- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Although configuring Web Application security or Web API security is easily done via the configuration wizard, in most cases, assets are fully protected without additional manual changes, thanks to the CloudGuard AppSec learning mechanism.
Why do I need exceptions?
The most common use case of custom rules and exception configuration is when a log is issued and a security administrator decided that traffic matching one of the log fields (for example, the URI field) should not be detected or blocked by the AppSec engine. This is also known as a “false positive”.
Usually, for new traffic that is being blocked because he was not learned yet or because it looks like an actual attack.
How do exceptions work?
A custom rule/exception is a combination of the specific AppSec security practice that caught the original event and the Asset relevant for the same traffic. Once an exception is put in place, the AppSec engine will work according to the configuration:
How to create an exception?
List of Keys Possible to Use:
|
Exception Key |
Value String Search Location |
Remarks |
|
Host |
Regular expression of the HTTP Hostname |
|
|
URI |
HTTP full URI in request |
|
|
Source Identifier |
Regular Expression of the identifier, according to the definition of Source Identifier in the Asset's configuration |
|
|
Source IP |
The IP address of the request's source in the IP address or CIDR format (e.g. "<IP address>/<number of bits for network>") |
|
|
Parameter Name |
Regular Expression of a parameter name is key in the HTTP request body's XML or JSON file |
Can be used with the “Skip” action |
|
Parameter Value |
Regular Expression of a parameter value is the value to a key in the HTTP request body's XML or JSON file |
Can be used with the “Skip” action |
|
Protection Name |
The protection name used by the security sub-practice |
For IPS and Snort Rules only |
|
Country Code |
For Geolocation-based exceptions. The country is resolved according to the source IP address. Code is the recommended use for country-based exceptions and can be searched here according to the Alpha-2 code of ISO-3166. |
|
|
Country Name |
For Geolocation-based exceptions. The country is resolved according to the source IP address. The name is less recommended for country-based exceptions but is more readable. Exact names can be searched here according to ISO-3166. |
|
|
File Hash |
SHA-256 string of the file the exception should apply to. |
For File Security only |
|
File Name |
The file name matches the configured exception. |
For File Security only |
|
Response Body Note - Scanning response traffic adds a performance impact. |
Regular expression of a pattern within the HTTP Response Body |
This key allows adding manually Data Loss Prevention (DLP) rules |
|
Indicator |
A regular expression for indicators to be ignored during the inspection. When an exception is set to skip and includes the "Indicator" field, the parameter will not be skipped, and instead, only the matching indicators will be ignored, allowing for other indicators to be detected in the matching parameter. |
Can be used with the “Skip” action |
Examples:
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY