- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I have just combined the Firewall and Applications & URL Filtering Blades into one policy and I have a question about a rule and where I should place it.
With my old split policies, I had a "Recommended Categories to Block" on the Application policy as the last rule before my "Default Allow All" Rule and I am wondering the best place on where to add this for my combined rule base now.
I have decided at the moment to place it in my "Clean up rules" section and was seeing if anyone had any thoughts on this?
Thanks
You missed completely the rule 12 from the old policy. New policy will not allow any application connectivity to internet.
It would be better to create an inline layer for internet access with copy/paste of your older APC policy as sub-rules there
At the moment then Rule 3 would allow access through to the Internet without filtering. Is it actually blocking access at Rule 4 at all?
I am here with @mdjmcnally , rule 3 basically shadows 4. I would like to repeat my suggestion of creating a sub-layer which will filter out unwanted applications and allow the rest.
The way your new rulebase is build now, it is not the case.
So I understand then that the source on the IronPort rule 3 is an actual host, with it being blurred out then looks the same as the destination, hence our confusion as looks like is an Any, Any, Any rule
So Traffic flow is
If using proxy then then Source at the Firewall is seen as the IronPort Proxy and matches Rule 3 and relies on the IronPort/Proxy to do the filtering. So any traffic from the IronPort is seen as OK by the Firewall and not filtered.
If not using the Proxy then won't match Rule 3 so moves through to Rule 4. If matches that then the user gets a Block Page and you get a seperate log entry specific so can see against specific rule.
If doesn't match the Rule 4 then moves through to Rule 6 where gets dropped but the User gets no Block Page and obviously the log is jsut showing as Drop Rule so not as easy to distinguish in the logs.
Rule 4 won't block anything in this case that wouldn't get dropped at Rule 6 anyway but you will see logged seperately to the generic block all and the user a block page.
If you want to ensure that drop access to those then want it high on the rulebase as otherwise other rules potentially can allow access to them. These are categories that you don't want access to under any circumstances.
You can then use other rules or potentially an inline layer to control what can access.
inline layer is useful as can then delegate admin of the inline layer so that if use a rule that permits say a dept access to the Internet then call an inline layer, you can delegate admin of that layer for the dept to the dept head. Also means that they can control what there dept has.
I would suggest hit counts for changing rule order...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 15 | |
| 13 | |
| 10 | |
| 6 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY