- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Here is an example URL, where if you enable blocking specific file types in AV and select gzip, gz,tar.gz,tgz, the page doesn't load properly, because a large number of css.gzip and js.gzip files get blocked.
https://www.dummies.com/business/accounting/auditing/take-a-look-at-your-companys-liquidity-risk/
Is our only option to change these file types to deep scan in AV, or is there a way to bypass css.gzip and js.gzip otherwise?
We don't have DLP or Threat emulation enabled. I was hoping to bypass by file extension, but can't see how.
A.
Trying to duplicate what you are getting unsuccessfully...R80.40, https inspection on, and switched the AV setting but page loads fine...are they not loading or are you getting block pages?
HTTPSs inspection is on for us. We are on 80.30.
You should see a large number of 307 redirects in Developer tools on your browser like below:
The page loads like this:
And our config:
Out of interest how is the following currently set for the environment?
Inspection settings > GZIP enforcement > Advanced
Same as what you showed:
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY