- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
I want to create a policy and use as destination the cloud 'Internet', but not the object 'all_Internet' — I want the cloud Internet.
More details are needed regarding your question but my assumption is that you want to use the Internet object coming from the App & URL blade. For that you need to enable the Application & URL feature in the policy.
In addition you also need to enable Application Control and if you have the license URL Filtering on the Cluster/Gateway object. Depending on the usage scenario, either both of them or only one of them may be sufficient.
Alternatively if there is a licensing limitation instead of using the Internet object you can assign a Zone to the external interface and use that Zone as the Internet object.
Which object(s) you can use depends on the enabled blades.
The Internet object as described would usually require AppC / URLF blades.
I'm a bit lost. Could you please explain exactly what you mean by “cloud internet”?
More details are needed regarding your question but my assumption is that you want to use the Internet object coming from the App & URL blade. For that you need to enable the Application & URL feature in the policy.
In addition you also need to enable Application Control and if you have the license URL Filtering on the Cluster/Gateway object. Depending on the usage scenario, either both of them or only one of them may be sufficient.
Alternatively if there is a licensing limitation instead of using the Internet object you can assign a Zone to the external interface and use that Zone as the Internet object.
Thanks to everyone, indeed the cloud symbol used to represent the internet—I managed to obtain it by enabling URL filtering and app control directly in the rule base policy configurations I had. Thanks.
Which object(s) you can use depends on the enabled blades.
The Internet object as described would usually require AppC / URLF blades.
Chris is 100% correct...you need urlf/appc blades enabled for that.
One thing that still puzzles me is that SK specifically refers to the ‘cloud internet’ rather than simply the ‘internet’.
I find that interesting as well.
Presumably talking about the object which has a cloud as its icon. This is the object which requires App Control/URL Filtering to be enabled.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 7 | |
| 6 | |
| 5 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY