<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 HTTPS Inspection Bypass for Office365 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/58858#M92033</link>
    <description>I am not aware of any specific plans to use Domain Objects in the HTTPS Inspection policy.&lt;BR /&gt;That said, we should see some improvement in upcoming releases.</description>
    <pubDate>Wed, 24 Jul 2019 00:18:26 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-07-24T00:18:26Z</dc:date>
    <item>
      <title>R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33297#M92017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;Here's our situation. We'd upgraded from R77.30 to R80.10 a couple months ago to take advantage of new features and to implement HTTPS Inspection, which we'd been told would be a&amp;nbsp;more stable experience. Once we'd upgraded and&amp;nbsp;during testing of HTTPS Inspection, we found our general O365 experience to be lacking. Microsoft recommends not to inspect that traffic, to have the cleanest connection between client and their servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We were going to apply the SK119562 Hotfix to our R80.10 Take 112 environment to take advantage of the Dynamic Objects, but ran into issues. Lo and behold, R80.20 went GA, so we changed our tact to upgrading to R80.20. We found the Updatable Objects for O365/Azure, and thought we could use those in our Bypass Rules. We've been told that those can only be used in Access Policies. Which is a shame, as this is exactly what we need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Should we just use the Dynamic Objects in the Destination column in HTTPS Inspection rules, forgetting about these new "Updatable Objects"?&lt;/P&gt;&lt;P&gt;Unfortunately we have tried employing these Dynamic Objects in R80.20 and get this error.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71230_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Does R80.20 just work better with Office 365 and there is no need for a specific Bypass Rule?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Any other suggestions/solutions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot believe that this would not have been thought about during the EA period for R80.20, especially as this SK119562 Hotfix was made available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Eric&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2018 08:24:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33297#M92017</guid>
      <dc:creator>Eric_Knopp</dc:creator>
      <dc:date>2018-10-05T08:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33298#M92018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe the plan is to support those updatable objects in the HTTPS Inspection policy, but it's not supported currently.&lt;/P&gt;&lt;P&gt;It's possible this SK may also still be relevant (even though it mentions R77.20):&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104564" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104564"&gt;Bypass for Office 365 in R77.20 HTTPS Inspection policy&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2018 16:18:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33298#M92018</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-05T16:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33299#M92019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It was picked up during the EA process, particularly with the new Updatable Objects in R80.20 being so vital to getting O365 to work. &amp;nbsp;There is a JHF coming to support this but no estimate on timescale. &amp;nbsp;It's a bit of a nightmare to add in the objects for O365 within the HTTPS Inspection policy but that seems to be the only way to do it at present. &amp;nbsp;It has to be a source/destination bypass rule within the HTTPS Inspection policy otherwise the first packet is inspected to identify the application which breaks the connection to O365.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:37:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33299#M92019</guid>
      <dc:creator>Stuart_Green</dc:creator>
      <dc:date>2018-10-29T14:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33300#M92020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Hi,&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;Unfortunately, updatable objects are not supported in HTTPS Inspection in R80.20.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;You can sumbit RFE&amp;nbsp;thru&amp;nbsp;your SE&amp;nbsp;to get support of O365 in HTTPSI policy in R80.20&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;Thanks,&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Meital&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2018 16:24:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33300#M92020</guid>
      <dc:creator>Meital_Natanson</dc:creator>
      <dc:date>2018-11-04T16:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33301#M92021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does Checkpoint have a best-practices document / whitepaper that explains how they recommend &lt;EM&gt;successfully&amp;nbsp;&lt;/EM&gt;deploying Office 365 services behind their Gateway?&amp;nbsp; With so many customers making this migration to O365, this would be very helpful.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If no document exists, it may be beneficial to include best-practices for customers that are "all in" (use the heavy inspection blades + https inspection), "mostly in" (use heavy inspection blades, not https inspection), or FW-only customers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may also differ by code version, aka Updatable objects in R80.20,&amp;nbsp; or some other method in previous versions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your consideration!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 19:04:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33301#M92021</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2018-11-16T19:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33302#M92022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you mean clients behind your gateway &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;If you're using HTTPS Inspection:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112354" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112354"&gt;How to allow Office 365 services in Application Control R77.30 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're not using HTTPS Inspection but using R80.20, you can allow access to the Office 365 Services in your Access Policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74604_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 19:16:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33302#M92022</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T19:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33303#M92023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I meant clients behind the GW that are connecting to O365, thanks&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, for now, if using HTTPS inspection, use App Control and don't try to bypass HTTPS (even though MS says to do so).&lt;/P&gt;&lt;P&gt;In the future, if Updatable objects can be used in HTTPS bypass rules, it may make sense to then allow the updatable objects in access control policy, and bypass HTTPS inspection for&amp;nbsp;those same objects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, this is helpful info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 19:35:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33303#M92023</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2018-11-16T19:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33304#M92024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello all, any news about a official best pratices doc or whitepaper from Checkpoint?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:27:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33304#M92024</guid>
      <dc:creator>Alessandro_Marr</dc:creator>
      <dc:date>2019-01-30T14:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33305#M92025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;they still did no implemented the dynamic objects for HTTPs Inspection policy so i don't believe&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:36:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33305#M92025</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2019-01-30T14:36:25Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33306#M92026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dor, did you have implemented https inspection on r80.20?&amp;nbsp; the&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;kernel parameter&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;EM style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;STRONG&gt;enhanced_ssl_inspection &lt;/STRONG&gt;is on or off?&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:45:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33306#M92026</guid>
      <dc:creator>Alessandro_Marr</dc:creator>
      <dc:date>2019-01-30T14:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33307#M92027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This has been an issue for some time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way we have had to implement the bypass is to import objects into the SMS via an API call and then use these objects within the HTTPS Inspection policy. &amp;nbsp;That's been the only way to bypass HTTPS Inspection. &amp;nbsp;If it isn't bypassed, there are no end of issues with authentication services as the first packet always gets inspected and that breaks trust.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 17:46:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33307#M92027</guid>
      <dc:creator>Stuart_Green</dc:creator>
      <dc:date>2019-01-30T17:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33308#M92028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I find importing gazillions of IPs crazy, impractical and really frustrating for end-users where every day something stops to work because M$ changed their IP range or because of the way HTTPS-I&amp;nbsp;is currently implemented.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, CheckPoint, please come up with an easy-to-deploy solution for this for all firmware supporting HTTPS-I (not only R80.20).&amp;nbsp;I know this is partly not a vendor problem but it can only be properly solved by you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Being polite I will skip my comments on the way M$ forces FW admins to compromise security for their online services to work. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2019 06:53:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33308#M92028</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2019-02-01T06:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33309#M92029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi We have the same issue. we are currently doing the bypass by creating a custom Office365&amp;nbsp;Application/site.&lt;/P&gt;&lt;P&gt;It contains&amp;nbsp; 6 urls and seems to have solve the main problem for us.&lt;/P&gt;&lt;P&gt;currently we have in the list&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="78422" alt="Office 365 bypass application/site" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/78422_office  bypass.PNG" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2019 09:25:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/33309#M92029</guid>
      <dc:creator>Chris_Thuys</dc:creator>
      <dc:date>2019-02-13T09:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/49454#M92030</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;Are there any news regarding using domain objects in HTTPS inspection in R80.20?&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Bernhard&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 12:24:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/49454#M92030</guid>
      <dc:creator>Bernhard_Sayer</dc:creator>
      <dc:date>2019-04-01T12:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/58812#M92031</link>
      <description>&lt;P&gt;Any update on this?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2019 12:43:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/58812#M92031</guid>
      <dc:creator>Gregory_Link</dc:creator>
      <dc:date>2019-07-23T12:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/58818#M92032</link>
      <description>&lt;P&gt;Any News?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2019 14:05:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/58818#M92032</guid>
      <dc:creator>Andrey_Kuzmenko</dc:creator>
      <dc:date>2019-07-23T14:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/58858#M92033</link>
      <description>I am not aware of any specific plans to use Domain Objects in the HTTPS Inspection policy.&lt;BR /&gt;That said, we should see some improvement in upcoming releases.</description>
      <pubDate>Wed, 24 Jul 2019 00:18:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/58858#M92033</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-24T00:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 HTTPS Inspection Bypass for Office365</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/59101#M92034</link>
      <description>&lt;P&gt;We plan supporting it in R80.40 planned for the end of this year, and we're looking for EA customers for EA program to start in 2 months.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2019 19:43:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-HTTPS-Inspection-Bypass-for-Office365/m-p/59101#M92034</guid>
      <dc:creator>Gera_Dorfman</dc:creator>
      <dc:date>2019-07-28T19:43:38Z</dc:date>
    </item>
  </channel>
</rss>

