<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: O365 access filtering in R80.10 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13382#M91293</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good point Mike! I really don't have answer for that, I guess a better clarification would be useful. But just this note alone about reverse lookups would put me off in all honesty. I don't believe you would get accurate results with this approach &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Note: some DNS servers do not support DNS reverse lookups or might not be fully updated with all reverse entries.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Nov 2018 21:51:12 GMT</pubDate>
    <dc:creator>Kaspars_Zibarts</dc:creator>
    <dc:date>2018-11-05T21:51:12Z</dc:date>
    <item>
      <title>O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13374#M91285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Challenge description: our user general internet access is limited to proxy only&amp;nbsp;or very specific "whitelisted" IPs could be accessed directly bypassing proxy, i.e O365. Up until October we were able to script simple network group with all O365 IPv4 addresses based on XML information from MS. That has been streamedlined now and many services have only FQDNs, not IP addresses and quite a few have a wild-card in front of the FQDN (there goes domain object option..). It's all good and great with R80.20 as there you have ready made updatable objects (&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk131852" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk131852"&gt;Updatable Objects in R80.20&lt;/A&gt;&amp;nbsp;) that cover exactly this. Seems like with R80.10 the only option is these dynamic objects (&lt;A href="https://community.checkpoint.com/docs/DOC-2339"&gt;Dynamic Objects in R80.10&lt;/A&gt;&amp;nbsp;) that you must order from CP or enabling Application Control, that requires HTTPS inspection. Which we do not want to do as it breaks some O365 functionality and generally is not recommended by MS.&lt;/P&gt;&lt;P&gt;Is anyone else&amp;nbsp; facing similar challenge? Any ideas what you are going to do before R80.20 is rolled out? For us it's a simple call of SW maturity and we don't believe that R80.20 is ready to be deployed in production yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 15:27:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13374#M91285</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-05T15:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13375#M91286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kaspars,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought this could be accomplished in R80.10 by using the "Non-FQDN". SK (&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk120633) mentions the example of checkpoint.com on a non-FQDN setup allowing access to support.checkpoint.com, community.checkpoint.com, etc. would this not solve your wildcard situation for any domain at *.domain.com?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120633" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120633"&gt;Domain Objects in R80.10 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Snippet:&lt;/P&gt;&lt;H3 style="color: #333333; background-color: #ffffff; font-weight: bold; font-size: 16px;"&gt;&lt;STRONG&gt;Non-FQDN mode&lt;/STRONG&gt;&lt;/H3&gt;&lt;BLOCKQUOTE class="jive-quote" style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;P&gt;When FQDN mode is unchecked, traffic to the domain and its sub-domains will be matched on the rule using the non-FQDN Domain object.&lt;/P&gt;&lt;P&gt;Example:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;EM&gt;checkpoint.com&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;as non-FQDN - all traffic to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;checkpoint.com&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and to its sub-domains, such as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;support.checkpoint.com&lt;/EM&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;community.checkpoint.com&lt;/EM&gt;, etc. will be matched on that object.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;When upgrading domain objects from pre-R80.10, this option is enforced.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;To match a rule with non-FQDN domain object, the Security gateway uses DNS reverse lookup (if the IP address is not already in cache).&lt;/P&gt;&lt;P&gt;Note: some DNS servers do not support DNS reverse lookups or might not be fully updated with all reverse entries.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 15:40:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13375#M91286</guid>
      <dc:creator>Mike_A</dc:creator>
      <dc:date>2018-11-05T15:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13376#M91287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nah, non-FQDN object stops acceleration and generally is rather ineffective as it will only permit one IP in case names resolves to multiple &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. This option should be banned haha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 15:49:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13376#M91287</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-05T15:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13377#M91288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good to know, thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there documentation on the single IP usage and stopping of acceleration when using this "Non-FQDN" objects? Or was information you obtained from TAC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Mike&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 15:57:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13377#M91288</guid>
      <dc:creator>Mike_A</dc:creator>
      <dc:date>2018-11-05T15:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13378#M91289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Either you allow IP spaces used by O365 on r80.10 via network objects and hoping that they will not change so frequently, so you would not have to care about updating them or you will use r80.20 and updatable objects.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 16:45:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13378#M91289</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2018-11-05T16:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13379#M91290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So far it's been ok based on old info but I doubt it will last too long.. we did updates daily before &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 19:18:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13379#M91290</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-05T19:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13380#M91291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually it's fairly well documented&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk41632" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk41632"&gt;Best Practices - Working with Domain Objects (Pre R80.10)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578"&gt;SecureXL Mechanism&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Couldn't find about one IP issue, but we had to learn it hard way so we left donaid objects alone pre-R80.10&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 19:24:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13380#M91291</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-05T19:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13381#M91292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please understand I am not trying debate but better understand the documentation here and possibly help others. I to want to be able to use domain objects and possible wildcards.