- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi everyone,
Curious, here in early 2026, what people are implementing for inspection/bypass for access to Office365 (SharePoint, Teams, Outlook, etc). Back when we first implemented HTTPS Inspection, we ended up putting in a number of bypass rules for various MS/Office365 services. I'm trying to clean this up - ideally we'd inspect - having DPI for files moving back and forth between OneDrive would be ideal from a Threat Prevention perspective, and many Applications Signatures say they require HTTPS Inspection for application detection (e.g. Microsoft Teams). On the other hand...if it ain't broke, don't mess with it. So I'm looking for what other people have currently in place and how that is working for you and your users.
Thanks,
Dave
You might not need to do DPI on Office 365 traffic if you're using Email and Collaboration, since some security functions can be done as part of that product.
I will tell you what I do in the lab, but Im sure this is NOT something many people would ever do. I use wildcards and literally exempt anything *outlook* *teams* and *microsoft*. Otherwise, you may find yourself troubleshooting this for hours on end trying to figure out what needs to be allowed/exempted.
Andy and PhoneBoy,
Appreciate the responses. FWIW we do use some MS native tools for threat prevention, but I wouldn't mind some more layered defense, as long as it doesn't impact customers. We pretty much bypass all M365 traffic via a couple of unwieldy rules, and I am planning to clean them up. Before I do this, however, if anyone is inspecting M365 traffic, I'd like to hear your experiences.
Dave
Hey Dave,
I know customer that used to do that, not any longer. Im almost positive the reason they stopped was because it eas causing them too many headaches along the way, since they always had to end up bypassing things.
Out of M365 Network Principles M$ says avoid any deeper inspection (which TLS Inspection definitively is).
| Bypass proxies and inspection devices | Configure browsers with PAC files that send Microsoft 365 requests directly to egress points. Configure edge routers and firewalls to permit Microsoft 365 traffic without inspection. | Minimize latency Reduce load on network devices |
I´d stick to MSXFAQ ( M365 und SSL Inspektion, saying avoid inspecting endpoints ( M365 Endpoints Worldwide - API ) that are flagged with "Optimize" and "Allow" as category. "optimize" endpoints you could try with TLS Inspection.
AFAIK - with this you will not get hands on files that are moved around in OneDrive and co. But enabling TLS Inspection will pretty sure cause problems with the application.
Sharepoint and Teams chances are good, you won´t get a good hand on on network level.
Other vendors have things like "tenant control" to stick users to their own tenant or control where they might access.. not sure if Check Point offers something in that direction.
Excellent advice @Nüüül
This is the path I am headed - excluding those ranges marked with Optimize and Allow. Ideally, Check Point would break down the updatable objects for Office365 Services based on these tags - otherwise I'm stuck with some manual work, verifying when these "optimize" and "allow" ranges are updated and changing my rules based on that. I will likely end up using a broader stroke - just bypassing essentially everything in the Office365 Services updatable objects group.
I agree 100%, seems totally logical to me as well.
here are several scripts and so on that you could use to build your own updatable objects. perhaps you would need to adopt them a bit for using those flags.
but yes, thats some extra work.
Dave,
Do you run R82? There are many new features that make your life for easy. (learning mode: https://support.checkpoint.com/results/sk/sk182679 )
And certificate pinning:
Starting from R82, several new features were added to further address the challenges posed by certificate-pinned applications:
Second tip: you can bypass the 'recommended' websites listed in https://support.checkpoint.com/results/sk/sk163595
Start building new policy maybe with a few test clients, or your own machine.
So rule 1 is your client and bypass and rule 2 inspect.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY