Skip to content

Sophos Endpoint Agent Installation Information and Prerequisites๐Ÿ”—

This document provides essential information and prerequisites for installing the Sophos Endpoint Agent. Setting up your firewall or proxy correctly is crucial to ensure the protection and management of your devices.

Domains and Ports Setup๐Ÿ”—

You must configure your firewall or proxy to allow the necessary domains and ports. This setup allows all features to route traffic using the same proxy. Some domains are owned by Sophos, while others are essential for operations such as verifying installations or recognizing certificates.

Note

Apply the configuration steps below only if your firewall blocks outbound traffic by default (default deny). If your environment allows outbound traffic by default, skip these steps.

Recommendations๐Ÿ”—

  • Avoid Regional Firewall Rules: These rules could override your allow list and prevent Sophos Agent from functioning correctly. For example, blocking non-US regions might hinder services running through European regions due to hosting on Amazon Web Services (AWS), which uses non-static IP addresses. See AWS IP address ranges and Amazon IP addresses.
  • Use Wildcards: If your firewall or proxy supports wildcards, it can simplify configuration. If not, some features may be unavailable.

Ports๐Ÿ”—

  • Allow this port: 443 (HTTPS)

Domains๐Ÿ”—

Sophos Central Admin Domains๐Ÿ”—

Allow these Sophos domains:

  • central.sophos.com
  • cloud-assets.sophos.com
  • sophos.com
  • downloads.sophos.com

If your proxy or firewall supports wildcards, you can use the wildcard *.sophos.com to cover these addresses.

Non-Sophos Addresses๐Ÿ”—

Allow the following non-Sophos addresses:

  • az416426.vo.msecnd.net
  • dc.services.visualstudio.com

Sophos Domains๐Ÿ”—

The domains you need to allow depend on whether your firewall or proxy supports wildcards.

Click the appropriate tab for details.

Allow the following wildcards to cover the Sophos domains:

  • *.sophos.com
  • *.sophosxl.com
  • *.sophosxl.net
  • *.sophosupd.com
  • *.sophosupd.net
  • *.hitmanpro.com

You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:

  • *.globalsign.com
  • *.globalsign.net
  • *.digicert.com

Allow the following wildcards to cover the Sophos domains:

  • ^sophos\.com/
  • ^[A-Za-z0-9.-]*\.sophos\.com.?/
  • ^[A-Za-z0-9.-]*\.sophosxl\.com.?/
  • ^[A-Za-z0-9.-]*\.sophosxl\.net.?/
  • ^[A-Za-z0-9.-]*\.sophosupd\.com.?/
  • ^[A-Za-z0-9.-]*\.sophosupd\.net.?/
  • ^[A-Za-z0-9.-]*\.hitmanpro\.com.?/

You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:

  • ^[A-Za-z0-9.-]*\.globalsign\.com.?/
  • ^[A-Za-z0-9.-]*\.globalsign\.net.?/
  • ^[A-Za-z0-9.-]*\.digicert\.com.?/

If your proxy or firewall doesn't support wildcards, you must manually add the exact domains you need.

Allow these Sophos domains:

  • central.sophos.com
  • cloud-assets.sophos.com
  • sophos.com
  • downloads.sophos.com

You also need to identify the server addresses that the Sophos management communication system and the device installers use to communicate with Sophos Central Admin securely. Click the tab corresponding to your device's operating system and follow the steps to identify and allow these addresses.

On Windows devices, do as follows:

  1. Open SophosCloudInstaller.log. You can find it in C:\ProgramData\Sophos\CloudInstaller\Logs.
  2. Look for the line starting Opening connection to.

    There will be at least two entries. The first will look like one of these:

    • dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.com
    • mcs2-cloudstation-us-east-2.prod.hydra.sophos.com
    • mcs.stn100yul.ctr.sophos.com
    • mcs2.stn100yul.ctr.sophos.com

    The second will look like one of these:

    • dzr-api-amzn-eu-west-1-9af7.api-upe.p.hmr.sophos.com
    • api-cloudstation-us-east-2.prod.hydra.sophos.com
    • api.stn100yul.ctr.sophos.com

    Add both the domains to your rules.

  3. Add the following addresses:

    • t1.sophosupd.com
    • sus.sophosupd.com
    • sdds3.sophosupd.com
    • sdds3.sophosupd.net
    • sdu-auto-upload.sophosupd.com
    • sdu-feedback.sophos.com
    • sophosxl.net
    • 4.sophosxl.net
    • samples.sophosxl.net
    • cloud.sophos.com
    • id.sophos.com
    • central.sophos.com
    • downloads.sophos.com
    • alert.hitmanpro.com
    • ssp.sophos.com
    • sdu-auto-upload.sophosupd.com
    • rca-upload-cloudstation-us-west-2.prod.hydra.sophos.com
    • rca-upload-cloudstation-us-east-2.prod.hydra.sophos.com
    • rca-upload-cloudstation-eu-west-1.prod.hydra.sophos.com
    • rca-upload-cloudstation-eu-central-1.prod.hydra.sophos.com
    • rca-upload.stn100bom.ctr.sophos.com
    • rca-upload.stn100yul.ctr.sophos.com
    • rca-upload.stn100hnd.ctr.sophos.com
    • rca-upload.stn100gru.ctr.sophos.com
    • rca-upload.stn100syd.ctr.sophos.com
  4. Add the domains required for Sophos Management Communication System:

    • dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.com
    • dzr-mcs-amzn-us-west-2-fa88.upe.p.hmr.sophos.com
    • mcs-cloudstation-eu-central-1.prod.hydra.sophos.com
    • mcs-cloudstation-eu-west-1.prod.hydra.sophos.com
    • mcs-cloudstation-us-east-2.prod.hydra.sophos.com
    • mcs-cloudstation-us-west-2.prod.hydra.sophos.com
    • mcs2-cloudstation-eu-west-1.prod.hydra.sophos.com
    • mcs2-cloudstation-eu-central-1.prod.hydra.sophos.com
    • mcs2-cloudstation-us-east-2.prod.hydra.sophos.com
    • mcs2-cloudstation-us-west-2.prod.hydra.sophos.com
    • mcs.stn100syd.ctr.sophos.com
    • mcs.stn100yul.ctr.sophos.com
    • mcs.stn100hnd.ctr.sophos.com
    • mcs2.stn100syd.ctr.sophos.com
    • mcs2.stn100yul.ctr.sophos.com
    • mcs2.stn100hnd.ctr.sophos.com
    • mcs.stn100gru.ctr.sophos.com
    • mcs2.stn100gru.ctr.sophos.com
    • mcs.stn100bom.ctr.sophos.com
    • mcs2.stn100bom.ctr.sophos.com
    • mcs-push-server-eu-west-1.prod.hydra.sophos.com
    • mcs-push-server-eu-central-1.prod.hydra.sophos.com
    • mcs-push-server-us-west-2.prod.hydra.sophos.com
    • mcs-push-server-us-east-2.prod.hydra.sophos.com
    • mcs-push-server.stn100yul.ctr.sophos.com
    • mcs-push-server.stn100syd.ctr.sophos.com
    • mcs-push-server.stn100hnd.ctr.sophos.com
    • mcs-push-server.stn100gru.ctr.sophos.com
    • mcs-push-server.stn100bom.ctr.sophos.com
  5. Add the domains required for the SophosLabs Intelix service:

    • us.analysis.sophos.com
    • apac.analysis.sophos.com
    • au.analysis.sophos.com
    • eu.analysis.sophos.com
    • analysis.sophos.com
  6. Add these domains if your license includes XDR or MDR:

    • live-terminal-eu-west-1.prod.hydra.sophos.com
    • live-terminal-eu-central-1.prod.hydra.sophos.com
    • live-terminal-us-west-2.prod.hydra.sophos.com
    • live-terminal-us-east-2.prod.hydra.sophos.com
    • live-terminal.stn100yul.ctr.sophos.com
    • live-terminal.stn100syd.ctr.sophos.com
    • live-terminal.stn100hnd.ctr.sophos.com
    • live-terminal.stn100gru.ctr.sophos.com
    • live-terminal.stn100bom.ctr.sophos.com
  7. You may need to allow access to the following Certificate Authority sites if your firewall doesn't already allow them:

    • ocsp.globalsign.com
    • ocsp2.globalsign.com
    • crl.globalsign.com
    • crl.globalsign.net
    • ocsp.digicert.com
    • crl3.digicert.com
    • crl4.digicert.com

On macOS devices, do as follows:

  1. Download and extract SophosInstall.zip. See Before Installation.
  2. Open SophosCloudConfig.plist. You can find it in the SophosInstall/Sophos Installer Components directory.
  3. Look for the RegistrationServerURL key. The string that follows it contains a URL. Add this domain to your rules.
  4. Add the following addresses:

    • t1.sophosupd.com
    • sus.sophosupd.com
    • sdds3.sophosupd.com
    • sdds3.sophosupd.net
    • sdu-auto-upload.sophosupd.com
    • sdu-feedback.sophos.com
    • sophosxl.net
    • 4.sophosxl.net
    • samples.sophosxl.net
    • cloud.sophos.com
    • id.sophos.com
    • central.sophos.com
    • downloads.sophos.com
    • amazonaws.com
    • ssp.sophos.com
    • sdu-auto-upload.sophosupd.com
    • rca-upload-cloudstation-us-west-2.prod.hydra.sophos.com
    • rca-upload-cloudstation-us-east-2.prod.hydra.sophos.com
    • rca-upload-cloudstation-eu-west-1.prod.hydra.sophos.com
    • rca-upload-cloudstation-eu-central-1.prod.hydra.sophos.com
    • rca-upload.stn100bom.ctr.sophos.com
    • rca-upload.stn100yul.ctr.sophos.com
    • rca-upload.stn100hnd.ctr.sophos.com
    • rca-upload.stn100gru.ctr.sophos.com
    • rca-upload.stn100syd.ctr.sophos.com
  5. Add the domains required for Sophos Management Communication System:

    • dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.com
    • dzr-mcs-amzn-us-west-2-fa88.upe.p.hmr.sophos.com
    • mcs-cloudstation-eu-central-1.prod.hydra.sophos.com
    • mcs-cloudstation-eu-west-1.prod.hydra.sophos.com
    • mcs-cloudstation-us-east-2.prod.hydra.sophos.com
    • mcs-cloudstation-us-west-2.prod.hydra.sophos.com
    • mcs2-cloudstation-eu-west-1.prod.hydra.sophos.com
    • mcs2-cloudstation-eu-central-1.prod.hydra.sophos.com
    • mcs2-cloudstation-us-east-2.prod.hydra.sophos.com
    • mcs2-cloudstation-us-west-2.prod.hydra.sophos.com
    • mcs.stn100syd.ctr.sophos.com
    • mcs.stn100yul.ctr.sophos.com
    • mcs.stn100hnd.ctr.sophos.com
    • mcs2.stn100syd.ctr.sophos.com
    • mcs2.stn100yul.ctr.sophos.com
    • mcs2.stn100hnd.ctr.sophos.com
    • mcs.stn100gru.ctr.sophos.com
    • mcs2.stn100gru.ctr.sophos.com
    • mcs.stn100bom.ctr.sophos.com
    • mcs2.stn100bom.ctr.sophos.com
  6. Add the domains required for the SophosLabs Intelix service:

    • us.analysis.sophos.com
    • apac.analysis.sophos.com
    • au.analysis.sophos.com
    • eu.analysis.sophos.com
  7. You may need to allow access to the following Certificate Authority sites if they aren't allowed by your firewall:

    • ocsp.globalsign.com
    • ocsp2.globalsign.com
    • crl.globalsign.com
    • crl.globalsign.net
    • ocsp.digicert.com
    • crl3.digicert.com
    • crl4.digicert.com

On Linux devices, do as follows:

  1. Find SophosSetup.sh on your device.
  2. Run the following command to start the installer and print the output.

    sudo bash -x ./SophosSetup.sh
    
  3. Look for the following lines:

    • line starting + CLOUD_URL=https://
    • line starting + MCS_URL=https://

    Add the domains from both lines to your rules.

  4. Add the following addresses:

    • t1.sophosupd.com
    • sus.sophosupd.com
    • sdds3.sophosupd.com
    • sdds3.sophosupd.net
    • sdu-feedback.sophos.com
    • sophosxl.net
    • 4.sophosxl.net
    • samples.sophosxl.net
    • cloud.sophos.com
    • id.sophos.com
    • central.sophos.com
    • downloads.sophos.com
  5. Add the domains required for Sophos Management Communication System:

    • dzr-mcs-amzn-eu-west-1-9af7.upe.p.hmr.sophos.com
    • dzr-mcs-amzn-us-west-2-fa88.upe.p.hmr.sophos.com
    • mcs-cloudstation-eu-central-1.prod.hydra.sophos.com
    • mcs-cloudstation-eu-west-1.prod.hydra.sophos.com
    • mcs-cloudstation-us-east-2.prod.hydra.sophos.com
    • mcs-cloudstation-us-west-2.prod.hydra.sophos.com
    • mcs2-cloudstation-eu-west-1.prod.hydra.sophos.com
    • mcs2-cloudstation-eu-central-1.prod.hydra.sophos.com
    • mcs2-cloudstation-us-east-2.prod.hydra.sophos.com
    • mcs2-cloudstation-us-west-2.prod.hydra.sophos.com
    • mcs.stn100syd.ctr.sophos.com
    • mcs.stn100yul.ctr.sophos.com
    • mcs.stn100hnd.ctr.sophos.com
    • mcs2.stn100syd.ctr.sophos.com
    • mcs2.stn100yul.ctr.sophos.com
    • mcs2.stn100hnd.ctr.sophos.com
    • mcs.stn100gru.ctr.sophos.com
    • mcs2.stn100gru.ctr.sophos.com
    • mcs.stn100bom.ctr.sophos.com
    • mcs2.stn100bom.ctr.sophos.com
    • mcs-push-server-eu-west-1.prod.hydra.sophos.com
    • mcs-push-server-eu-central-1.prod.hydra.sophos.com
    • mcs-push-server-us-west-2.prod.hydra.sophos.com
    • mcs-push-server-us-east-2.prod.hydra.sophos.com
    • mcs-push-server.stn100yul.ctr.sophos.com
    • mcs-push-server.stn100syd.ctr.sophos.com
    • mcs-push-server.stn100hnd.ctr.sophos.com
    • mcs-push-server.stn100gru.ctr.sophos.com
    • mcs-push-server.stn100bom.ctr.sophos.com
  6. Add the domains required for the SophosLabs Intelix service:

