Sophos User1175 you can opt out all AV stuff on the new app. Of course this is bad for companies that push the app to mobile devices and only need the authenticator. I don't understand why they put it all together. Probably to monetize it at a later day.

We recommend that users migrate to another authenticator app, such as the authenticator feature in Intercept X for Mobile, Google Authenticator, or other apps. See Migrate to another authenticator application.


Sophos Authenticator Windows Download


Download Zip 🔥 https://urlin.us/2y5Gix 🔥



Sophos Authenticator is a free app for Android published in the System Maintenance list of apps, part of System Utilities.


The company that develops Sophos Authenticator is Sophos GmbH. The latest version released by its developer is 3.4.


To install Sophos Authenticator on your Android device, just click the green Continue To App button above to start the installation process. The app is listed on our website since 2021-04-12 and was downloaded 47 times. We have already checked if the download link is safe, however for your own protection we recommend that you scan the downloaded app with your antivirus. Your antivirus may detect the Sophos Authenticator as malware as malware if the download link to com.sophos.sophtoken is broken.


How to install Sophos Authenticator on your Android device:Click on the Continue To App button on our website. This will redirect you to Google Play.Once the Sophos Authenticator is shown in the Google Play listing of your Android device, you can start its download and installation. Tap on the Install button located below the search bar and to the right of the app icon.A pop-up window with the permissions required by Sophos Authenticator will be shown. Click on Accept to continue the process.Sophos Authenticator will be downloaded onto your device, displaying a progress. Once the download completes, the installation will start and you'll get a notification after the installation is finished.

You can implement multi-factor authentication using hardware or software tokens. You must link software tokens to an authenticator application, such as any third-party authenticator on a mobile device or tablet. When users log on, they must provide a password and a passcode.

I stumbled upon a strange behavoir. Google Authenticator profile for the reset portal overrides the existing one in my Microsoft 2FA app if an authenticator instance already exists- which is the one I setup for the pwstate instance. Is this a known issue, or did I do something wrong?

What I would like to clarify is that we use Microsoft Authenticator app and not Google Authenticator App. It's compatible with Google Authenticator stuff. But somehow, in this case, it get's messed up. The identifier string stays the same. Even if I add pwstate authenticator token first; change it's name and add reset portal authenticator token, it still overrides. I am gambling on that this happens because of them both having an identifier in common which causes the app to think that the both are the same entity with a different token.

For the authenticator issue: We can mark it as resolved. I have 2 devices that check positive and 1 device that gives negative so far (android and ISO device checks positive; 1 ios device checks negative). So we can assume it works and the other device will be troubleshooted here locally.

Not with Azure MFA. For token based second factor I advice to use built in MFA from XG Firewall.

 Been using it a lot with hardware and software tokens (Sophos, Google or Microsoft authenticator App). Any SHA1 hardware token will work. These are the ones I prefer: =372

It all comes down to Access-Challenge response (to fill in code received trough app or SMS) not being sent back to the client as sophos VPN clients (or OpenVPN) does not support this. It will work on userportal only.

WinAuth is a portable, open-source Authenticator for Windows that provides counter or time-based RFC 6238 authenticators and common implementations, such as the Google Authenticator. WinAuth can be used with many Bitcoin trading websites as well as games, supporting Battle.net (World of Warcraft, Hearthstone, Heroes of the Storm, Diablo), Guild Wars 2, Glyph (Rift and ArcheAge), WildStar, RuneScape, SWTOR and Steam.

WinAuth supports any service or website that uses the Google Authenticator, Microsoft Authenticator or an RFC 6283 based authenticator. It also supports games such as Battle.Net (World of Warcraft, Hearthstone, Diablo III), GuildWars 2, Glyph, WildStar, Runescape, SWTOR and Steam.

An unlimited number of authenticators can be stored, each with their own personalized name and icon for quick reference. The WinAuth application can be sized as preferred or automatically displayed to fit.

Each authenticator can be assigned a hot-key to notify, display, clipboard copy or inject the current code into another application. An advanced injection script can also be created to automate username, password and code entry. Scripts are part of the private data and also fully encrypted along with the authenticator data.

Hi Martin,

thanks for this how-to. great work.

one question though:

i see that this is working with the MFA app confirmation, but is it also possible to use the generated 6-digit code of the authenticator app?

just in case you might not have internet access with your smartphone or not every use has setup the confirmation via the app turned on.

now i created a deny network policy on this new radius, where users with ad syncd accounts to sophos like john.doe (who are a member of our standard ssl vpn group synced to sophos) are not allowed to use the mfa function.

This is a great article. I have hit a snag though. the NPS is working and the authenticator asks for the MFA just fine when attempting to connect to the VPN, however it says that AUTH failed. the test works fine in the setup, but after downloading the VPN config and installing it, it just keeps prompting for authentication. Here is the log from the VPN client:

Select I want to use a different authenticator app, and then select Next. 

If you don't see the I want to use a different authenticator app option, then your admin doesn't currently allow you to use verification codes.



Hi.. so we just deployed sophos in ha and under sophos there is two Cisco routers in vrrp. Everything was working fine until we deployed meraki. We did research for 2 whole day only to find out that the issue was due to sophos being in ha. But I don't understand how is sophos being in ha affecting meraki AP to come online. 

Note: We checked the port we connected the AP in our labtop and it was getting an ip. We didn't changed any configuration just disabled ha and the AP was online.

I am unable to any longer access my SSL VPN clients from my internal network. Nothing seems to have changed; however, I can no longer deploy files, browse to them, ping, etc. I have verified firewall rules in windows are correct. Not only that but if I go into Diagnostics on the XGS I can ping a client and get a response from the firewall itself.

Hi everyone. I've screenshotted the invalid traffic log in Sophos in this discussion. The sophos is showing so many invalid logs and I don't know what's really the issue. For context I had two WAN links from same ISP i.e. Primary and secondary sophos link. Now secondary link is down however the secondary link is set such that it will only be active when primary is down .

The most important thing you can do to increase your online security, alongside using a password manager, is to enable two-factor authentication everywhere you can. After interviewing five experts and testing eight authenticator apps, we recommend Duo Mobile, which has the best combination of compatibility, security, usability, and reliability for most people. 17dc91bb1f

cambodia map

download high frequency data

windows 7 media center startup sound download

call tracker pro apk download

lifecycle manager download source not connected