<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft Activation negatively impacted by HTTPS Inspection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14113#M2396</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HTTPS Inspection is a nightmare with O365 as you rightly point out. &amp;nbsp;We've been trying to get it to work for well over a year now and there's always something that just breaks ever so slightly. &amp;nbsp;Adding CAs in to HTTPS Inspection never seems to fully work. &amp;nbsp;It is also a problem with online services such as Sophos Central, Adobe Creative Cloud and other online services that don't like MITM attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully R80.20's online services will fix this but it seems a long time coming...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most success that we've had is to create network objects on the gateway by manually defining these object from&amp;nbsp;&lt;A class="link-titled" href="https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2" title="https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2"&gt;Office 365 URLs and IP address ranges - Office 365&lt;/A&gt;&amp;nbsp; and then adding source and destination rules in to HTTPS Inspection. &amp;nbsp;Adding in the category to HTTPS inspection means that the first packet always gets inspected so that also breaks O365. &amp;nbsp;Not ideal but it is a workaround until R80.20 comes of age.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Aug 2018 20:40:07 GMT</pubDate>
    <dc:creator>Stuart_Green</dc:creator>
    <dc:date>2018-08-01T20:40:07Z</dc:date>
    <item>
      <title>Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14104#M2387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;I recently turned on HTTPS inspection with application control URL filtering and have had several instances where URL site bypasses did not work.&amp;nbsp; Microsoft O365 product activation is one of these, imagine the headache.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;The behaviour is outlined in SK122158 which claims that if a certificate cannot be validated that the traffic will show as "Detect" and not bypassed even if the site URL is bypassed.&amp;nbsp; The solution is to either bypass an IP host object, or add the site's CA certificate to the trusted CA list under HTTPS inspection.&amp;nbsp; I am guessing that in order for the prior to work, the certificate is not validated for an IP host object.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Has anyone else run across this, and how did you resolve?&amp;nbsp; Any suggestions and wisdom would be appreciated.&amp;nbsp; I am also being asked to bypass ALL Microsoft traffic.&amp;nbsp; For context I am at R77.30 JHA286 in order to leverage the time quota hot fix.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thank you in advance.&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Jul 2018 15:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14104#M2387</guid>
      <dc:creator>Larry_Birch</dc:creator>
      <dc:date>2018-07-29T15:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14105#M2388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you try adding the relevant CA key to the gateway's key store as mentioned here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk122158" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk122158"&gt;Bypass by URL in HTTPS Inspection does not work when the site certificate is invalid&lt;/A&gt;&amp;nbsp;(same SK you mention above)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that, in general, we are adding "Online Services" to R80.20 Gateway, where you will be able to create objects that represent specific online services like Office 365.&lt;/P&gt;&lt;P&gt;These objects will be dynamically updated by the gateway based on information provided by the provider, e.g. Microsoft.&lt;/P&gt;&lt;P&gt;I believe it will be possible to add these to HTTPS Inspection, but I'm not 100% certain of this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Jul 2018 23:56:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14105#M2388</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-29T23:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14106#M2389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for the quick response.&amp;nbsp; I have not done so as of yet, but will.&amp;nbsp; Is there an easy way to determine all the CAs, Microsoft and the like, that I may require to add in order to be proactive?&amp;nbsp; Could tracker be used?&amp;nbsp; Thank you again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for moving to R80, I am bound to R77.30 until such time that Time Quota is available.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 02:23:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14106#M2389</guid>
      <dc:creator>Larry_Birch</dc:creator>
      <dc:date>2018-07-30T02:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14107#M2390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Larry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can add CA of Microsoft as trusted CA in HTTPS Inspection. Other option is you can completely bypass the Microsoft O365.&lt;/P&gt;&lt;P&gt;As Dameon said, You will find Dynamic services of Microsoft O365 and for others in upcoming R80.20&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 09:54:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14107#M2390</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-07-30T09:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14108#M2391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Time Quota feature is part of a "Customer Release" and you'll have to check with your local office to see what the plan is for bringing this into the maintrain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Offhand, I'm not sure there's an easy way to find all the CAs you need to add, except maybe by looking in the CA store of&amp;nbsp;a&amp;nbsp;local PC and ensure all the Microsoft-specific ones are added.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 16:14:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14108#M2391</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-30T16:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14109#M2392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much.&amp;nbsp; You read my mind, I am doing that right now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 15:47:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14109#M2392</guid>
      <dc:creator>Larry_Birch</dc:creator>
      <dc:date>2018-08-01T15:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14110#M2393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the input.&amp;nbsp; Bypassing O365 entirely would be a last resort I believe.&amp;nbsp; O365 seems an obvious point of exfiltration.&amp;nbsp; I don't know if there are mitigating controls in that cloud that we could leverage.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 15:51:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14110#M2393</guid>
      <dc:creator>Larry_Birch</dc:creator>
      <dc:date>2018-08-01T15:51:54Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14111#M2394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We do have a &lt;A href="https://community.checkpoint.com/space/2090"&gt;CloudGuard SaaS&lt;/A&gt;‌ offering, which will be generally available in short order.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 16:51:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14111#M2394</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-01T16:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14112#M2395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It isn't in the HTTPS Inspection option in R80.20 just yet but feedback has urged its inclusion...!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 20:33:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14112#M2395</guid>
      <dc:creator>Stuart_Green</dc:creator>
      <dc:date>2018-08-01T20:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Activation negatively impacted by HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14113#M2396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HTTPS Inspection is a nightmare with O365 as you rightly point out. &amp;nbsp;We've been trying to get it to work for well over a year now and there's always something that just breaks ever so slightly. &amp;nbsp;Adding CAs in to HTTPS Inspection never seems to fully work. &amp;nbsp;It is also a problem with online services such as Sophos Central, Adobe Creative Cloud and other online services that don't like MITM attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully R80.20's online services will fix this but it seems a long time coming...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most success that we've had is to create network objects on the gateway by manually defining these object from&amp;nbsp;&lt;A class="link-titled" href="https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2" title="https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2"&gt;Office 365 URLs and IP address ranges - Office 365&lt;/A&gt;&amp;nbsp; and then adding source and destination rules in to HTTPS Inspection. &amp;nbsp;Adding in the category to HTTPS inspection means that the first packet always gets inspected so that also breaks O365. &amp;nbsp;Not ideal but it is a workaround until R80.20 comes of age.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 20:40:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Microsoft-Activation-negatively-impacted-by-HTTPS-Inspection/m-p/14113#M2396</guid>
      <dc:creator>Stuart_Green</dc:creator>
      <dc:date>2018-08-01T20:40:07Z</dc:date>
    </item>
  </channel>
</rss>

