Domains and ports to allow
If you have Sophos Firewall, you don't need to follow the steps here. All the domains and ports required for use of Sophos Central are allowed by default.
If you use a non-Sophos firewall or proxy, make sure that it allows the domains and ports listed here. This lets you protect your devices and manage them from Sophos Central.
All features route traffic using the same proxy.
Some of the domains you need to allow are owned by Sophos Central Admin. Others aren't, but are needed for essential operations such as checking that installations work or recognizing certificates.
This page tells you which domains and ports you need for the following products:
- Intercept X, XDR, or MDR. Use this section for your threat protection products.
- Sophos AD Sync. Use this section too if you use Sophos AD Sync to keep your Sophos Central users list up to date.
For domains specific to other Sophos products, see More Sophos products.
Recommendations
-
Don't use firewall regional rules. These could override your allowed list and prevent Sophos products from working. For example, a block on non-US regions could stop services that sometimes run through European regions. This can happen because our products are hosted on Amazon Web Service (AWS), which uses non-static IP addresses. See AWS IP address ranges and Amazon IP addresses.
-
Check whether you can use wildcards in your firewall or proxy rules. If you can't, there are some features you can't use.
Intercept X, XDR, or MDR
Follow these instructions if you have any of these licenses:
- Intercept X Advanced
- Intercept X Advanced for Server
- Intercept X Advanced with XDR
- Intercept X Advanced for Server with XDR
- Managed Detection and Response Essentials
- Managed Detection and Response Complete
- Managed Detection and Response Essentials Server
- Managed Detection and Response Complete Server
Ports
Allow this port:
443 (HTTPS)
Domains
Allow the following domains. Ensure you complete all sections.
Sophos Central Admin domains
-
Allow these Sophos domains:
central.sophos.comcloud-assets.sophos.comsophos.comdownloads.sophos.com
If your proxy or firewall supports wildcards, you can use the wildcard
*.sophos.comto cover these addresses. -
Allow the following non-Sophos addresses:
az416426.vo.msecnd.netdc.services.visualstudio.com
Sophos domains
The domains you need to allow depend on whether your firewall or proxy supports wildcards.
Click the appropriate tab for details.
Allow the following wildcards to cover the Sophos domains:
*.sophos.com*.sophosxl.com*.sophosxl.net*.sophosupd.com*.sophosupd.net*.hitmanpro.com
You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:
*.globalsign.com*.globalsign.net*.digicert.com
Allow the following wildcards to cover the Sophos domains:
^sophos\.com/^[A-Za-z0-9.-]*\.sophos\.com.?/^[A-Za-z0-9.-]*\.sophosxl\.com.?/^[A-Za-z0-9.-]*\.sophosxl\.net.?/^[A-Za-z0-9.-]*\.sophosupd\.com.?/^[A-Za-z0-9.-]*\.sophosupd\.net.?/^[A-Za-z0-9.-]*\.hitmanpro\.com.?/
You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:
^[A-Za-z0-9.-]*\.globalsign\.com.?/^[A-Za-z0-9.-]*\.globalsign\.net.?/^[A-Za-z0-9.-]*\.digicert\.com.?/
If your proxy or firewall doesn't support wildcards, you must manually add the exact domains you need.
Allow these Sophos domains:
central.sophos.comcloud-assets.sophos.comsophos.comdownloads.sophos.com
You also need to identify the server addresses that the Sophos management communication system and the device installers use to communicate with Sophos Central Admin securely. Click the tab corresponding to your device's operating system and follow the steps to identify and allow these addresses.
On Windows devices, do as follows:
- Open
SophosCloudInstaller.log. You can find it inC:\ProgramData\Sophos\CloudInstaller\Logs. -
Look for the line starting
Opening connection to.There will be at least two entries. The first will look like one of these:
dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.commcs2-cloudstation-us-east-2.prod.hydra.sophos.commcs.stn100yul.ctr.sophos.commcs2.stn100yul.ctr.sophos.com
The second will look like one of these:
dzr-api-amzn-eu-west-1-9af7.api-upe.p.hmr.sophos.comapi-cloudstation-us-east-2.prod.hydra.sophos.comapi.stn100yul.ctr.sophos.com
Add both the domains to your rules.
