- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Trying to block:
https://www.virtualbox.org/wiki/Downloads
Using R80.10, HTTPS Inspection is enabled. I can block the domain but I need to block the "Downloads". Every custom app rule I make never hits o this URL, I don't think I am getting the syntax right for the "regular expression". Any help will be greatly appreciated.
Did you make a custom application/site object under application policy to block it?
You can't block a specific HTTPS URL unless HTTPS Inspection is enabled.
And if you're using HTTPS Inspection, it's highly recommended you be on a more current release.
Well just because of that I spun up an R80.40 release and HTTPS inspection enabled. Same problem, the rule never gets hit. I've checked the regex expression and it appears to be right. If I missed something please let me know. Screenshots are attached.
Try not backslashing the forward slashes in your URL.
@Roger_Boyle did you try using a native URL without regular expressions?
Also, in this specific case Dameon is correct, HTTPSi should be enabled.
So I tested your request on my lab and I couldn't do the exact page. I was able to do the homepage and even with HTTPS enabled it will not work. Regex didn't solve it,
Using your logic of not allowing users to download from Virtualbox.org but not block the page, you can use Content awareness. Build a custom app for the URL (virtualbox.org*) and use content aware to not allow download of ANY file. Set the action to block and that would allow access to the page but not to download anything from the site.
Is it possible to block a particular page? I thought firewalls can inspect up to domain level (URL) not gradual inspection like whole URI, this was the information provided by TAC engineer when I open a SR for a similar requirement!!
If your goal is to prevent downloads from virtualbox.org, using Content Awareness is probably the right answer as it should catch it regardless of the URL.
If you have a requirement to block a specific URL on a specific site, HTTPS Inspection is enabled, and it's not working correctly, please engage with the TAC.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY