This new Secureknowledge article, sk184185, answers one very frequent question: Why do you want to enable HTTPS Inspection on your security GWs.
Here is what the SK says (quoting in full):
Without HTTPS Inspection, the Security Gateway can only inspect metadata such as domain names and TLS certificates. Most Threat Prevention blades cannot inspect encrypted payloads. With HTTPS Inspection enabled, the gateway decrypts traffic and allows full inspection by all blades.
Recommendation: Enable HTTPS Inspection for outbound traffic. Exclude sensitive domains such as banking sites or internal services to avoid privacy and performance issues.
Warning: HTTPS Inspection may impact performance and user privacy. Test in a lab environment before deployment.
Real-World Example
A user clicks a phishing link: example.com/login
- Without HTTPS Inspection:
- URL Filtering blocks known malicious domains.
- Anti-Bot uses reputation and traffic patterns.
- Encrypted payload bypasses AV/IPS.
- With HTTPS Inspection:
- Zero-Phishing analyses the page and injects browser protections.
- AV/IPS inspect files and exploits inside the page.
Blade Behavior Comparison