<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows &amp;amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143529#M22299</link>
    <description>&lt;P&gt;Click the&amp;nbsp;&lt;SPAN&gt;'+' button under the Source/Destination column, choose import 'Updatable Objects', and then you can choose the relevant"HTTPS services - bypass" - see&amp;nbsp;sk131852 !&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Mar 2022 16:17:23 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2022-03-11T16:17:23Z</dc:date>
    <item>
      <title>Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/107833#M14474</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;I was wondering whether it is possible to have custom applications or url filtering objects in order to achieve reachability of the apple &amp;amp; microsoft software update servers?&lt;/P&gt;&lt;P&gt;The official applications "Apple Software Update" and "Windows Update" seem to only work with an existing HTTPS Inspection setup. As url filtering and application control (some applications) can be done with pattern&amp;nbsp; matching against the SNI / CN of the certificate I was wondering whether this can be done for the mentioned update servers. Unfortunately I am not aware of the setup of apples or microsofts update servers and whether SNI / CN comparison can be used in such a case.&lt;/P&gt;&lt;P&gt;Maybe someone already ran into the same issue or heard of a possible solution.&lt;/P&gt;&lt;P&gt;Thanks and best regards,&lt;/P&gt;&lt;P&gt;Maik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Edit: As always I forgot some details... the question is related to R80.20 Take 118 - VSX + MDM setup]&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 14:56:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/107833#M14474</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2021-01-14T14:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/107886#M14484</link>
      <description>&lt;P&gt;For the SNI verification stuff to work properly, you may need to enable HTTPS Inspection with an any any bypass rule.&lt;BR /&gt;Not sure if they fixed that in that R80.20 JHF or a future one.&lt;BR /&gt;They did in R80.40.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2021 05:04:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/107886#M14484</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-15T05:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/107917#M14493</link>
      <description>&lt;P&gt;Seems like it is supported since &lt;STRONG&gt;R80.20 Jumbo HotFix - Ongoing Take 117 (13 October 2019)&lt;/STRONG&gt;, at least related to the Jumbo Patch notes. Is there some kind of list which application control "objects" can be used with this feature but HTTPS inspection disabled (or set to bypass all)?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2021 12:02:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/107917#M14493</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2021-01-15T12:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/108075#M14527</link>
      <description>&lt;P&gt;**ping**&lt;/P&gt;&lt;P&gt;Would also appreciate feedback in any way, like for example that this approach does not make much sense and why (in regards to the mentioned objects/update servers).&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 09:46:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/108075#M14527</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2021-01-18T09:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143340#M22257</link>
      <description>&lt;P&gt;Yes, some guidance on how this is possible, or even if it is at all, would be nice.&amp;nbsp; My goal is to allow all servers access to a list of supplied windows update URLs (not IP ranges, as that information is not available).&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 12:01:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143340#M22257</guid>
      <dc:creator>Mraybone</dc:creator>
      <dc:date>2022-03-09T12:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143362#M22260</link>
      <description>&lt;P&gt;The most recent enhancement I'm aware of in this regard is outlined in&amp;nbsp;&lt;SPAN&gt;sk163595.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 14:51:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143362#M22260</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-09T14:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143368#M22261</link>
      <description>&lt;P&gt;Thanks for the reply, unfortunately I only have the firewall blade available to me.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:18:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143368#M22261</guid>
      <dc:creator>Mraybone</dc:creator>
      <dc:date>2022-03-09T15:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143389#M22264</link>
      <description>&lt;P&gt;With only Firewall blade available, there isn't much you can do.&lt;BR /&gt;Your only option is by IP address as even looking at URLs or SNI requires App Control.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 22:01:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143389#M22264</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-09T22:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143404#M22270</link>
      <description>&lt;P&gt;I was afraid of that, thanks for the info.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 08:28:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143404#M22270</guid>
      <dc:creator>Mraybone</dc:creator>
      <dc:date>2022-03-10T08:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143483#M22291</link>
      <description>&lt;P&gt;We have got the application control blade installed now, but the rule for Windows Update doesn't seem to be doing much.&amp;nbsp; Any tips?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 09:19:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143483#M22291</guid>
      <dc:creator>Mraybone</dc:creator>
      <dc:date>2022-03-11T09:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143519#M22294</link>
      <description>&lt;P&gt;See &lt;SPAN&gt;&lt;STRONG&gt;sk163595&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;Check Point Solution for R80.40 and above We collected a list of HTTPS services that are known to be used in pinned scenarios. These HTTPS services are part of the "HTTPS services - bypass" updatable object.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;In previous versions&lt;/STRONG&gt;&lt;SPAN&gt;, users can only use the “Bypass HTTPS inspection of all traffic to all known software update services” checkbox.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 14:45:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143519#M22294</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-03-11T14:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143521#M22296</link>
      <description>&lt;P&gt;Ok thanks, this is interesting - we have R80.40, but I can't find the "HTTPS services - bypass" object...&lt;/P&gt;&lt;P&gt;I have actually narrowed this down to the fact that it is only HTTPS that isn't working, so I'm almost there! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 15:06:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143521#M22296</guid>
      <dc:creator>Mraybone</dc:creator>
      <dc:date>2022-03-11T15:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143527#M22298</link>
      <description>&lt;P&gt;I found the object, I can even see things in the logs being successfully bypassed but windows updates still won't work&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 16:06:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143527#M22298</guid>
      <dc:creator>Mraybone</dc:creator>
      <dc:date>2022-03-11T16:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Windows &amp; Apple Software Updates without HTTPS Inspection (via SNI/CN comparison)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143529#M22299</link>
      <description>&lt;P&gt;Click the&amp;nbsp;&lt;SPAN&gt;'+' button under the Source/Destination column, choose import 'Updatable Objects', and then you can choose the relevant"HTTPS services - bypass" - see&amp;nbsp;sk131852 !&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 16:17:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-amp-Apple-Software-Updates-without-HTTPS-Inspection-via/m-p/143529#M22299</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-03-11T16:17:23Z</dc:date>
    </item>
  </channel>
</rss>

