Hi
We have created a custom application/site object to use in the https inspection bypass rule. It contains trusted domains and services we want to exclude from inspection. Let's call it HTTPS_inspection_bypass. This custom app is only used in HTTPS inspection policy.
Since there is a lot of traffic to this domains this custom application is almost always on the top of the TOP applications list in the reports and the granular visibility per application/site is lost. So, instead of gmail.com, microsoft.com, lync.com etc., we only get HTTPS_inspection_bypass as an application, swallowing all the included domains, making reports somewhat lacking in precision.
I'm quite sure this is by design, but is there a way around that?
![top_apps.JPG top_apps.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/9341i79E1F13A547024B8/image-size/large?v=v2&px=999)