
Sophos UTM 9.6 settings - scan settings
Sophos
Antivirus Mechanism Settings
Select the antivirus mechanism to be used in all single scan configurations of the WebAdmin. In dual scan configurations, both antivirus mechanisms are used. Note that dual scan is not available with a BasicGuard subscription. Click Apply to save your settings.
Advanced Threat Protection options
Select Send suspicious content to SophosLabs for analysis to improve protection. SophosLabs includes a cloud-based sandbox that can automatically monitor and analyse the behaviour of potential malware. This helps to protect your UTM even better by delivering updates faster. Deactivating this function may slightly delay the implementation of defensive measures.
It is sent over a secure channel and handled in accordance with the SophosLabs Information Security Policy.
Antispam mechanism settings
A parent proxy (also known as a parent or upstream proxy) is required in countries where access to the Internet is only allowed through a government-controlled proxy. If your security regulations require the use of a parent proxy, you can configure it here by specifying a host definition and port.
Use parent proxy:
- Select this option to use a parent proxy.
- Select the host or add a new host.
-
Specify the port of the proxy.
Adding a definition is explained on the Definitions & Users > Network Definitions > Network Defin itions page.
-
Click Apply.
Your settings are saved.
Proxy requires authentication: If the parent proxy requires authentication, enter the user name and password here.

Marcel Zimmer is the Technical Managing Director of EnBITCon. During his time in the German Armed Forces, the trained IT developer was able to gain numerous project experiences. His interest in IT security was significantly awakened by his service in command support. Even after his service, he is an active reservist in the Bundeswehr.
His first firewall was a Sophos UTM 120, which he had to set up for a customer project. Since then, his interest in IT security has grown steadily. In the course of time, various security and infrastructure topics have come into his focus. His most interesting projects included, for example, WLAN coverage in an explosion-proof area, as well as a multi-site WLAN solution for a large