- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
A customer would like to be able to test that a deployed URL Filtering policy is working correctly and blocking or allowing access to different groups of users.
Do Check Point provide a similar database of URLs to that seen at testwebsensedatabase.com (ForcePoint) so that specific categories can be confirmed to be blocked for certain users without having to try and visit a site that belongs to that category?
Clearly they don't want to be trying to go legitimate pornography sites or other questionable sites just to confirm the policy is correctly applied.
Thanks
Hi Paul,
I'm pretty sure that similar questions have been raised on Check Mates before and I don't believe that there is such a 'database' (not one that Check Point offers anyway). You can verify URL categorization as outlined on sk69200 but no, I don't think there is such a database.
Is this what you are looking for?
http://www.cpcheckme.com/checkme/
I've not run the tool Tomer. I would need the customer to run it.
Well an example might be malicious sites. Customer wants to be sure they are blocked without visiting them. Even if they know a URL that is categorised as such, should they be testing to a 'genuine' malicious site to see if the policy works? If it's not configured properly and then they connect to the malicious site rather than being blocked they've now potentially infected or exposed themselves.
Hello, any updates on this case? I am having the same issue, unable to test the configured policies with safe sites. I requested Check Point to categorize test pages from other parties accordingly to their categories (currently, they are all categorized as Computer/Internet), as recommended in sk98489, but they just dismissed my requests without any explanation... Please, if you know of any safe testing pages that Check Point has categorized correctly, could you share them with the community?
Last time I looked (which I admit was a while ago), each URL Filtering category should have a couple of example URLs.
We don’t have a central list, though.
Indeed this is visible in SmartConsole / Object explorer as seen here:
See also: https://usercenter.checkpoint.com/ucapps/urlcat/categories
Thank you for your comments, guys. Yes, I am aware some examples are visible in SmartConsole, but let me explain why I think we need safe testing sites anyway:
1- For malicious or content-sensitive categories, we would prefer not to visit the actual web pages. For example, SmartConsole suggests xvideos.com for the Pornography category (do I really need to browse to an actual pornography site to check if my policy is correctly configured?), and no examples are provided for the Spyware / Malicious Sites category, at least in my SmartConsole version (so how do I check it?).
2- For non-malicious categories, some of the examples do not exist anymore (e.g., anonymizer.com), and most of them use only HTTPS currently, and we would like to check the policies before deploying HTTPS inspection.
You don't need to browse to the sites you can test URLs here: https://urlcat.checkpoint.com/urlcat/
I am aware of it, but this is only helpful to see how Check Point categorizes an URL. We want to test if our configured policy is working as expected (so we need to surf to an actual page to check if the firewall is blocking that category).
HTTPS Categorization needs to be enabled (should be by default), but it should not be required to deploy HTTPS Inspection to categorize URLs in most cases.
As you say, it is not required to categorize URLs, but it is to show the blocking page (otherwise, we only see a CONNECTION_RESET error message in the browser). Nonetheless, the issue with the need to surf to actual pornography pages to check the policy is still unresolved without safe testing pages.
Why do you believe that if you check the category of a URL on the URLCAT page and block this category in your policy that it wouldn't be effective?
We are in an academic environment, students are learning, and they make mistakes. To verify their progress and continue to the next stages of the training, they need to check with us that their policies are correctly applied. As Check Point Academy instructors, we strongly believe that safe test pages are needed, and we do not want students to browse actual pornography or malicious sites to check their policies. I hope this is understandable.
Thanks for clarifying the use case, it is different. Have you already raised this with the Secure Academy team as a requirement? If yes I will follow-up with them.
In the interim it sounds like something that may be overcome with a combination of DNS manipulation and a honeypot for such an environment (if not a basic category override).
Can you please provide further information on how to raise the case with the Secure Academy team? Thank you for your kind answers throughout the process.
The workaround we've been doing is to configure a category override for the safe testing sites, but if Check Point did it permanently on its database, it would be ideal.
I would start by reaching out to secureacademy(at)checkpoint.com and go from there.
Any Idea where I can get the list of URLs that the IPS is blocking ?
This would be VERY useful as well!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
6 | |
5 | |
3 | |
3 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY