Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Web Control only works with HTTP

Hi All,

Like everyone else no doubt we are trying to ramp up security for all of our home workers by extensively blocking all of the dangerous file types and non work categories using Web Control for Sophos EndPoint.  However from testing it appears that web control only blocks port 80 - so anything via HTTPS is bypassed and it is a complete waste of time.  In the office our firewall (different vendor) intercepts the HTTPS traffic and we can block/restrict it, but now everyone is at home we have lost this protection.  Is there any way I can block file types and web pages delivered over HTTPS for my home workers?

TIA

Stuart



This thread was automatically locked due to age.
Parents
  • Hello Stuart,

    Endpoint Web Control should block HTTPS access to sites (based on the SNI or IP-address) but it can't inspect the traffic (the additional security options won't work).
    How did you test?

    Christian

  • Hi Christian,

     

    Thanks for the reply.  We have increased the categories that we block and I have ticked to block all file downloads, so PDF and EXE are blocked, however I can download PDF files and EXE files from Microsoft's download center - but files are blocked when I go to a HTTP site. (I have in fact had to allow PDF files since, but EXE files are still blocked). We haven't whitelisted any sites via Sophos either.  Are there circumstances when it cann't inspect the packet and block the file?  Just tried again and I could download the Direct X installer from Microsoft download center (exe)

    Thanks

     

  • Hello Stuart,

    Web Control (and Web Protection) are in principle a proxy, i.e. they can only inspect the TCP stream. As HTTPS connections are encrypted Web Control is totally blind.

    Christian 

  • Thanks again,

     

    Just out of interest how do you manage to secure and restrict HTTPS for your users? Or do you not bother?  It just seems to me that the world is going HTTPS so this is going to be an issue for most users if like us you are only using the endpoint software for home workers?

  • I don't think it would be possible unless you have a network appliance performing HTTPS scan and decrypt.  When a user accesses a HTTPS website the appliance will take the connection instead of forwarding it to the intended website and create its own connection with the site.  This way the appliance can decrypt and inspect the traffic before handing it to the endpoint.  In order for the appliance to do this you'll need to import the appliance's certificate into the endpoints trusted certificates, otherwise the endpoints will not trust the appliance and drop the HTTPS connection.

    What you can do is require remote clients to connect using a full VPN tunnel to the network appliance, passing all network traffic through it to be scanned.  The endpoint's web control has been good enough for my environment as the endpoint still scans files for malicious content as they are opened and web control blocks access to inappropriate web categories.  I do understand the need for blocking downloads of specific file types through HTTPS though and believe a VPN + network appliance would be the only way to go for that.

  • Hi,

    I think you're right with regards the appliance situation, that's exactly how it works in the office for us, allowing us to scan HTTPS traffic.  We use split tunnel VPN because we don't have the bandwidth at the office to route all VPN traffic through it (Teams video call quality dropped significantly) so we have applied for an upgrade to the line.  Hopefully once this is done we can route all VPN traffic back via the tunnel and out through the firewall for better protection.

     

    Thanks all that replied :-)

Reply
  • Hi,

    I think you're right with regards the appliance situation, that's exactly how it works in the office for us, allowing us to scan HTTPS traffic.  We use split tunnel VPN because we don't have the bandwidth at the office to route all VPN traffic through it (Teams video call quality dropped significantly) so we have applied for an upgrade to the line.  Hopefully once this is done we can route all VPN traffic back via the tunnel and out through the firewall for better protection.

     

    Thanks all that replied :-)

Children
No Data