Examining the firewall logs, I see that endpoint protection uses swi_service.exe which is attempting to communicate on port 80 to access some European AWS addresses. The UTM blocks the traffic by default. This seems like strange behavior. I would have expected the device to allow this traffic if Endpoint Protection is enabled.
I'd add that it seems odd that in 2017 an unencrypted connection is used for security applications. Why not https?
What's the best approach to dealing with this traffic?
I can add ip addresses to specific firewall rules, but this seems like a hack that will break the next time someone at Sophos changes an ip address.
Thoughts?
This thread was automatically locked due to age.