No, I answered both parts. But let's clarify.
TLS inspection effort is defined by HTTPSi rulebase. Traffic filtering is enforced by the network security policy.
HTTPSi enforcement happens way before Network filtering takes over and drops something.
For all TCP-based unsupported TLS traffic (mostly for that with certificate pinning), it is the best practice to bypass it in HTTPSi rulebase, to save a decryption effort that will fail anyway. Same applies to traffic you know will be dropped by network security rulebase. The best way to do that is to describe explicitly only the traffic you want to decrypt and bypass any other web traffic on Bypass cleanup rule.
In the case of QUIC, it is UDP, not TCP, port 443, and now HTTPSi does not support its decryption. My personal understanding is, there will be no decryption effort on QUIC at this point, so you do not have to create a targeted bypass rule with any of the supported releases. However, the situation is changing rapidly, and it is possible that UDP-based HTTP/2 will enter the picture at some point, with one of HFAs.
For that matter, making sure it is bypassed will not hurt.
However, if you are looking for the official best practice recommendation, and not yet another personal opinion, please open a TAC case: https://help.checkpoint.com