The current configuration is a fail-open which means that the traffic will be allowed in case the URL will be unknown.
Changing to a fail-close will have impact on all the environment since all the HTTPS traffic toward website with unknown reputation will be blocked until the checkpoint receive a status on those websites.
We are getting bombarded with alerts from SOC, when ever a user logins to a DC, stating that he has accessed a malicious URL.
I believe this is because of the fail-open settings. Is there any customization that can be done to prevent this from happening. Please check and let me know.
Some of the URL's reported are below,
media[.]jtdwjcwq6f4wp4ce[.]com
ns1[.]telecom-info[.]com