- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi mates,
Is there a way to restrict outbound https traffic from going to web mail portals. We want to allow users to use https, but we don't want them to send email. Also, would outbound https inspection be needed?
You would have to block specific webmail portals to do that, which would most likely require HTTPS Inspection.
Not necessarily. As long as Manage & Settings > Blades > Application Control > Categorize HTTPS Websites is enabled, URL Filtering should work. Then as long as you have a services contract for the firewall, you can add a rule to block the "Email" category.
TLSv1.3 with encrypted SNI throws a wrench into this, but it should be possible to block that in various ways, including via Group Policy.
I would say this is pretty good AI answer : - )
Andy
*********************
Webmail portals (like Gmail, Outlook Web Access, Yahoo Mail) use HTTPS encryption, which hides the full URL path and content from traditional firewalls. Without HTTPS inspection, you can only see the domain name (e.g., mail.google.com) — not the full URL (e.g., mail.google.com/inbox) or user actions.
mail.google.com, but you can't block specific actions like sending emails or accessing attachments. [techdocs.b...oadcom.com]Here’s how to implement this securely and effectively:
mail.google.com, outlook.live.com, mail.yahoo.com) using domain-based filtering. [techdocs.b...oadcom.com]Im thinking one rule to allow port 443 and another to block 25?
Andy
You would have to block specific webmail portals to do that, which would most likely require HTTPS Inspection.
Not necessarily. As long as Manage & Settings > Blades > Application Control > Categorize HTTPS Websites is enabled, URL Filtering should work. Then as long as you have a services contract for the firewall, you can add a rule to block the "Email" category.
TLSv1.3 with encrypted SNI throws a wrench into this, but it should be possible to block that in various ways, including via Group Policy.
I would say this is pretty good AI answer : - )
Andy
*********************
Webmail portals (like Gmail, Outlook Web Access, Yahoo Mail) use HTTPS encryption, which hides the full URL path and content from traditional firewalls. Without HTTPS inspection, you can only see the domain name (e.g., mail.google.com) — not the full URL (e.g., mail.google.com/inbox) or user actions.
mail.google.com, but you can't block specific actions like sending emails or accessing attachments. [techdocs.b...oadcom.com]Here’s how to implement this securely and effectively:
mail.google.com, outlook.live.com, mail.yahoo.com) using domain-based filtering. [techdocs.b...oadcom.com]Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY