<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URLF detect events with &amp;quot;Untrusted Certificate&amp;quot; for Microsoft sites with &amp;quot;HTTPS l in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/223111#M42779</link>
    <description>&lt;P&gt;I do not understand, which certificate you installed? and where your downloaded it?&lt;/P&gt;</description>
    <pubDate>Thu, 08 Aug 2024 20:27:58 GMT</pubDate>
    <dc:creator>jennyado</dc:creator>
    <dc:date>2024-08-08T20:27:58Z</dc:date>
    <item>
      <title>URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS lite"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111193#M15342</link>
      <description>&lt;P&gt;Trying to get my head around as we get many URL Filtering detect events for Microsoft sites when using categorization without HTTPS interception, aka "&lt;STRONG&gt;HTTPS lite"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Lets start with the problem:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10606i8D65AB9E588F0F05/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I read the&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk159872&amp;amp;partition=Advanced&amp;amp;product=HTTPS" target="_self"&gt;sk159872&lt;/A&gt;&amp;nbsp;and added missing Trusted CAs manually, cleared cache and installed policy but events keep coming:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10607i8C6D70B9E110EBF8/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally read&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk64521&amp;amp;partition=Basic&amp;amp;product=HTTPS" target="_self"&gt;sk64521&lt;/A&gt;&amp;nbsp;and there were no automatic downloads available.&lt;/P&gt;
&lt;P&gt;Looked at&amp;nbsp;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=events.data.microsoft.com" target="_self"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=events.data.microsoft.com&lt;/A&gt;&amp;nbsp;as well but got none the wiser what would be the problem.&lt;/P&gt;
&lt;P&gt;Chrome shows possible problem with validity length:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 776px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10608i21B789E1D9BCEDEB/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not entirely sure why it is showing as Untrusted. Any ideas?&lt;/P&gt;
&lt;P&gt;We are running R80.40 T91.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 09:16:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111193#M15342</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-02-19T09:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111199#M15343</link>
      <description>&lt;P&gt;I have a similar error since today with full HTTPS Inspection, luckily just used on a pilot group for now. Working fine yesterday, broken today with warning of reused certificates with similar serial numbers or "Untrusted" source instead of the MITM CA depending of the browser.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 17:29:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111199#M15343</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2021-02-18T17:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111202#M15344</link>
      <description>&lt;P&gt;For us it's only a PoC so no one is really affected. We're evaluating if CP HTTPS Lite can replace our proxy.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 17:47:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111202#M15344</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-02-18T17:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111210#M15346</link>
      <description>&lt;P&gt;My thought is Chrome doesn't trust the cert provided by &lt;SPAN class="info"&gt;events.data.microsoft.com&lt;/SPAN&gt; because it's valid for more then 398 days&amp;nbsp; (&lt;A href="http://blog.cacert.org/2020/06/browser-manufacturers-shorten-certificate-lifetime-to-one-year/" target="_self"&gt;link&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;Not Before: 10/9/2020, 21:03:31&lt;BR /&gt;Not After: 10/12/2021, 20:03:31&lt;BR /&gt;Total: 455&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="events.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10616i5734A5D32A040CB5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="events.png" alt="events.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Instead, the cert for teams.events.&lt;SPAN class="info"&gt;data.microsoft.com&lt;/SPAN&gt; (which is different one) is trusted&lt;/P&gt;&lt;P&gt;Not Before: 14/9/2020, 21:51:29 &lt;BR /&gt;Not After: 9/9/2021, 21:51:29&lt;BR /&gt;Total 360&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="teams.events.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10617iC590EB684C95B938/image-size/medium?v=v2&amp;amp;px=400" role="button" title="teams.events.png" alt="teams.events.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Server side misconfiguration&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 18:57:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111210#M15346</guid>
      <dc:creator>FraP</dc:creator>
      <dc:date>2021-02-18T18:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111218#M15347</link>
      <description>&lt;P&gt;Thanks, I still want this cert to be trusted in Checkpoint solution. I'm not too worried about Chrome&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 18:57:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111218#M15347</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-02-18T18:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111224#M15349</link>
      <description>&lt;P&gt;Here's what I've seen today. The pilot system is an unattended Windows VM which is the only activated source in the HTTPS Inspection policy so there's no company-wide impact.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Categorize HTTPS websites&lt;/EM&gt; has been running for long along with URLF blades and they work without issues.&lt;/P&gt;&lt;P&gt;The pilot was working until today with HTTPS inspection, the MITM certificate was seen in the browser and HTTPS Inspection logs would show up and everything was working fine.&lt;/P&gt;&lt;P&gt;When I checked again this evening (I didn't during the day), I saw that I couldn't browse anywhere anymore, I either had certificate validation errors from all browsers as the certificate was signed by "Untrusted" instead of the MITM or errors about certificates with similar serials being reused. Also, all logs in HTTPS Inspection would show the validation error of the URL trying to be reached.&lt;/P&gt;&lt;P&gt;If I disable HTTPS Inspection in the gateway properties, browsing works again but the strange thing is that I keep seeing the MITM certificate signing the site, even for sites open in private mode which were never accessed on the pilot machine. No more HTTPS Inspection logs though. I went further by disabling the inspection rule on top of disabling the HTTPS inspection but same behaviour. Maybe I should have first disabled the inspection rule, then disabled HTTPS Inspection on the gateway. I will check further tomorrow.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 19:48:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111224#M15349</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2021-02-18T19:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111231#M15350</link>
      <description>&lt;P&gt;Actually I was trying to stay away from HTTPS interception purposely in this thread &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; hence the note about HTTPS Lite at the beginning.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think I found my problem thanks to this article&amp;nbsp;&lt;A href="https://www.networkoc.net/windows-update-fails-when-check-point-https-inspection-is-enabled/" target="_self"&gt;https://www.networkoc.net/windows-update-fails-when-check-point-https-inspection-is-enabled/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did import only root CA but not intermediate CA! I have added it now and will report tomorrow.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We're really interested in "unbroken" HTTPS categorization and filtering for various reasons.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 21:10:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111231#M15350</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-02-18T21:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111250#M15357</link>
      <description>&lt;P&gt;I could be wrong when I say this, but Im pretty sure that using that https categorization without the https inspection enabled is not very helpful. I believe what ends up happening is that firewall really tries to do the categorization, but the problem is, if inspection is off, then there is really nothing to inspect, so block pages would never work. One thing I find odd is why you keep getting the warnings if https inspection is off, that makes no sense at all. Does it show up on all the browsers?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 01:28:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111250#M15357</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-19T01:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111260#M15358</link>
      <description>&lt;P&gt;Confirmed! It was the intermediate CA that was missing,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10622iB8B5EE16A8779D46/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 05:48:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111260#M15358</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-02-19T05:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111263#M15359</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;actually there is a lot to inspect even with "unbroken" HTTPS &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; You need to start thinking about the future when you won't be able to break TLS at all, or think of pinned certs already.&lt;/P&gt;
&lt;P&gt;There has been multiple sessions even here on Checkmates regarding it i.e&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/HTTPS-Inspection-Best-Practices-TechTalk-Video-Slides-and-Q-amp/m-p/70842#M1188" target="_self"&gt;HTTPS-Inspection-Best-Practices&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In nutshell you would inspect TSL handshake:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 474px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10623i0ECCD5AB28F49CD4/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And results are surprisingly good:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10624iD1B653917F58AE2A/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 06:28:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111263#M15359</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-02-19T06:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111300#M15365</link>
      <description>&lt;P&gt;No, I agree...not saying it wont work, but I know block page will never show without https inspection. Maybe this is way more advanced in R80, but in the old days, it was very basic.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 12:01:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/111300#M15365</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-19T12:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/223111#M42779</link>
      <description>&lt;P&gt;I do not understand, which certificate you installed? and where your downloaded it?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 20:27:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/223111#M42779</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2024-08-08T20:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249674#M48756</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we are facing same issue here, we have got the below step from tac &amp;amp; also the CAs zip file, we have flow the step but still we are facing Certificate Validation is Untrusted.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;How to run / Sanity test the script:&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Get / Attach a zip file which contains 2 files (jar,sh)&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Take a GAIA snapshot of the Management server / MDS machine&lt;/LI&gt;&lt;LI&gt;Close Smart Console&lt;/LI&gt;&lt;LI&gt;Download the attached zip file.&lt;/LI&gt;&lt;LI&gt;Extract the zip file.&lt;/LI&gt;&lt;LI&gt;Make sure the management server / MDS is up and running&lt;/LI&gt;&lt;LI&gt;Place the 2 files from the zip file in the home directory (/home/admin) of the management server / MDS.&lt;/LI&gt;&lt;LI&gt;On the management server / MDS, run:&lt;BR /&gt;# cd /home/admin&lt;BR /&gt;#&amp;nbsp;chmod&amp;nbsp;+x&amp;nbsp;&lt;A href="https://runaccessclient.sh/" target="_blank"&gt;RunAccessClient.sh&lt;/A&gt;&lt;BR /&gt;# chmod +x AccessClient.jar&lt;BR /&gt;#&amp;nbsp;&lt;STRONG&gt;In case of SMS&lt;/STRONG&gt;: ./RunAccessClient.sh -a fixOrphanTrustedCAs&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;After fixOrphanTrustedCAs has ended successfully, remove both script files from the machine.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 23 May 2025 04:53:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249674#M48756</guid>
      <dc:creator>VIKAS1</dc:creator>
      <dc:date>2025-05-23T04:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249685#M48757</link>
      <description>&lt;P&gt;Saw your message you sent, but cant respond from little phone screen lol. Anyway, you dont need to unzip anything, its simply upload via smart console. That file is from $CPDIR/database folder.&lt;/P&gt;
&lt;P&gt;Is that where it was given to you from?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2025 06:46:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249685#M48757</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-23T06:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249800#M48775</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have received the zip file from tac and also step to flow, but after flowing the step we are still getting the same error.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Certificate Validation&amp;nbsp; &amp;nbsp;Untrusted Certificate&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 05:13:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249800#M48775</guid>
      <dc:creator>VIKAS1</dc:creator>
      <dc:date>2025-05-26T05:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: URLF detect events with "Untrusted Certificate" for Microsoft sites with "HTTPS l</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249801#M48776</link>
      <description>&lt;P&gt;Hi! Did you try to follow the steps described in this article?&amp;nbsp;&lt;A href="https://www.networkoc.net/windows-update-fails-when-check-point-https-inspection-is-enabled/" target="_self"&gt;https://www.networkoc.net/windows-update-fails-when-check-point-https-inspection-is-enabled/&lt;/A&gt;&amp;nbsp;it's really well written&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 05:21:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-detect-events-with-quot-Untrusted-Certificate-quot-for/m-p/249801#M48776</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2025-05-26T05:21:54Z</dc:date>
    </item>
  </channel>
</rss>

