<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection and MS/Office365, once more in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270960#M45497</link>
    <description>&lt;P&gt;Excellent advice&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1663"&gt;@Nüüül&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Feb 2026 02:01:19 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-02-16T02:01:19Z</dc:date>
    <item>
      <title>HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270822#M45469</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;Curious, here in early 2026, what people are implementing for inspection/bypass for access to Office365 (SharePoint, Teams, Outlook, etc). Back when we first implemented HTTPS Inspection, we ended up putting in a number of bypass rules for various MS/Office365 services. I'm trying to clean this up - ideally we'd inspect - having DPI for files moving back and forth between OneDrive would be ideal from a Threat Prevention perspective, and many Applications Signatures say they require HTTPS Inspection for application detection (e.g. Microsoft Teams). On the other hand...if it ain't broke, don't mess with it. So I'm looking for what other people have currently in place and how that is working for you and your users.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 19:20:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270822#M45469</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2026-02-13T19:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270824#M45470</link>
      <description>&lt;P&gt;You might not need to do DPI on Office 365 traffic if you're using Email and Collaboration, since some security functions can be done as part of that product.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 19:31:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270824#M45470</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-02-13T19:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270870#M45477</link>
      <description>&lt;P&gt;I will tell you what I do in the lab, but Im sure this is NOT something many people would ever do. I use wildcards and literally exempt anything *outlook* *teams* and *microsoft*. Otherwise, you may find yourself troubleshooting this for hours on end trying to figure out what needs to be allowed/exempted.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Feb 2026 14:19:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270870#M45477</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-14T14:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270893#M45478</link>
      <description>&lt;P&gt;Andy and PhoneBoy,&lt;/P&gt;
&lt;P&gt;Appreciate the responses. FWIW we do use some MS native tools for threat prevention, but I wouldn't mind some more layered defense, as long as it doesn't impact customers. We pretty much bypass all M365 traffic via a couple of unwieldy rules, and I am planning to clean them up. Before I do this, however, if anyone is inspecting M365 traffic, I'd like to hear your experiences.&lt;/P&gt;
&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Sat, 14 Feb 2026 20:23:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270893#M45478</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2026-02-14T20:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270894#M45479</link>
      <description>&lt;P&gt;Hey Dave,&lt;/P&gt;
&lt;P&gt;I know customer that used to do that, not any longer. Im almost positive the reason they stopped was because it eas causing them too many headaches along the way, since they always had to end up bypassing things.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Feb 2026 20:25:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270894#M45479</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-14T20:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270948#M45494</link>
      <description>&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Out of&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-network-connectivity-principles?WT.mc_id=M365-MVP-6771&amp;amp;view=o365-worldwide" target="_blank" rel="noopener"&gt;M365 Network Principles&lt;/A&gt;&amp;nbsp;M$ says avoid any deeper inspection (which TLS Inspection definitively is).&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Bypass proxies and inspection devices&lt;/TD&gt;&lt;TD&gt;Configure browsers with PAC files that send Microsoft 365 requests directly to egress points.&lt;BR /&gt;Configure edge routers and firewalls to permit Microsoft 365 traffic without inspection.&lt;/TD&gt;&lt;TD&gt;Minimize latency&lt;BR /&gt;Reduce load on network devices&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;I´d stick to MSXFAQ (&amp;nbsp;&lt;A href="https://www.msxfaq.de/netzwerk/grundlagen/ssl_inspection.htm#microsoft_365_und_ssl_inspection" target="_blank" rel="noopener"&gt;M365 und SSL Inspektion,&lt;/A&gt;&amp;nbsp;saying avoid inspecting endpoints ( &lt;A href="https://endpoints.office.com/endpoints/worldwide" target="_blank" rel="noopener"&gt;M365 Endpoints Worldwide - API&lt;/A&gt;&amp;nbsp;) that are flagged with "Optimize" and "Allow" as category. "optimize" endpoints you could try with TLS Inspection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AFAIK - with this you will not get hands on files that are moved around in OneDrive and co. But enabling TLS Inspection will pretty sure cause problems with the application.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sharepoint and Teams chances are good, you won´t get a good hand on on network level.&lt;/P&gt;&lt;P&gt;Other vendors have things like "tenant control" to stick users to their own tenant or control where they might access.. not sure if Check Point offers something in that direction.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Feb 2026 16:23:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270948#M45494</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2026-02-15T16:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270960#M45497</link>
      <description>&lt;P&gt;Excellent advice&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1663"&gt;@Nüüül&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 02:01:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270960#M45497</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-16T02:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270999#M45499</link>
      <description>&lt;P&gt;This is the path I am headed - excluding those ranges marked with Optimize and Allow. Ideally, Check Point would break down the updatable objects for Office365 Services based on these tags - otherwise I'm stuck with some manual work, verifying when these "optimize" and "allow" ranges are updated and changing my rules based on that. I will likely end up using a broader stroke - just bypassing essentially everything in the Office365 Services updatable objects group.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:27:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/270999#M45499</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2026-02-16T13:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/271003#M45500</link>
      <description>&lt;P&gt;I agree 100%, seems totally logical to me as well.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:43:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/271003#M45500</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-16T13:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/271038#M45501</link>
      <description>&lt;P&gt;here are several scripts and so on that you could use to build your own updatable objects. perhaps you would need to adopt them a bit for using those flags.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but yes, thats some extra work.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 18:50:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/271038#M45501</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2026-02-16T18:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and MS/Office365, once more</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/271052#M45502</link>
      <description>&lt;P&gt;Dave,&lt;/P&gt;
&lt;P&gt;Do you run R82? There are many new features that make your life for easy. (learning mode:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182679" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182679&lt;/A&gt;&amp;nbsp;)&lt;/P&gt;
&lt;P&gt;And certificate pinning:&lt;/P&gt;
&lt;P&gt;Starting from R82, several new features were added to further address the challenges posed by certificate-pinned applications:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Full Fail-Open Mode: Automatically detects failures in the HTTPS Inspection process due to client-side issues like pinned certificates. When a failure is detected, the connection is added to an exception list, ensuring zero connectivity issues for end-users.&lt;/LI&gt;
&lt;LI&gt;Allow Lists: In addition to the well-known HTTPS services, this list includes known certificate-pinned applications identified through learning and analyzing similar connection behaviors, allowing users to decide whether to bypass them.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Second tip: you can bypass the 'recommended' websites listed in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk163595" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk163595&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Start building new policy maybe with a few test clients, or your own machine.&lt;/P&gt;
&lt;P&gt;So rule 1 is your client and bypass and rule 2 inspect.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 21:55:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-and-MS-Office365-once-more/m-p/271052#M45502</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-02-16T21:55:29Z</dc:date>
    </item>
  </channel>
</rss>

