Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Blocking Chrome Remote Desktop

XG135

I can't believe this isn't a more common question. I could only find this post:

https://community.sophos.com/products/xg-firewall/f/firewall-and-policies/96040/what-is-the-best-practice-approach-to-blocking-chrome-remote-desktop

 

I go to APPLICATIONS > Application Filter. Add> Create filter. Select Individual application > Chrome Remote Desktop, select > All The Time > Deny

Go back to FIREWALL > Default Policy. Choose Application Control Drop Down, select that filter.

And it's not working. (Did this exactly to block YouTube and it works).

 

 



This thread was automatically locked due to age.
Parents Reply Children
  • Hi Tony,

    Yes, pushing it out via GPO will probably the most efficient deployment method if you have to push out to a large volume of clients.

    Good luck!

    Karlos
    Community Support Engineer | Sophos Technical Support

    Knowledge Base  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'This helped me' link.
  • We push it via GPO to all Domain PC's and use Meraki MDM for all iOS / Android

     

    We don't allow staff on the Corporate network WiFi so if their phones get that error - sucks to be them :-)

    Sophos XG 450 (SFOS 18.5.1 MR-1)

    Sophos R.E.D 50 x 2

    Always configuring new stuff.....

  • I do allow them on my Unifi (separate) network that still runs through the XG. I use Microsoft MDM. 

    I also let guest and vendors use our Wifi when needed.  

    So this may not work for me.

    I do have some spare external IP's... maybe I can segment the wifi. 

     

    Thanks for the comment! Appreciated.

     

     

     

     

  • Be careful when you enable HTTPS intercept - be sure to exempt Finance, Health, etc.

    Otherwise you'll have Legal knocking on your door next...

    Also, be sure that your company's AUP states that employees should have no expectation of privacy on the corporate network. And don't include your guest network without checking with Legal first...