-
Add the following addresses:
t1.sophosupd.comsus.sophosupd.comsdds3.sophosupd.comsdds3.sophosupd.netsdu-auto-upload.sophosupd.comsdu-feedback.sophos.comsophosxl.net4.sophosxl.netsamples.sophosxl.netcloud.sophos.comid.sophos.comcentral.sophos.comdownloads.sophos.comalert.hitmanpro.comssp.sophos.comsdu-auto-upload.sophosupd.comrca-upload-cloudstation-us-west-2.prod.hydra.sophos.comrca-upload-cloudstation-us-east-2.prod.hydra.sophos.comrca-upload-cloudstation-eu-west-1.prod.hydra.sophos.comrca-upload-cloudstation-eu-central-1.prod.hydra.sophos.comrca-upload.stn100bom.ctr.sophos.comrca-upload.stn100yul.ctr.sophos.comrca-upload.stn100hnd.ctr.sophos.comrca-upload.stn100gru.ctr.sophos.comrca-upload.stn100syd.ctr.sophos.com
-
Add the domains required for Sophos Management Communication System:
dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.comdzr-mcs-amzn-us-west-2-fa88.upe.p.hmr.sophos.commcs-cloudstation-eu-central-1.prod.hydra.sophos.commcs-cloudstation-eu-west-1.prod.hydra.sophos.commcs-cloudstation-us-east-2.prod.hydra.sophos.commcs-cloudstation-us-west-2.prod.hydra.sophos.commcs2-cloudstation-eu-west-1.prod.hydra.sophos.commcs2-cloudstation-eu-central-1.prod.hydra.sophos.commcs2-cloudstation-us-east-2.prod.hydra.sophos.commcs2-cloudstation-us-west-2.prod.hydra.sophos.commcs.stn100syd.ctr.sophos.commcs.stn100yul.ctr.sophos.commcs.stn100hnd.ctr.sophos.commcs2.stn100syd.ctr.sophos.commcs2.stn100yul.ctr.sophos.commcs2.stn100hnd.ctr.sophos.commcs.stn100gru.ctr.sophos.commcs2.stn100gru.ctr.sophos.commcs.stn100bom.ctr.sophos.commcs2.stn100bom.ctr.sophos.commcs-push-server-eu-west-1.prod.hydra.sophos.commcs-push-server-eu-central-1.prod.hydra.sophos.commcs-push-server-us-west-2.prod.hydra.sophos.commcs-push-server-us-east-2.prod.hydra.sophos.commcs-push-server.stn100yul.ctr.sophos.commcs-push-server.stn100syd.ctr.sophos.commcs-push-server.stn100hnd.ctr.sophos.commcs-push-server.stn100gru.ctr.sophos.commcs-push-server.stn100bom.ctr.sophos.com
-
Add the domains required for the SophosLabs Intelix service:
us.analysis.sophos.comapac.analysis.sophos.comau.analysis.sophos.comeu.analysis.sophos.comanalysis.sophos.com
-
Add these domains if your license includes XDR or MDR:
live-terminal-eu-west-1.prod.hydra.sophos.comlive-terminal-eu-central-1.prod.hydra.sophos.comlive-terminal-us-west-2.prod.hydra.sophos.comlive-terminal-us-east-2.prod.hydra.sophos.comlive-terminal.stn100yul.ctr.sophos.comlive-terminal.stn100syd.ctr.sophos.comlive-terminal.stn100hnd.ctr.sophos.comlive-terminal.stn100gru.ctr.sophos.comlive-terminal.stn100bom.ctr.sophos.com
-
You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:
ocsp.globalsign.comocsp2.globalsign.comcrl.globalsign.comcrl.globalsign.netocsp.digicert.comcrl3.digicert.comcrl4.digicert.com
On macOS devices, do as follows:
- Download and extract SophosInstall.zip. See Before you install on macOS.
- Open
SophosCloudConfig.plist. You can find it in theSophosInstall/Sophos Installer Componentsdirectory. - Look for the
RegistrationServerURLkey. The string that follows it contains a URL. Add this domain to your rules. -
Add the following addresses:
t1.sophosupd.comsus.sophosupd.comsdds3.sophosupd.comsdds3.sophosupd.netsdu-auto-upload.sophosupd.comsdu-feedback.sophos.comsophosxl.net4.sophosxl.netsamples.sophosxl.netcloud.sophos.comid.sophos.comcentral.sophos.comdownloads.sophos.comamazonaws.comssp.sophos.comsdu-auto-upload.sophosupd.comrca-upload-cloudstation-us-west-2.prod.hydra.sophos.comrca-upload-cloudstation-us-east-2.prod.hydra.sophos.comrca-upload-cloudstation-eu-west-1.prod.hydra.sophos.comrca-upload-cloudstation-eu-central-1.prod.hydra.sophos.comrca-upload.stn100bom.ctr.sophos.comrca-upload.stn100yul.ctr.sophos.comrca-upload.stn100hnd.ctr.sophos.comrca-upload.stn100gru.ctr.sophos.comrca-upload.stn100syd.ctr.sophos.com
-
Add the domains required for Sophos Management Communication System:
dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.comdzr-mcs-amzn-us-west-2-fa88.upe.p.hmr.sophos.commcs-cloudstation-eu-central-1.prod.hydra.sophos.commcs-cloudstation-eu-west-1.prod.hydra.sophos.commcs-cloudstation-us-east-2.prod.hydra.sophos.commcs-cloudstation-us-west-2.prod.hydra.sophos.commcs2-cloudstation-eu-west-1.prod.hydra.sophos.commcs2-cloudstation-eu-central-1.prod.hydra.sophos.commcs2-cloudstation-us-east-2.prod.hydra.sophos.commcs2-cloudstation-us-west-2.prod.hydra.sophos.commcs.stn100syd.ctr.sophos.commcs.stn100yul.ctr.sophos.commcs.stn100hnd.ctr.sophos.commcs2.stn100syd.ctr.sophos.commcs2.stn100yul.ctr.sophos.commcs2.stn100hnd.ctr.sophos.commcs.stn100gru.ctr.sophos.commcs2.stn100gru.ctr.sophos.commcs.stn100bom.ctr.sophos.commcs2.stn100bom.ctr.sophos.com
-
Add the domains required for the SophosLabs Intelix service:
us.analysis.sophos.comapac.analysis.sophos.comau.analysis.sophos.comeu.analysis.sophos.com
-
You may need to allow access to the following Certificate Authority sites if they aren't allowed by your firewall:
ocsp.globalsign.comocsp2.globalsign.comcrl.globalsign.comcrl.globalsign.netocsp.digicert.comcrl3.digicert.comcrl4.digicert.com
On Linux devices, do as follows:
- Find
SophosSetup.shon your device. -
Run the following command to start the installer and print the output.
sudo bash -x ./SophosSetup.sh -
Look for the following lines:
- line starting
+ CLOUD_URL=https:// - line starting
+ MCS_URL=https://
Add the domains from both lines to your rules.
- line starting
-
Add the following addresses:
t1.sophosupd.comsus.sophosupd.comsdds3.sophosupd.comsdds3.sophosupd.netsdu-feedback.sophos.comsophosxl.net4.sophosxl.netsamples.sophosxl.netcloud.sophos.comid.sophos.comcentral.sophos.comdownloads.sophos.com
-
Add the domains required for Sophos Management Communication System:
dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.comdzr-mcs-amzn-us-west-2-fa88.upe.p.hmr.sophos.commcs-cloudstation-eu-central-1.prod.hydra.sophos.commcs-cloudstation-eu-west-1.prod.hydra.sophos.commcs-cloudstation-us-east-2.prod.hydra.sophos.commcs-cloudstation-us-west-2.prod.hydra.sophos.commcs2-cloudstation-eu-west-1.prod.hydra.sophos.commcs2-cloudstation-eu-central-1.prod.hydra.sophos.commcs2-cloudstation-us-east-2.prod.hydra.sophos.commcs2-cloudstation-us-west-2.prod.hydra.sophos.commcs.stn100syd.ctr.sophos.commcs.stn100yul.ctr.sophos.commcs.stn100hnd.ctr.sophos.commcs2.stn100syd.ctr.sophos.commcs2.stn100yul.ctr.sophos.commcs2.stn100hnd.ctr.sophos.commcs.stn100gru.ctr.sophos.commcs2.stn100gru.ctr.sophos.commcs.stn100bom.ctr.sophos.commcs2.stn100bom.ctr.sophos.commcs-push-server-eu-west-1.prod.hydra.sophos.commcs-push-server-eu-central-1.prod.hydra.sophos.commcs-push-server-us-west-2.prod.hydra.sophos.commcs-push-server-us-east-2.prod.hydra.sophos.commcs-push-server.stn100yul.ctr.sophos.commcs-push-server.stn100syd.ctr.sophos.commcs-push-server.stn100hnd.ctr.sophos.commcs-push-server.stn100gru.ctr.sophos.commcs-push-server.stn100bom.ctr.sophos.com
-
Add the domains required for the SophosLabs Intelix service:
us.analysis.sophos.comapac.analysis.sophos.comau.analysis.sophos.comeu.analysis.sophos.com
-
Add these domains if your license includes XDR or MDR:
live-terminal-eu-west-1.prod.hydra.sophos.comlive-terminal-eu-central-1.prod.hydra.sophos.comlive-terminal-us-west-2.prod.hydra.sophos.comlive-terminal-us-east-2.prod.hydra.sophos.comlive-terminal.stn100yul.ctr.sophos.comlive-terminal.stn100syd.ctr.sophos.comlive-terminal.stn100hnd.ctr.sophos.comlive-terminal.stn100gru.ctr.sophos.comlive-terminal.stn100bom.ctr.sophos.com
-
You may need to allow access to the following Certificate Authority sites if they aren't allowed by your firewall:
ocsp.globalsign.comocsp2.globalsign.comcrl.globalsign.comcrl.globalsign.netocsp.digicert.comcrl3.digicert.comcrl4.digicert.com
Note
Some firewalls or proxies show reverse lookups with *.amazonaws.com addresses. This is expected as we use Amazon AWS to host several servers. You must add these URLs to your firewall or proxy.
Sophos AD Sync
If you use Sophos AD Sync to keep your Sophos Central users list up to date with Active Directory, you must also allow the domains in this section.
Restriction
If your firewall doesn't allow wildcards you can't use Sophos AD Sync utility.
-
If you're using the Active Directory service, allow the following pre-signed s3 domains:
tf-presigned-url-eu-west-1-prod-*-bucket.s3.eu-west-1.amazonaws.comtf-presigned-url-eu-central-1-prod-*-bucket.s3.eu-central-1.amazonaws.comtf-presigned-url-us-east-2-prod-*-bucket.s3.us-east-2.amazonaws.comtf-presigned-url-us-west-2-prod-*-bucket.s3.us-west-2.amazonaws.comtf-presigned-url-ca-central-1-prod-*-bucket.s3.ca-central-1.amazonaws.comtf-presigned-url-ap-southeast-2-prod-*-bucket.s3.ap-southeast-2.amazonaws.comtf-presigned-url-ap-northeast-1-prod-*-bucket.s3.ap-northeast-1.amazonaws.comtf-presigned-url-ap-south-1-prod-*-bucket.s3.ap-south-1.amazonaws.comtf-presigned-url-sa-east-1-prod-*-bucket.s3.sa-east-1.amazonaws.com
-
Allow the following wildcards:
*.s3.eu-west-1.amazonaws.com*.s3.eu-central-1.amazonaws.com*.s3.us-east-2.amazonaws.com*.s3.us-west-2.amazonaws.com*.s3.ca-central-1.amazonaws.com*.s3.ap-southeast-2.amazonaws.com*.s3.ap-northeast-1.amazonaws.com*.s3.ap-south-1.amazonaws.com*.s3.sa-east-1.amazonaws.com
When using wildcard FQDNs, make sure DNS requests go through your firewall. For more information, see Wildcard FQDN behavior.
Sophos Assistant
Sophos Assistant is a feature in Sophos Central and other Sophos products that helps you complete tasks and find information quickly.
Sophos Assistant is hosted in Whatfix. For the feature to work, you must allow Whatfix domains.
If your data center is outside the EU (European Union), allow these URLs:
https://cdn.whatfix.com/prod/*https://whatfix.com/service/*
If your data center is in the EU (European Union), allow these URLs:
https://eucdn.whatfix.com/prod/*https://eu.whatfix.com/service/*
More Sophos products
Some Sophos products have additional domains that must be allowed for full functionality. See the following links for details:
- Sophos Email Security: Email domain information
- Sophos access points: Domain requirements
- Sophos Switch: Domain requirements