- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I'm creating a firewall policy to support Office 365 traffic and I'm running into an issue (by design) regarding the decryption of Office 365 endpoint traffic. I've enabled HTTPS inspection globally, as well as inspection bypass for Office 365 endpoints, but the challenge I'm running into is that the Checkpoint will still perform SSL decryption on all traffic (because inspection is enabled globally).
Microsoft recommends against decryption of Optimize and Allow category endpoints...Is there any way to bypass decryption (easily) for these endpoints? Ideally using updatable objects?
Obviously a bit of a catch-22 here. We need HTTPS inspection so we can recognize traffic that we'll allow out, but the global decryption settings create an issue for these two endpoint categories.
Any thoughts are appreciated!
Darren,
Hope you are doing well. My first guess would be that the updateable objects for Microsoft/Office don't include the involved wildcards / FQDN according to sk163595: HTTPS Inspection bypass list object
*.broadcast.skype.com
*shared.officeapps.live.com
Have you tried to create a specific custom application object containing those entries? Then add them to the TLS Inspection policy + bypass.
In previous version you could enable Probe Bypass so the bypass action doesn't inspect even the first packet of the TLS handshake.
However in later version probe bypass was discontinued. I have to perform more research on R80.40 but so far the best way that I found to complete bypass traffic is to not even include those hosts / networks on the SSL/TLS policy.
This approach is difficult to implement on large scale environments and of course it will disable TLS inspection completed on those hosts.
More information here: Outbound SSL Inspection: A war story
Very familiar with the R80.40 enhancement allowing the use of Updatable Objects in the HTTPS inspection policy, and this is working as designed (logs are reporting that O365 endpoints have been bypassed). The challenge, however, is that because HTTPS inspection is enabled globally, the Checkpoint will still perform SSL encrypt/decrypt, evident in the fact that the firewall will replace the SSL certificate.
I can't think of any way to completely bypass SSL encrypt/decrypt functionality, so thought I'd throw this out to the larger community. Attached are a couple of screenshots detailing the issue when testing connectivity from https://connectivity.office.com.
Darren,
Hope you are doing well. My first guess would be that the updateable objects for Microsoft/Office don't include the involved wildcards / FQDN according to sk163595: HTTPS Inspection bypass list object
*.broadcast.skype.com
*shared.officeapps.live.com
Have you tried to create a specific custom application object containing those entries? Then add them to the TLS Inspection policy + bypass.
In previous version you could enable Probe Bypass so the bypass action doesn't inspect even the first packet of the TLS handshake.
However in later version probe bypass was discontinued. I have to perform more research on R80.40 but so far the best way that I found to complete bypass traffic is to not even include those hosts / networks on the SSL/TLS policy.
This approach is difficult to implement on large scale environments and of course it will disable TLS inspection completed on those hosts.
More information here: Outbound SSL Inspection: A war story
Adding the custom application did the trick (somewhat surprisingly). I had assumed that the Network Onboarding tool was complaining about the SSL decryption/certificate replacement. Once I whitelisted the two application URLs and configured them for HTTPS Inspection Bypass, all health checks came back positive.
Thanks!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY