- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
For the safety of their organizations and to help stop the spread of COVID-19/Coronavirus, our customers have moved all non-essential employees to work from home. The increase in volume of remote workers has resulted in considerable added load on Security Gateways, and customers are requesting guidance from Microsoft and Check Point on how to alleviate this additional workload while still maintaining an acceptable security posture.
Microsoft has made two recommendation to customers using Office 365 applications to optimize user experience:
1. Split tunnel Office 365 applications instead of routing them over a VPN tunnel
2. Split tunnel Office 365 applications using explicit “Optimized” Microsoft provided IP address ranges rather than split-tunneling using generic O365 FQDNs
This SecureKnowledge article describes how to achieve this when using a Check Point VPN client. While sending these connections directly to the Office 365 services alleviates the load on Check Point Security Gateways it also removes this traffic from the path of Threat Prevention inspection those same gateways provide. Customers should evaluate if split-tunneling this traffic meets their security posture needs.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY