Domains and ports to allow
Zitat von mpachmann am 18. Juni 2025, 15:53 Uhrhttps://docs.sophos.com/central/Customer/help/en-us/PeopleAndDevices/ProtectDevices/DomainsPorts/index.html
If you have Sophos Firewall, you don't need to follow the steps here. All the domains and ports required for use of Sophos Central are allowed by default.
If you use a non-Sophos firewall or proxy, make sure that it allows the domains and ports listed here. This lets you protect your devices and manage them from Sophos Central.
All features route traffic using the same proxy.
Some of the domains you need to allow are owned by Sophos Central Admin. Others aren't, but are needed for essential operations such as checking that installations work or recognizing certificates.
This page tells you which domains and ports you need for the following products:
- Intercept X, XDR, or MDR. Use this section for your threat protection products.
- Sophos AD Sync. Use this section too if you use Sophos AD Sync to keep your Sophos Central users list up to date.
If you're setting up Sophos Email Security, see Email domain information.
Recommendations
- Don't use firewall regional rules. These could override your allowed list and prevent Sophos products from working. For example, a block on non-US regions could stop services that sometimes run through European regions. This can happen because our products are hosted on Amazon Web Service (AWS), which uses non-static IP addresses. See AWS IP address ranges and Amazon IP addresses.
- Check whether you can use wildcards in your firewall or proxy rules. If you can't, there are some features you can't use.
Intercept X, XDR, or MDR
Follow these instructions if you have any of these licenses:
- Intercept X Advanced
- Intercept X Advanced for Server
- Intercept X Advanced with XDR
- Intercept X Advanced for Server with XDR
- Managed Detection and Response Essentials
- Managed Detection and Response Complete
- Managed Detection and Response Essentials Server
- Managed Detection and Response Complete Server
Ports
Allow this port:
443 (HTTPS)
Domains
Allow the following domains. Ensure you complete all sections.
Sophos Central Admin domains
- Allow these Sophos domains:
central.sophos.com
cloud-assets.sophos.com
sophos.com
downloads.sophos.com
If your proxy or firewall supports wildcards, you can use the wildcard
*.sophos.com
to cover these addresses.- Allow the following non-Sophos addresses:
az416426.vo.msecnd.net
dc.services.visualstudio.com
Sophos domains
The domains you need to allow depend on whether your firewall or proxy supports wildcards.
Click the appropriate tab for details.
Allow the following wildcards to cover the Sophos domains:
*.sophos.com
*.sophosxl.com
*.sophosxl.net
*.sophosupd.com
*.sophosupd.net
*.darkbytes.com
*.darkbytes.io
*.hitmanpro.com
You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:
*.globalsign.com
*.globalsign.net
*.digicert.com
Note
Some firewalls or proxies show reverse lookups with
*.amazonaws.com
addresses. This is expected as we use Amazon AWS to host several servers. You must add these URLs to your firewall or proxy.Domains for TLS inspection
If you're using TLS inspection or have a firewall that uses application filtering, you must add these domains.
prod.endpointintel.darkbytes.io
kinesis.us-west-2.amazonaws.com
To confirm you need to add these domain exclusions, or to test that the exclusions are effective, check your DNS and your connectivity on a device.
Select the tab for your operating system.
On Windows, do as follows:
- To check your DNS, open PowerShell and enter the following commands:
Resolve-DnsName -Name prod.endpointintel.darkbytes.io
Resolve-DnsName -Name kinesis.us-west-2.amazonaws.com
You should see a DNS response message from each domain.
- To check your connectivity, enter the following command:
Invoke-WebRequest -uri https://prod.endpointintel.darkbytes.io
You should see the following response:
{message: "running..."}
.On Linux and macOS, do as follows:
- To check your DNS, enter the following commands:
host prod.endpointintel.darkbytes.io
host kinesis.us-west-2.amazonaws.com
You should see a DNS response message from each domain.
- To check your connectivity, enter the following command:
`curl -v https://prod.endpointintel.darkbytes.io/`
You should see the following response:
{message: "running..."}
.Sophos AD Sync
If you use Sophos AD Sync to keep your Sophos Central users list up to date with Active Directory, you must also allow the domains in this section.
Restriction
If your firewall doesn't allow wildcards you can't use Sophos AD Sync utility.
- If you're using the Active Directory service, allow the following pre-signed s3 domains:
tf-presigned-url-eu-west-1-prod-*-bucket.s3.eu-west-1.amazonaws.com
tf-presigned-url-eu-central-1-prod-*-bucket.s3.eu-central-1.amazonaws.com
tf-presigned-url-us-east-2-prod-*-bucket.s3.us-east-2.amazonaws.com
tf-presigned-url-us-west-2-prod-*-bucket.s3.us-west-2.amazonaws.com
tf-presigned-url-ca-central-1-prod-*-bucket.s3.ca-central-1.amazonaws.com
tf-presigned-url-ap-southeast-2-prod-*-bucket.s3.ap-southeast-2.amazonaws.com
tf-presigned-url-ap-northeast-1-prod-*-bucket.s3.ap-northeast-1.amazonaws.com
tf-presigned-url-ap-south-1-prod-*-bucket.s3.ap-south-1.amazonaws.com
tf-presigned-url-sa-east-1-prod-*-bucket.s3.sa-east-1.amazonaws.com
- Allow the following wildcards:
*.s3.eu-west-1.amazonaws.com
*.s3.eu-central-1.amazonaws.com
*.s3.us-east-2.amazonaws.com
*.s3.us-west-2.amazonaws.com
*.s3.ca-central-1.amazonaws.com
*.s3.ap-southeast-2.amazonaws.com
*.s3.ap-northeast-1.amazonaws.com
*.s3.ap-south-1.amazonaws.com
*.s3.sa-east-1.amazonaws.com
When using wildcard FQDNs, make sure DNS requests go through your firewall. For more information, see Wildcard FQDN behavior.
Sophos Assistant
Sophos Assistant is a feature in Sophos Central and other Sophos products that helps you complete tasks and find information quickly.
Sophos Assistant is hosted in Whatfix. For the feature to work, you must allow Whatfix domains.
If your data center is outside the EU (European Union), allow these URLs:
https://cdn.whatfix.com/prod/*
https://whatfix.com/service/*
If your data center is in the EU (European Union), allow these URLs:
https://eucdn.whatfix.com/prod/*
https://eu.whatfix.com/service/*
If you have Sophos Firewall, you don't need to follow the steps here. All the domains and ports required for use of Sophos Central are allowed by default.
If you use a non-Sophos firewall or proxy, make sure that it allows the domains and ports listed here. This lets you protect your devices and manage them from Sophos Central.
All features route traffic using the same proxy.
Some of the domains you need to allow are owned by Sophos Central Admin. Others aren't, but are needed for essential operations such as checking that installations work or recognizing certificates.
This page tells you which domains and ports you need for the following products:
- Intercept X, XDR, or MDR. Use this section for your threat protection products.
- Sophos AD Sync. Use this section too if you use Sophos AD Sync to keep your Sophos Central users list up to date.
If you're setting up Sophos Email Security, see Email domain information.
Recommendations
- Don't use firewall regional rules. These could override your allowed list and prevent Sophos products from working. For example, a block on non-US regions could stop services that sometimes run through European regions. This can happen because our products are hosted on Amazon Web Service (AWS), which uses non-static IP addresses. See AWS IP address ranges and Amazon IP addresses.
- Check whether you can use wildcards in your firewall or proxy rules. If you can't, there are some features you can't use.
Intercept X, XDR, or MDR
Follow these instructions if you have any of these licenses:
- Intercept X Advanced
- Intercept X Advanced for Server
- Intercept X Advanced with XDR
- Intercept X Advanced for Server with XDR
- Managed Detection and Response Essentials
- Managed Detection and Response Complete
- Managed Detection and Response Essentials Server
- Managed Detection and Response Complete Server
Ports
Allow this port:
443 (HTTPS)
Domains
Allow the following domains. Ensure you complete all sections.
Sophos Central Admin domains
- Allow these Sophos domains:
central.sophos.com
cloud-assets.sophos.com
sophos.com
downloads.sophos.com
If your proxy or firewall supports wildcards, you can use the wildcard
*.sophos.com
to cover these addresses. - Allow the following non-Sophos addresses:
az416426.vo.msecnd.net
dc.services.visualstudio.com
Sophos domains
The domains you need to allow depend on whether your firewall or proxy supports wildcards.
Click the appropriate tab for details.
Allow the following wildcards to cover the Sophos domains:
*.sophos.com
*.sophosxl.com
*.sophosxl.net
*.sophosupd.com
*.sophosupd.net
*.darkbytes.com
*.darkbytes.io
*.hitmanpro.com
You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:
*.globalsign.com
*.globalsign.net
*.digicert.com
Note
Some firewalls or proxies show reverse lookups with *.amazonaws.com
addresses. This is expected as we use Amazon AWS to host several servers. You must add these URLs to your firewall or proxy.
Domains for TLS inspection
If you're using TLS inspection or have a firewall that uses application filtering, you must add these domains.
prod.endpointintel.darkbytes.io
kinesis.us-west-2.amazonaws.com
To confirm you need to add these domain exclusions, or to test that the exclusions are effective, check your DNS and your connectivity on a device.
Select the tab for your operating system.
On Windows, do as follows:
- To check your DNS, open PowerShell and enter the following commands:
Resolve-DnsName -Name prod.endpointintel.darkbytes.io
Resolve-DnsName -Name kinesis.us-west-2.amazonaws.com
You should see a DNS response message from each domain.
- To check your connectivity, enter the following command:
Invoke-WebRequest -uri https://prod.endpointintel.darkbytes.io
You should see the following response:
{message: "running..."}
.
On Linux and macOS, do as follows:
- To check your DNS, enter the following commands:
host prod.endpointintel.darkbytes.io
host kinesis.us-west-2.amazonaws.com
You should see a DNS response message from each domain.
- To check your connectivity, enter the following command:
`curl -v https://prod.endpointintel.darkbytes.io/`
You should see the following response:
{message: "running..."}
.
Sophos AD Sync
If you use Sophos AD Sync to keep your Sophos Central users list up to date with Active Directory, you must also allow the domains in this section.
Restriction
If your firewall doesn't allow wildcards you can't use Sophos AD Sync utility.
- If you're using the Active Directory service, allow the following pre-signed s3 domains:
tf-presigned-url-eu-west-1-prod-*-bucket.s3.eu-west-1.amazonaws.com
tf-presigned-url-eu-central-1-prod-*-bucket.s3.eu-central-1.amazonaws.com
tf-presigned-url-us-east-2-prod-*-bucket.s3.us-east-2.amazonaws.com
tf-presigned-url-us-west-2-prod-*-bucket.s3.us-west-2.amazonaws.com
tf-presigned-url-ca-central-1-prod-*-bucket.s3.ca-central-1.amazonaws.com
tf-presigned-url-ap-southeast-2-prod-*-bucket.s3.ap-southeast-2.amazonaws.com
tf-presigned-url-ap-northeast-1-prod-*-bucket.s3.ap-northeast-1.amazonaws.com
tf-presigned-url-ap-south-1-prod-*-bucket.s3.ap-south-1.amazonaws.com
tf-presigned-url-sa-east-1-prod-*-bucket.s3.sa-east-1.amazonaws.com
- Allow the following wildcards:
*.s3.eu-west-1.amazonaws.com
*.s3.eu-central-1.amazonaws.com
*.s3.us-east-2.amazonaws.com
*.s3.us-west-2.amazonaws.com
*.s3.ca-central-1.amazonaws.com
*.s3.ap-southeast-2.amazonaws.com
*.s3.ap-northeast-1.amazonaws.com
*.s3.ap-south-1.amazonaws.com
*.s3.sa-east-1.amazonaws.com
When using wildcard FQDNs, make sure DNS requests go through your firewall. For more information, see Wildcard FQDN behavior.
Sophos Assistant
Sophos Assistant is a feature in Sophos Central and other Sophos products that helps you complete tasks and find information quickly.
Sophos Assistant is hosted in Whatfix. For the feature to work, you must allow Whatfix domains.
If your data center is outside the EU (European Union), allow these URLs:
https://cdn.whatfix.com/prod/*
https://whatfix.com/service/*
If your data center is in the EU (European Union), allow these URLs:
https://eucdn.whatfix.com/prod/*
https://eu.whatfix.com/service/*