- Products
- Learn
- Local User Groups
- Partners
- More
Check Point Jump-Start Online Training
Now Available on CheckMates for Beginners!
Why do Hackers Love IoT Devices so Much?
Join our TechTalk on Aug 17, at 5PM CET | 11AM EST
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
The SMB Cyber Master
Boost your knowledge on Quantum Spark SMB gateways!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Did you try adding the relevant CA key to the gateway's key store as mentioned here: Bypass by URL in HTTPS Inspection does not work when the site certificate is invalid (same SK you mention above)?
Note that, in general, we are adding "Online Services" to R80.20 Gateway, where you will be able to create objects that represent specific online services like Office 365.
These objects will be dynamically updated by the gateway based on information provided by the provider, e.g. Microsoft.
I believe it will be possible to add these to HTTPS Inspection, but I'm not 100% certain of this.
Thank you very much for the quick response. I have not done so as of yet, but will. Is there an easy way to determine all the CAs, Microsoft and the like, that I may require to add in order to be proactive? Could tracker be used? Thank you again.
As for moving to R80, I am bound to R77.30 until such time that Time Quota is available.
The Time Quota feature is part of a "Customer Release" and you'll have to check with your local office to see what the plan is for bringing this into the maintrain.
Offhand, I'm not sure there's an easy way to find all the CAs you need to add, except maybe by looking in the CA store of a local PC and ensure all the Microsoft-specific ones are added.
Thank you very much. You read my mind, I am doing that right now.
Hi Dameon,
It isn't in the HTTPS Inspection option in R80.20 just yet but feedback has urged its inclusion...!
Hi Larry,
You can add CA of Microsoft as trusted CA in HTTPS Inspection. Other option is you can completely bypass the Microsoft O365.
As Dameon said, You will find Dynamic services of Microsoft O365 and for others in upcoming R80.20
Thank you for the input. Bypassing O365 entirely would be a last resort I believe. O365 seems an obvious point of exfiltration. I don't know if there are mitigating controls in that cloud that we could leverage.
We do have a CloudGuard SaaS offering, which will be generally available in short order.
HTTPS Inspection is a nightmare with O365 as you rightly point out. We've been trying to get it to work for well over a year now and there's always something that just breaks ever so slightly. Adding CAs in to HTTPS Inspection never seems to fully work. It is also a problem with online services such as Sophos Central, Adobe Creative Cloud and other online services that don't like MITM attacks.
Hopefully R80.20's online services will fix this but it seems a long time coming...
The most success that we've had is to create network objects on the gateway by manually defining these object from Office 365 URLs and IP address ranges - Office 365 and then adding source and destination rules in to HTTPS Inspection. Adding in the category to HTTPS inspection means that the first packet always gets inspected so that also breaks O365. Not ideal but it is a workaround until R80.20 comes of age.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY