Skip to content
The XG Series hardware appliances will reach end-of-life (EOL) on March 31, 2025. Click here to see the XG to XGS migration documentation.

Active threat response

Active threat response provides instant and automated response to active adversaries equipped with sophisticated software and networking skills. These adversaries try to gain entry into your network and systems and continuously adapt their techniques using hands-on keyboard and AI-assisted methods.

Active threat response offers multiple modules of threat intelligence feeds, enabling the firewall to coordinate defenses immediately without manual intervention.

The modules are as follows:

  • MDR threat feeds
  • Sophos X-Ops threat feeds

You can choose to configure some or all of them. Configuration is simple because the threat feeds are integrated with the firewall.

The integration also enables the firewall to take immediate action without remediation delays, offering effective protection from threats.

What are threat feeds?

Threat feeds are a list of IP addresses, domains, and URLs involved in threat activity, such as phishing and malware. These objects are called Indicators of Compromise (IoCs) or indicators of attack.

Depending on the threat feed module, the firewall remains up-to-date with the threat feeds' latest indicators at frequent intervals or based on threat information.

When you configure a threat feed's settings, you allow the firewall to block or monitor traffic related to the IoCs in the feed.

Note

We recommend that you configure the firewall to block traffic related to IoCs instead of only logging the events.

Summary of threat feed modules

See what each threat feed module offers and its licensing requirements:

Threat feed module Description
MDR threat feeds Sophos MDR analysts share intelligence about active threats in your network with the firewall.
Sophos X-Ops threat feeds Threat database from SophosLabs.

For licenses and the additional firewall configurations, see Requirements for threat feeds.

For threat feed configurations, see Configure threat feeds.

The following diagram shows how the different threat feed modules work with the firewall.

Threat feeds diagram.

How the firewall implements threat feeds

The firewall first implements MDR threat feeds followed by Sophos X-Ops threat feeds.

If an IoC exists in both the threat feeds, the firewall takes action based on the following options you select:

  • Log and drop: Drops the traffic, logs the event under MDR, and doesn't check the other threat feed.
  • Log only or Monitor: Logs individual events for MDR and Sophos X-Ops threat feeds.

Note

Go to System services > Log settings and make sure logs for Active threat response are turned on.

Threat protection by traffic type

The following table shows the details of the traffic types that the Active threat response modules protect:

Forwarded traffic

Traffic type MDR Sophos X-Ops
Source IP address match for outgoing traffic
Destination IP address, domain, and URL match for outgoing traffic

Note

Active threat response doesn't match the source IP address for forwarded traffic entering the network, such as DNAT and WAF traffic.

System-destined traffic

Traffic type MDR Sophos X-Ops
Source IP address match for traffic flowing to services listed in Administration > Device access, such as the web admin console, VPN portal, and VPN

More resources