Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Arturxr
Explorer

connecting to unauthorized proxy or vpn to bypass security policies on checkpoint?

Jump to solution

how to determine from checkpoint logs which network user connects to an unauthorized proxy server or vpn to bypass security policies on checkpoint?

0 Kudos
1 Solution

Accepted Solutions

Filter logs/reports/views as suggested by @PhoneBoy you may also wish to add the "Anonymizer" category 

View solution in original post

0 Kudos
2 Replies
PhoneBoy
Admin
Admin

It depends on how the end user is connecting and what blades are active.
If you have App Control on for all Internet-facing traffic, there are categories for proxies and VPN you can search on.
You'll see more if HTTPS Inspection is enabled as well. 
That assume you've constructed your rulebase correctly.

If your outbound access rule includes the service Any, it's highly recommended you restrict that to needed services only to minimize the risk of either connecting to a proxy or VPN.

0 Kudos

Filter logs/reports/views as suggested by @PhoneBoy you may also wish to add the "Anonymizer" category 

0 Kudos