- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Re: R80.20 Identity Tags and Updatable Objects
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
R80.20 Identity Tags and Updatable Objects
This video elaborates on one the most important aspects of the Check Point Infinity architecture which is the dynamic, unified characteristics of a policy.
legacy Static policy means ticketing, many install policy operations and inherent discrepancies within the policy will ruin our operational efficiency.
However, by solving these challenges with a Dynamic approach – the security operations engineers only need to design a single policy rule for each scenario that will seamlessly control all operational aspects of an enterprise, while keeping access changes strict, yet adaptive.
Enjoy
- Tags:
- adaptive
- check point smartconsole
- cisco
- cloudguard controller
- context awareness
- cyber security
- dynamic
- dynamic cyber security
- dynamic policy
- dynamic security
- identity awareness
- identity tags
- infinity
- infinity archtecture
- integration
- new features
- office365
- online services
- r80.20
- real time
- security group
- security group tags
- security tags
- smartconsole
- tag
- tag based
- tags
- tech bytes
- tech talk
- tme
- updatable objects
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Great work Ofir Calif Roi Caspy !
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This was a great presentation. Very informative and directive. Thank you.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I was trying to create a NAT hide using a dynamic object or domains objects. However, I've got an "Invalid Object '.office365.com' in Original Dst of Address Translation Rule 5. The valid objects are: host, gateway, network, address range and router."
Would I like to know If the new updatable objects can be used by NAT policy?
Many thanks,
Felipe Tropeia
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sorry for my late reply.
Domain objects and updatable objects are currently not supported in NAT rulebase.
This is under development though..
hope this helps...
Yair
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
how to use Updatable Objects in legacy application HTTPS inspection.
Can Checkpoint ensure all Microsoft Office 365 application work without any problems if https inspected?
Thanks
Andreas
- Tags:
- https inspection
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This may be supported in an upcoming release.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
how to proceed with Microsoft cloud applcations like Azure, Skype , Power BI gateway hub and so on?
Recommendation from Microsoft is to http bypass -> result no Checkpoint blade protection anymore.
How to improve this and what is your experience with this kind of applications in your environments.
Thank you
Andreas
- Tags:
- https inspection
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
HTTPS Inspection also cannot be applied to applications that use Certificate Pinning or client-side certificates.
If you need those applications to work, then they would need to be bypassed if HTTPS Inspection were used.
Azure hosts a lot of things in it, so you'd need to be more specific about what you're asking about here.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Tags:
- https inspection
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The IPs specific to this service must be excluded from HTTPS Inspection as a result.
At the moment, we do not provide an easy way to do this, but it is planned for R80.40.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We plan supporting updatable objects in https inspection in R80.40 which is planned for the end of this year; We are looking for EA customers with EA program to start in about 2 months.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Dynamic objects seem largely unusable currently. TAC are always recommend HTTPS inspection to support Application Control and URL Filtering, but O365 needs to be bypassed and you can't use the updatable objects in the HTTPS inspection policy and so need to maintain manual address groups again.
Updatable objects are also not supported in the desktop policy (for endpoints managed out of a SmartCenter), making it hard to allow direct access to O365 when connected via a VPN. Guessing they are not supported for the full Endpoint client policy either?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I don't know what the plan is to support this in the desktop Endpoint policy.
