- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hello,
I have a question.
I have a traffic that I see in the "log" is being allowed (Action:Detect), but I can't understand "why".
According to the "Profile" defined, the traffic should be "blocked", but in the log, I can see that the traffic is being allowed, and that should not happen, or am I misinterpreting the log?
I want to first understand exactly the log, because my ultimate goal is to "block" traffic from the LAN to the domain "christoher-pelletier.mykajabi.com".
Blocking it by an access rule, or by FQDN, I don't think is an option.
Can you please guide me?
Regards.
Make sure in gateway object setting is set to "according to policy"
Best,
Andy
Andy,
I have just checked my Cluster object. I found that it is set to "Detect Only".
So, the custom rules are going to be ignored, as long as I don't change the behaviour in the "Cluster object", right?
Cheers.
Thats right.
Hey Bro
What would be the best practice to block a domain like the one I exposed in this post, if the customer still decides not to modify the behavior of the Antibot&Antivirus on the Cluster object (they still want this behavior to stay in Detect mode)?
Is it advisable to block this URL by a FQDN rule (using DOMAINS objects), or is it better to work with the URLF blade?
Greetings.
Best practice is best practice...
FQDN objects and URLF are different approaches.
The later would use a site/category approach.
Depends who you ask, I guess. Chris is right, its different approaches. I always do it with URLF blade.
Best,
Andy
Try to use Custom Site/Application objects whenever possible instead of Domain objects. Only time you should be using Domain objects is if the URL filtering blade is not enabled on the gateway.
The "Domain Objects" depend on the Blade Firewall, then?
Does the effectiveness of working "URL" "Blocking" with "Domain Objects" depend on DNS?
Greetings.
Yes Domain objects are part of the firewall blade, in R80+ for FQDN's it relies on forward DNS lookups, for non-FQDN it relies on reverse DNS lookups which can still be problematic and should be avoided where possible. Custom URL/Site objects match the actual URL site name for HTTP, or the SNI (Server Name Indication) for HTTPS via the URL Filtering blade. For performance reasons you should try to avoid using the "*" character in Custom Site/URL objects, see here for more detail: Custom Sites and RegExp Wildcard Efficiency
Hello, my friend.
Happy 2024 🙂
I have a curiosity, even if I create explicit rules in the Threat Prevention layer, if my Cluster object is still in "Detect Only" mode, the Firewall will completely ignore my explicit rules, right?
Greetings.
Feliz ano nuevo!
YES 🙂
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 13 | |
| 11 | |
| 10 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 6 | |
| 6 |
Wed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY