cannot be scanned for viruses or other malware, so allowing HTTP range requests only makes sense for completely trusted sites. |
||
NSWA-1020 |
|
|
Some languages / fonts not supported in exported report PDFs | The Web Appliance's PDF generation library does not support all character sets, so Active Directory user names that use unsupported character sets do not render correctly. |
||
NSWA-1018 |
|
|
SMA bypass does not work when joining with hostname but accessing by IP | If a Web Appliance is joined to a Management Appliance by entering the Management Appliance's fully qualified domain name into the Hostname text box in the Configuration > System > Central Management page, but an administrator subsequently accesses the Management Appliance's Administration Web Interface by using the Management Appliance's IP address while proxying through the Web Appliance, the usual policy bypassing applied to that access is ignored as the IP address will not be recognized as being the Management Appliance. |
||
NSWA-1016 |
|
ICQ's default connection settings won't work with the proxy | By default, the instant messaging application, ICQ, connects to login.icq.com through port 5190, which will not work with the Web Appliance. To be able to connect, ICQ must be reconfigured to use port 80 for this connection. |
|||
NSWA-1014 |
|
|
Local Site List entry with unused tag should notify the admin | Currently, you can add a Local Site List entry with an unused tag which can take precedence over a Local Site List entry with a used tag, potentially disabling the used tag. To prevent this, always ensure that all added tags have actions configured in the* Configuration > Group Policy > Additional Policies* wizard. |
||
NSWA-1012 |
|
Bridged/transparent setting cause Cisco switch to shut down its port | If you change a Web Appliance from explicit to either bridged or transparent mode, it causes interoperability issues with the spanning-tree calculations of Cisco switches. This can be overcome by running spanning-tree bpduguard disable for the appropriate port on the Cisco switch. |
|||
NSWA-1010 |
|
|
Issues with Adobe Flash Player | By default, the Adobe Flash player uses port 1935 to receive streamed content. The Sophos Web Appliance does not block this traffic (unless you have configured your policy to block Adobe Flash video), but it is common for firewalls to block traffic through this port. If you find that you are unable to view Flash videos in your network, and you have not explicitly blocked access to Adobe Flash video in your policy, open port 1935 access on your firewall. Other solutions are available, but are beyond the scope of the Sophos Web Appliance documentation; however, you can examine the options discussed in this Adobe article: http://www.adobe.com/devnet/flashcom/articles/firewalls_proxy02.html. |
||
NSWA-1008 |
|
|
Router requires WCCP restart when "mismatched forwarding method" case encountered | When a proxy with an incompatible forwarding method attempts to join a Web Cache Communication Protocol (WCCP) service group, the Cisco router correctly detects that an unusable proxy has joined, but it does not update the router's record. To correct this, you must disable WCCP on the router, and then re-enable it, clearing the list of known routers. |
||
NSWA-1006 |
|
|
Docs: Dashboard unique users could be double counted in load balancing mode | In load-balancing mode, some unique users may be double-counted on the Management Appliance dashboard when one of the load-balanced appliances becomes temporarily unavailable. |
||
NSWA-1004 |
|
Endpoint can't re-register with a SWA it has previously registered to | If an endpoint registers with a Sophos Web Appliance (SWA) or Sophos Management Appliance (SMA), then registers with a second, different SWA or SMA, it will then be unable to re-register with the first SWA or SMA. |
|||
NSWA-1002 |
|
|
Endpoint to Sophos Web Appliance (SWA) communication does not work with non-SWA proxies that use ActiveDirectory authentication. | Endpoint to Sophos Web Appliance (SWA) communication does not work with non-SWA proxies that use ActiveDirectory authentication. |
||
NSWA-998 |
|
|
Manually Backup Download fails in IE8 | Manually downloading a backup using Internet Explorer (IE) may fail. This can be caused by certain combinations of settings. The description of the issue and its resolution for IE v9 can be found in this Microsoft support article, while the description and resolution for earlier versions of IE can be found in this Miscrosoft support article. |
UTM
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NCL-1769 |
|
Unable to download Sophos Network Agent for Android from the Google Play store | An issue was found where the existing version of the Sophos Network Agent is using an older version of the Google API’s. This prevents the Sophos Network Agent from being downloadable for devices running the latest version of the Android OS. The Sophos Network Agent will continue to function on devices running the older version of Android OS. |
|||
NUTM-14092 |
|
|
|
High CPU usage by rrdtool due to DST | Situation: High CPU usage by rrdtool |
Switch timezone to “Etc / UTC” and restart the system |
NUTM-14054 |
|
|
|
PAYG License Expires When IMDSv2 is Enabled | When enabling IMDSv2 on a ‘Pay as you Go’ UTM instance the license checker fails and the instance has no license. When logging in to the instance users will see a page asking for license file and are unable to proceed. No temporary or valid license can get passed this page. Features on the UTM will be disabled as well. Work around is to switch the instance back to IMDSv1. This will be fixed in version 9.715 |
|
NUTM-13616 |
|
|
Roaming between APX and AP models is not supported | Roaming between APX and AP models is not supported Legacy AP to APX and vice versa roaming won’t work as its not supported due to different driver constraint. |
||
NUTM-13534 |
|
|
Throughput when doing speed tests while using web proxy | When using services that test network speed for individual devices, results may indicate lower than expected bandwidth when web filtering is enabled. This is generally due to the way that traffic is received, scanned, and forwarded by the UTM’s web proxy and the need to ensure that resources consumed by a single connection does not impact resources available for other traffic on the network. It does not represent an overall limit on the bandwidth that can be handled by the firewall – under normal use conditions, the UTM handles multiple parallel connections from different endpoint devices which allows parallelization of processing and allows the full bandwidth of the network connection to be used. |
||
NUTM-13194 |
|
SPX portal 404 NO SUCH USER after upgrading to 9.708 | The SPX portal throws a 404 when users clicks on the register link in the registration email. Please contact support to get a prefix. |
Select an SPX template with the sender set password. This will require the sender to add [secure: Note: If the Outlook encrypt add-in is used, users will still need to mark the email with that tool to encrypt. Users without outlook client will need to add the header X-Sophos-SPX-Encrypt: yes to the email before sending. |
||
NUTM-5222 |
|
missing account link/binding in pop3 database | The pop3 mailaccount bindings will not store correctly to the database if no prefetch server is configured. As a side effect, a user will not be able to release items from the quarantine if no prefect server is specified. |
|||
NUTM-4996 |
|
|
Webpages with Encoded Slashes Not Allowed | Non-standard Webpages Not loading With WAF . If there any encoded slashes in the URL responsible for Loading the Web pages those URL would not load and are replied with 404 by WAF although the resource exists on the backend server . The signs for identifying such an URI is it contains slashes in encoded format (%2F) The Apache directive AllowEncodedSlashes is set to No by default for security reasons. This means Apache will reply with a 404 to every request containing encoded slashes. Setting the parameter to NoDecode is not an option since that setting is not compatible with mod_proxy since it would result in double encoding . The reason why the endcoded slashes are not allowed is that you can access locations that were otherwise restricted. E.g. if you have a location configured for /something on example.com and you access example.com/something%2F..%2Fadmin, you can reach a location that might have no site path configured in WAF. This is for setting AllowEncodedSlashes to yes. More information would be at https://httpd.apache.org/docs/2.4/mod/core.html#allowencodedslashes |
||
NUTM-5043 |
|
Recipient verification not working with Microsoft Global Catalog (LDAP over SSL using port 3269). | Recipient Verification is set to verify recipients in Active Directory and messages to non-existant recipients are not rejected as expected. |
After you confirm that recipient callout works with port 3268 and without SSL you could try the following: In WebAdmin create a "New network definition" in Definitions & Users >> Network Definitions >> Network Definitions tab. Set its type to "DNS Host" and enter the DNS hostname for the Active Directory server. After we click on the Save button we can use this definition with the Authentication Server in Definitions & Users >> Authentication Services >> Server tab. |
||
NUTM-6650 |
|
|
SQL_INJECTION Critical warned instead of blocked | Webserver protection is only warning on SQL injection instead of blocking. reverseproxy logs will show ModSecurity: Warning message and does not block the connection This was caused because the following where added to the skip filer rules list These rules are need to decide if the SQL inject should be blocked, because they are not done the SQL inject is not blocked. |
||
NUTM-8000 |
|
Failed node's quarantined e-mails can't be released | On UTM quarantine directories are sycned across all nodes. Any e-mail quarantined on a node is synced to the node directory across all nodes - this is valid also for "RESERVED" nodes. Directory structure: Spool directory: E-mails on HA systems are by design not automatically syned if there is a failover. To retrieve e-mails of a failed node the administrator has to copy the e-mails manually. Copy e-mails from the failed to the current node (ID): After this restart the SMTP: |
|||
NUTM-8001 |
|
SMTP 'cannot parse spamd' error allowing spam | The logs show the following error message This issue is being cause because the spam lookup module is failing to connect to the lookup servers |
|||
NUTM-9276 |
|
E-Mail Quarantine behaviour | Is it expected behaviour that the retry time includes the time a mail was in quarantine If a mail was moved to quarantine and was released later the mail server rejects the mail with a temp error 421. |
|||
NUTM-9457 |
|
SPX attachments with # in file name | When an email is sent with an attachment and that attachment has space then # sign the SPF truncates the name of the attachment in the encrypted pdf. The attachment cannot be opened example file name In the pdf it will say 'Test' you cannot open or save the attachment from the pdf when this happens PDF meta XML parsing of "#" character after space is not supported by pdf utility used for SPX |
|||
NUTM-9453 |
|
Non-ASCII Character : Bypass valid SPF Record | Domain which have a valid SPF Record could bypass the SPF checking if you send a non-ascii character in the HELO string. Example : If there is a domain test.com with SPF Record v=spf1 mx a ip4:X.X.X.X -all when you try to telnet into the server and try sending a non-ascii character in the helo string the SPF check fails .
Reason : When EHLO/HELO is missing or rejected by exim, the spf check will fail due to missing EHLO/HELO. Workaround : Enable Reject invalid HELO/ missing RDNS |
|||
NUTM-10388 |
|
|
|
What is Max_processes Max | Question: What is the max_processes max setting for the WAF service ? There is no max value for this setting. The limiting factor will be how much memory is available, which then depends on how many features are being used on the UTM. Suggestion is to increase the max_processes value slowly, making sure there's enough memory on the SG to handle it. |
|
NUTM-11151 |
|
UTM not decrypting S/MIME messages from Gmail | UTM is expecting an encrypted signed message. It reverts it by decrypting the message first then verifies the signature. |
|||
NUTM-12382 |
|
|
WAF Content-Encoding disabled with common threat filtering enabled | WAF compression not working with "Common Threat Filter" enabled If Client requests encoding like gzip WAF will not send back this encode content if "Common Threat Filter" is enabled. |
Disable command threat filter |
|
NUTM-12608 |
|
Supported S/MIME versions | Which S/MIME versions do we support in UTM? Sophos UTM supports the following S/MIME versions: |
Using the command line, you can define which S/MIME version Sophos UTM uses: smime: Sophos UTM handles S/MIME version 2 (default) |
||
NUTM-13328 |
|
|
VLAN limitations based on chipsets on network modules | The number of VLANs supported per interface is dictated by the Ethernet Controller used by the NIC. 82599ES based ethernet controllers support up to 64 VLANs. The aforementioned Ethernet Controllers are used by the following NICs: Other modules may support more or less VLANs. An indication that the threshold is being crossed is the existence of the following log in dmesg (or kernel.log on UTM): i40e 0000:04:00.0: Error I40E_AQ_RC_ENOSPC, forcing overflow promiscuous on PF If the log above is being seen, lower the amount of VLANs per interface and spread them across multiple interfaces until the logs are no longer generated – this should improve performance. |
||
NCL-1394 |
|
|
CAA takes 2-3 minutes to login user on MAC when it comes back from Sleep | Issue description : When MAC books comes up from the Sleep mode its takes 2-3 minutes for the user to be able to browse the internet . This happens only incase we have a User based firewall rule . It takes CAA around 2-3 minutes to authenticate the user . Workaround : The user can disconnect and reconnect the client . |
Disconnect the CAA , Reconnect |
|
NCL-1392 |
|
Do we support Secure LDAP port 636 in STAS for Novell eDirectory configuration ? | *Question:* Do we support Secure LDAP port 636 in the Novel eDirectory configuration of STAS? Answer: Secure LDAP port 636 is not supported in the Novel eDirectory configuration of STAS. |
|||
NCL-1309 |
|
|
STAS Users are getting disconnected frequently if dead entry timeout configured other than zero. | STAS Users are getting disconnected frequently if dead entry timeout configured other than zero. Dead Entry Timeout does not work and it MUST be set to zero. If the value for the dead entry timeout is configured anything other than zero then such behavior encountered and users may get disconnected randomly. |
Need to set the dead entry timeout to zero to avoid user disconnection due to dead entry timeout. It is recommended to use the WMI mechanism in STAS for log-off detection. |
|
NUTM-12689 |
|
|
RDweb Apps via HTML5 VPN portal not working | The HTML5VPN portal offers RDP connections and HTTP / HTTPS connections. Acessing RDP systems via an HTML5VPN HTTPS connections is not supported and there is no plan to support this in the future. To use RDP use an RDP connection from the HTML5VPN portal. |
None |
|
NUTM-12630 |
|
|
IPv6 link local address disappear | In IPv6, the local link address is created and assigned to an interface by Linux system when the interface is brought up. The interface will lose its link local address if it is brought down This issue will occur in the following scenario: Work-around for this issue |
||
NUTM-12469 |
|
|
|
HTML 5 VPN Black box over cursor with Windows 10 | When using the HTML5 VPN portal to RDP into a Windows 10 machines the cursor some times shows as a black box. Attempted to change the cursor on the RDP machine same issues (but different box shape) |
N/A |
NUTM-12432 |
|
|
Not possible to use 2 IPsec Remote Profiles with PSK and XAUTH | It is not possible to use 2 or more IPsec Remote Profiles with PSK and XAUTH enabled at the same time. |
Use only one profile with PSK and the other profiles with certificates |
|
NUTM-12332 |
|
|
RED site-to-site tunnels reconnecting at random intervals (utm to SG/XG) | A change in the RED-Client in UTM Firmware version 9.7 MR4 (9.704) leds to UTM site-to-site tunnels to disconnect and reconnect in random intervals. |
||
NUTM-12187 |
|
|
|
[HTML5 VPN] HTTPS connection type doesn't work | The HTTPS part of the HTML 5 portal only support TLS 1.0 It is recommended to use WAF instead of HTML5 VPN as it has better support and a more granular control. |
|
NUTM-11856 | Sophos Connect: Cannot authenticate user with german umlauts | Sophos Connect for the time being only supports Ascii characters, no umlauts or UTF-8 or UTF-16. |
||||
NUTM-11670 |
|
Allow arp broadcasts option | Allow ARP broadcasts explained ARP is a broadcast protocol which means every machine in the broadcast range needs to receive the ARP in order to communicate which each other. This option does not apply to all ARP requests as it does not apply to the Ethernet targeted MAC address. All ARP requests will have Ethernet target MAC address as broadcast address. This option only applies to certain ARP requests, which have the ARP target address set to broadcast address. This is not the same as the Ethernet target MAC address. Here is an example of the Frame this applies too. Bold is what the UTM will check. Ethernet II, Src: Sophos_10:0e:00 (00:1a:8c:10:0e:00), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Address Resolution Protocol (request) |
|||
NUTM-11638 |
|
|
Possible RED 50 issue after 9.605 | An issue has been identified which affects RED 50 devices in UTM 9.600 onwards. The UTM 9.600 onwards introduced an issue which, in some cases, might cause RED 50 devices to disconnect and NOT connect back. This has resulted in the devices becoming unusable or ‘bricking’. There is a possible issue with bad block handling and the flash developing a more significant amount of bad blocks that is causing the issue . If you are affected by this please open a support ticket. |
||
NUTM-11285 |
|
|
|
GES Question : Queen interface Alias IP to Workers | UTM on AWS the Queen interface syncs Alias IP to Workers . Currently, adding or deleting Alias IP objects on Queen would reflect on the Workers as Queen as the controller node, Updates on Alias IP objects would not be reflected on Workers due to the filter mechanism designed . Workaround : If the customer wants to use alias ips on their worker nodes, they can do the following for each alias ip: 1. Create alias ip object and select which interface it's aliasing to. 2. After the alias ip has appeared on each Worker's node, change its attributes through Worker's UI. 3. Verify that the changes to alias ip should stay at Worker all the time until the Queen decides to delete it. Also, use Queen to toggle on/off the alias ip's status. |
|
NUTM-11315 |
|
|
Duplicate DHCP Static IP entries allowed | UTM will allow multiple host objects to have the same IP address. This means multiple MAC addresses can be assigned to the same IP and there will be no error or warning message that his has been done. The DHCP service will only give the IP out to the first machine to grab the IP address. All other machines will get an APIPA address (169.254.0.0/16) |
||
NUTM-11045 |
|
|
GES Question: conntrackd synchronization | After a firmware update or an ha-takeover from an Active-Passive HA System, it can happen that the conntrack synchronization is interrupted. |
||
NUTM-11359 |
|
|
Routing table for LAG is getting removed after disable the HA active-passive | Routing table for LAG interface is removed if HA is disabled. This happens if HA is being disabled and there are VLAN interfaces on top of the LAG interface. |
Reboot the system. |
|
NUTM-9722 |
|
|
SG430 / SG 450 with interface issues in a specific combination | Affected models:- Issue condition:- None of the Ethernet Interfaces could be visible in ifconfig Error Message:- PCI Vendor and Device IDs do not match! Technical Root Cause:- 8x1 Coppler Module PCI-E root from CPU has detected and configured LAN chip of i350AM4 but failed to be configured with upstream/downstream PCI-E port. Issues will happen only using 8x1G copper module in Slot A with 4x10G Fiber module in Slot C:- Temporary Solution:- Just reboot the device will detect the interface again and working normal. Permanent Solution:- SG afftected models must be upgraded to latest official BIOS version. Affected Bios Version SG 430 - R1.04 (11092015) or any lower version SG 450 - R1.03 (11092015) or any lower version |
||
NUTM-4405 |
|
|
Webadmin not reachable with IE11 when md5 signed certificate is used since change from NUTM-3311 | TLS 1.0 had been disabled in 9.402. |
The issue can be avoided by using a certificate signed with SHA256. A appropriate certificate can be created using the Webadmin: If the Webadmin CA also uses MD5 the CA needs to be re-generated too. |
|
NUTM-10897 |
|
|
|
Temporary network interruptions with certain network settings | There can be a temporary disruption of network connectivity under one of the following conditions: 1. dns_group is configured with a specific interface instead of "Any" |
Work-Around |
NUTM-11082 |
|
|
GUI live log limitation in regards of NAT rules | The UI shows an "alert" in the live log for NAT rules when the NAT rule is above 1000. The code that writes the packetfilter log assumes that NAT rule IDs are in between 62000 and 63000 (within 1000 range). By default they start with 62001 and keep incrementing. If the code sees a rule with an ID above 63000 it labels it with "IPTables" and the word "alert". |
||
NUTM-11117 |
|
|
|
OSPF continuously restarts when IPv6 enabled | OSPF restarted continuously when the IPv6 is enabled . *Root Cause Analysis Workaround : Add an IPv6 range to the Pool network in the Remote Access/SSL/Virtual IP Pool |
|
NUTM-5348 |
|
|
WAN interface stops forwarding traffic on VM appliance | Engineering does not recommend customers to use the e1000 driver, which has not been maintained for a number of years. In general, our recommendation is for customers the use the VMX driver instead. If customers have to use the e1000 driver, they should make sure it's updated to the latest version. |
||
NUTM-10685 |
|
|
Available pattern updates appear to not be updating | If UTM is only using some of the features then the lastest availible pattern version and the actual pattern version might differ. This can happen when the newer pattern is including changes for an unused feature.
This is by design and cannot be changed. |
||
NUTM-10647 |
|
|
SG550/650 refresh, SG750: 4x10G module port numbering reversed | SG 550 / 650 have the port numbers reversed when using the 4x10G module - compared to what is printed on the module. There is no issue with other modules. |
||
NUTM-10320 |
|
|
Time is appearing wrong in UTM hosted | Time is appearing wrong in logs. Issue is observed when admin changes the timezone on UTM Web GUI. This issue is caused by each running process is spawned off with the current TimeZone (TZ) and this TZ is used for setting the time in the log message. Changing the TZ on UTM Web GUI does not force this TZ change in all current processes in the system. Hence all the logging from current running system will have old time. |
Reboot the system |
|
NUTM-10586 |
|
|
Webadmin access through IPsec Tunnel with NAT does not work | It is not possible to use NAT on top of SSL on top of IPsec tunnel on the same UTM. |
|
|
NUTM-10544 |
|
|
AWS UTM experiencing connectivity issues after restoring a backup from a different AWS instance type | When restoring a backup from a UTM in AWS utilizing one instance type (e.g c3.large) to another AWS UTM utilizing a different instance type (e.g c4.large) the resultant UTM may be inaccessible or have limited network connectivity. |
1) Ensure that the new UTM instance has at least two NICs added. |
|
NUTM-10387 |
|
Support USB modems Verizon USB 760 Verizon Pantech Verizon Mifi7730L | Are the following modems supported:
|
|||
NUTM-10386 |
|
|
STAS on UTM questions | Common questions regarding STAS on Sophos UTM 9.510 1. Does the UTM make queries to STAS when it see traffic that is not authenticated? UTM does not make queries for unauthenticated traffic, this is only available in SFOS 2. With logoff detection disabled will STAS record the log off events from the Windows event logs and update the UTM? STAS only handles the login events from the Windows event system and updates the UTM, logoff detection is the only way users are removed from the liveuser list 3. How do users get removed from the collector database in stas? Users can only be removed by manually deleting them, logoff detection, or login event for the same IP arrives will replace the old IP. |
||
NUTM-10488 |
|
Key Reuse Vulnerability - not affected | Sophos UTM is not affected by IPSec IKE Key Reuse vulnerability |
|||
NUTM-10487 |
|
|
SFP Modules in 10 Gbit SFP+ Flexiport | With 10 Gbit SFP+ Flexiport Modules only the 2x10 Port module supports 1 Gbit SFP Modules |
||
NUTM-10292 |
|
|
Connection issues caused by ARP flux | ARP flux is sometimes an issue when there is a bridge interface in UTM. ARP flux can be identified when followings are present: Solution to this is to change the default arp_filter from 0 to 1 Notes |
||
NUTML-12003 |
|
|
Pinging the SSL client gateway IP address from the server side fails. | In a SSL site-to-site setup ping packets from the server site to the remote network gateway address don't work. If you try the same thing from the client side, everything works without any problem. |
Ping will work if you use the command with source ip address: ping -I "source ip address" "destination ip address" |
|
NUTM-10007 |
|
Random slow down of the SG430/SG450 with busy disk and less disk I/O | a small percentage of SG and XG 430/450 Rev.1 appliances not being accessible anymore except via serial. This is caused by a SSD software/firmware issue. The serial console output shows the errors:
This issue is based on problems with the Solid State Disk (SSD) firmware. If you have an SG or XG 430/450 Rev.1 that is experiencing issues like those shown above, please contact Sophos Support for further instructions. If possible go ahead and make a backup with one of the KBA's mentioned below:
|
|||
NUTM-4903 |
|
|
Route sometimes missing after UTM migration within a XEN server pool | In rare cases some static routes don't get set after a UTM gets migrated from one XEN host to an other. |
To restore the routes you need to disable and re-enable the link used by the route or the missing route itself. |
|
NUTM-5138 |
|
|
Authentication exceptions don't work when matching by category | Web Protection exceptions that skip Authentication do not work correctly if they match by category. If matching by URL they work as expected. The system first checks for exceptions based on source and destination IP, and then if applicable, it authenticates the request. Only authenticated requests will be checked for tags or for categories. |
Create Authentication exceptions that match by URL, domain, source or destination instead of by category. |
|
NUTM-5593 |
|
|
Policy tester shows incorrect result in special case | The Web Protection policy tester displays an incorrect result in the following case:
The policy tester will show the URL is allowed, but if a client actually tries to browse directly to it, they will be blocked. The client is blocked because when browsing to that URL, the browser first tries to open up a SSL CONNECT tunnel to www.youtube.com, which is blocked. The client doesn't actually get the chance to request the actual URL. This occurs regardless of whether Decrypt & Scan is enabled. |
||
NUTM-5829 |
|
|
Use of strict policy in combination with respond only mode | When a connection attempt comes in pluto tries to find a connection for it with the information that is available at the time. Usually that is the remote gateway's IP address. In the respond only case (and also for remote access) that IP address is not configured, so there's little chance that pluto picks the right connection to start with. It is only the correct connection if it is the first one that matches in the linked list of connections. The order of the list changes as pluto moves entries that are used to the front, so lookups are faster for active connections. So, there's no way to guarantee one particular connection is preferred over another one. Pluto picks a "random" connection and proceeds the negotiation. If it picks one with a strict policy and the remote peer is not matching that policy, then the connection is declined because of strict. Later in the negotiation, when the certificates and thus the identity of the remote peer is known, pluto would switch to the correct connection. But the strict policy prevents that, stopping the negotiation before the identity is revealed. |
||
NUTM-6919 |
|
|
Web Proxy signs certificate with search domain appended to subject if server not found | If a Search domain is configured (Web Protection > Filtering Options > Misc > Search domain) and an end-user attempts to browse to a non-existent domain over HTTPS (e.g. https://this-does-not-exist.com), the following will happen:
This will result in a browser warning, since the browser was trying to access this-does-not-exist.com and the certificate created for this-does-not-exist.com.foo.bar. |
If the same search domain is already provided to clients (via DHCP), it's usually not necessary to configure it on the Web Proxy. If this is the case, you can remove the search domain from Web Protection > Filtering Options > Misc > Search Domain. |
|
NUTM-7669 |
|
|
Unable to connect SSH for 8 minutes after changing IP address on SSB5 v9.312 | After changing IP addresss it takes a few mins until the system is accessible through SSH. This is because IPS needs to reload and blocks access to the system while its reloading. This only happens on low-end appliances. |
There are 3 different methods for reloading IPS, which can be changed through condfd key, ips -> reload_method. It accepts the following three values: 'reload','restart','takeover' |
|
NUTM-7782 |
|
|
UTM gets unresponsive while pattern updates were running | The UTM automatically downloads and applies pattern updates to ensure protection at all times. After downloading the updates, the scan engine is reinitialized with new detection data. Sometimes the engine component itself is updated with a new version. While the update is happening, downloaded content or other requests that requires scanning can be delayed while the reload completes. |
||
NUTM-8837 |
|
|
Changes in static route configuration or the enabling/disabling the interfaces will cause all routes to be configured again. | As per UTM design, changes in static route configuration or the enabling/disabling the interfaces will cause all routes to be deleted, in the backend, and then add back all the routes again that are not disabled. This issue can be verify through the confd, confd-debug, mdw-debug logs. In such cases,if OSPF is enabled and the static routes are redistributed, there could be fluctuation in the route topologies. LSA updates(specifically LSA type 5)will cause the neighbour to log the topology related changes. For the other dynamic routing protocol, we may see similar behaviour as well but it depends on how other dynamic routing protocol advertises the routes to the neighbours. |
No Workaround |
|
NUTM-9352 |
|
UTM reboots when polycom video conference is in use | Using the application Polycom RealPresence Desktop 3.4.0.54718 for the Video Conferencing over UTM could result in spontaneous reboot of the UTM. |
Please use Polycom RealPresence Desktop 3.7 or higher. |
||
NUTM-4452 |
|
|
Clinet machines not able to update the SOPHOS CLOUD ANTI VIRUS while using Https scanning . | Endpoints cannot connect to the MCS server if https scanning is enabled for the decrypt and scan . The http log would give an error like this one 2016:05:18-10:52:11 utm httpproxy[5630]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="192.168.1.241" dstip="54.148.0.26" user="admin" ad_domain="" statuscode="502" cached="0" profile="REF_vTSCHPtQsV (LAN)" filteraction="REF_qVYuykYAYD (administrator filter)" size="3742" request="0x18426800" url="https://54.148.0.26/" referer="" error="Failed to verify server certificate" authtime="6" dnstime="1" cattime="0" avscantime="0" fullreqtime="860528" device="0" auth="4" ua="" exceptions="" |
For this cases the "Sophos LiveConnect" DNS Group should be used in the transparent skip list by source address. If this doesn't exist, create it using the DNS hostname "all.broker.sophos.com". |
|
NUTM-4461 |
|
|
afcd[xxxxx]: _afc_conn_get_age(): The timestamp of connection 0x019AE6CF is in the future; correcting ... | UTM is logging all the day (about 15-20 a day, everyday) the below messages: 2016:06:07-00:09:30 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x0196662A is in the future; correcting ... 2016:06:07-00:09:30 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x0196662C is in the future; correcting ... 2016:06:07-00:09:30 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x01966629 is in the future; correcting ... 2016:06:07-00:14:50 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x0196725E is in the future; correcting ... 2016:06:07-00:17:30 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x01967872 is in the future; correcting ... 2016:06:07-00:22:50 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x0196841A is in the future; correcting ... 2016:06:07-00:32:10 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x01969802 is in the future; correcting ... 2016:06:07-07:50:51 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x019A6FA7 is in the future; correcting ... 2016:06:07-07:56:11 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x019A7EF7 is in the future; correcting ... 2016:06:07-08:33:31 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x019AE6CA is in the future; correcting ... 2016:06:07-08:33:31 firewall-1 afcd[5586]: _afc_conn_get_age(): The timestamp of connection 0x019AE6CF is in the future; correcting ... |
There is no workaround. This error message is merely warning and does not have any impact on the system. It is safe to ignore this. |
|
NUTM-8004 |
|
|
Incorrect IPtables rules if working with object groups and interfaces | IPtables rules are not created correctly if host objects are bound to interface groups. Depending on which of the interfaces is on top of the interface group the IPtables rules will be written. Everytime you change the order, the rules will change. utm:/root # iptables-save | grep 9100 -A USR_FORWARD -i eth0 -p tcp -m policy --dir in --pol none -m set --match-set k5VA9LzHISEdJUBR6rRRpw src -m tcp --sport 1:65535 --dport 9100 -j DROP -A USR_FORWARD -i eth1 -p tcp -m policy --dir in --pol none -m set --match-set k5VA9LzHISEdJUBR6rRRpw src -m tcp --sport 1:65535 --dport 9100 -j DROP utm:/root # iptables-save | grep 9100 -A USR_FORWARD -s 8.8.8.8/32 -i eth1 -p tcp -m policy --dir in --pol none -m tcp --sport 1:65535 --dport 9100 -j DROP -A USR_FORWARD -s 8.8.8.8/32 -i eth0 -p tcp -m policy --dir in --pol none -m tcp --sport 1:65535 --dport 9100 -j DROP -A USR_FORWARD -s 192.168.1.1/32 -i eth0 -p tcp -m policy --dir in --pol none -m tcp --sport 1:65535 --dport 9100 -j DROP |
||
NUTM-9418 |
|
|
Website "simulatore.publiservizi.net" cannot be opened properly with web proxy | Issue : Website simulatore.publiservizi.net is rendered incorrectly if HTTP Proxy is in use. The issue seems to caused due to the web server returns Pragma header with a 0D0D0A which the UTM parser takes it as end of Headers and treats rest as body. |
The workaround will be adding the site to Transparent Mode Skiplist so that the site will be by passed from proxy. |
|
NUTM-9452 |
|
|
ERROR: netlink response for Increase seq numbers HA SYSTEM included errno 3: No such process | Problem: This issue can happen when PMTU discovery does not work as expected on HA link. There is no side effect other than the occasional error message from Pluto. Solution: Ensure there is no PMTU black hole in HA link path. |
||
NUTM-9755 |
|
HTML5 VPN Portal Connections do not support additional or non-standard ports | HTML5 VPN Portal Connections do not support accessing additional resources on additional or non-standard ports |
|||
NUTM-7667 |
|
|
UTM reports target host's IP as its own hop address during traceroute | Running traceroute to a host behind an ipsec tunnel, the remote UTM reports the target IP address as hop. This is instead of its own address. As result of this the target address is shown twice in traceroute. There is no impact on this. |
No Workaround |
|
NUTM-8805 |
|
|
Static Routes for same destination network | It is not possible to add two or more static routes for the same destination network (even with different metric and gateways). |
||
NUTM-10132 |
|
|
Access to other Webadmin through HTML5VPN not possible | It is not possible to connect to another UTM Webadmin within the Network through HTML5VPN Portal. |
Use the WAF to access WebAdmin |
|
NUTM-8198 |
|
|
Certificate expiry notification received for unlicensed feature | Customer receiving certificate expiry notification for the Web Proxy CA. However as they aren't licensed for web filtering they are unable to regenerate this. I dont think we should be sending notifications for certificate used in features that are unlicensed? Or at least have a way of regenerating these from the GUI without the license. Fallback log showing the relevant cert object: 2017:05:10-09:17:01 SOPHOS_UTM [daemon:info] notify_expiring_certs.pl: INFO - certificate REF_CaMetCukLswinOvygo2 will expire 2017:05:10-09:17:01 SOPHOS_UTM [daemon:info] notify_expiring_certs.pl: INFO - notified about 1 certificates, which will expire Object in cc: 127.0.0.1 OBJS > REF_CaMetCukLswinOvygo2 Logged into object 'REF_CaMetCukLswinOvygo2'. Use 'w' to write eventual changes. { 'comment' => '', 'enddate' => 'May 16 00:00:00 2017 GMT', 'fingerprint' => '8A:C2:68:3C:F0:E8:88:68:DB:6E:7C:DA:A0:75:39:44:12:51:11:31', 'issuer' => 'C=uk, L=Abingdon, O=Sophos, CN=Sophos Proxy CA, emailAddress=sophos@sophos.co.uk', 'issuer_hash' => '255c8b73', 'name' => 'C=uk, L=Abingdon, O=Sophos, CN=Sophos Proxy CA, emailAddress=sophos@sophos.co.uk', 'public_key_algorithm' => 'rsaEncryption', 'serial' => '91B2C5B6F9E8C4EB', 'startdate' => 'Mar 3 17:38:24 2014 GMT', 'subject' => 'C=uk, L=Abingdon, O=Sophos, CN=Sophos Proxy CA, emailAddress=david.bullimore@vygon.co.uk', 'subject_alt_names' => [ 'IP Address:127.0.0.1' ], 'subject_hash' => '255c8b73', 'vpn_id' => '127.0.0.1', 'vpn_id_type' => 'ipv4_address' } Support cases raised relating to the Cert Expiry notifications are falling into the following categories: |
||
NUTM-4310 |
|
|
Wrong count of ssh logins in summary in executive reports | At some point an Accu file could get broken and all reporting data of the last 30 days gets lost. Every 5 minutes the Reporter is updating the Accu file. If the file is not readable (because of being missing or corrupt) a new one is created and reporting starts from beginning. |
||
NUTM-4971 |
|
|
High amount of country blocking changes are not available in the last webadmin changes view | In case you change 30 or more country's in the country blocking configuration it could be that you will not see the changes in the "Last Webadmin Changes" Tab. |
In case you have to change a huge amount of country's in the country blocking configuration, please do it in more then one step. Change some settings and apply the changes before you repeat the steps above to change the remaining country's. |
|
NUTM-10002 |
|
|
SG/XG devices may become inaccessible due to SSD firmware | Problem Symptom
The following appliances are affected by this issue. The issue is SSD firmware related so the UTM software does not change the issue. Sophos XG Firewall, UTM, AP, RED: How to find the revision number Resolution If possible go ahead and make a backup with one of the below KBA's: |
||
NUTM-9807 |
|
|
Interface order may change after reboot for virtual UTMs on Hyper-V | Following a reboot, the order of the interfaces on a virtual UTM on Hyper-V may change, breaking High Availability. This is a known issue due to the manner in which Microsoft manages interface naming in Hyper-V and UTM default behavior. The solution for this issue is to export the Hyper-V assigned interface addressing to the internal UTM rules file. This sets the interface order as static on the UTM side to stay consistent with the Hyper-V side interface config. |
Follow steps to resolve in KB132109: https://community.sophos.com/kb/en-us/132109 |
|
NUTM-7783 |
|
|
httpproxy does not support non-HTTP traffic on port 80 | UTM httpproxy will not handle non-HTTP traffic on port 80. Bypassing the IP address(s) by entering into the appropriate skip list is the recommended solution. |
Adding the source IP of the host into the transparent skip list allows video streaming to work. |
|
NUTML-11942 |
|
|
Playing mp4 files on Safari browser is not possible while using AV scan | Playing mp4 files on Safari browser is not possible while using AV scan. |
Add an exception for sites / URLs which serve streaming media |
|
NUTML-11953 |
|
|
IP displayed instead of username when using NCP client with more than one remote networks | In case you configure a remote access IPsec connection with more than one local networks, you will find in the ipsec.log file that "username" is filled with the IP address instead of the real name of the user. This will also cause, that the IP of the User Network Object will not be set. |
||
NUTML-11955 |
|
|
Reports exported to CSV files are incorrect with german localization | If you open reports exported to CSV files with Microsoft Excel (German localization) some percentages are displayed as dates. The problem here is that German Excel prefers to interpret 2.6 as 2nd of July since in Germany that number would have been written 2,6. |
Import the file via the "Daten" menue and manually switch the type of those columns to "Text" instead of "Standard". |
|
NUTML-11966 |
|
|
Huawei E392 LTE Stick not working properly | |||
NUTML-11975 |
|
|
VDSL reconnect results in RED 50 looping reconnects with Zyxel VMG1312-B30A Modem | After a VDSL reconnect the Zyxel Modem doesn't forward the UDP packets on port 3410 to the RED. |
It could be that a new modem firmware solves the problem. Unfortunately we don't have feedback yet if this firmware solves the problem or not. Another workaround is to disable and enable the PPPoE interface in the webadmin |
|
NUTML-11988 |
|
|
Authentication fails with users in AD Nested Groups |
|
||
NUTML-12033 |
|
|
Power on issues on SG310 appliance | We are using ATX Power Supplies in our appliances, which have a power switch to turn it on or off. To turn the appliance on again, you have to switch off the power supply unit and wait roughly 10 seconds before you can power it on again. |
||
NUTML-12034 |
|
|
Broken quarantine report in OWA 2010 non light version | If OWA is used for reading the quarantine report the email's in the preview window is broken because of the OWA's unique way of overriding CSS attributes. Workaround is to open the message (by double clicking). |
||
NUTML-12039 |
|
|
Transparent AD SSO user profile still matches if user is switched on workstation | In transparent mode, when a new user logs in immediately after another user has logged out, authentication caching may cause the UTM to recognize the new user as the previous user. The new user may be granted the same browsing policy, and may be logged as if they are the previous user. This can occur for up to five minutes, until the UTM refreshes its cache. |
If this delay in authentication is unacceptable in your environment, use standard mode rather than transparent mode. |
|
NUTM-5754 |
|
|
OSPF 'Announce default route' doesn't work with IPv6 | OSPF Default Route Redistribution ('Announce default route') is not supported with IPv6 in the Sophos UTM. Only IPv4 is supported. |
Utilize a 3rd party network device to announce IPv6 default routes. |
|
NUTML-11998 |
|
|
AV scanning and ActiveSync | Antivirus scanning does not work on Microsoft ActiveSync. The scanning fails because ActiveSync encodes the transferred data in formats which the Anti-virus engine does not understand. |
||
NUTML-12100 |
|
|
removing cache, too many local copies | After an update the web proxy stops working. The proxy log '/var/log/http.log' shows the message "removing cache, too many local copies" and '/var/storage/cores' potentially contains one or more core dumps per minute. This points to a problem with the proxy startup and needs manual intervention. |
Please contact support. |
|
NUTML-12097 |
|
|
Transparent AD SSO - b_auth_failed_but_accepted_as_user_any | HTTP-Proxy only sends a 407 (authentication request) for requests which could be authenticated. This means, if the request matches any of the following criterias it will not be authenticated:
In these cases the proxy looks up in its cache for last authenticated user from that IP address. If no cache record found it uses the "default" profile. |
Send a simple HTTP request through browser to authenticate user. Any subsequent request from that IP address will use the authenticated user. |
|
NUTML-12095 |
|
|
It is not possible to deactivate HA Link Monitoring for LAG Interface | It is not possible to deactivate HA Link Monitoring for LAG Interface in WebAdmin. |
Please contact support. It is possible to deactivate via the console. |
|
NUTML-12094 |
|
|
Application control block for "Teamviewer" didn't work anymore | Application control block for "Teamviewer" doesn't work when HTTP Proxy is enabled but Full SSL scanning is not enabled. |
Enable Full SSL Scanning in the HTTP Proxy settings |
|
NUTML-12093 |
|
|
Endpoint client matches wrong HTTP proxy filter action | In transparent mode, the UTM web proxy cannot challenge HTTPS requests for authentication. As endpoint web control filters HTTP requests, it is possible that a user will not be in the authentication cache and policy will fall back to policy based on the IP address. This can, for instance, block a site that the user is approved to visit. |
To work around this issue, use agent or browser authentication or bypass the specific HTTPS site on the UTM. |
|
NUTML-12092 |
|
|
Attachments in SPX mails results in a winmail.dat file | After SPX encrypting messages coming from an MS Exchange server original mail attachments are packed into a winmail.dat file which then appears as an attachment of the encrypted PDF. |
As a workaround the Exchange admin needs to disable RTF as follows: 1) Login in to the exchange server |
|
NUTML-12091 |
|
|
Problems with opening word documents from sharepoint via WAF in different browsers | If SharePoint is published through WAF with form-based reverse authentication enabled, opening Office documents doesn't work. Instead of the Office document the reverse authentication form template is shown. |
Either disable SharePoint integration in the browser (then download the Office document, edit and re-upload it) or disable reverse authentication. |
|
NUTML-12089 |
|
|
SPX reply portal removes original filename from attachments | SPX: Uploading files to SPX reply portal while using IE10 or higher can cause that the filenames are overwritten by the complete local path. |
You can disable this behavior in IE: IE -> Internet Options -> Security -> Internet -> Custom level |
|
NUTML-12088 |
|
|
aua fails to handle passwords with umlaut for http proxy authentication | Passwords containing non-ascii characters do not work in IE and FireFox when authenticating through the http proxy. Chrome works properly. |
||
NUTML-12086 |
|
|
Ultrasurf not being blocked by Application Control | Application control block for "Ultrasurf" doesn't work when HTTP Proxy is enabled but Full SSL scanning is not enabled. |
Enable Full SSL Scanning in the HTTP Proxy settings. |
|
NUTML-12085 |
|
|
False error handling in smtp proxy while using callout recipient verification | If a recipient validation callout fails (eg. resulting in error: "552 Requested mail action aborted: exceeded storage allocation") Exim only reports back "550 address unknown". |
NA |
|
NUTML-12081 |
|
|
Upload through ftp proxy don't work directly if the file is bigger then 150 MB | When using FTP to upload large files through the proxy, the client may not receive a 226 response code before it times out. |
If this occurs, it can be prevented by increasing the setting to a large timeout value for your FTP client. |
|
NUTML-12079 |
|
|
Cannot query NTP peers from remote host | Query UTM ntp service for peer info from remote host fails after update to 9.308. |
NA |
|
NUTML-12078 |
|
|
Official Microsoft Android RDP application didn't work with WAF | The official Microsoft Android and iOS remote desktop (RDP) apps don't work with WAF. The apps fail with the following error message when trying to connect to a remote computer through WAF: We couldn't connect to the gateway because of an error. If this keeps happening, ask your admin or tech support for help. Error code: 0x3000008 |
No workaround possible other than configuring a DNAT rule to skip WAF completely. |
|
NUTML-12077 |
|
|
Upload of Eicar virus is possible with OWA Full when Silverlight is enabled | Upload of Eicar virus is possible with OWA Full when Silverlight is enabled. OWA light + enabled silverlight -> it's not possible to upload a virus like eicar OWA light + disabled silverlight -> it's not possible to upload a virus like eicar OWA Full + disabled silverlight -> it's not possible to upload a virus like eicar OWA Full + enabled silverlight -> it IS possible to upload a virus like eicar |
Don't use the combination of OWA Full + enabled silverlight on clients which have OWA access. In this combination it is not possible to scan for viruses because we can't scan for viruses in SOAP requests. |
|
NUTML-12074 |
|
|
https enduser message not shown in AD SSO mode | Periodically an Internet Explorer user may not see an UTM generated block page when getting blocked from accessing https site. The user instead would see a generic IE error page. This is due to an issue within IE. |
Hit Refresh in the browser to see the proper UTM block page. |
|
NUTML-12070 |
|
|
Script error issue with large Network Group objects | It is not possible to use large network group objects with over 200 items. Everything which exceeds 200 items in a group might be subject to script timeouts. |
||
NUTML-12067 |
|
|
Complete download from a webserver behind the WAF is not possible | It is not possible to download big files through the WAF. Neither mod_proxy nor the UTM-WAF modules were designed to handle a high amount of parallel large file uploads or downloads. |
Please contact support. |
|
NUTML-12066 |
|
|
Slave node in RESERVED mode with 9.304, although this mode never activated | Sometimes during the upgrade from 9.2x to 9.3 it can happen on HA/cluster system that the slave node is going in RESERVED mode (although this feature isn't enabled in webadmin). Output from "hs" on command line looks like this: Current mode: HA MASTER with id 1 in state ACTIVE |
To fix that issue, please reboot the master node. If that will not solve the problem, contact the support. |
|
NUTML-12060 |
|
|
Problem with display of "connected clients" in webadmin when using L2TP with Radius auth | Connected L2TP VPN clients are not counted as 'connected clients' in the dashboard when using RADIUS/DHCP. But they are listed in the Remote Access reporting. |
||
NUTML-12058 |
|
SSO login on UTM devices not working if useraccount contains a '@' | In case the user name to login to the gatway manager contains a '@' sign (e.g. admin@sophos) the SSO login from the gateway manager to the UTMs will not work. |
Don't use account containing a '@' sign in the username. |
||
NUTML-12056 |
|
|
Userportal - adding multiple addresses to whitelist/blacklist does not work | It is not possible to add multiple entries to the sender whitelist/blacklist in User Portal (SMTP) in one step. When a user accesses the User Portal, adds multiple entries to the sender whitelist/blacklist, Workaround: Steps to reproduce: |
||
NUTML-12049 |
|
|
Sophos Scanner runs in timeout | If scanning a mail takes longer than 2 minutes, cssd will time out and the mail will subsequently be quarantined with reason="unscannable" extra="AV Scanner unreachable". |
||
NUTML-12043 |
|
|
RDWeb via WAF is not possible on customers site | We don't have protocol support for Microsoft's RDG-RPC protocol suite which they added with Windows Server 2012 (we only support the "old" MSRPC suite). Whenever such a RDG (2012) connection fails the log contains line stating |
||
NUTML-12042 |
|
|
Reporting: Graphs and values in mail reporting are inconsistent | The graphs and values in the mail reporting are inconsistent due different time frames. The graphs reach back for 24 hours, whereas the report is generated live of "today". |
||
NUTML-12041 |
|
|
Network chipset 82574L ( UTM 220 rev 4/5, UTM 320 rev 4/5) :Detected Hardware Unit Hang / Reset adapter unexpectedly | For devices with an Intel 82574L network card chipset you might see messages like e1000e 0000:01:00.0 |
Please ensure that PoE is disabled for the port the UTM is connected to. |
|
NUTML-12038 |
|
|
Failed login reported from wrong IP Address | Sometimes when the message 'Failed to connect backend' appears |
||
NUTML-12036 |
|
|
Microsoft Exchange 2013 changed behavior of RCPT verification with callout | Microsoft changed in the Exchange the behavior for its recipient verification. The Mailserver sends the "550" after "data" instead of after "rcpt to:" This is NOT RFC conform. |
Use Recipient verification over Active Directory. |
|
NUTML-12035 |
|
|
Detected Hardware Unit Hang and Reset adapter unexpectedly still exists (82583V / UTM 120r5) | If you notice the following log lines in kernel.log for this specific adapter type (82583V) on 2014:09:11-15:09:24 utm kernel: [129844.820420] e1000e 0000:05:00.0 eth0: Detected Hardware Unit Hang: Verify the adapter: Procedure: Check that it worked: All entries have to be set to disabled. utm:/root # lspci -vvvv | grep LnkCtl |
||
NUTML-12032 |
|
|
DynDNS: IPv6 limitations |
|
There is no workaround for API limitations of DynDNS services |
|
NUTML-12030 |
|
|
Webadmin runs into timeout during lengthy report generation | The WebAdmin runs into a timeout while the query is executed (timeout warnings may be displayed in WebAdmin). This may happen if it takes too long to generate the dashboard data which is derived from the database. |
none |
|
NUTML-12029 |
|
|
http://www.zermatt.ch/Unterkunftsverzeichnis#/ does not load shelter list when http proxy is in transparent mode | Sophos UTM does not currently support the Websocket protocol when in transparent mode. |
Add an exception for the site at Web Protection > Filtering Options > Misc, under �Skip transparent mode destination hosts/nets�. |
|
NUTML-12026 |
|
|
OTP is not useable when the password has numeric characters | The UTM cannot determine if a 6-digit number at the end of the password is a passcode or the end of the password, so it takes it as the passcode. |
Use a password without digits at the end |
|
NUTML-12025 |
|
|
Policy tester returns wrong group membership if local security groups are used (groups in groups) | If a user is a member of a local AD group that is sub-group of a global AD group, policy tester results for that user will be inconsistent with the actual behavior of the proxy profile. |
None |
|
NUTML-12024 |
|
|
Outlook anywhere behind the WAF didn't work | If an Outlook Anywhere is behind the WAF and the test tool from microsoft (https://testconnectivity.microsoft.com/) is used you will get some errors in the output from the test tool. |
Independent from the error in the output of the microsoft test tool you can use the OA config for outlook on the clients. |
|
NUTML-12014 |
|
|
NIC ordering on VMWare not stable, might change if interface are added/removed | If adding or removing NICs for VMWare instances, it can happen that the remaining interfaces change their names, so that they are not associated with the correct interface objects anymore. |
||
NUTML-12007 |
|
|
Argos information is not synced to cluster slave - http proxy requests cannot be authorized | SAA client client information is not synced to slave node in HA/ Cluster setups. In HA setups (active/passive) clients using SAA client need to authenticate on master again after e.g. takeover is performed. |
NA |
|
NUTML-12004 |
|
|
Rev. Auth.: form auth fails with some browsers if path contains special characters | Form based reverse authentication uses session cookies. The matching of cookie to paths in browsers seems to be implemented very inconsistently regarding escaping of special characters. In some cases authentication will fail because the cookie is not sent by the browser. E.g. when using Firefox and paths containing the single quote character ' |
The following special characters seem to be safe to use in URLs in all tested browsers: -._~!$&()+,=:@ We recommend limiting site paths using reverse authentication to using those characters (in addition to alpha numeric characters). |
|
NUTML-12002 |
|
|
Eicar virus was uploaded althought the WAF said "Access denied with code 400" | Eicar virus was uploaded althought the WAF said "Access denied with code 400" 1) The file to be uploaded is split into several files and those files are uploaded separately. Even if the file as a whole is a detectable virus, the file segments - now each a file by themselves - could be clean in regards to AV scanning. This is a general problem for AV scanning, not specific for the WAF and cannot be solved the WAF either. 2) The file to be uploaded is wrapped in additional data which is used by the web page framework to carry meta data. From a WAF point of view, all of it is payload since every byte - no matter whether actual payload or meta data as seen by the web page framework - could be part of a virus. Hence, the whole stream is passed to AV scanning which then fails to extract the (potential) virus from the stream. Again, this is a general AV scanning problem which cannot be solved by the WAF. |
||
NUTML-11979 |
|
|
AD SSO fails on ReadOnly DC | If configured AD SSO against a ReadOnly DC on a UTM, SSO will fail. While the client tries to authenticate with kerberos you will get following errormessages in the http logfile: "gss_accept_sec_context: Decrypt integrity check failed" |
Set the AD SSO server to ReadWrite mode or do the SSO against an ReadWrite Server. |
|
NUTML-11973 |
|
|
Reboot command from LCD panel doesn't work after initial installation | During the installation of UTM software on Sophos appliances, the LCD is used to show the installation status. The used base system / environment for the installer, is different as in normal operation and doesn�t offer all functions. To reboot the appliance after installation, use the �Reboot� button on the final screen or press �CTRL + ALT + DEL�. If you want to power off the appliance at the end of installation, you have to switch it off using the switch of the power supply. |
||
NUTM-7656 |
|
|
ULOGD coredumps in 9.411 | ULOG restarts with Coredumps . The reason for the restarts could be because of the following reasons
|
||
NUTM-7784 |
|
|
Warn pages with category webmail didn't work as expected | This issue affects customer who wants to block/warn access to gmx.de or web.de for example. When you click proceed from a 'Warn', you are allowed to continue browsing the warned category for 30 minutes as long as:
The problem with "webmail" is that they use a number of different domains that are categorized differently, presumably because they're used for different purposes. When you go to gmx.de, it's categorized as 'Web Mail' but redirects you to gmx.net, which is 'Internet Services. Once you have logged in, it then tries to load email content from 3c.gmx.net which is again categorized as 'Web Mail'. For some reason, there is no 'referer' header for, the UTM treat them as a new domain and try to return a warning. But because the request is for a background connection/API lookup and not a web page, the warn page never gets displayed. |
In such cases you can work around the problem by re-categorizing 3c.gmx.net as 'Internet Services' locally, or by re-categorizing gmx.net as 'Web Mail' locally. |
|
NUTM-7366 |
|
|
Installer doesn't detect newly manufactured SG550/SG650 in 9.3x | The newly manufactured SG550/650 design was changed. One memory module was moved to the other CPU (slot change). This results in the hardware detection seeing the "new" SG550/650 differently. This was changed in the 9.4 installer, but not in 9.3x. |
||
NUTML-11877 |
|
|
HTML5 VPN Webapps: Popups are disabled | HTML5 VPN Webapps: Popups are disabled As of now, popups are blocked by the internal Firefox. The user will be informed when blocking has taken place. |
||
NUTML-11880 |
|
|
SAA user names are not displayed for IPS in the reports | Reverse DNS and user are not displayed for ips in the reports For IPS reverse DNS and Users (SAA) are not displayed by the inline report and in the executive report. Only the ip addresses are displayed. |
||
NUTML-12101 |
|
|
Daily Executive Report type PDF does not include IPS or ATP section if they are empty | Daily Executive Report type PDF does not include IPS or ATP section if they are empty. |
Use HTML only version. |
|
NUTML-12011 |
|
|
[Hyper-V] No link status reported with 'tulip' driver (legacy NICs) | Legacy network adapters are not supported in Hyper-V. The legacy network adapter requires processing in the management operating system that is not required by the network adapter. We recommend that you use the legacy network adapter only to perform a network-based installation or when the guest operating system does not support the network adapter. |
||
NUTML-11948 |
|
|
Uplink balancing: PING for monitoring via type UDP is always sent over the first active Interface (->all interfaces may go down) | If the monitoring type "UDP" is used for uplink balancing, the uplink may be continuously toggled if the first uplink interface is down. |
If possible, try to use monitoring via TCP or PING. |
|
NUTML-12069 |
|
|
Bridge with a Wifi interface and some other Ethernet doesn't work after Update to v9.3 | Wifi Traffic is not processed correctly from the separate Zone interface to the LAN in a bridge which is setup between a LAN and a separate Zone interface. |
||
NUTML-11885 |
|
|
Backend Membership groups limited to AD Users do not work | The backend membership authentication didn't work if limited to Active Directory users, only when limited to Active Directory groups. For example Authentication failed for user ads_test3 when using the following LDAP string: (User ads_test3 is a member of the ads_group1) |
||
NUTML-11984 |
|
|
MAC addresses are not rewritten correctly if DNAT is configured on bridge interfaces | The UTM doesn't send the radius packets to the radius server if the AP and the radius server are in the same network and if there is bridge configured on the UTM including this network. |
Put the bridge interface into the promiscuous mode. Example: ifconfig br0 promisc Please note: You have the enable the promiscuous mode again after an UTM reboot. |
|
NUTML-11999 |
|
|
wrong HTTP/S redirect using multiple vhosts with wildcard domains and subdomains | Using HTTP to HTTPS redirection in combination with wilcard domains could lead to using the wrong virtual webserver. Example:
The request http://main.mydomain is correctly redirected to https://main.mydomain. Afterwards the request https://main.mydomain is answered by the wrong real webserver, real2 instead of real1. |
||
NUTML-12045 |
|
|
UMTS modem: UTM needs reboot to detect device after installation | |||
NUTML-11987 |
|
|
ips: the changes of the rule counters in the attack pattern tab are only visible when reloading the tab | The rule counters in the IPS Attack Pattern Tab are not updated instantly when changing the rule age. |
Reload the Attack Pattern Tab |
|
NUTML-11866 |
|
|
HTML5 VPN: Websocket error when accessing User Portal via HTTPS proxy | When the HTML5 VPN portal is accessed via a HTTP proxy that intercepts SSL |
You can only work-around this issue on the HTTP proxy side. If the HTTP proxy |
|
NUTML-11936 |
|
|
S/MIME verification doesn't work for users having different certs for verification and encryption | Incoming mails which have different certificates for signature and mail encryption cannot be verified/decrypted. Internal Storage can only hold one certificate for a remote user, due to this the verification/decryption fails if different certificates are used. |
- |
|
NUTML-12037 |
|
|
[NUTM-1141] Change behavior how NAC enforce WiFi connections | The desired functionality or behaviour can be achieved by setting the mac filter type to "Black list" in SSID configuration. In this case only, the black listed mac group and non-complaint devices are blocked. Other complaint and non-managed devices are able to join the wireless Network. However, the default behaviour is set to block everything expect complaint devices, so that more security is achieved. |
||
NUTML-12001 |
|
|
[NUTM-407] Up2Date button can be used before all up2date packages are distributed to all nodes | Up2Date button can be pressed before all Up2Date packages have been distributed to all nodes. |
If you want to be sure that all packages have been distributed: |
|
NUTML-12083 |
|
|
SG210 - FlexiPort NIP-51084 not recognized | How to do hardware changes to a cluster: 1) Power down all nodes If this is done differently there is high chance that cluster is in inconsistent hardware state. This can result in strange behavior. |
||
NUTML-11879 |
|
|
User "m�ller" can't log in via Cisco VPN Clien | Users with non-ASCII characters (for example m�ller) can't login via Cisco VPN. In aua.log, the username is garbled like: m��lle 2012:05:22-11:05:36 ich10 aua[22278]: id="3005" severity="warn" sys="System" su |
||
NUTML-11883 |
|
|
Websecurity reporting does not work for IPv6 address URLs | Websecurity reporting does not work for IPv6 address URLs If an request contains an IPv6 address in the URL host part, this request does not show up in the websecurity reporting. |
||
NUTML-11939 |
|
|
Facebook options like facebook post are not blocked until you select 'Facebook' | Enabling a sub-category of 'Facebook' without enabling 'Facebook' itself will not work and will allow access to the sub-categories, although these are checked. Workaround: sub-categories of 'Facebook' can only be blocked when 'Facebook' is enabled itself. |
||
NUTML-11863 |
|
|
Username cannot be left blank for SSH connection type | "Automatic login" for the SSH connection type in the HTML5 VPN Portal is not checked - Username cannot be left blank. |
||
NUTML-11992 |
|
|
Import of a filter action omits entries for blocked / allowed websites | |||
NUTML-12090 |
|
|
webadmin does not check hostname in a host object (network definition) | From a DNS point of view, the hostnames "hostname" and "hostname." (note the '.') denote the same host. The UTM does not regard these as being equal. It is therefore possible to configure two different hosts, which resolve to the same hostname. This is an invalid BIND configuarion and will prevent BIND from starting. Workaround is to not have a host in both styles, but use either the notation with, or without dot. |
||
NUTM-6318 |
|
|
Whitelist/blacklist object can't be recreated if filter action not saved | If an administrator creates a whitelist/blacklist object within a Web Filter action, but then doesn't save the filter action (eg. clicks Cancel), another whitelist/blacklist object with the same name cannot be created in any other filter action. When attempting to create one, an error appears: "The whitelist/blacklist object with the same name '(name)' already exists. |
This issue can be resolved manually by deleting the object via the backend, as follows: |
|
NUTM-6199 |
|
|
Sandstorm parentproxy not available for license without WebProtection | Customers using Sandstorm only in conjunction with Email Protection can not configure a parent proxy on the Webadmin GUI. The missing WebProtection license disables the required pages in the Webgui. |
If a parent proxy is required, because no direct connection to the Internet is allowed, the proxy can be set using the cc cli-utility
|
|
NUTM-5734 |
|
|
Logging & Reporting, View Log Files, Search Log Files, Filter issue | 407s are deliberately suppressed because they can create a bunch of noise that is not useful in most cases. That is also the cause why it is not possible to search for specific http status codes (407 for example) - You can search logs on the back-end. |
||
NUTM-5460 |
|
|
Checksum errors while using svn checkouts through proxy | SVN issue with pipeline requests user@system:~/Downloads/Test$ svn checkout http://svn.apache.org/repos/asf/spamassassin/trunk/rules /home/tottie/Downloads/Test/ Our httpproxy, like most proxies in the market, does not support pipeline requests. |
||
NUTM-5346 |
|
|
SOCKS Proxy with Auth failed for Skype | Skype is sending the password with null characters in the string, which is not supported by our SOCKS proxy. The SOCKS proxy expects cleartext strings. |
||
NUTM-4404 |
|
|
Tranparent skiplist with additional address of UTM as destintation host doesn't work | Requests goign to URLs, which resolve to a local address on the UTM, can't skip the transparent proxy. Even if it is added to the "transparent skiplist" as desination host, the request will still be intercepted by the transparent proxy. |
