- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi mates,
Is there a way to restrict outbound https traffic from going to web mail portals. We want to allow users to use https, but we don't want them to send email. Also, would outbound https inspection be needed?
You would have to block specific webmail portals to do that, which would most likely require HTTPS Inspection.
Not necessarily. As long as Manage & Settings > Blades > Application Control > Categorize HTTPS Websites is enabled, URL Filtering should work. Then as long as you have a services contract for the firewall, you can add a rule to block the "Email" category.
TLSv1.3 with encrypted SNI throws a wrench into this, but it should be possible to block that in various ways, including via Group Policy.
I would say this is pretty good AI answer : - )
Andy
*********************
Webmail portals (like Gmail, Outlook Web Access, Yahoo Mail) use HTTPS encryption, which hides the full URL path and content from traditional firewalls. Without HTTPS inspection, you can only see the domain name (e.g., mail.google.com) — not the full URL (e.g., mail.google.com/inbox) or user actions.
mail.google.com, but you can't block specific actions like sending emails or accessing attachments. [techdocs.b...oadcom.com]Here’s how to implement this securely and effectively:
mail.google.com, outlook.live.com, mail.yahoo.com) using domain-based filtering. [techdocs.b...oadcom.com]Im thinking one rule to allow port 443 and another to block 25?
Andy
You would have to block specific webmail portals to do that, which would most likely require HTTPS Inspection.
Not necessarily. As long as Manage & Settings > Blades > Application Control > Categorize HTTPS Websites is enabled, URL Filtering should work. Then as long as you have a services contract for the firewall, you can add a rule to block the "Email" category.
TLSv1.3 with encrypted SNI throws a wrench into this, but it should be possible to block that in various ways, including via Group Policy.
I would say this is pretty good AI answer : - )
Andy
*********************
Webmail portals (like Gmail, Outlook Web Access, Yahoo Mail) use HTTPS encryption, which hides the full URL path and content from traditional firewalls. Without HTTPS inspection, you can only see the domain name (e.g., mail.google.com) — not the full URL (e.g., mail.google.com/inbox) or user actions.
mail.google.com, but you can't block specific actions like sending emails or accessing attachments. [techdocs.b...oadcom.com]Here’s how to implement this securely and effectively:
mail.google.com, outlook.live.com, mail.yahoo.com) using domain-based filtering. [techdocs.b...oadcom.com]Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY