Hello all.
Hopefully there is a simple answer to this question. We are on v9.351-3 and using SSL VPN for remote access into our file servers. Our "remote access" users have work-issued laptops. All users are non-local admins, so the IT shop is responsible for installation of the SSL VPN clients. Somewhere along the way, a user's VPN installer was used to install on their personal home machine (we have no control over the non-domain machine and we became aware of this when Sophos started reporting a virus via "Advanced Threat Protection").
Is it possible, and what would be the process (which logs), to locate this machine in UTM and then block it from being able to VPN in? I tried finding MAC address with the mentioned IP from "ATP", but unsure if I am looking in the correct logs (thought maybe the firewall logs). Also created a MAC address definition for this MAC address and then created a new firewall rule to deny/reject for the specific user using MAC filter. Was not successful.
Unfortunately, it is not an option to remove the user from the "VPN user group", since this person still needs access from their domain laptop.
Tony
This thread was automatically locked due to age.