Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

7. Enter Username: Enter the username used to log in to the Sophos Firewall. It is recommended that you define a special username to be used exclusively for these scans so that they can be identified in the firewall’s logs.

8. Enter Password: Enter the password used to log in to the Sophos Firewall.

...

9. Select an associated company: Select an existing company in order to add the firewall as an asset of that company.

...

13. When the scan is complete, details of Users, Zones, Groups, Interfaces, Access Rules, and Services are populated for the Sophos Firewall.

...

Completed firewall scans are listed with timestamps as shown below. To view the results of a scan, click the scan in the list.

...