This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Somebody successfully pblished Windows Terminalserver 2019 with Sophos XG

Hi,

does somebody successfully pblished Windows Terminalserver 2019 with Sophos XG?

If yes: Any hints how to?

I am able to get the rdweb page available from outside.

But when starting an app the comes user credentials pop up from internal server and aftger some time timeout...

Thanks for hints

Gernot



This thread was automatically locked due to age.
Parents
  • We managed to get it going and I wanted to paste screenshots of our config but apparently that is not supported on this forum from 199x Rolling eyes

    Basically create a policy like:
    Enable RPC (Pass Outlook Anywhere)
    Mode: Reject
    No cookie signing
    Static URL hardening enabled for:
    /
    /rpc
    /favicon.ico
    /rpc/rpcproxy.dll?localhost:3388
    /rpc/rpcproxy.dll
    /rpc/rpcWithCert

    No form hardening
    No AV
    Block bad repu: enabled
    skip remote lookups: disabled
    Common threat filter: On (level 1)
    Skip filter rules:
    911100
    920100
    920340
    920440
    960015
    960032
    960035
    960911
    981172
    981176
    981204
    SQL injection diabled - all others enabled

    Then in your WAF rule don't use Path Specific Routing and in the exceptions section create 1 that disables URL hardening for these sites:

    /RDWeb/*,/rpc/*,/rpcWithCert/*


    Rasmus

Reply
  • We managed to get it going and I wanted to paste screenshots of our config but apparently that is not supported on this forum from 199x Rolling eyes

    Basically create a policy like:
    Enable RPC (Pass Outlook Anywhere)
    Mode: Reject
    No cookie signing
    Static URL hardening enabled for:
    /
    /rpc
    /favicon.ico
    /rpc/rpcproxy.dll?localhost:3388
    /rpc/rpcproxy.dll
    /rpc/rpcWithCert

    No form hardening
    No AV
    Block bad repu: enabled
    skip remote lookups: disabled
    Common threat filter: On (level 1)
    Skip filter rules:
    911100
    920100
    920340
    920440
    960015
    960032
    960035
    960911
    981172
    981176
    981204
    SQL injection diabled - all others enabled

    Then in your WAF rule don't use Path Specific Routing and in the exceptions section create 1 that disables URL hardening for these sites:

    /RDWeb/*,/rpc/*,/rpcWithCert/*


    Rasmus

Children