`
UK Sales: 0330 1340 230

Latest News

09/05/2024
by Paul Heritage

Latest blogs and updates from SonicWall-Sales.com

DNS vs URL Filtering - What’s the Difference and Why it Matters.

01/12/2025
by Paul Heritage

Cyberattacks often begin with a single click. That’s why content filtering is more critical than ever in today’s digital landscape. But not all filtering technologies are the same and understanding the difference between DNS and URL filtering can help your organization build a smarter, layered security strategy for web access.

What is DNS Filtering?

DNS filtering works at the Domain Name System (DNS) level.
This is the same system that translates a website (like linkedin.com) into the IP address your device uses to connect.
When DNS filtering is enabled, requests for malicious, risky, or non-compliant domains are blocked before a full connection is established.

Benefits of DNS Filtering:

• Fast and lightweight – stops threats before a page even loads
• Great for remote/hybrid work – protection travels with users
Broad protection – blocks entire domains known for hosting malware, phishing, or botnets.

Example:
If a user clicks a phishing link to malicious-phish.com, DNS filtering stops it from resolving so no connection or download is made (and no risk).

What is URL Filtering?

URL filtering goes deeper. It analyzes the full web address (URL), including the specific page, folder, or file path, after DNS resolution.

This allows organizations to enforce more granular web access policies and send the entire URL for more in-depth evaluation.

Benefits of URL Filtering:

Granular control – Send specific pages for further risk-based evaluation (e.g., example.com/sports/basketball)
Advanced Threat Protection – Stops users from accessing compromised subpages or dangerous downloads on otherwise “safe” domains

Example:
A site like example.com may be generally safe, but example.com/freeware.exe could contain malware. URL filtering catches this.

SonicOS 7.3.1 Released

20/11/2025
by Paul Heritage

Version 7.3.1-7013 - This version of SonicOS 7.3.1 is a maintenance release for existing platforms and also resolves issues found in previous releases.

Release notes: 232-006386-00_RevB_SonicOS_7.3.1_ReleaseNotes.pdf


A new feature included in this release is Credential Auditor.

Credential Auditor is a built-in security feature that helps organizations reduce credential-based risks. It validates user passwords against industry-recognized lists of compromised credentials and provides actionable insights for administrators.

Key Capabilities

  • Automated Credential Checks: Compares user passwords against known compromised credential databases.
  • Risk Identification: Flags accounts with exposed or weak credentials for immediate attention.
  • Administrative Actions: Enables administrators to enforce security measures, such as issuing warnings to affected users and requiring password changes.

Key Features:

  • Provides proactive protection against leaked credentials, securing both local and externally authenticated accounts.
  • Improves password hygiene across the network.
  • Reduces the risk of credential-based attacks.
  • Simplifies compliance with security best practices

More information: Understanding and Using Credential Auditor on SonicWall Firewalls

Which options include SonicWall NSM

15/10/2025
by Paul Heritage

NSM (Network Security Manager) is now included with every Gen7/8 firewall with an active support subscription. Additional features are included in security/support bundles (like Advanced Protection Service Suite or Managed Protection Service Suite).

Buying Options SaaS Management SaaS Reporting
Hardware Only None None
HW + Support Included None
HW + APSS Included 7-days of SaaS Advanced Reporting
HW + MPSS Included 30-days of SaaS Advanced Reporting

If you want to add or increase the storage time you can purchase SaaS 7, 30, 90 or 365 Days of Advanced Reporting and Analytics.

SaaS Reporting

Managed Protection Security Suite (MPSS) & Firewall Best Practice Configurations

15/10/2025
by Paul Heritage

Firewalls need active management. With MPSS, SonicWall experts handle the management of your Generation 7 or 8 firewall, ensuring you always have the best firewall configuration to defend against cyber threats.

SonicWall’s Managed Protection Security Suite (MPSS) brings the expertise of our SonicSentry team to manage and monitor your firewalls, becoming an extension of your team to help you maximise your resources and achieve better security. For MSPs, partnering with us for firewall management can help you grow your business without adding headcount, while also freeing your team to focus on more customer service-oriented tasks.

Managed Protection Security Suite Datasheet

As a prerequisite, a minimum level of configuration is required and a document is available to help. I would advise anyone to set their firewall to best practices and include these amendments.

MSS Managed Firewall Best Practice Configurations

Gen 7 Pricing Increase - 15th October

25/09/2025
by Paul Heritage

Gen 7 pricing will be adjusted starting October 15, 2025, as we continue expanding our Gen 8 portfolio. While both Gen 7 and Gen 8 provide strong, modern capabilities, Gen 8 will be the platform for future innovations and extended lifecycle support.

Gen 8 models in stock

16/09/2025
by Paul Heritage

Many of the new Gen 8 models are in stock (currently limited), but we're getting more in every week.

Added some discounted products - see home page promotions

05/09/2025
by Paul Heritage

Added some discounted products - see home page promotions.

These mostly include some Essential renewal bundles, but also NSa 2700 offer.

Details here.

Migrating to the new Gen 8 models.

14/08/2025
by Paul Heritage

The SonicWall GEN8 TZ Series and GEN8 NSa Series firewalls introduce in-product migration capabilities that allow administrators to import configuration settings from supported legacy SonicWall firewalls. This greatly simplifies the upgrade process by eliminating the need for manual reconfiguration during hardware refresh or platform upgrade.

Settings Import Feature:

  • Export/Import settings
  • Devices must be entirely configured from scratch in a typical greenfield deployment (new setup). With GEN8 firewalls, you can import .exp configuration files from supported legacy devices, streamlining migration.
  • The GEN8 TZ and NSa firewalls support in-product migration from select current and previous generation SonicWall firewalls.
  • This feature is especially useful when upgrading from GEN6 or GEN7 models.

Key Benefits:

  • Reduces time spent on manual configuration
  • Maintains policy consistency across hardware generations
  • Simplifies deployments and rollback planning

Pre-Requisites: The following devices are supported as source firewalls from which settings can be exported and imported to GEN8 TZs and NSa models:

SonicOS 7 Device TZ80 TZ280 TZ380 TZ380W TZ480 TZ580 TZ680 NSa 2800 NSa 3800 NSa 4800 NSa 5800
TZ270 N Y Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ270W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ370 N Y* Y Y* Y* Y* Y* Y* Y* Y* Y*
TZ370W N Y* Y* Y Y* Y* Y* Y* Y* Y* Y*
TZ470 N Y Y Y* Y Y Y Y* Y* Y* Y*
TZ470W N Y* Y* Y Y* Y* Y* Y* Y* Y* Y*
TZ570 N Y Y Y* Y Y Y Y* Y* Y* Y*
TZ570P N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ570W N Y* Y* Y Y* Y* Y* Y* Y* Y* Y*
TZ670 N N Y N Y Y Y Y* Y* Y* Y*
NSA2700 N N N N N N N Y Y* Y* Y*
NSA3700 N N N N N N N Y* Y Y* Y*
NSA4700 N N N N N N N N Y* Y Y*
NSA5700 N N N N N N N N N Y Y
NSA6700 N N N N N N N N N N Y*


SonicOS 6/6.5 Device TZ80 TZ280 TZ380 TZ380W TZ480 TZ580 TZ680 NSa 2800 NSa 3800 NSa 4800 NSa 5800
SOHOW Y Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
SOHO250 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
SOHO250W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ300 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ300P N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ300W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ350 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ350W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ400 N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ400W N Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ500 N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ500W N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ600 N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
TZ600P N N Y* Y* Y* Y* Y* Y* Y* Y* Y*
NSA2600 N N N N N N N Y* Y* Y* Y*
NSA2650 N N N N N N N Y# Y* Y* Y*
NSA3600 N N N N N N N Y* Y* Y* Y*
NSA3650 N N N N N N N N Y* Y* Y*
NSA4600 N N N N N N N N Y* Y* Y*
NSA4650 N N N N N N N N Y* Y* Y*
NSA5600 N N N N N N N N N Y* Y*
NSA5650 N N N N N N N N N Y* Y*
NSA6600 N N N N N N N N N N Y*
NSA6650 N N N N N N N N N N Y*
SM9200 N N N N N N N N N N N
NSA9250 N N N N N N N N N N N
SM9400 N N N N N N N N N N N
NSa9450 N N N N N N N N N N N
SM9600 N N N N N N N N N N N
NSa9650 N N N N N N N N N N N
SM9800 N N N N N N N N N N N
NSSP12400 N N N N N N N N N N N
NSSP12800 N N N N N N N N N N N


SonicOS 5 Device TZ280 TZ380 TZ380W TZ480 TZ580 TZ680 NSa 2800 NSa 3800 NSa 4800 NSa 5800
SOHO Y* Y* Y* Y* Y* Y* Y* Y* Y* Y*
Y
Supported
N
Unsupported
Y*
Supported but import will fail if VLAN or Tunnel Interfaces are present in the settings file.
Important: Please remove the VLAN or tunnel interface configuration for the settings import to succeed- Recommended. Alternatively, use the Existing Migration Tool to convert the settings and import them to the GEN8 firewalls.
Y#
In-Product Migration is Unsupported. Use Migration App via NSM to support settings Migration


EPSS Retirement Notice: Transition to APSS or MPSS

31/07/2025
by Paul Heritage

SonicWall will retire the Essential Protection Service Suite (EPSS) effective August 1, 2025.

In today’s threat landscape — where cyberattacks use automation, AI, and advanced evasion — customers need a simple, effective solution. To address this, we’re simplifying our service portfolio to make it easier to deliver the protection your customers expect.

As of August 1, SonicWall will offer a single subscription bundle: the Advanced Protection Service Suite (APSS) — delivering best-in-class threat prevention at a low total cost of ownership.

Partners in the Service Provider Program can also choose the Managed Protection Service Suite (MPSS), which adds the firewall management expertise of the SonicSentry NOC. MPSS is currently available in NOAM, with global availability coming soon.

We encourage you to begin transitioning your customers to APSS or MPSS, both of which include advanced security, support, and SaaS-based reporting and analytics.

MSS Managed Firewall Mandatory Configurations

18/07/2025
by Paul Heritage

Device > Settings > Administration > Login / Multiple Administrators > Login security

Device > Settings > AdministrationLogin / Multiple Administrators > Login security

Option

Best Practice Value

Default Value

Password must be changed every (days)

90

Disabled

Change password after (hours)

1

1

Bar repeated passwords for this many changes

4

Disabled

New password must contain 8 characters different from the old password

Enable

Disabled

Enforce a minimum password length of

12

8

Enforce password complexity

Alphanumeric and symbolic characters

None

Complexity Requirement - Upper Case Characters

2

0

Complexity Requirement - Lower Case Characters

2

0

Complexity Requirement - Number Characters

2

0

Complexity Requirement - Symbolic Characters

2

0

Log out the Admin after inactivity of (mins)

20

5

Admin/user lockout

Enable

Disabled

Local admin/user account lockout

Enable

Disabled

Device > Settings > Firmware and Settings

Option

Best Practice Value

Default Value

Cloud Backup

Enabled

Disabled

Device > Users > Settings > Authentication

Option

Best Practice Value

Default Value

Display user login info since last login

Enabled

Disabled

Device > AppFlow > Flow Reporting > Settings

Option

Best Practice Value

Default Value

Enable AppFlow To Local Collector

Enabled

Disabled

Device > Log > Settings

Option

Best Practice Value

Default Value

Logging Level

Inform

Warning

Alert Level

Error

Alert

Device > Log > Name Resolution

Option

Best Practice Value

Default Value

Name Resolution Method

DNS

None

Network > SSLVPN > Server Settings

Option

Best Practice Value

Default Value

Inactivity Timeout (minutes)

60

10

Mouse Inactivity Check

Enabled

Disabled

Network > Firewall > Advanced > Settings

Option

Best Practice Value

Default Value

Enable Stealth Mode

Enabled

Disabled

Randomize IP ID

Enabled

Disabled

Decrement IP TTL for forwarded traffic

Enabled

Disabled

Never generate ICMP Time-Exceeded packets

Enabled

Disabled

Network > Firewall > Advanced > Connections

Option

Best Practice Value

Default Value

Enable Control Plane Flood Protection

Enabled

Disabled

Network > Firewall > Flood Protection > TCP > Layer 3 SYN Flood Protection - SYN Proxy

Option

Best Practice Value

Default Value

SYN Flood Protection Mode

Proxy WAN client connections when attack is suspected

Watch and report possible SYN floods

Network > Firewall > Flood Protection > UDP

Option

Best Practice Value

Default Value

Default UDP Connection Timeout

60

30

Enable UDP Flood Protection

Enabled

Disabled

UDP Flood Attack Threshold

5000

1000

Network > Firewall > Flood Protection > ICMP

Option

Best Practice Value

Default Value

Enable ICMP Flood Protection

Enabled

Disabled

Network > VoIP > Settings

Option

Best Practice Value

Default Value

Enable consistent NAT

Enabled

Disabled

Policy > Security Services > Gateway Anti-Virus

Option

Best Practice Value

Default Value

Enable Gateway Anti-Virus

Enabled

Disabled

PROTOCOLS - FTP Inbound & Outbound Inspection

Enabled

Disabled

PROTOCOLS - HTTP Inbound & Outbound Inspection

Enabled

Disabled

PROTOCOLS - IMAP Inbound Inspection

Enabled

Disabled

PROTOCOLS - POP3 Inbound Inspection

Enabled

Disabled

PROTOCOLS - SMTP Inbound & Outbound Inspection

Enabled

Disabled

PROTOCOLS - TCP STREAM Inbound & Outbound Inspection

Enabled

Disabled

Policy > Security Services > Anti-Spyware

Option

Best Practice Value

Default Value

Enable Anti-Spyware

Enabled

Disabled

SIGNATURE GROUPS - High Priority Spyware PREVENT & DETECT ALL

Enabled

Disabled

SIGNATURE GROUPS - Medium Priority Spyware PREVENT & DETECT ALL

Enabled

Disabled

SIGNATURE GROUPS - Low Priority Spyware PREVENT & DETECT ALL

Enabled

Disabled

PROTOCOLS - Enable Inbound Instpection for:

  • HTTP
  • FTP
  • IMAP
  • SMTP
  • POP3

Enabled

Disabled

Enable Inspection of Outbound Spyware Communication

Enabled

Disabled

Policy > Security Services > Intrusion Prevention

Option

Best Practice Value

Default Value

Enable IPS

Enabled

Disabled

Signature Groups - High Priority Attackes PREVENT & DETECT ALL

Enabled

Disabled

Signature Groups - Medium Priority Attackes PREVENT & DETECT ALL

Enabled

Disabled

Policy > Capture ATP > Settings > Basic

Option

Best Practice Value

Default Value

Enable Capture ATP

Enabled

Disabled

File types for Capture ATP analysis:

  • Executables (PE, Mach-O, and DMG)
  • PDF
  • Office 97-2003(.doc , .xls ,etc.)
  • Office (.docx , .xlsx ,etc.)
  • Archives (.jar, .apk, .rar, .bz2, .bzip2, .7z, .xz, .gz, and .zip)

Enabled

Disabled

Policy > Security Services > Geo-IP Filter

Option

Best Practice Value

Default Value

Block connections to/from countries selected in the Countries tabs

Enabled

Disabled

Enable Logging

Enabled

Disabled

Block all Unknown countries

Enabled

Disabled

Countries:

  • Afghanistan
  • Algeria
  • Azerbaijan
  • Bangladesh
  • Belarus
  • Bosnia and Herzegovina
  • Brazil
  • Burundi
  • Central African Republic
  • China
  • Comoros
  • Congo, The Democratic Republic
  • Cuba
  • Eritrea
  • Guatemala
  • Guinea
  • Guinea-Bissau
  • Haiti
  • India
  • Iran, Islamic Republic of
  • Iraq
  • Korea, Democratic People's Repu
  • Lebanon
  • Mali
  • Moldova, Republic of
  • Montenegro
  • Myanmar
  • Nicaragua
  • Niger
  • Pakistan
  • Russian Federation
  • Saudi Arabia
  • Somalia
  • Sudan
  • Syrian Arab Republic
  • Tajikistan
  • Tunisia
  • Turkey
  • Turkmenistan
  • Ukraine
  • Venezuela
  • Vietnam
  • Yemen
  • Zimbabwe

Blocked

Allowed

Policy > Security Services > Botnet Fiter

Option

Best Practice Value

Default Value

Block connections to/from Botnet Command and Control Servers

Enabled

Disabled

Enable Logging

Enabled

Disabled

Policy > Security Services > App Control

Option

Best Practice Value

Default Value

Enable App Control

Enabled

Disabled

Enable Logging for All Apps

Enabled

Disabled

Policy > Security Services > App Control > Signatures

Option

Best Practice Value

Default Value

Categories:

  • APP-UPDATE
  • BROWSING-PRIVACY
  • FILETYPE-DETECTION
  • IM
  • INFRASTRUCTURE
  • MISC-APPS
  • MOBILE-APPS
  • MULTIMEDIA
  • PROTOCOLS
  • VoIP-APPS
  • WEB-BROWSER
  • WEB-CONFERENCING

No Logging

Categories:

  • GAMING
  • MINERS
  • P2P

Log & Block

No Logging or Blocking

Objects > Match Objects > URI Lists

Option

Best Practice Value

Default Value

CFS Global Allow List

  • sonicwall.com

Created

N/A

CFS Global Block List

  • malware[.]com
  • 123movies[.]to
  • phishlabs[.]com
  • isthatphish[.]com
  • onion[.]ws
  • emotet[.]in

Created

N/A

Objects > Profile Objects > Content Filter > CFS Default Profile > Settings > URI List

Option

Best Practice Value

Default Value

CFS Global Allow List

Specified under Allowed URI List

N/A

CFS Global Block List

Specified under Forbidden URI List

N/A

Objects > Profile Objects > Content Filter > CFS Default Profile > Settings > Category

Option

Best Practice Value

Default Value

Categories:

  • Alcohol/Tobacco
  • Gambling
  • Weapons
  • Drugs/Illegal Drugs

Allowed

Blocked

Categories:

  • Pay to Surf Sites

Blocked

Allowed

Objects > Profile Objects > Content Filter > CFS Default Profile > Settings > Reputation

Option

Best Practice Value

Default Value

Enable Reputation

Enabled

Disabled

Reputation Action

CFS Default Reputation Object

N/A

Objects > Profile Objects > Content Filter > CFS Default Profile > Advanced

Option

Best Practice Value

Default Value

Enable HTTPS Content Filtering

Enabled

Disabled

Enable Google Force Safe Search

Enabled

Disabled

Enable Bing Force Safe Search

Enabled

Disabled

Policy > Rules and Policies > Content Filter Rules > CFS Default Policy

Option

Best Practice Value

Default Value

Source Zone

ALL

LAN


Threat Actors Modify and Re-Create Commercial Software to Steal Users’ Information.

25/06/2025
by Paul Heritage

In collaboration with Microsoft Threat Intelligence (MSTIC), SonicWall has identified a deceptive campaign to distribute a hacked and modified version of SonicWall’s SSL VPN NetExtender application that closely resembles the official SonicWall NetExtender software. NetExtender enables remote users to securely connect and run applications on the company network. Users can upload and download files, access network drives, and use other resources as if they were on the local network. Security solutions from SonicWall (GAV: Fake-NetExtender [Trojan]) and Microsoft (TrojanSpy:Win32/SilentRoute.A) will flag the installer as malicious and enable proactive defenses.

The website impersonating the legitimate NetExtender is hosting a Trojanized version of SonicWall’s actual NetExtender version 10.3.2.27 (the latest release version), digitally signed by “CITYLIGHT MEDIA PRIVATE LIMITED.”



The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server.

Technical Details

The threat actor modified the following component files, which are part of the NetExtender installer, to execute the application and send configuration information to a remote server:

  • NeService.exe (Modified file; digital signature is invalid)
  • NetExtender.exe (Modified file; no digital signature)



Modifications to NeService.exe

This file is the SonicWall NetExtender Windows service used by the NetExtender application. It contains a function used to validate the digital certificates of NetExtender components. Upon successful validation, the program continues to execute; otherwise, it displays a validation failure message and exits.




In the malicious installer, this file is patched at all locations where the function results are evaluated. The patch bypasses the check, allowing execution to continue regardless of validation results.




Modifications to NetExtender.exe

Additional code was added to send VPN configuration information to a remote server with the IP address 132.196.198.163 over port 8080. Once the VPN configuration details are entered and the “Connect” button is clicked, the malicious code performs its own validation before sending the data to the remote server. Stolen configuration information includes the username, password, domain, and more.



Mitigation

SonicWall and Microsoft have acted quickly to take down the impersonating websites and have had the installer’s digital certificate revoked.

It is strongly recommended that users download SonicWall applications only from trusted sources: sonicwall.com or mysonicwall.com.

SonicWall Capture ATP with RTDMI™ detects the malicious installer, and SonicWall Managed Security Services identifies and blocks it as:

  • GAV: Fake-NetExtender (Trojan)

Microsoft Defender Antivirus detects this as:

  • "SilentRoute" Trojan ("TrojanSpy:Win32/SilentRoute.A")

IOCs

Sha256:

  • d883c067f060e0f9643667d83ff7bc55a218151df600b18991b50a4ead513364 : Malicious NetExtender Installer
  • 71110e641b60022f23f17ca6ded64d985579e2774d72bcff3fdbb3412cb91efd : Malicious NEService.exe
  • e30793412d9aaa49ffe0dbaaf834b6ef6600541abea418b274290447ca2e168b: Malicious NetExtender.exe

Network:

  • 132.196.198.163

DNS vs URL Filtering

30/05/2025
by Paul Heritage

DNS vs URL Filtering - What’s the Difference and Why it Matters.

Cyberattacks often begin with a single click. That’s why content filtering is more critical than ever in today’s digital landscape. But not all filtering technologies are the same and understanding the difference between DNS and URL filtering can help your organization build a smarter, layered security strategy for web access.

What is DNS Filtering?

DNS filtering works at the Domain Name System (DNS) level. This is the same system that translates a website (like linkedin.com) into the IP address your device uses to connect.

When DNS filtering is enabled, requests for malicious, risk, or non-compliant domains are blocked before a full connection is established.

Benefits of DNS Filtering:

  • Fast and lightweight – stops threats before a page even loads
  • Great for remote/hybrid work – protection travels with users
  • Broad protection – blocks entire domains known for hosting malware, phishing, or botnets

What is URL Filtering?

URL filtering goes deeper. It analyzes the full web address (URL), including the specific page, folder, or file path, after DNS resolution.

This allows organizations to enforce more granular web access policies and send the entire URL for more in-depth evaluation.

Benefits of URL Filtering:

  • Granular control – Send specific pages for further risk-based evaluation (e.g., example.com/ sports/basketball)
  • Advanced Threat Protection – Stops users from accessing compromised subpages or dangerous downloads on otherwise “safe” domains

Why You Need Both

DNS filtering is your first line of defense by keeping users from even reaching known bad destinations. URL filtering is your second layer which analyzes deeper content on the fly to catch what DNS filtering didn’t.

Together they give you:

  • Comprehensive threat coverage to prevent data loss and breaches
  • Flexible policy-based controls based on user groups • A layered security approach that’s secures web access wherever your users are
FEATURE DNS FILTERING URL FILTERING
Layer Network (DNS)
Application (HTTP/S)
Granularity
Domain-wide
Path-specific (URLs, subpages, files)
Speed
Fast, blocks early
Slightly slower, more detailed
Use Cases
Stop known threats early
Enforce deeper inspection
Best For
Lightweight, broad protection
Granular content filtering and policy enforcement