Hello everyone,
Our situation:
We have Threat Prevention blades enabled on a Check Point firewall—Anti‑Virus, IPS, Anti‑Bot, etc. But HTTPS (SSL/TLS) inspection is turned OFF.
1. What we know:
• Without SSL inspection, Firewall cannot decrypt encrypted HTTPS traffic, so it cannot inspect the content inside that traffic. It only sees the IP addresses and ports.
• Since about 85–95 % of web traffic is HTTPS, most traffic remains uninspected.
• Without decryption, our Threat Prevention blades cannot detect malware, phishing links, bots, or data leaks hidden in HTTPS .
• In effect, we are blind to threats inside encrypted traffic; our heavy security investment may be going to waste .
2. So what benefits remain of Threat Prevention without SSL inspection?
• We only get protection for cleartext traffic (HTTP, SMTP, FTP, etc.).
• We can still block obvious network-level attacks (port scans, header anomalies), but application-layer threats in HTTPS are untouched .
4. Our conclusion so far:
• With HTTPS inspection OFF, threat prevention on encrypted traffic is effectively disabled.
• Without decryption, there is no content-level scanning, meaning zero protection for a large chunk of traffic.
My questions to the community:
1. Is our understanding correct? In short, without HTTPS inspection, Threat Prevention features don’t work on encrypted traffic?
2. Are there any real use cases where disabling HTTPS inspection still gives valuable security from Check Point Threat Prevention blades?
3. Which security features do still work on HTTPS traffic if inspection is off (e.g., header-based IPS rules, reputation checks, etc.)?
4. What are best practices for deploying HTTPS inspection in environments concerned about privacy, performance, or compliance?
Regards,
@Chinmaya_Naik