- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
This new Secureknowledge article, sk184185, answers one very frequent question: Why do you want to enable HTTPS Inspection on your security GWs.
Here is what the SK says (quoting in full):
Without HTTPS Inspection, the Security Gateway can only inspect metadata such as domain names and TLS certificates. Most Threat Prevention blades cannot inspect encrypted payloads. With HTTPS Inspection enabled, the gateway decrypts traffic and allows full inspection by all blades.
Recommendation: Enable HTTPS Inspection for outbound traffic. Exclude sensitive domains such as banking sites or internal services to avoid privacy and performance issues.
A user clicks a phishing link: example.com/login
| Feature | Without HTTPS Inspection | With HTTPS Inspection | Notes |
|---|---|---|---|
| IPS | Minimal: TLS anomalies only | Full payload inspection | Requires decrypted content |
| Anti-Bot / C2 Detection | DNS, traffic patterns, domain reputation | Adds payload inspection for beaconing | Detects hidden C2 patterns in HTTP POST/GET |
| Anti-Bot / Reputation | IP/domain reputation, TLS cert anomalies | No additional benefit | Reputation is metadata-driven |
| Application Control | Partial: SNI, IP ranges | Full identification via payload | Differentiates app functions (e.g., chat vs. video) |
| Application Control - UserCheck | Not supported | Supported via HTTP redirect | Requires decryption |
| URL Filtering | Domain-based filtering | Granular filtering by path, parameters | Blocking example.com/badpage requires decryption |
| URL Filtering - UserCheck | Not supported | Supported via HTTP redirect | Requires decryption |
| Anti-Virus | Limited on URL based filtering | Scans files inside HTTPS | Requires decrypted payload |
| Threat Emulation | Not available | Extracts files for sandboxing | Requires decryption |
| Threat Extraction | Not available | Sanitizes active content | Requires decryption |
| Zero-Phishing | Limited SNI-based enforcement (R82.10) | Full page analysis and JS injection | In-browser protection requires HTTPS Inspection |
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY