Information: Three minute survey on Exploring more ways to contact Sophos Technical Support. If you can spare the time, we would love your feedback!
We'd love to hear about it! Click here to go to the product suggestion community
In reply to Idriel:
"\\installs\SophosVPN\certmgr.exe" -add "\\installs\SophosVPN\sophos.cer" -c -s -r localMachine TrustedPublisher >nul
tasklist /FI "IMAGENAME eq setup.exe" 2>NUL | find /I /N "setup.exe" >NUL
if "%ERRORLEVEL%"=="0" GOTO DoUntilLoop2
REM Copy a shortcut over because it usually doesn't copy itself
xcopy "\\installs\SophosVPN\Sophos" "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Sophos\" /y /e >nul
REM Remove the config for the users who created "setup.exe"
rmdir "%ProgramFiles(x86)%\Sophos\Sophos SSL VPN Client\config\" /S /Q
REM Change permissions on the config folder so that users can install their own certificate
cacls "%ProgramFiles(x86)%\Sophos\Sophos SSL VPN Client\config" /t /e /g Everyone:f >nul
I finally figured out how to deploy the Sophos VPN Client used with XG firewalls to computers ahead of time, while still allowing users to log into the Client Portal, download their configuration, and paste it into the config folder without requiring membership in the local Administrators group.
1) Extract the Publisher Certificate from the client executable with 7-Zip: a. Log into the Sophos Client Portal and click "SSL VPN > Download Client and Configuration for Windows" b. In the File Explorer location that you downloaded the file, right click the executable and extract all contents to a folder c. Navigate into that folder, then open the "driver" folder and double click the "tap0901.cat" file d. Click "View Signature", then "View Certificate", then the "Details" tab, then "Copy to File...", Next, Next, click "Browse..." to choose a filename and location to save the certificate file. e. Close all windows.2) Add that certificate to the Trusted Publishers on all of the relevant domain-joined PCs using Group Policy a. In your policy, drill down to "Computer Configuration" > Policies > Windows Settings > Security Settings > Public Key Policies > Trusted Publishers" b. Right click that "Trusted Publishers" folder and click "Import...", click Next, browse to the certificate that you extracted in step 1, click Next and Finish. c. Wait 24 hours for all of the computers in the scope of this policy to receive the certificate when Group Policy checks in on their PC3) Use PDQ Deploy to perform the following two steps: a. Install the client and configuration that you downloaded in step 1 with the /S parameter b. Run an icacls command to change the permissions of the config folder to allow members of the local Users group to Modify: icacls "C:\Program Files (x86)\Sophos\Sophos SSL VPN Client\config" /grant Users:(OI)(CI)M /T4) Then, when users are ready, they log into the Sophos Client Portal with their AD credentials, click “SSL VPN > Download Configuration for Other OSs”, copy the file, navigate to the config folder in step 3.b, delete the old config file, paste in the one they just downloaded, then empty the trash.5) Connect to the VPN with their AD credentials. It works!