- Products
- Learn
- Local User Groups
- Partners
- More
Open Garden In Action:
External Cyber Risks
Inside the SharePoint Zero-Day
What It Means and How to Stay Protected
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
Forrester Wave™: Zero Trust Platforms, Q3 2025
Remote Access VPN – User Experience
Help us with the Short-Term Roadmap
CheckMates Go:
SharePoint CVEs and More!
Hi,
I am about to implement HTTPS Inspection but there are some issues with Mac's and software updates.
Current HTTPS Inspect rules bypass 17.0.0.0/8 and itunes.apple.com but still there are some issues.
Are there any plans for an Updatable Apple object or anyone else that has run into this issue that has found a solution ?
Hello @svori ,
Can you be more explicit on what are the HTTPS Inspection issues you're facing - more exactly with examples/screenshots ?
We've looked into this as we are running an POC to implement apple cache servers, therefore we had to make sure that Apple traffic via CheckPoints were not inspected (certificate substituted).
FWL policies looks like:
For the HTTPS Inspection, we're bypassing "apple.com" CustomApp object and "c.apple.news" .
Those objects contains:
apple.com | c.apple.news |
*.aplle.com |
c.apple.news |
So with that, we were able to see that the Apple cache machine, was able to register the Apple Cloud cache services, and download packages.
Ty,
Ah, I remember my struggles on this subject with a customer couple of years back who is 95% Apple shop.
What we ended up doing was whitelist followimg:
*apple*
*itunes*
and bunch of Apple IP ranges
Sadly, I wish there were appropriate updatable objects there. Now in all fairness, all other major fw vendors dont have those updatable objects either when it comes to Apple : - (
Thanks, will try that and i hope that someone from Check Point can update us on plans for an Updatable object 🙂
For us to have an Updatable Object, the vendor has to provide the IP ranges in a machine consumable format.
Without that, it’s impossible for us to accurately determine what IP ranges vendors use for what.
Did you try to use the HTTPS services recommended bypass Updateable object and Apple Smart Accel Updateable object for exception?
Yes Https inspect bypass both updatable objects is used to bypass.
Could not find any Apple related category in Updatable objects list ?
I dont think you would find it, as it simply does not exist : - (. Anyway, I gotta get ready to drive to test center to give my CCTE exam, but when I come back, will fire up my https inspection lab in R81.20 and verify all this.
Cheers mate.
Andy
Thanks, it was a response to GW Albrecht 🙂
Good luck on your exam!
Tx mate! Yea, I know it was response to our good man Guenther :). Anyway, will check when Im back, hopefully around 11 am EST.
Andy
It does exist at least since R81.20 / R81.10.00. Please do not state that something simply does not exist if the only reason for the statement is your ignorance ! No harm in telling: I never heard of, i never saw that, i do not believe it exists. But not: Does not exist...
Thats right, I see exact same thing you posted, which does literally nothing lol. I was on the call once with TAC escalations guy and customer and that was pretty much only thing he could find as well. So, factually, okay, I will give it to you, it DOES exist, but its useless 😂
Andy
Hello @svori ,
Can you be more explicit on what are the HTTPS Inspection issues you're facing - more exactly with examples/screenshots ?
We've looked into this as we are running an POC to implement apple cache servers, therefore we had to make sure that Apple traffic via CheckPoints were not inspected (certificate substituted).
FWL policies looks like:
For the HTTPS Inspection, we're bypassing "apple.com" CustomApp object and "c.apple.news" .
Those objects contains:
apple.com | c.apple.news |
*.aplle.com |
c.apple.news |
So with that, we were able to see that the Apple cache machine, was able to register the Apple Cloud cache services, and download packages.
Ty,
Thank you for sharing this solution 🙂
Thanks for sharing @Sorin_Gogean , always great advice! 💪👍
Andy
Hello there,
Can you show us what is included in your apple software updates object?
We have a simular issue that ipads can no longer recieve updates when inspection is on. however we would like to limit what we exactly open.
Me, personally, I just do *apple* and call it a day lol
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
6 | |
5 | |
5 | |
4 | |
4 | |
4 | |
4 | |
3 | |
3 |
Thu 31 Jul 2025 @ 05:00 PM (CEST)
CloudGuard Network Security for Nutanix - Full Deployment with Tenant & Transit VPC - AMER/EMEATue 12 Aug 2025 @ 10:00 AM (CEST)
Ransomware Redefined: What Q2 2025 Tells Us About the Future of Extortion - EMEATue 12 Aug 2025 @ 05:00 PM (CEST)
Ransomware Redefined: What Q2 2025 Tells Us About the Future of Extortion - AMERThu 31 Jul 2025 @ 05:00 PM (CEST)
CloudGuard Network Security for Nutanix - Full Deployment with Tenant & Transit VPC - AMER/EMEATue 12 Aug 2025 @ 10:00 AM (CEST)
Ransomware Redefined: What Q2 2025 Tells Us About the Future of Extortion - EMEATue 12 Aug 2025 @ 05:00 PM (CEST)
Ransomware Redefined: What Q2 2025 Tells Us About the Future of Extortion - AMERTue 19 Aug 2025 @ 08:00 AM (CST)
Tegucigalpa: Entrenamiento Práctico SBTR82 para la Comunidad CheckMatesWed 20 Aug 2025 @ 08:00 AM (CST)
San Pedro Sula: Entrenamiento Práctico SBTR82 para la Comunidad CheckMatesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY