- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I have been slowly implementing the application control, and noticed today the Overpage page listing a list of allowed high risk applications. One of those applications is loadm.exelator.com. I went to the Security Policies, Application and was going to make a rule to block it, but that application does not appear in list.
But when I research it in the logs, it lists it there, and a category even. How do I block it when it is not listed in the Applications list in the rulebase though?
See attached image for log entry.
Ofcourse yo can do it! you need to create a Custom Application/Site:
and then add the URLs that you want to block (or permit) in this custom category:
Check sk165094 for best practices: https://support.checkpoint.com/results/sk/sk165094
The log was generated by URL FILTERING blade (not Application Control Blade) so this should be blocked by URL Filtering "categories" (not an specific application) in your access policy.
If you have R81.10, check the admin guide here: https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuid...
So I would block it by using the categories Spam, High Risk and URL Filtering, but there is no way to block it directly by the loadm.exelator.com that is listed, correct?
Ofcourse yo can do it! you need to create a Custom Application/Site:
and then add the URLs that you want to block (or permit) in this custom category:
Check sk165094 for best practices: https://support.checkpoint.com/results/sk/sk165094
Also....Check Point provides an online tool that allows you to check whether a URL is classified under one of the categories of the URL Filtering Blade. After you check the URL, this tool also allows you to suggest an alternative categorization for the URL:
https://urlcat.checkpoint.com/
All great points @MikeB
Thank you very much! Perfect
Btw, I will add one more thing on top of what @MikeB said. I know this has come up few times before, so figured would mention it. Some folks had said they whitelist all the needed sites, but they still get blocked. I spent, cant even count, how many hours with TAC and different customers troubleshooting this and I found way it works all the time, never let me down. So, here is what I mean by that.
Say you wish to block everything facebook or youtube, I simply create custom app/site as @MikeB pointed out and add *facebook* and *youtube* and thats it. Otherwise, I can tell you right now, if you try and follow all the examples given in the sk165094, no offense, but you might be on the phone till 3 am or longer lol
Just giving you my honest feedback/experience.
Cheers,
Andy
I agree with @MikeB , makes sense what he advised about which blade blocked this traffic.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
15 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY