<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection options to apply only to devices that trust CA in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-options-to-apply-only-to-devices-that-trust-CA/m-p/116471#M16426</link>
    <description>&lt;P&gt;I would think a properly defined Access Role would be sufficient (one that only matches things where both a user and machine identity was acquired in Active Directory).&amp;nbsp;&lt;BR /&gt;Something defined similar to the following:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-04-20 at 5.37.02 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11452i159174F772DCC952/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-04-20 at 5.37.02 PM.png" alt="Screen Shot 2021-04-20 at 5.37.02 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-04-20 at 5.36.47 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11453iDE929519C85B5A1D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-04-20 at 5.36.47 PM.png" alt="Screen Shot 2021-04-20 at 5.36.47 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;  &lt;/P&gt;</description>
    <pubDate>Wed, 21 Apr 2021 00:38:25 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-04-21T00:38:25Z</dc:date>
    <item>
      <title>HTTPS Inspection options to apply only to devices that trust CA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-options-to-apply-only-to-devices-that-trust-CA/m-p/116462#M16425</link>
      <description>&lt;P&gt;I've been doing some testing with HTTPS inspection using a sub-CA from our internal domain CA. I'm wondering if there are any methods to scoping the hosts you apply inspection to that I am missing in the documentation or elsewhere. From what I can tell you just have to use the source field with Access Roles, Networks, Hosts, etc. The issue with our environment and I'm sure many environments is that our subnets are not totally separated in ways that keep domain joined or managed devices separate from something that does not trust our CA. So just turning on HTTPS inspection for entire subnets is not really possible in our environment without causing issues.&lt;/P&gt;&lt;P&gt;I would be interested to hear what others have done to scope out their environments to only hit devices that are either on the domain or otherwise managed where the root certs can be pushed to them. At one point I seem to recall a VAR telling me that Check Point was going to have a way to do it by device type (Windows, Mobile, ETC) where you could scope that way, but I have never found anything like this.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 22:17:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-options-to-apply-only-to-devices-that-trust-CA/m-p/116462#M16425</guid>
      <dc:creator>Travis_Krings</dc:creator>
      <dc:date>2021-04-20T22:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection options to apply only to devices that trust CA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-options-to-apply-only-to-devices-that-trust-CA/m-p/116471#M16426</link>
      <description>&lt;P&gt;I would think a properly defined Access Role would be sufficient (one that only matches things where both a user and machine identity was acquired in Active Directory).&amp;nbsp;&lt;BR /&gt;Something defined similar to the following:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-04-20 at 5.37.02 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11452i159174F772DCC952/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-04-20 at 5.37.02 PM.png" alt="Screen Shot 2021-04-20 at 5.37.02 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-04-20 at 5.36.47 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11453iDE929519C85B5A1D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-04-20 at 5.36.47 PM.png" alt="Screen Shot 2021-04-20 at 5.36.47 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;  &lt;/P&gt;</description>
      <pubDate>Wed, 21 Apr 2021 00:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-options-to-apply-only-to-devices-that-trust-CA/m-p/116471#M16426</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-21T00:38:25Z</dc:date>
    </item>
  </channel>
</rss>

