<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 Identity Tags and Updatable Objects  in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46347#M89857</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was trying to create a NAT hide using&amp;nbsp;a dynamic object or domains objects. However, I've got an "Invalid Object '.office365.com' in Original Dst of Address Translation Rule 5. The valid objects are: host, gateway, network, address range and router."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would I like to know If the new updatable objects can be used by NAT policy?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Felipe Tropeia&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 Jan 2019 14:04:01 GMT</pubDate>
    <dc:creator>Felipe_Tropeia</dc:creator>
    <dc:date>2019-01-18T14:04:01Z</dc:date>
    <item>
      <title>R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46344#M89854</link>
      <description>&lt;P&gt;&lt;IFRAME src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FDwMkMElB5Lk%3Ffeature%3Doembed&amp;amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DDwMkMElB5Lk&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FDwMkMElB5Lk%2Fhqdefault.jpg&amp;amp;key=3b4b3cb34e044cb590554f889078322d&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" class="embedly-embed" allow="autoplay; fullscreen"&gt;&lt;/IFRAME&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: verdana, geneva, sans-serif;"&gt;This video elaborates on one the most important aspects of the Check Point Infinity architecture which is the dynamic, unified characteristics of a policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: verdana, geneva, sans-serif;"&gt;legacy Static policy means ticketing, many install policy operations and inherent discrepancies within the policy will ruin our operational efficiency.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: verdana, geneva, sans-serif;"&gt;However, by solving these challenges with a Dynamic approach – the security operations engineers only need to design a single policy rule for each scenario that will seamlessly control all operational aspects of an enterprise, while keeping access changes strict, yet adaptive. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: verdana, geneva, sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: verdana, geneva, sans-serif;"&gt;Enjoy&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Nov 2021 11:55:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46344#M89854</guid>
      <dc:creator>Yair_Herling</dc:creator>
      <dc:date>2021-11-14T11:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46345#M89855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great work&amp;nbsp;&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/66724"&gt;Ofir Calif&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/42490"&gt;Roi Caspy&lt;/A&gt;‌ !&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2019 18:22:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46345#M89855</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2019-01-07T18:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46346#M89856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was a great presentation.&amp;nbsp; Very informative and directive.&amp;nbsp; Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2019 04:30:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46346#M89856</guid>
      <dc:creator>John_Fulater</dc:creator>
      <dc:date>2019-01-11T04:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46347#M89857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was trying to create a NAT hide using&amp;nbsp;a dynamic object or domains objects. However, I've got an "Invalid Object '.office365.com' in Original Dst of Address Translation Rule 5. The valid objects are: host, gateway, network, address range and router."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would I like to know If the new updatable objects can be used by NAT policy?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Felipe Tropeia&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 14:04:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/46347#M89857</guid>
      <dc:creator>Felipe_Tropeia</dc:creator>
      <dc:date>2019-01-18T14:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/47245#M89858</link>
      <description>&lt;P&gt;Sorry for my late reply.&lt;/P&gt;
&lt;P&gt;Domain objects and updatable objects are currently not supported in NAT rulebase.&lt;/P&gt;
&lt;P&gt;This is under development though..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yair&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2019 08:32:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/47245#M89858</guid>
      <dc:creator>Yair_Herling</dc:creator>
      <dc:date>2019-03-17T08:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59074#M89859</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how to use Updatable Objects in legacy application HTTPS inspection.&amp;nbsp;&lt;BR /&gt;Can Checkpoint ensure all Microsoft Office 365 application work without any problems if https inspected?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Andreas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jul 2019 08:17:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59074#M89859</guid>
      <dc:creator>Andreas_Hofmann</dc:creator>
      <dc:date>2019-07-27T08:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59086#M89860</link>
      <description>This is not currently supported.&lt;BR /&gt;This may be supported in an upcoming release.</description>
      <pubDate>Sat, 27 Jul 2019 22:15:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59086#M89860</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-27T22:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59091#M89861</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how to proceed with Microsoft cloud applcations like Azure, Skype , Power BI gateway hub and so on?&lt;BR /&gt;Recommendation from Microsoft is to http bypass -&amp;gt; result no Checkpoint blade protection anymore.&lt;BR /&gt;&lt;BR /&gt;How to improve this and what is&amp;nbsp;your experience with this kind of applications in your environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Andreas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2019 08:21:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59091#M89861</guid>
      <dc:creator>Andreas_Hofmann</dc:creator>
      <dc:date>2019-07-28T08:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59095#M89862</link>
      <description>Skype in particular isn't standard HTTPS, which means HTTPS Inspection won't necessarily work anyway.&lt;BR /&gt;HTTPS Inspection also cannot be applied to applications that use Certificate Pinning or client-side certificates.&lt;BR /&gt;If you need those applications to work, then they would need to be bypassed if HTTPS Inspection were used.&lt;BR /&gt;&lt;BR /&gt;Azure hosts a lot of things in it, so you'd need to be more specific about what you're asking about here.&lt;BR /&gt;</description>
      <pubDate>Sun, 28 Jul 2019 13:08:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59095#M89862</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-28T13:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59102#M89863</link>
      <description>&lt;P&gt;We plan supporting updatable objects in https inspection in R80.40 which is planned for the end of this year; We are looking for EA customers with EA program to start in about 2 months.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2019 19:45:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59102#M89863</guid>
      <dc:creator>Gera_Dorfman</dc:creator>
      <dc:date>2019-07-28T19:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59565#M89864</link>
      <description>I am searching for a very deep and clear instruction how to implement Office 365 applications. For example I have a lot of problems with application Teams (sharing desktops) Do we really have to exclude all Office365 IPs and Office365 URLs in https inspection? What are your experiences and how do you operate Office365 in Checkpoint firewall environments?</description>
      <pubDate>Sun, 04 Aug 2019 08:46:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59565#M89864</guid>
      <dc:creator>Andreas_Hofmann</dc:creator>
      <dc:date>2019-08-04T08:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59606#M89865</link>
      <description>Skype and its descendants such as Teams do not work with HTTPS Inspection.&lt;BR /&gt;The IPs specific to this service must be excluded from HTTPS Inspection as a result.&lt;BR /&gt;At the moment, we do not provide an easy way to do this, but it is planned for R80.40.</description>
      <pubDate>Mon, 05 Aug 2019 05:11:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/59606#M89865</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-08-05T05:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/64114#M89866</link>
      <description>&lt;P&gt;Dynamic objects seem largely unusable currently. TAC are always recommend HTTPS inspection to support Application Control and URL Filtering, but O365 needs to be bypassed and you can't use the updatable objects in the HTTPS inspection policy and so need to maintain manual address groups again.&lt;/P&gt;&lt;P&gt;Updatable objects are also not supported in the desktop policy (for endpoints managed out of a SmartCenter), making it hard to allow direct access to O365 when connected via a VPN. Guessing they are not supported for the full Endpoint client policy either?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 21:51:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/64114#M89866</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2019-10-01T21:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Tags and Updatable Objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/64117#M89867</link>
      <description>Updatable Objects should be usable in the HTTPS Inspection policy in R80.40.&lt;BR /&gt;I don't know what the plan is to support this in the desktop Endpoint policy.</description>
      <pubDate>Tue, 01 Oct 2019 22:29:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Tags-and-Updatable-Objects/m-p/64117#M89867</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-01T22:29:18Z</dc:date>
    </item>
  </channel>
</rss>

