Support Center > Search Results > SecureKnowledge Details
HTTPS Inspection bypass list object Technical Level
Solution

Background

In some cases, services that used to work when HTTPS Inspection was disabled lose connectivity when HTTPS Inspection is enabled. The common reason for the connectivity issues is that HTTPS Inspection cannot establish trust between the client and the Security Gateway, and therefore cannot inspect the traffic. Usually, pushing Security Gateway CA certificate into the system trust store is sufficient. But some applications have trust stores of their own: therefore, the Security Gateway will not be able to inspect, and you should decide to drop or bypass these services. If you choose to bypass specific HTTPS services to prevent connectivity issues, they will not be inspected. To leverage the highest level of security, we recommend that, before you bypass any service, you figure out if trust can be established without bypassing.

Check Point Solution for R80.40 and above

We collected a list of HTTPS services that are known to be used in pinned scenarios. These HTTPS services are part of the "HTTPS services - bypass" updatable object.

HTTPS services - recommended bypass

These are well-known HTTPS services used by popular programs and applications. These services are often used to provide updated services or access remote resources. We recommend that you bypass these services in the HTTPS Inspection policy to prevent connectivity issues.

  • Adobe Updates - HTTPS bypass
    • adobe.com
    • *.adobe.com
    • *.adobetag.com
  • Check Point Updates - HTTPS bypass
    • avupdates.checkpoint.com
    • secureupdates.checkpoint.com
    • updates.checkpoint.com
  • Java Updates - HTTPS bypass
    • sjremetrics.java.com
    • javadl-esd-secure.oracle.com
    • *.javadl-esd-secure.oracle.com
  • Microsoft Updates - HTTPS bypass
    • login.live.com
    • settings-win.data.microsoft.com
    • *.vortex-win.data.microsoft.com
    • *.delivery.mp.microsoft.com
    • tsfe.trafficshaping.dsp.mp.microsoft.com
    • update.microsoft.com
    • *.update.microsoft.com
    • sls.update.microsoft.com
  • Mozilla Firefox Updates - HTTPS bypass
    • download-installer.cdn.mozilla.net

HTTPS services - optional bypass

These are well-known HTTPS services used by popular programs and applications that can be inspected only in some scenarios: for example, only when used by a web application or a website.  If you select to bypass this list, the application and website are not inspected. 

Important - Some applications can be used for malicious file distribution. Consider how the service is used within your organization and if there is a need to bypass these services in the HTTPS Inspection policy to prevent connectivity issues.

  • AWS Console - HTTPS bypass
    • *.console.aws.amazon.com
    • docs.aws.amazon.com
    • signin.aws.amazon.com
    • *.signin.aws.amazon.com
    • fls-na.amazon.com
    • cdn.assets.as2.amazonaws.com
    • aws-signin-website-assets.s3.amazonaws.com
    • opfcaptcha-prod.s3.amazonaws.com
    • d1dgtfo2wk29o4.cloudfront.net
    • Images-na.ssl-images-amazon.com
  • BitDefender - HTTPS bypass
    • *.cdn.bitdefender.net
    • download.bitdefender.com
    • login.bitdefender.net
    • login.bitdefender.com
    • nimbus.bitdefender.net
    • push.bitdefender.net
    • upgrade.bitdefender.com
  • Dashlane - HTTPS bypass
    • dashlane.com
    • *.dashlane.com
  • Dropbox - HTTPS bypass
    • *.dropbox.com
    • *.dropboxapi.com
    • *.previews.dropboxusercontent.com
    • mmp.getdropbox.com
  • Facebook - HTTPS bypass
    • *.facebook.com
  • Finch VPN - HTTPS bypass
    • amber.finchapi.com
    • www.finchvpn.com
  • Google - HTTPS bypass
    • accounts.google.com
    • alt2-mtalk.google.com
    • android.clients.google.com
    • www.google.com
    • android.googleapis.com
    • cryptauthenrollment.googleapis.com
    • device-provisioning.googleapis.com
    • digitalassetlinks.googleapis.com
    • fcmconnection.googleapis.com
    • fcmtoken.googleapis.com
    • firebaseperusertopics-pa.googleapis.com
    • play.googleapis.com
    • semanticlocation-pa.googleapis.com
    • lh3.googleusercontent.com
    • play-lh.googleusercontent.com
    • *.gstatic.com
    • *.gvt1.com
  • LogMeIn - HTTPS bypass
    • *.cdngetgo.com
    • *.expertcity.com
    • *.getgo.com
    • *.getgocdn.com
    • *.getgoservices.com
    • *.getgoservices.net
    • *.go2assist.me
    • *.gofastchat.com
    • *.goto-rtc.com
    • *.gotoassist.com
    • *.gotoassist.at
    • *.gotoassist.me
    • gotomeet.me
    • *.gotomeet.at
    • *.gotomeet.me
    • *.gotomeeting.com
    • *.gotomypc.com
    • *.gotostage.com
    • *.gototraining.com
    • *.gotowebinar.com
    • *.helpme.net
    • accounts.logme.in
    • *.accounts.logme.in
    • *.joingotomeeting.com
    • *.jointraining.com
    • *.joinwebinar.com
    • logmein.com
    • *.logmein.com
    • *.logmeininc.com
    • *.logmeinrescue.com
  • Skype for Business (Lync) - HTTPS bypass
    • lync.com
    • *.lync.com
  • MyQuickCloud - HTTPS bypass
    • *.myquickcloud.com
  • OneDrive - HTTPS bypass
    • cdn.funcaptcha.com
    • fpt.live.com
    • login.live.com
    • odc.officeapps.live.com
    • skyapi.policies.live.net
    • signup.live.com
    • skyapi.live.net
    • *.pipe.aria.microsoft.com
    • *.data.microsoft.com
    • *.svc.ms
    • *.msauth.net
    • *.onedrive.com
    • cdn.onenote.net

Usage

To bypass services, in the HTTPS Inspection policy, click the '+' button under the destination column, select import 'Updatable Objects', and then select the applicable HTTPS Services list from the HTTPS Services - bypass object .

Below is an example of adding HTTPS Services - bypass updatable object to Destination column in HTTPS Inspection Policy:

As an alternative you can select to drop these services: in the Access policy, click the '+' button under the destination column, select import 'Updatable Objects', and then select the applicable HTTPS Services list from the HTTPS Services - bypass object .

Below is an example of adding HTTPS Services - bypass updatable object to Destination column in Access Policy:

Note: This solution is available from R80.40. 
In previous versions, users can only use the “Bypass HTTPS inspection of all traffic to all known software update services” checkbox.
For R80.40 users, the solutions can work together. Note that the “HTTPS services – bypass” updatable object covers more services, and the user might select to bypass/drop some of them, and not all of them.  

Related solutions:

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment