Sophos Protect Devices Update Failure

Description

Occasionally, when end stations are attempting to update Sophos End Point protection, the SonicWall Gateway Anti-Virus blocks the download as the updates contains strings that resemble malicious code.  While the two companies are investigating, the following article will provide a way to avoid this issue.

Image

Cause

Sophos updates contain strings that resemble malicious code, so when a SonicWall firewall scans them, they show up as indicators of malware and we block them. Our SonicWall Capture Labs Director is in contact with Sophos on the best way for us both to resolve this however, the fact that our GAV sees some of their Malware Definition/Signatures as potential Malware is not surprising given that they must contain data to detect Malware and that data looks like Malware.

Resolution

If you have troubles installing the Sophos client and not able to download the initial signature database it is most likely because SonicWall GAV security service is blocking the transfer. We will need to exclude a few Sophos FQDN addresses (i.e. *.sophos.com, *.sophosupd.com, etc.) in order to pass the traffic. To do this we will create a firewall access rule for the Sophos AV Group with the option to Disable DPI so traffic to the Sophos AV Group bypasses all of the SonicWall DPI engines. We will also modify the FQDN address objects to override the TTL given by the DNS server lookup as they are shorter than what it appears the Sophos client refreshes for, we will put them at the max of 86,400 seconds which is 24 hours. This is because if the client is trying to talk to d1.sophosupd.com for updates on IP 1.2.3.4 and uses that IP for the next 30 minutes but the TTL is only 60 seconds, the SonicWall could clear that IP out of the FQDN Address Object cache before the client does a new DNS query to repopulate the SonicWall firewall’s cache and it would therefore not match the bypass DPI Rule.

  1. Create custom Address Objects from Network | Address Objects for Sophos Domains and override the DNS TTL as below.

    NOTE: You will have to check with Sophos which domains you need to exclude and create as many customer Address Objects as needed. After the Address Objects are created, you can group them under an Address Group (i.e. Sophos AV Group) to be used into the Access Rules.


    ImageSophos Endpoint - domains
    *.sophos.com
    *.sophosupd.com
    *.sophosupd.net
    *.sophosxl.net
    ocsp2.globalsign.com
    crl.globalsign.com

    Image
  2. Create the following access rule by navigating to Firewall | Access Rules.
    Under the General tab select:
    • Action: Allow
    • From: Any zone with Sophos clients
    • To: WAN
    • Source Port: Any
    • Service: Any
    • Source: Any
    • Destination: The address objects that was created for Sophos
      Image
    • Under the Advanced tab check Disable DPI.
  3. Create DPI-SSL exclusions. Exclude the following:

DPI-SSL Connection Failure List when trying to install the client:

Image

Related Articles

  • TOTP based two-factor authentication for management by Admin user using SonicOS API
    Read More
  • Two-factor authentication using TOTP for Management by User with admin privileges
    Read More
  • How do I configure Two-factor authentication for the Admin login with TOTP?
    Read More
not finding your answers?
was this article helpful?