This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos Safeguard

Hi,

 

I have a number of Desktop PC's and Laptops that are at remote locations that don't require to be on our Domain as they are running Citrix.

 

We have been told to get them to work with Sophos Safeguard, we will need to import the certificate in the 'Personal' section of 'Certificates'.

 

The above has been tried with no success, can anyone help or suggest anything I am missing?

 

Kind regards, Dan Petford



This thread was automatically locked due to age.
Parents
  • Hi Dan - Although they're not on the domain, are you treating them like domained machines?

     

    Does your SafeGuard server have a secondary DMZ server, or is the primary server accessible to them (via public/VPN etc..)

     

    They can work with Sophos but they either have to have access to the server, or treated as standalone clients. With the standalone clients you can create a package configuration file to apply to the client that contains the policies, but the key backup location would have to be stored somewhere for the recovery of the device - ideally somewhere centrally and obviously not stuck on the client! 

  • Yes, we do have a secondary server in dmz (well port forwarded actually, but same end result) – that’s what allows the remote domain-joined PC’s to sync with safeguard. Just to clarify that remote domain computers are fine, just the workgroup ones that won’t connect.

    I did find that the local machine required a password, so have set one, and it started to initialise, however it still doesn't connect to the server, and the status is a Guest now.

  • Ah ok - Thanks Dan. Sounds like you've set it up well. Have you created a matching workgroup name for the remote laptops and are they all in the same workgroup name?

    If the workgroup name (you could just use "workgroup" but a bit lazy/confusing!) matches the workgroup name on the clients, they'll populate the auto-registered group. 

    You could then apply the same policies from your successful machines to the "auto-registered" workgroup folder. 

    Sophos client doesn't like blank passwords on accounts, so always best to set one. 

    It's also worth using the client connection tool (assuming you have V7 or better?)  - ON the client, C:\Program Files (x86)\Sophos\SafeGuard Enterprise\Client\SGNCSCC.exe.

     

     

     

  • Please see the report attached of the connection tool

  • And you have a valid public SSL cert applied to this DMZ/ported server? No chain/intermediary certs needed on the DMZ server?

    Your remote domained PC's that DO connect - are they connecting to the same server or the primary? Are they connecting with a VPN or without? If it's a VPN are the DNS routing tables allowing a connection rather than the DMZ server being truly public?

  • They are connecting to the same server, our remote domain ones are via a VPN and work fine.

  • Then it could be the DNS routing of the VPN client is what's making the client work on those laptops, and not the availability of the DMZ server?

     

    Can you install the VPN client on the un-domained PC's to test this? If this works (which I now suspect it will) then it's the availability of the DMZ that's in question - not the client.

  • We have tested a Laptop on the Domain, connected via 4G and SafeGuard still synchronises without our VPN client connected.

Reply Children