- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
CheckMates Fest 2026
Watch Now!AI Security Masters
Hacking with AI: The Dark Side of Innovation
CheckMates Go:
CheckMates Fest
Hello,
I have a question.
I have a traffic that I see in the "log" is being allowed (Action:Detect), but I can't understand "why".
According to the "Profile" defined, the traffic should be "blocked", but in the log, I can see that the traffic is being allowed, and that should not happen, or am I misinterpreting the log?
I want to first understand exactly the log, because my ultimate goal is to "block" traffic from the LAN to the domain "christoher-pelletier.mykajabi.com".
Blocking it by an access rule, or by FQDN, I don't think is an option.
Can you please guide me?
Regards.
Make sure in gateway object setting is set to "according to policy"
Best,
Andy
Andy,
I have just checked my Cluster object. I found that it is set to "Detect Only".
So, the custom rules are going to be ignored, as long as I don't change the behaviour in the "Cluster object", right?
Cheers.
Thats right.
Hey Bro
What would be the best practice to block a domain like the one I exposed in this post, if the customer still decides not to modify the behavior of the Antibot&Antivirus on the Cluster object (they still want this behavior to stay in Detect mode)?
Is it advisable to block this URL by a FQDN rule (using DOMAINS objects), or is it better to work with the URLF blade?
Greetings.
Best practice is best practice...
FQDN objects and URLF are different approaches.
The later would use a site/category approach.
Depends who you ask, I guess. Chris is right, its different approaches. I always do it with URLF blade.
Best,
Andy
Try to use Custom Site/Application objects whenever possible instead of Domain objects. Only time you should be using Domain objects is if the URL filtering blade is not enabled on the gateway.
The "Domain Objects" depend on the Blade Firewall, then?
Does the effectiveness of working "URL" "Blocking" with "Domain Objects" depend on DNS?
Greetings.
Yes Domain objects are part of the firewall blade, in R80+ for FQDN's it relies on forward DNS lookups, for non-FQDN it relies on reverse DNS lookups which can still be problematic and should be avoided where possible. Custom URL/Site objects match the actual URL site name for HTTP, or the SNI (Server Name Indication) for HTTPS via the URL Filtering blade. For performance reasons you should try to avoid using the "*" character in Custom Site/URL objects, see here for more detail: Custom Sites and RegExp Wildcard Efficiency
Hello, my friend.
Happy 2024 🙂
I have a curiosity, even if I create explicit rules in the Threat Prevention layer, if my Cluster object is still in "Detect Only" mode, the Firewall will completely ignore my explicit rules, right?
Greetings.
Feliz ano nuevo!
YES 🙂
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 56 | |
| 44 | |
| 16 | |
| 14 | |
| 14 | |
| 11 | |
| 10 | |
| 10 | |
| 9 | |
| 8 |
Thu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesThu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY