
Do you have a question about the Sophos WS100 and is the answer not in the manual?
Details the hardware differences between various appliance models, including processors and memory.
Describes various network deployment options for the Sophos Web Appliance.
Details the Explicit Deployment option for configuring client web browsers to use the appliance.
Explains Transparent Deployment where firewall/router redirects traffic to the Web Appliance.
Explains the differences between appliance modes (standalone, joined) and models.
Details how the Sophos Web Appliance provides security and control for web browsing.
Explains how Sophos Web Appliance and Enterprise Console extend web control to endpoints.
Manage appliance administrator accounts and configure end-user notification pages.
Details on creating, modifying, and deleting appliance administrator accounts.
Configure how Sophos Web Appliance policies are applied to user groups or at specific times.
Configure default policies for URL requests based on content type and download types.
Set a second policy to override default rules for URL requests during specific time periods.
Create additional policies as exceptions to Default and Special Hours policies.
Change the Web Appliance's default processing of user web requests.
Configure how the appliance treats websites based on risk level.
Enable or disable HTTPS scanning to provide secure sessions and scan encrypted content.
Change the configuration of the appliance's system software, including updates and alerts.
Check software update status, initiate updates, and schedule automatic updates.
Configure access to your Active Directory server for user and group information.
Configure default authentication settings and create authentication profiles for users.
Change the appliance's connection and identity within your organization's network.
Configure the appliance's IP address, DNS servers, and deployment mode.
Lists the types of reports available, categorized by Traffic & Performance, Users, and Policy & Content.
Search user activity logs by user, site, suspicious activity, or timeline.
Describes common error messages and corrective actions for Active Directory configuration.