None. |
Wireless
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
CWIFI-13082 |
|
|
Social login is not working with AP100Series Model | Due to an SSL error, the user can not log in to the network with social login credentials. We found that TLS1.2 is not available in the AP100 device. |
||
CWIFI-13058 |
|
Sophos Central Wireless supports only the English language on the hotspot Captive Portal page. | Sophos Central Wireless Captive Portal page supports only the English language. Some elements will remain in English after the language is changed. |
|||
CWIFI-13041 |
|
Wireless Product Tab not available on the central admin | If the central account is hosted in new regions, the Central Wireless Product is unavailable, and there are no plans to make it available in the new regions. When customers create an account in central, in a new region, they will face a message describing which products are available. A warning message describing a wireless product does not yet have a plan or date for when new regions will be supported. |
|||
CWIFI-12586 |
|
|
Only the first 50 entries of the device page will be exported into the CSV file | Currently there is a limitation which leads to the issue that only the first 50 entries will be exported to CSV irrespective of the number of clients. Development threads this as a feature request and will address it in future releases. But there is no ETA yet for this. |
N/A |
|
CWIFI-12119 |
|
Users trying to access the captive portal page to authenticate using Social Media credentials receive an error | The connection of the captive portal page delivered by the access point is secured by a self-signed certificate. |
You may try with another browser which would provide you an option to proceed further. |
||
CWIFI-12204 |
|
|
Legacy AP's will brick when Interrupted during Firmware upgrade. | Following AP models might brick when a firmware update is interrupted due to a power loss: AP 15,15C,55,55C,100,100C and 100X. |
1.Making sure that there will be no power outage during the upgrade process. |
|
CWIFI-11442 |
|
|
Data limit Set on Voucher doesn't restrict new download/connection after quota expire | Wireless client connected on Sophos AP/APX managed by Sophos Central Wireless might able to access more data then define on voucher. Sophos AP/APX sends period update of data usage on voucher to Sophos Central at every 4.5 minutes. In worst case user may get free access to internet for maximum 4.5 minute over mentioned 'Access time/Data Limit' on voucher. |
||
CWIFI-10529 |
|
|
|
Legacy issue: Devices fail to disconnect from AP when Connected SSID is removed from AP | Devices fail to disconnect from the AP when the Connected SSID is removed from the AP. Clients like Macbook Air, Android Phone, Dell laptop with Linux are still showing as connected to the AP when connected SSID is removed from AP page. On the clients WiFi page, it still shows the device as connected and with an connected IP address. |
Disconnect the client. |
CWIFI-9933 |
|
|
|
Client Vendor filter not working as expected | Attempting to filter connected clients by Vendor only works for the first 8 characters entered. If more than this are entered into the filter then 0 results are returned. |
Significant improvements are planned for the filtering in Central Wifi later in 2019 at which point we expect this behaviour to be resolved |
CWIFI-9048 |
|
Dynamic Vlan with sync security is not supported but is user configureable | There is no work around for this at the moment. Dynamic and Sync security should not be enabled on the same SSID. |
|||
CWIFI-9244 |
|
|
User is able to enable Sync security on an SSID which is assigned to AP platforms(AP100,AP55,AP15) though the functionality is only supported in APX | Sync security feature is not supported for AP platforms but user can edit the SSID assigned to the AP platforms and can enable the sync security feature. This can create a issue in mixed platform environment where the SSID is part of both APX and AP platforms in a network. There would be different behavior when the AP roams from APX to AP platforms. |
There is no work around for this. User should not enable the Sync security on a SSID which is assigned to AP platforms. |
|
CWIFI-9526 |
|
SSIDs are not getting broadcasted when mesh is established between APX and legacy AP platform. | SSIDs are not getting broadcasted on 5GHz when mesh is established between APX and legacy AP platform. Steps: This is a known limitation. |
|||
CWIFI-9527 |
|
Usage graphs are only updated every 20 minutes | Usage graphs are only updated every 20 minutes lient details including Usage graphs are shown and updated every 20 minutes.. |
|||
CWIFI-9101 |
|
|
|
SSID information sometimes not updated immediately under clients page. | Sometimes Current Network(SSID) under Accesspoint->Clients-> |
There is no workaround for this.User has to wait for around 5 minutes from the time clients gets connected to the SSID for the proper UI update under Accesspoint->Clients-> |
CWIFI-8657 |
|
|
Discrepancy between APX320 and APX530/740 in LED behavior during hard reset. | No workaround for this. In all the APX platform if reset button is pressed for about 8 to 10sec APX goes for reboot and if the reset button pressed for more than 15 sec it goes for config wipe out. |
||
CWIFI-9098 |
|
If the MacOS has both Mobile SMC and Endpoint, the status keep toggling if one of them has RED status | This in case where MacOS has both Mobile SMC and Endpoint, If Mobile Says "Red" and the Endpoint says "Green", the Status keeps on toggling so is the change in clients functionality. |
There is no workaround for this. MacOS should have either Mobile SMC or Endpoint software not the both. |
||
CWIFI-9245 |
|
|
Blocked page will be rendered first time for clients in "Red" state when trying to access Sophos friendly white listed URLs | Refreshing the page again will allow the access of Sophos friendly white listed URLs. |
||
CWIFI-7237 |
|
|
In a roaming scenario client MAC entries will be present in old AP as well as in new roamed AP. | When a client roams from one AP to another, clients MAC entry will be present in old AP as well as in the new roamed AP in UI ( under Accesspoint->Client page). Ideally the client MAC entry should be present only in new roamed AP and entry in older AP should be removed when it roams to new AP. |
There is no workaround for this. Client MAC entry in older AP will be removed after 5 minutes and there will not be any effect on AP functionality. This is only a UI issue. |
|
CWIFI-8420 |
|
|
|
Search by Mac address shows duplicate results in client page when first 2 bytes of MAC is used for search. | Under clients page when we search for client using first 2 bytes Mac address , duplicate entries of the same client can be seen. |
Use 3 bytes or more of the clients Mac address in search option under clinets page. |
CWIFI-4201 | Background automatic channel selection | Currently, background automatic channel selection is not working. This means that an AP will not switch a channel even if it becomes too crowded or has too much interference. |
||||
CWIFI-4310 | MESH interoperability when manually selecting channels and channel bandwidth | To make sure that MESH works between APs, you need to ensure that the APs which should be part of the MESH network are broadcasting on the same channel and use the same channel bandwidth. Manual channel selection is highly recommended. |
||||
CWIFI-4261 | Recommendation: schedule firmware updates to be applied daily or weekly | As we'll be shipping frequent updates, we would recommend to schedule firmware updates to happen daily or weekly. If you set it to monthly you might be missing out for a long time! |
||||
CWIFI-4496 | Manual interaction required when upgrading a Mesh network to version 1.3 |
This is a one-time effort and is not needed for future releases. There won't be a fix for this. |
|
|||
CWIFI-4202 | UTM wireless firmwares used for flashing have a chance of bricking the AP | The AP firmware that is on UTM <= 9.404 has firmware that does not have the reliability improvements that we've added to the firmware update process in later firmware releases. Please make sure to not unplug an AP after it has been registered by the Cloud until it is shown as online in the Cloud. |
||||
CWIFI-4254 |
|
UI: trying to register multiple APs in parallel sometimes fails | Due to an UI issue, whenever you try to register more than one AP in the Wizard, the UI might show an error even though the registration works. Unfortunately, this affects a common workflow: a new customer wants to set up multiple APs in one go. |
Zero Trust Network (ZTNA)
Key | Affected versions | Fix versions | Components | Summary | Description | Workaround |
---|---|---|---|---|---|---|
NZT-1969 |
|
|
Users are facing 403 error after updating usergroup name in Azure AD | Users are facing a 403 error after updating a user group name in Azure AD and accessing an application with the updated group name. |
Move the usergroup (ie updated) from the Assigned group of the resource to Available group list. (Un assign group for the resource) |
|
NZT-2516 |
|
ZTNA cloud formation stack creation is failing in Osaka AWS region | Users won’t be able to successfully deploy AWS gateway in OSAKA AWS region. |
Use other AWS regions for AWS gateway deployment. |