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One link&amp;nbsp;you sent represents a "Pre R80.10" best practice on domain objects which I have always agreed to and obeyed by, Domain objects on any version R77.30 or below was NOT a good idea. Everything I have read, starting in R80.10 this was not applicable and fixed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is from &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120633"&gt;sk120633&lt;/A&gt;&amp;nbsp;towards the bottom.&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;TABLE border="0" cellpadding="2" cellspacing="0" style="border-color: #e6edf7;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD valign="top"&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="border-color: #9eb5c5;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD valign="top" width="100%"&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="2" style="border-color: #9eb5c5;" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;&lt;STRONG&gt;Domain objects Acceleration&lt;/STRONG&gt;&lt;/H2&gt;&lt;P&gt;Starting from R80.10, Domain objects do not disable SecureXL Accept templates anymore and support Templates Acceleration. Hence, Domain objects can be used in upper rules in the security policy with no performance impact.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SecureXL link also references where conditions are met to not create an accepted template. Yet references "Rules that contain Domain Object" would not create an accelerated template, but states that its been resolved in R80.10 (bottom bullet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG style="background-color: #ffffff; color: #000000; text-decoration: underline; font-size: 14px;"&gt;Snippet from SecureXL Mechanism link:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;All subsequent rules below such rules will not be templated as well, regardless of the rule. It is advised that all rules that can be templated, be placed at the top of the rule base (unless of course, this will violate other optimization considerations):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Rule with service '&lt;CODE&gt;Any&lt;/CODE&gt;' (&lt;STRONG&gt;resolved in R75.40 and above&lt;/STRONG&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Rule with a service that has a 'handler' (where a specific protocol is chosen in '&lt;CODE&gt;Protocol Type&lt;/CODE&gt;' field - instead of '&lt;CODE&gt;None&lt;/CODE&gt;' ; go to service object - right-click - click on "&lt;CODE&gt;Edit...&lt;/CODE&gt;" - click on "&lt;CODE&gt;Advanced...&lt;/CODE&gt;" button - refer to "&lt;CODE&gt;Protocol Type:&lt;/CODE&gt;" field).&lt;BR /&gt;Note: This setting can be changed only in SmartDashboard R7X and lower.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Rules that contain Port range object (&lt;STRONG&gt;resolved in R75.40 and above&lt;/STRONG&gt;).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Rules that contain Time object (&lt;STRONG&gt;resolved in R80.10&lt;/STRONG&gt;).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Rules that contain Dynamic object (&lt;STRONG&gt;resolved in R80.10&lt;/STRONG&gt;).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Rules that contain Domain object (resolved in R80.10).&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 19:48:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13381#M91292</guid>
      <dc:creator>Mike_A</dc:creator>
      <dc:date>2018-11-05T19:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13382#M91293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good point Mike! I really don't have answer for that, I guess a better clarification would be useful. But just this note alone about reverse lookups would put me off in all honesty. I don't believe you would get accurate results with this approach &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Note: some DNS servers do not support DNS reverse lookups or might not be fully updated with all reverse entries.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 21:51:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13382#M91293</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-05T21:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13383#M91294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also a good point Kaspars! I thought in R80.10 reverse DNS lookups were removed and only forward lookups were used. Good conversation!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the biggest talking point here is with cloud computing. I do not believe that AWS, for example, gives you the ability to create reverse DNS entries for any of your ELB, EC2, etc instances. They rely on the user adding a CNAME to make any host name to their owned domain (&lt;STRONG&gt;domain.com&lt;/STRONG&gt;) look aesthetically pleasing. How would one using Check Point (rhetorical question) for a &lt;STRONG&gt;domain.com&lt;/STRONG&gt; hosted within AWS with &lt;STRONG&gt;support.domain.com&lt;/STRONG&gt;, &lt;STRONG&gt;community.domain.com&lt;/STRONG&gt; etc. benefit from a Non-FQDN domain object where the IP cannot be defined? If one was to allow &lt;STRONG&gt;.domain.com&amp;nbsp;&lt;/STRONG&gt;but not want to allow all of AWS, all the underlying reverse entries for said AWS issued IP, 100.26.82.X for example, would look like this &lt;STRONG&gt;ec2-100-26-82-X.compute-1.amazonaws.com&lt;/STRONG&gt;. If security was so strict that they did not want to allow &lt;STRONG&gt;.amazonaws.com&lt;/STRONG&gt; domain object, how would this be accomplished? Would we need to define FQDN objects for each sub-domain we wanted our users to hit? I can see in the example this isn't an extreme admin overhead but what about instances where various companies use then a CDN, well say Akamai, all is good if we allow &lt;STRONG&gt;.amakaitechnologies.com&lt;/STRONG&gt;, until said organization decides they want to switch CDN networks...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch-Abernathy&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/2138"&gt;Valeri Loukine&lt;/A&gt;‌ any insight as to how you are seeing users overcome these "reverse DNS" hurdles?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Mike&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 12:44:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13383#M91294</guid>
      <dc:creator>Mike_A</dc:creator>
      <dc:date>2018-11-06T12:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13384#M91295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Totally get being cautious, but we've had more than 1000 customers already upgrade to R80.20 with generally positive results.&lt;/P&gt;&lt;P&gt;That said you may be able to use something like this to get the IP addresses imported as objects in R80.10:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3013"&gt;Basic script for importing IP Adress objects from feed (here office365)&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 12:54:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13384#M91295</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-06T12:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13385#M91296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Best not to rely on reverse DNS lookups, which have been problematic for a couple of decades now. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;It's why we eventually reworked Domain objects to support forward DNS lookups.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 12:56:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13385#M91296</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-06T12:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13386#M91297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Dameon!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we assume that a FQDN object is a forward lookup and any Non-FQDN (un-tick the box) would be subject to a reverse DNS lookup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 13:08:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13386#M91297</guid>
      <dc:creator>Mike_A</dc:creator>
      <dc:date>2018-11-06T13:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13387#M91298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah - that was the reason for this thread. MS has stopped XML feed (we used that ourselves before) and changed it to REST. Which in itself would not be a problem but the main issue is that whole format has changed - some services are defined by FQDN only, some just by IP, some by both and some by domains with wildcards. And that's why it became tricky to implement in R80.10. Looks like R80.20 is the only option.. Unless CP ports the same functionality to R80.10 &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Will have to start new thread about R80.20 MDS and VSX experiences in real world&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 13:10:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13387#M91298</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-06T13:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13388#M91299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this is how Domain objects worked prior to R80.10.&lt;/P&gt;&lt;P&gt;Note in the mode, the objects will not generate SecureXL templates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 14:37:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13388#M91299</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-06T14:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13389#M91300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You might want to check MineMeld. Yes it is product from another vendor, but it is opensource product, which doesn't require licensing and it can be integrated with other vendors. There are some articles on how to deploy the MineMeld and also some useful how to create Office365 miners. The good news is that the miners are updated to work with the new REST service and the basic setup already return all IPv4, IPv6 and URLs used for any O365 product.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 10:05:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13389#M91300</guid>
      <dc:creator>Astardzhiev</dc:creator>
      <dc:date>2018-11-09T10:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13390#M91301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Having generated the feeds in Minemeld are you saying it is then possible to such these into R80.10? We have a Minemeld already and use it to feed out other firewall vendor devices but not Check Point yet as I didn't think it could.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 13:49:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13390#M91301</guid>
      <dc:creator>Tim_Spencer</dc:creator>
      <dc:date>2018-11-13T13:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13391#M91302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're the one generating the feeds, you can generate them in&amp;nbsp;{ "name" : "Office365Group", "members" : { "add" : ["New Host 1", "New Host 2"]&amp;nbsp; &amp;nbsp;} }&amp;nbsp; format and send it via POST to &lt;A href="https://&amp;lt;Management"&gt;https://&amp;lt;Management&lt;/A&gt;&amp;nbsp;Server IP&amp;gt;/web-api/v1.1/set-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to make the argument that solving&amp;nbsp;&lt;EM&gt;that o365 challenge&lt;/EM&gt; is a compelling reason to upgrade.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;A _jive_internal="true" data-userid="47831" data-username="0460ae43-b630-4a72-b063-0a8888fa3bb5" href="https://community.checkpoint.com/people/0460ae43-b630-4a72-b063-0a8888fa3bb5"&gt;Kaspars Zibarts&lt;/A&gt; wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Will have to start new thread about R80.20 MDS and VSX experiences in real world&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Care to elaborate?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 18:50:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13391#M91302</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-11-13T18:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13392#M91303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just wanted to hear from those running R80.20 in larger networks, how's it going so far and if they would recommend to go ahead with MDS and VSX upgrades. That was all. Since we're sort of forced to rush it out earlier than we thought. I would normally want to wait till first jumbo is released.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 20:06:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13392#M91303</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-13T20:06:37Z</dc:date>
    </item>
    <item>
      <title>Re: O365 access filtering in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13393#M91304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We do this today with R80.10.&amp;nbsp; The PAC file ultimately becomes the "director" of what should go direct via firewall and what should go via proxy.&lt;/P&gt;&lt;P&gt;1. Subscribe to the JSON (XML previously) of published IP networks using some sort of script&lt;/P&gt;&lt;P&gt;2. Add/remove the networks via API&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We have a group for each subcategories (Skype, Exchange, SharePoint, Common)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;3. Put the groups in firewall policy (and you need some sort of mechanism to install policy if your policies aren't already being installed on a frequent basis)&lt;/P&gt;&lt;P&gt;4. Implement Microsoft's proxy PAC&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Microsoft O365 networks will go direct&lt;/LI&gt;&lt;LI&gt;Content not hosted by Microsoft (non-Microsoft O365 IP space) will use the proxy environment&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2018 16:26:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/O365-access-filtering-in-R80-10/m-p/13393#M91304</guid>
      <dc:creator>Brian_Deutmeyer</dc:creator>
      <dc:date>2018-11-20T16:26:26Z</dc:date>
    </item>
  </channel>
</rss>

