<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Harmony SASE and Endpoint Security Signature Updates in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277182#M46197</link>
    <description>&lt;P&gt;Upon trialing SASE, Endpoint security will not allow signature updates at all. Even though there's a &lt;SPAN&gt;Check Point Updates - HTTPS bypass rule, it didnt seem to work, unless we added in *.checkpoint.com.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 20 May 2026 10:28:17 GMT</pubDate>
    <dc:creator>Simon_Moscovitz</dc:creator>
    <dc:date>2026-05-20T10:28:17Z</dc:date>
    <item>
      <title>Harmony SASE and Endpoint Security Signature Updates</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277182#M46197</link>
      <description>&lt;P&gt;Upon trialing SASE, Endpoint security will not allow signature updates at all. Even though there's a &lt;SPAN&gt;Check Point Updates - HTTPS bypass rule, it didnt seem to work, unless we added in *.checkpoint.com.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 10:28:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277182#M46197</guid>
      <dc:creator>Simon_Moscovitz</dc:creator>
      <dc:date>2026-05-20T10:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony SASE and Endpoint Security Signature Updates</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277183#M46198</link>
      <description>&lt;P&gt;The "Check Point Updates HTTPS bypass" should contains these FQDN (based on sk163595)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;avupdates.checkpoint.com&lt;/LI&gt;
&lt;LI&gt;secureupdates.checkpoint.com&lt;/LI&gt;
&lt;LI&gt;updates.checkpoint.com&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;And here you should find the FQDN used by the Endpoint: So&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk83520" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk83520&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;So using that object seems to be not enough as reported by the Sks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 10:38:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277183#M46198</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-20T10:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony SASE and Endpoint Security Signature Updates</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277184#M46199</link>
      <description>&lt;P&gt;Yes, but i would have thought that these exceptions should be in the bypass rules by default, not just the three. No?&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 10:41:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277184#M46199</guid>
      <dc:creator>Simon_Moscovitz</dc:creator>
      <dc:date>2026-05-20T10:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony SASE and Endpoint Security Signature Updates</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277185#M46200</link>
      <description>&lt;P&gt;Oh yes I agree with you, only Check Poinrt could give an explanation maybe.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 10:42:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277185#M46200</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-20T10:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony SASE and Endpoint Security Signature Updates</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277186#M46201</link>
      <description>&lt;P&gt;taking a look about the threee FQDN included in the object you mentioned and the SKs I mentioned, they are used only by the security gateway and management ... so that object is not used and related to Endpoint upgrades&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 10:47:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277186#M46201</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-20T10:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony SASE and Endpoint Security Signature Updates</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277189#M46202</link>
      <description>&lt;P&gt;Acutally, I've just changed the rule to the destination being Checkpoint services updateable objects instead of the domain names, which seems to work, and is now dynamic!&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 10:52:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Harmony-SASE-and-Endpoint-Security-Signature-Updates/m-p/277189#M46202</guid>
      <dc:creator>Simon_Moscovitz</dc:creator>
      <dc:date>2026-05-20T10:52:59Z</dc:date>
    </item>
  </channel>
</rss>

