Skip to content
The XG Series hardware appliances will reach end-of-life (EOL) on March 31, 2025. Click here to see the XG to XGS migration documentation.

Active threat response

Active threat response provides instant and automated response to active adversaries equipped with sophisticated software and networking skills. These adversaries try to gain entry into your network and systems and continuously adapt their techniques using hands-on keyboard and AI-assisted methods.

Active threat response offers multiple modules of threat intelligence feeds, enabling the firewall to coordinate defenses immediately without manual intervention.

The modules are as follows:

  • MDR threat feeds
  • Sophos X-Ops threat feeds
  • Third-party threat feeds

You can choose to configure some or all of them. Configuration is simple because threat feeds, such as MDR and Sophos X-Ops threat feeds, are integrated with the firewall.

The integration also enables the firewall to take immediate action without remediation delays, offering effective protection from threats.

What are threat feeds?

Threat feeds are a list of IP addresses, domains, and URLs involved in threat activity, such as phishing and malware. These objects are called Indicators of Compromise (IoCs) or indicators of attack.

Depending on the threat feed module, the firewall remains up-to-date with the threat feeds' latest indicators at frequent intervals or based on threat information.

When you configure a threat feed's settings, you allow the firewall to block or monitor traffic related to the IoCs in the feed.

Note

We recommend that you configure the firewall to block traffic related to IoCs instead of only logging the events.

Summary of threat feed modules

See what each threat feed module offers and its licensing requirements:

Threat feed module Description
MDR threat feeds Sophos MDR analysts share intelligence about active threats in your network with the firewall.
Sophos X-Ops threat feeds Threat database from SophosLabs.
Third-party threat feeds Feed URLs that you configure.

For licenses and the additional firewall configurations, see Requirements for threat feeds.

For threat feed configurations, see Configure threat feeds.

The following diagram shows how the different threat feed modules work with the firewall.

Threat feeds diagram.

Threat protection by traffic type

The following table shows the details of the traffic types that the Active threat response modules protect:

Forwarded traffic

Traffic type MDR Third-party threat feeds Sophos X-Ops
Source IP address match for outgoing traffic
Destination IP address, domain, and URL match for outgoing traffic

Note

Active threat response doesn't match the source IP address for forwarded traffic entering the network, such as DNAT and WAF traffic.

System-destined traffic

Traffic type MDR Third-party threat feeds Sophos X-Ops
Source IP address match for traffic flowing to services listed in Administration > Device access, such as the web admin console, VPN portal, and VPN

More resources