<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application filter based on risk - do not include URL... in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249536#M41726</link>
    <description>&lt;P&gt;For URL Filtering, there is a category called "URL Filtering" that matches anything in our URL Filtering database.&lt;BR /&gt;There is also an "Uncategorized" category that matches stuff that isn't there.&lt;BR /&gt;Also, the assumption is that URL Filtering is using specific web-based ports only.&lt;/P&gt;
&lt;P&gt;Applications include things that aren't strictly Web Applications and/or don't use standard web ports.&lt;BR /&gt;Allowing access to "All Applications" would also allow access over the relevant ports as well, which would be overly broad and may create performance and/or security issues..&lt;BR /&gt;Also note that some application signatures do not work fully unless HTTPS Inspection is used.&lt;BR /&gt;Application categories/signatures must be explicitly permitted as a result.&lt;/P&gt;</description>
    <pubDate>Wed, 21 May 2025 18:48:57 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-05-21T18:48:57Z</dc:date>
    <item>
      <title>Application filter based on risk - do not include URL...</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249480#M41715</link>
      <description>&lt;P&gt;Hi All!&lt;/P&gt;&lt;P&gt;I have a customer that have exported a list from&amp;nbsp;&lt;U&gt;&lt;A href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fprotect.checkpoint.com%2Fv2%2Fr02%2F___https%3A%2Fappwiki.checkpoint.com%2Fappwikisdb%2Fpublic.htm___.YzJlOmNwYWxsOmM6bzo5ZjhmZTEzMDY3NTU5YzE0NGQ1YzhjMTk1OTAwNjUwNjo3OmY3NTI6ZTczMGYwZDkwMTYzY2E4ZWJlNGM3YWNjNjFkZWNhYzBiMTdkZmMwOGI4NGRiZDM0M2I3NmNkNTliNDAzMzFlNjpoOlQ6Tg&amp;amp;data=05%7C02%7Cmattias.andersson%40shibuya.se%7C39ddc029966c41eb5c1f08dd977b7079%7C75c78e5d53c94f62b32d7f4f11886db5%7C0%7C0%7C638833278638860253%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=mQMTYY6%2F6rMgpes8HCY2vqIJS6XtsFpr5LTineTNx3A%3D&amp;amp;reserved=0" target="_blank"&gt;https://appwiki.checkpoint.com/appwikisdb/public.htm.&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;The customer will deny and permit some application based on Risk 3-5 (Medium, High, Critical), around applications 50 should be permitted and the rest denied.&lt;/P&gt;&lt;P&gt;I have tried to figured our how I can build an policy for that...&lt;BR /&gt;&lt;BR /&gt;I have created an Application/Site Group with "permitted" Applications and after that I have created a drop for "Critical Risk, High Risk and Medium Risk", my problem is that above Categories also includeds URLs that shouldn´t be&amp;nbsp; dropped.&lt;/P&gt;&lt;P&gt;How can I accomplishabove? To create a group with 10000 applications and drop them seems like the only solution that I have found, which will not be updated with new applications.&lt;BR /&gt;&lt;BR /&gt;Do Check Point offer some kind of pre-defined group for "All Applications" or "Appplication Risk without URLs" that I haven´t found?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mattias&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 10:20:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249480#M41715</guid>
      <dc:creator>maad-pul</dc:creator>
      <dc:date>2025-05-21T10:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: Application filter based on risk - do not include URL...</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249497#M41717</link>
      <description>&lt;P&gt;The Risk categories you can use in objects refer to specific applications for which we have a signature (eg AppWiki).&lt;BR /&gt;They do not refer to URLs in general, for which you must use one of the URL filtering categories:&amp;nbsp;&lt;A href="https://usercenter.checkpoint.com/ucapps/" target="_blank"&gt;https://usercenter.checkpoint.com/ucapps/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If your goal is to allow only specific sites and deny the rest, you want explicit allow rules created for those sites and those sites only.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 12:54:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249497#M41717</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-21T12:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Application filter based on risk - do not include URL...</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249515#M41723</link>
      <description>&lt;P&gt;Well, Risk categories also included URL Filtering according to&amp;nbsp;&lt;A href="https://usercenter.checkpoint.com/ucapps/urlcat/categories" target="_blank"&gt;https://usercenter.checkpoint.com/ucapps/urlcat/categories&lt;/A&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Medium Risk&lt;/TD&gt;&lt;TD&gt;Applications and Websites that may be misused and cause data leak / malware infection.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which mean if a use the "Medium Risk" for Dropping Risk 3 (Medium Risk) Applications, I will also drop URLs that Check Point has categories in that section, my intention is just to drop application and I can´t find a nice way to bulid that filter....&lt;BR /&gt;&lt;BR /&gt;Do you understand my problem?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 15:31:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249515#M41723</guid>
      <dc:creator>maad-pul</dc:creator>
      <dc:date>2025-05-21T15:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Application filter based on risk - do not include URL...</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249516#M41724</link>
      <description>&lt;P&gt;If you are creating block rules based on broad categories, you may have to make exceptions to permit certain access.&lt;BR /&gt;There's a couple ways to do this:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A rule proceeding your block rule that explicitly permits access to the specific site/application (either pre-defined or custom).&lt;/LI&gt;
&lt;LI&gt;Creating a local categorization override:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk98489" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk98489&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;See also:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Web-Filtering-Best-Practices-March-2025-Video-and-Slides/m-p/244980#M47695" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Web-Filtering-Best-Practices-March-2025-Video-and-Slides/m-p/244980#M47695&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 15:51:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249516#M41724</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-21T15:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Application filter based on risk - do not include URL...</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249517#M41725</link>
      <description>&lt;P&gt;Thanks for information! A Feature Request from me would be to have a either pre-defined object with "All Applications" or segment Risk Categories by Application and URL.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 15:55:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249517#M41725</guid>
      <dc:creator>maad-pul</dc:creator>
      <dc:date>2025-05-21T15:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Application filter based on risk - do not include URL...</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249536#M41726</link>
      <description>&lt;P&gt;For URL Filtering, there is a category called "URL Filtering" that matches anything in our URL Filtering database.&lt;BR /&gt;There is also an "Uncategorized" category that matches stuff that isn't there.&lt;BR /&gt;Also, the assumption is that URL Filtering is using specific web-based ports only.&lt;/P&gt;
&lt;P&gt;Applications include things that aren't strictly Web Applications and/or don't use standard web ports.&lt;BR /&gt;Allowing access to "All Applications" would also allow access over the relevant ports as well, which would be overly broad and may create performance and/or security issues..&lt;BR /&gt;Also note that some application signatures do not work fully unless HTTPS Inspection is used.&lt;BR /&gt;Application categories/signatures must be explicitly permitted as a result.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 18:48:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-filter-based-on-risk-do-not-include-URL/m-p/249536#M41726</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-21T18:48:57Z</dc:date>
    </item>
  </channel>
</rss>