    • us.analysis.sophos.com
    • apac.analysis.sophos.com
    • au.analysis.sophos.com
    • eu.analysis.sophos.com
  7. Add these domains if your license includes XDR or Taegis MDR:

    • live-terminal-eu-west-1.prod.hydra.sophos.com
    • live-terminal-eu-central-1.prod.hydra.sophos.com
    • live-terminal-us-west-2.prod.hydra.sophos.com
    • live-terminal-us-east-2.prod.hydra.sophos.com
    • live-terminal.stn100yul.ctr.sophos.com
    • live-terminal.stn100syd.ctr.sophos.com
    • live-terminal.stn100hnd.ctr.sophos.com
    • live-terminal.stn100gru.ctr.sophos.com
    • live-terminal.stn100bom.ctr.sophos.com
  8. You may need to allow access to the following Certificate Authority sites if they aren't allowed by your firewall:

    • ocsp.globalsign.com
    • ocsp2.globalsign.com
    • crl.globalsign.com
    • crl.globalsign.net
    • ocsp.digicert.com
    • crl3.digicert.com
    • crl4.digicert.com

Note

Some firewalls or proxies show reverse lookups with *.amazonaws.com addresses. This is expected as we use Amazon AWS to host several servers. You must add these URLs to your firewall or proxy.

Proxy Configuration๐Ÿ”—

You can configure Sophos Agent to connect to Sophos Central or download Sophos updates through a proxy server. This section explains how to configure proxy settings in Sophos Central.

If you prefer, you can configure the proxy settings directly on each device. For details, see Configure Devices to Use Proxy Server Settings.

Configure the Proxy๐Ÿ”—

These steps enable both computers and servers to use the proxy server.

  1. Select My Products โ†’ General Settings โ†’ Proxy Configuration.
  2. On the Proxy Configuration page, turn on Proxy Configuration.
  3. Enter the proxy settings:

    • Hostname. For example, proxy.example.net.
    • Port. For example, 8080.
    • Username and Password for the proxy.
  4. Select Save.

Note

For security reasons, we can't recover the password. When you select Save, you may overwrite an existing password.

How Devices Connect๐Ÿ”—

Sophos Agent devices connect to the internet using the first working configuration they find. Devices attempt to connect in the following order:

  1. Use a Sophos Central Message Relay.
  2. Use the proxy configuration detailed here.
  3. Use the default system proxy.
  4. Use an automatically discovered proxy (WPAD).
  5. Connect without using a proxy.

Managing Endpoint Software๐Ÿ”—

You can manage your Sophos Agent installation directly from Sophos Central. This feature enables you to easily upgrade from Sophos Agent Detection Only to Sophos Endpoint Agent to add advanced preventative controls when needed. If necessary, you can also downgrade from Sophos Endpoint Agent to Sophos Agent Detection Only.

You can apply these actions to both computers and servers.

  1. Go to My Products โ†’ Endpoint โ†’ Computers.
  2. Use the checkboxes to select individual computers, or use the select-all checkbox to manage all computers.
  3. Click Manage Endpoint Software to open the configuration modal.

Manage Computer Software

In the modal, use Agent Mode to switch the selected agents to a different software mode or to remotely uninstall the agent.

You can also use the Encryption option to enforce encryption on the selected endpoint(s).

  1. Go to My Products โ†’ Endpoint โ†’ Servers.
  2. Use the checkboxes to select individual servers, or use the select-all checkbox to manage all servers.
  3. Click Manage Endpoint Software to open the configuration modal.

Manage Server Software

In the modal, use Agent Mode to switch the selected agents to a different software mode or to remotely uninstall the agent.

Note

The Encryption option is not available for servers.