<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Control and URL filtering Matching Multiple Categories/Objects in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252493#M49435</link>
    <description>&lt;P&gt;Good point there Lloyd, though considering https inspection is enabled, that should cover it.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jul 2025 20:14:06 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-07-02T20:14:06Z</dc:date>
    <item>
      <title>Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252435#M49403</link>
      <description>&lt;P&gt;I wanted to reach out if anyone else has had to fight with this.&amp;nbsp; So we have established a policy that we would block all AI web tools except for Copilot since we are in the cloud now.&amp;nbsp; I built an inline rule that when matched to the category AI, go through this inline rule, allow co-pilot, block everything else.&amp;nbsp; As per best practice since this rule might not be hit as much, it's been placed lower than some.&amp;nbsp; What we found is that some AI tools were still accessible such as Google Gemini.&amp;nbsp; When I inspected this, Google Gemini was allowed because of 2 rules that allowed "Google Services" and "Google Ads".&amp;nbsp; I ended up moving the rule higher above these rules for this to catch.&amp;nbsp; I don't understand why 'gemini.google.com' would still be categorized or use the objects Google Services or Google Ads.&amp;nbsp; I can understand the possibility of Google Services, but Google Ads and the web advertisements category?&amp;nbsp; Really?&amp;nbsp; That's strange to me and I don't follow the logic that Gemini would fall under this particular one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anything that can be done to limit certain sites to only 1 category or object?&amp;nbsp; Or if this has come up what have others done to mitigate allowance of sites/services that match other categories and potentially match other rules allowing or blocking access which is not intended?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 15:07:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252435#M49403</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T15:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252438#M49405</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Could you please add some additional details for context:&lt;/P&gt;
&lt;P&gt;- HTTPS Inspection?&lt;/P&gt;
&lt;P&gt;- QUIC traffic blocked or inspected?&lt;/P&gt;
&lt;P&gt;- Gateway version/JHF?&lt;/P&gt;
&lt;P&gt;- Categorization mode hold or background?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 15:15:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252438#M49405</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-07-02T15:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252441#M49406</link>
      <description>&lt;P&gt;- HTTPS Inspection?&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;YES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;- QUIC traffic blocked or inspected?&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;BLOCKED and DISABLED on end user workstations by Group Policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;- Gateway version/JHF?&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;R81.20 JHF Take 92&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;- Categorization mode hold or background?&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;HOLD&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 15:26:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252441#M49406</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T15:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252442#M49407</link>
      <description>&lt;P&gt;Do you mind send screenshots of how you have it configured in the rulebase? Please blue out any sensitive data.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 15:59:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252442#M49407</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T15:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252447#M49408</link>
      <description>&lt;P&gt;Is there anything I can limit posting because I have a large rulebase?&amp;nbsp; It would quite a few on what is needed.&amp;nbsp; &amp;nbsp;Basically in the 2 I have, the AI rule was below the Group Web policy rules I have.&amp;nbsp; Some of these Group Web policies have Web Advertisements like Marketing and Google Services.&amp;nbsp; Now I'm finding out, all of Github is being blocked because all of it is matching the AI rule when I know it has the AI piece.&amp;nbsp; So why all of github is being listed as AI, I don't know.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ApplicationRulebase1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30865iFAA668BD72938E31/image-size/large?v=v2&amp;amp;px=999" role="button" title="ApplicationRulebase1.png" alt="ApplicationRulebase1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ApplicationRulebase2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30866iF3B3FAA4126D88AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="ApplicationRulebase2.png" alt="ApplicationRulebase2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 16:21:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252447#M49408</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T16:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252448#M49409</link>
      <description>&lt;P&gt;just that specific rule.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 16:20:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252448#M49409</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T16:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252449#M49410</link>
      <description>&lt;P&gt;I edited my post.&amp;nbsp; But this really seems to be more of how things are being categorized or what application they are falling under.&amp;nbsp; It's like it's miscategorizing them OR since somethings fall under multiple categories, it's matching the secondary categories instead of the primary maybe?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 16:23:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252449#M49410</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T16:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252450#M49411</link>
      <description>&lt;P&gt;I cant sadly tell from that screenshot, but here is what I would do. Create INLINE layer like below. I attached it, hope it makes sense.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 16:41:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252450#M49411</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T16:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252451#M49412</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/48397"&gt;@jberg712&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, super important...MAKE SURE to enable urlf blade in the inline layer if you are going to try that. Since by default, only fw blade is on.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 16:43:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252451#M49412</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T16:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252459#M49414</link>
      <description>&lt;P&gt;This rulebase with the rules in the screenshot is Application and URLf and the only one selected.&amp;nbsp; But by the logic you have their Andy, wouldn't that apply to all traffic to hit the inline rule?&amp;nbsp; If you look at mine, you don't apply the inline rule if the request isn't for something in the AI category.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ApplicationRulebase3.png" style="width: 615px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30867i6EDC2456C78DF216/image-size/large?v=v2&amp;amp;px=999" role="button" title="ApplicationRulebase3.png" alt="ApplicationRulebase3.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:06:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252459#M49414</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T17:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252460#M49415</link>
      <description>&lt;P&gt;In the services column...&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:07:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252460#M49415</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T17:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252463#M49417</link>
      <description>&lt;P&gt;Well, thats the logic I apply to this. You have that inline layer ONLY for what you are trying to do. So essentially you allow copilot and block anything else at the bottom. BUT, key is that parent rule of the layer has to be hit first.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:11:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252463#M49417</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T17:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252465#M49418</link>
      <description>&lt;P&gt;Hang on, sorry, I see the screenshot okay now. You have it right, as far as Im concenred.&lt;/P&gt;
&lt;P&gt;Quesitons I have:&lt;/P&gt;
&lt;P&gt;1) Are CNB net users NOT able to access the copilot sites?&lt;/P&gt;
&lt;P&gt;2) Any hits on rule 8.1?&lt;/P&gt;
&lt;P&gt;3) If access for those users is failing, what do logs show?&lt;/P&gt;
&lt;P&gt;If nothing helps, I would simply create custom category and add *copilot* entry in it and see if that helps, just add that in services.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:16:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252465#M49418</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T17:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252467#M49420</link>
      <description>&lt;P&gt;Correct.&amp;nbsp; I understand that concept.&amp;nbsp; The issue is still&amp;nbsp; when the rule was below the Group User roles, Google Gemini was still being allowed because the traffic log indicated that Google Gemini fell under Google Services and Google Web Advertisements.&amp;nbsp; Under a different object and a different category.&amp;nbsp; Therefore, users hit the rule that allowed Google services and Google Web Advertisements (which has to be allowed for certain things to work), therefore they could get to Google Gemini.&lt;/P&gt;&lt;P&gt;For example,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule 15 --&amp;gt;&amp;nbsp; Marketing --&amp;gt;&amp;nbsp; Access granted to Google Web Advertisements&lt;BR /&gt;Rule 19 --&amp;gt; Inline Rule for Blocking AI except for CoPilot&lt;/P&gt;&lt;P&gt;Marketing users try to use Google Gemini.&amp;nbsp; Google Gemini being AI is accepted on Rule 15 because of Google Web Advertisements being allowed. (miscategorization or secondary categorization).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Google Gemini is strictly AI and shouldn't fall under this.&lt;/P&gt;&lt;P&gt;Now I've moved my rule above the Marketing rule which now blocks Google Gemini.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The part I'm battling with is that Google Gemini SHOULD NOT BE categorized under Google Web Advertisements correct?&amp;nbsp; But if this is somehow correct (which I don't understand why), what can be done differently without moving the AI rule?&amp;nbsp; I mean if Gemini has a primary of AI and secondary category of Web Advertisements, can the rulebase somehow be set to only match the primary category?&amp;nbsp;&lt;/P&gt;&lt;P&gt;And that's assuming that's why Gemini is even matching the Marketing rule in the first place is because they are allowed the Web Advertisement category.&amp;nbsp; They don't have the AI category in their rule.&amp;nbsp; I'm just not wanting Gemini to match under the category Web Advertisements or Google Services.&lt;/P&gt;&lt;P&gt;I hope this is clear enough.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:22:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252467#M49420</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T17:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252468#M49421</link>
      <description>&lt;P&gt;Well, I get what you are saying. Sadly, thats not something customers can change, it comes from the company in question, in this case, Google. Technically, I doubt even CP can change that. See for example output from my lab gateway for Google services.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[Expert@R82:0]# dynamic_objects -uo "Google Services"&lt;/P&gt;
&lt;P&gt;object name: Google Services&lt;BR /&gt;range 0 : 8.8.4.0 8.8.4.255&lt;BR /&gt;range 1 : 8.8.8.0 8.8.8.255&lt;BR /&gt;range 2 : 8.34.208.0 8.34.223.255&lt;BR /&gt;range 3 : 8.35.192.0 8.35.207.255&lt;BR /&gt;range 4 : 23.236.48.0 23.236.63.255&lt;BR /&gt;range 5 : 23.251.128.0 23.251.159.255&lt;BR /&gt;range 6 : 34.0.0.0 34.3.1.255&lt;BR /&gt;range 7 : 34.3.3.0 34.3.4.255&lt;BR /&gt;range 8 : 34.3.8.0 34.3.127.255&lt;BR /&gt;range 9 : 34.4.0.0 34.191.255.255&lt;BR /&gt;range 10 : 35.184.0.0 35.199.191.255&lt;BR /&gt;range 11 : 35.200.0.0 35.247.255.255&lt;BR /&gt;range 12 : 57.140.192.0 57.140.255.255&lt;BR /&gt;range 13 : 64.15.112.0 64.15.127.255&lt;BR /&gt;range 14 : 64.233.160.0 64.233.191.255&lt;BR /&gt;range 15 : 66.22.228.0 66.22.229.255&lt;BR /&gt;range 16 : 66.102.0.0 66.102.15.255&lt;BR /&gt;range 17 : 66.249.64.0 66.249.95.255&lt;BR /&gt;range 18 : 70.32.128.0 70.32.159.255&lt;BR /&gt;range 19 : 72.14.192.0 72.14.255.255&lt;BR /&gt;range 20 : 74.114.24.0 74.114.31.255&lt;BR /&gt;range 21 : 74.125.0.0 74.125.255.255&lt;BR /&gt;range 22 : 104.154.0.0 104.155.255.255&lt;BR /&gt;range 23 : 104.196.0.0 104.199.255.255&lt;BR /&gt;range 24 : 104.237.160.0 104.237.191.255&lt;BR /&gt;range 25 : 107.167.160.0 107.167.191.255&lt;BR /&gt;range 26 : 107.178.192.0 107.178.255.255&lt;BR /&gt;range 27 : 108.59.80.0 108.59.95.255&lt;BR /&gt;range 28 : 108.170.192.0 108.170.255.255&lt;BR /&gt;range 29 : 108.177.0.0 108.177.127.255&lt;BR /&gt;range 30 : 130.211.0.0 130.211.255.255&lt;BR /&gt;range 31 : 136.22.160.0 136.22.186.255&lt;BR /&gt;range 32 : 136.124.0.0 136.125.255.255&lt;BR /&gt;range 33 : 142.250.0.0 142.251.255.255&lt;BR /&gt;range 34 : 146.148.0.0 146.148.127.255&lt;BR /&gt;range 35 : 152.65.208.0 152.65.211.255&lt;BR /&gt;range 36 : 152.65.214.0 152.65.215.255&lt;BR /&gt;range 37 : 152.65.218.0 152.65.219.255&lt;BR /&gt;range 38 : 152.65.222.0 152.65.255.255&lt;BR /&gt;range 39 : 162.120.128.0 162.120.255.255&lt;BR /&gt;range 40 : 162.216.148.0 162.216.151.255&lt;BR /&gt;range 41 : 162.222.176.0 162.222.183.255&lt;BR /&gt;range 42 : 172.110.32.0 172.110.39.255&lt;BR /&gt;range 43 : 172.217.0.0 172.217.255.255&lt;BR /&gt;range 44 : 172.253.0.0 172.253.255.255&lt;BR /&gt;range 45 : 173.194.0.0 173.194.255.255&lt;BR /&gt;range 46 : 173.255.112.0 173.255.127.255&lt;BR /&gt;range 47 : 192.104.160.0 192.104.161.255&lt;BR /&gt;range 48 : 192.158.28.0 192.158.31.255&lt;BR /&gt;range 49 : 192.178.0.0 192.179.255.255&lt;BR /&gt;range 50 : 193.186.4.0 193.186.4.255&lt;BR /&gt;range 51 : 199.36.154.0 199.36.156.255&lt;BR /&gt;range 52 : 199.192.112.0 199.192.115.255&lt;BR /&gt;range 53 : 199.223.232.0 199.223.239.255&lt;BR /&gt;range 54 : 207.223.160.0 207.223.175.255&lt;BR /&gt;range 55 : 208.65.152.0 208.65.155.255&lt;BR /&gt;range 56 : 208.68.108.0 208.68.111.255&lt;BR /&gt;range 57 : 208.81.188.0 208.81.191.255&lt;BR /&gt;range 58 : 208.117.224.0 208.117.255.255&lt;BR /&gt;range 59 : 209.85.128.0 209.85.255.255&lt;BR /&gt;range 60 : 216.58.192.0 216.58.223.255&lt;BR /&gt;range 61 : 216.73.80.0 216.73.95.255&lt;BR /&gt;range 62 : 216.239.32.0 216.239.63.255&lt;BR /&gt;range 63 : 216.252.220.0 216.252.223.255&lt;BR /&gt;range 64 : 2001:4860:: 2001:4860:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 65 : 2404:6800:: 2404:6800:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 66 : 2404:f340:: 2404:f340:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 67 : 2600:1900:: 2600:190f:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 68 : 2605:ef80:: 2605:ef80:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 69 : 2606:40:: 2606:40:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 70 : 2606:73c0:: 2606:73c0:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 71 : 2607:1c0:241:40:: 2607:1c0:241:4f:ffff:ffff:ffff:ffff&lt;BR /&gt;range 72 : 2607:1c0:300:: 2607:1c0:3ff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 73 : 2607:f8b0:: 2607:f8b0:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 74 : 2620:11a:a000:: 2620:11a:a0ff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 75 : 2620:120:e000:: 2620:120:e0ff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 76 : 2800:3f0:: 2800:3f0:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 77 : 2a00:1450:: 2a00:1450:ffff:ffff:ffff:ffff:ffff:ffff&lt;BR /&gt;range 78 : 2c0f:fb50:: 2c0f:fb50:ffff:ffff:ffff:ffff:ffff:ffff&lt;/P&gt;
&lt;P&gt;Looking for domains for 'Google Services' and its children objects:&lt;/P&gt;
&lt;P&gt;The updatable object Google Services does not contain any domains (object is enforced by IP addresses only)&lt;/P&gt;
&lt;P&gt;Operation completed successfully&lt;BR /&gt;[Expert@R82:0]#&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:29:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252468#M49421</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T17:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252469#M49422</link>
      <description>&lt;P&gt;Mind you, google gemini falls under AI category.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;H1 class="sc-hLQSwg hUipsh"&gt;URL Categorization&lt;/H1&gt;
&lt;DIV class="sc-dmyCSP kObIOd"&gt;For:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="sc-guDLey hYoftm" title="https://gemini.google.com/app"&gt;&amp;nbsp;&lt;A href="https://gemini.google.com/app" target="_blank"&gt;https://gemini.google.com/app&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Current&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Categories:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Artificial Intelligence (AI), Low Risk&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;SECTION class="sc-kMzELR bVSalu"&gt;
&lt;DIV class="sc-hABBmJ bXcgkt"&gt;
&lt;P&gt;Artificial Intelligence (AI)&lt;/P&gt;
&lt;P&gt;This category includes URLs that provide Chatbots and virtual assistance using natural language processing, Machine Learning tools and Generative AI models for creating new content including images, music, deepfake, text and more. Artificial Intelligence simulates human intelligence processes by machines, especially computer systems. Examples : chat.openai.com, bard.google.com&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="sc-hABBmJ bXcgkt"&gt;
&lt;P&gt;Low Risk&lt;/P&gt;
&lt;P&gt;Applications and Websites that are potentially non business related yet low risk.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:31:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252469#M49422</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T17:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252474#M49423</link>
      <description>&lt;P&gt;This is what my log says and under matched rules you see that it takes a different application and rule even though the details tab shows the categorization.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ApplicationLog1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30868i052DBDD60F25DF75/image-size/large?v=v2&amp;amp;px=999" role="button" title="ApplicationLog1.png" alt="ApplicationLog1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ApplicationLog2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30869i2E01382A9C6004C1/image-size/large?v=v2&amp;amp;px=999" role="button" title="ApplicationLog2.png" alt="ApplicationLog2.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:46:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252474#M49423</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T17:46:41Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252475#M49424</link>
      <description>&lt;P&gt;This is where the "logic" of the matching categories and applications eludes me.&amp;nbsp; As the details state the category for AI and Medium Risk, but the rule it matches is for Google Services Application and category Computers/Internet.&amp;nbsp; Unless they overlap somehow or nested somehow, it shouldn't be matching these rules.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:48:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252475#M49424</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-07-02T17:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252476#M49425</link>
      <description>&lt;P&gt;I get what you mean, thats puzzling to me as well. Might be worth TAC case.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:49:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252476#M49425</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T17:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control and URL filtering Matching Multiple Categories/Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252477#M49426</link>
      <description>&lt;P&gt;Thats my thinking as well, sounds like its overlapping in some way, otherwise, would not make logical sense.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 17:49:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Application-Control-and-URL-filtering-Matching-Multiple/m-p/252477#M49426</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T17:49:57Z</dc:date>
    </item>
  </channel>
</rss>

