Sophos Chromebook

Posted on  by admin

Learn how to configure XG Firewall to sign in Chromebook users to XG Firewall at the time they sign in to their Chromebook.

Sophos chromebook download


When you complete this unit, you’ll know how to do the following:

Configure Chromebook Manual install. Use chrome web store to install Sophos Chromebook User ID app. If a self-signed certificate is used for the XG, then the CA needs to be imported to the Chromebook. You may need to convert the generated certificate file to.pem,.crt or.cer file to be compatible with the chrome book. In April 2020, zero-day attacks were reported against the Sophos’ XG firewall. These attacks attempted to exploit a SQL injection vulnerability (CVE-2020-12271) targeting the firewall’s built-in PostgreSQL database server. If successfully exploited, this vulnerability would enable attackers to inject code into the database.

  • Configure an Active Directory server in XG Firewall for use with Google Chrome Enterprise.
  • Configure a Chromebook for use with XG Firewall.
  • Configure Google Chrome Enterprise for use with XG Firewall.

Configure Chromebook SSO with Active Directory

Sophos Chromebook Pro

Sophos chromebook updateSophos Chromebook

First configure XG Firewall.

  • Your Active Directory server is already configured for use with G Suite and synchronization has taken place.
  • You know how to configure an Active Directory server in XG Firewall.
  • You know how to create or import certificates.
  • You know how to create firewall rules.
  • Chromebooks can connect to the network controlled by XG Firewall, for example, LAN or Wi-Fi.

Sophos Chromebook Free

  1. Create an Active Directory server.
    The Chromebook users in the AD must have email addresses that use the domain registered with G Suite. For example, if your registered domain is, AD Chromebook users must have an email address like [email protected].
  2. Change device access to allow Chromebook SSO.
    Go to Administration > Device access and select Chromebook SSO for the zone where the Chromebook users are allowed to connect from, for example, LAN and Wi-Fi.
  3. Create or import a valid certificate.
    Note The CN must match the zone/network where the Chromebook users are, for example,

    The certificate must not be protected by a passphrase.

    The certificate is used for SSL-encrypted communication with the Chromebooks.
  4. Go to Authentication > Services > Chromebook SSO, enable the Chromebook SSO feature and specify the following settings:
    The domain as registered with G Suite, that is, the domain suffix of the email addresses used in G Suite, for example, This can be different from your Active Directory domain.
    CertificateThe certificate created/imported above
    Logging levelSelect the amount of logging
  5. Click Download G Suite app config.
    This will download a JSON file that you need to upload later to G Suite.
  6. Open the file with a text editor, enter a value for serverAddress (LAN or DNS IP address of XG Firewall), and save.
    Server address must match the certificate’s CN, for example,
  7. Create firewall rules.
    1. Create a User/Network rule to allow Google API and Chrome Web Store communication for all devices. This is necessary to push the app to the Chromebooks:
      • Source zones, for example: LAN, Wi-Fi
      • Destination zones, for example: WAN
      • Destination networks: Select the predefined FQDN host groups Google API Hosts and Google Chrome Web Store.
    2. Create a User/Network rule to match known users and to show the captive portal to unknown users to allow internet access to Chromebooks:
      • Source zones, for example: LAN, Wi-Fi
      • Destination zones, for example: WAN
      • Identity: Select the following options: Match known users, Show captive portal to unknown users

      Sort both rules so that rule a) is applied before rule b).

      If you don’t select Show captive portal to unknown users in rule b), we recommend that you create another network rule c) to avoid possible waiting time when contacting the Chrome Web Store.

    3. Create a User/Network rule with the following settings:
      • Rule type: Reject
      • Source zones, for example: LAN, Wi-Fi
      • Destination zones: WAN

      Place the rule at the bottom of the list so that the rule is applied last.