Collect Check Point firewall logs
This parser extracts Check Point firewall logs. It handles both CEF and non-CEF formatted messages, including syslog, key-value pairs, and JSON. It normalizes fields, maps them to the UDM, and performs specific logic for login/logout, network connections, and security events. It enriches the data with contextual information like geolocation and threat intelligence.
Before you begin
- Ensure that you have a Google Security Operations instance.
- Ensure that you are using Windows 2016 or later, or a Linux host with systemd.
- If running behind a proxy, ensure firewall ports are open.
- Ensure that you have privileged access to a Check Point Firewall.
Get Google SecOps ingestion authentication file
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Collection Agents.
- Download the Ingestion Authentication File.
Get Google SecOps customer ID
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Profile.
- Copy and save the Customer ID from the Organization Details section.
Install BindPlane Agent
- For Windows installation, run the following script:
msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quiet
- For Linux installation, run the following script:
sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.sh
- Additional installation options can be found in this installation guide.
Configure BindPlane Agent to ingest Syslog and send to Google SecOps
- Access the machine where BindPlane is installed.
Edit the
config.yaml
file as follows:receivers: udplog: # Replace the below port <54525> and IP <0.0.0.0> with your specific values listen_address: "0.0.0.0:54525" exporters: chronicle/chronicle_w_labels: compression: gzip # Adjust the creds location below according the placement of the credentials file you downloaded creds: '{ json file for creds }' # Replace <customer_id> below with your actual ID that you copied customer_id: <customer_id> endpoint: malachiteingestion-pa.googleapis.com # You can apply ingestion labels below as preferred ingestion_labels: log_type: SYSLOG namespace: Checkpoint_Firewall raw_log_field: body service: pipelines: logs/source0__chronicle_w_labels-0: receivers: - udplog exporters: - chronicle/chronicle_w_labels
Restart the BindPlane Agent to apply the changes:
sudo systemctl restart bindplane
Configure Syslog Export in a Check Point Firewall
- Sign in to the Check Point firewall UI using a privileged account.
- Go to Logs & Monitoring > Log Servers.
- Navigate to Syslog Servers.
- Click Configure, and set the following values:
- Protocol: select UDP to send security logs and/or system logs.
- Name: provide a unique name (for example, Bindplane_Server).
- IP Address: provide your syslog server IP address (Bindplane IP).
- Port: provide your syslog server Port (Bindplane Port).
- Select Enable log server.
- Select logs to forward: Both system and security logs.
- Click Apply.
UDM Mapping Table
Log Field | UDM Mapping | Logic |
---|---|---|
Action |
event.idm.read_only_udm.security_result.action_details |
Directly mapped from the Action field. |
Activity |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the Activity field. |
additional_info |
event.idm.read_only_udm.security_result.description |
Directly mapped from the additional_info field. |
administrator |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the administrator field. Key is "administrator". |
aggregated_log_count |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the aggregated_log_count field. Key is "aggregated_log_count". |
appi_name |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the appi_name field. Key is "appi_name". |
app_category |
event.idm.read_only_udm.security_result.category_details |
Directly mapped from the app_category field. |
app_properties |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the app_properties field. Key is "app_properties". |
app_risk |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the app_risk field. Key is "app_risk". |
app_session_id |
event.idm.read_only_udm.network.session_id |
Directly mapped from the app_session_id field, converted to a string. |
attack |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the attack field when Info is present. |
attack |
event.idm.read_only_udm.security_result.threat_name |
Directly mapped from the attack field when Info is present. |
attack_info |
event.idm.read_only_udm.security_result.description |
Directly mapped from the attack_info field. |
auth_status |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the auth_status field. |
browse_time |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the browse_time field. Key is "browse_time". |
bytes |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the bytes field. Key is "bytes". |
bytes |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the bytes field. Key is "bytes". |
calc_service |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the calc_service field. Key is "calc_service". |
category |
event.idm.read_only_udm.security_result.category_details |
Directly mapped from the category field. |
client_version |
event.idm.read_only_udm.intermediary.platform_version |
Directly mapped from the client_version field. |
conn_direction |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the conn_direction field. Key is "conn_direction". |
conn_direction |
event.idm.read_only_udm.network.direction |
If conn_direction is "Incoming", maps to "INBOUND". Otherwise, maps to "OUTBOUND". |
connection_count |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the connection_count field. Key is "connection_count". |
contract_name |
event.idm.read_only_udm.security_result.description |
Directly mapped from the contract_name field. |
cs2 |
event.idm.read_only_udm.security_result.rule_name |
Directly mapped from the cs2 field. |
date_time |
event.idm.read_only_udm.metadata.event_timestamp |
Parsed and converted to a timestamp using various date formats. |
dedup_time |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the dedup_time field. Key is "dedup_time". |
desc |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the desc field. |
description |
event.idm.read_only_udm.security_result.description |
Directly mapped from the description field. |
description_url |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the description_url field. Key is "description_url". |
destinationAddress |
event.idm.read_only_udm.target.ip , event.idm.read_only_udm.target.asset.ip |
Directly mapped from the destinationAddress field. |
destinationPort |
event.idm.read_only_udm.target.port |
Directly mapped from the destinationPort field, converted to an integer. |
destinationTranslatedAddress |
event.idm.read_only_udm.target.ip , event.idm.read_only_udm.target.asset.ip |
Directly mapped from the destinationTranslatedAddress field. |
destinationTranslatedAddress |
event.idm.read_only_udm.target.nat_ip |
Directly mapped from the destinationTranslatedAddress field. |
destinationTranslatedPort |
event.idm.read_only_udm.target.port |
Directly mapped from the destinationTranslatedPort field, converted to an integer. |
destinationTranslatedPort |
event.idm.read_only_udm.target.nat_port |
Directly mapped from the destinationTranslatedPort field, converted to an integer. |
deviceCustomString2 |
event.idm.read_only_udm.security_result.rule_name |
Directly mapped from the deviceCustomString2 field. |
deviceDirection |
event.idm.read_only_udm.network.direction |
If deviceDirection is 0, maps to "OUTBOUND". If 1, maps to "INBOUND". |
domain |
event.idm.read_only_udm.principal.administrative_domain |
Directly mapped from the domain field. |
domain_name |
event.idm.read_only_udm.principal.administrative_domain |
Directly mapped from the domain_name field. |
drop_reason |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the drop_reason field. |
ds |
event.idm.read_only_udm.metadata.event_timestamp |
Used with ts and tz to construct the event timestamp. |
dst |
event.idm.read_only_udm.target.ip , event.idm.read_only_udm.target.asset.ip |
Directly mapped from the dst field. |
dst_country |
event.idm.read_only_udm.target.location.country_or_region |
Directly mapped from the dst_country field. |
dst_ip |
event.idm.read_only_udm.target.ip , event.idm.read_only_udm.target.asset.ip |
Directly mapped from the dst_ip field. |
dpt |
event.idm.read_only_udm.target.port |
Directly mapped from the dpt field, converted to an integer. |
duration |
event.idm.read_only_udm.network.session_duration.seconds |
Directly mapped from the duration field, converted to an integer, if greater than 0. |
duser |
event.idm.read_only_udm.target.user.email_addresses , event.idm.read_only_udm.target.user.user_display_name |
Directly mapped from the duser field if it matches an email address format. |
environment_id |
event.idm.read_only_udm.target.resource.product_object_id |
Directly mapped from the environment_id field. |
event_type |
event.idm.read_only_udm.metadata.event_type |
Determined by logic based on the presence of certain fields and values. Defaults to GENERIC_EVENT if no specific event type is identified. Can be NETWORK_CONNECTION , USER_LOGIN , USER_CHANGE_PASSWORD , USER_LOGOUT , NETWORK_HTTP , or STATUS_UPDATE . |
fieldschanges |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the fieldschanges field. Key is "fieldschanges". |
flags |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the flags field. Key is "flags". |
flexString2 |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the flexString2 field. Key is the value of flexString2Label . |
from_user |
event.idm.read_only_udm.principal.user.userid |
Directly mapped from the from_user field. |
fservice |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the fservice field. Key is "fservice". |
fw_subproduct |
event.idm.read_only_udm.metadata.product_name |
Directly mapped from the fw_subproduct field when product is empty. |
geoip_dst.country_name |
event.idm.read_only_udm.target.location.country_or_region |
Directly mapped from the geoip_dst.country_name field. |
hll_key |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the hll_key field. Key is "hll_key". |
hostname |
event.idm.read_only_udm.target.hostname , event.idm.read_only_udm.target.asset.hostname , event.idm.read_only_udm.intermediary.hostname |
Directly mapped from the hostname field when inter_host is empty. |
http_host |
event.idm.read_only_udm.target.resource.attribute.labels[].value |
Directly mapped from the http_host field. Key is "http_host". |
id |
event.idm.read_only_udm.metadata.product_log_id |
Directly mapped from the _id field. |
identity_src |
event.idm.read_only_udm.target.application |
Directly mapped from the identity_src field. |
identity_type |
event.idm.read_only_udm.extensions.auth.type |
If identity_type is "user", maps to "VPN". Otherwise, maps to "MACHINE". |
if_direction |
event.idm.read_only_udm.network.direction |
Directly mapped from the if_direction field, converted to uppercase. |
ifdir |
event.idm.read_only_udm.network.direction |
Directly mapped from the ifdir field, converted to uppercase. |
ifname |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the ifname field. Key is "ifname". |
IKE |
event.idm.read_only_udm.metadata.description |
Directly mapped from the IKE field. |
inzone |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the inzone field. Key is "inzone". |
industry_reference |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the industry_reference field. Key is "industry_reference". |
instance_id |
event.idm.read_only_udm.principal.hostname , event.idm.read_only_udm.principal.asset.hostname |
Directly mapped from the instance_id field. |
inter_host |
event.idm.read_only_udm.intermediary.hostname |
Directly mapped from the inter_host field. |
ip_proto |
event.idm.read_only_udm.network.ip_protocol |
Determined based on the proto field or service field. Can be TCP, UDP, ICMP, IP6IN4, or GRE. |
ipv6_dst |
event.idm.read_only_udm.target.ip , event.idm.read_only_udm.target.asset.ip |
Directly mapped from the ipv6_dst field. |
ipv6_src |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip |
Directly mapped from the ipv6_src field. |
layer_name |
event.idm.read_only_udm.security_result.rule_set_display_name , event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the layer_name field. Key is "layer_name". |
layer_uuid |
event.idm.read_only_udm.security_result.rule_set , event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the layer_uuid field after removing curly braces. Key is "layer_uuid". |
layer_uuid_rule_uuid |
event.idm.read_only_udm.security_result.rule_id |
Directly mapped from the layer_uuid_rule_uuid field after removing brackets and quotes. |
log_id |
event.idm.read_only_udm.metadata.product_log_id |
Directly mapped from the log_id field. |
log_type |
event.idm.read_only_udm.metadata.log_type |
Directly mapped from the log_type field. Hardcoded to "CHECKPOINT_FIREWALL". |
loguid |
event.idm.read_only_udm.metadata.product_log_id |
Directly mapped from the loguid field after removing curly braces. |
logic_changes |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the logic_changes field. Key is "logic_changes". |
localhost |
event.idm.read_only_udm.target.hostname , event.idm.read_only_udm.target.asset.hostname |
Directly mapped from the localhost field. dst_ip is set to "127.0.0.1". |
malware_action |
event.idm.read_only_udm.security_result.detection_fields[].value , event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value |
Directly mapped from the malware_action field. Key is "malware_action". |
malware_family |
event.idm.read_only_udm.security_result.detection_fields[].value , event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value |
Directly mapped from the malware_family field. Key is "malware_family". |
malware_rule_id |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the malware_rule_id field after removing curly braces. Key is "Malware Rule ID". |
malware_rule_name |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the malware_rule_name field. Key is "Malware Rule Name". |
match_id |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the match_id field. Key is "match_id". |
matched_category |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the matched_category field. Key is "matched_category". |
message_info |
event.idm.read_only_udm.metadata.description |
Directly mapped from the message_info field. |
method |
event.idm.read_only_udm.network.http.method |
Directly mapped from the method field. |
mitre_execution |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the mitre_execution field. Key is "mitre_execution". |
mitre_initial_access |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the mitre_initial_access field. Key is "mitre_initial_access". |
nat_rulenum |
event.idm.read_only_udm.security_result.rule_id |
Directly mapped from the nat_rulenum field, converted to a string. |
objecttype |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the objecttype field. Key is "objecttype". |
operation |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the operation field. |
operation |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the operation field. Key is "operation". |
orig |
event.idm.read_only_udm.principal.hostname , event.idm.read_only_udm.principal.asset.hostname |
Directly mapped from the orig field. |
origin |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip , event.idm.read_only_udm.target.ip , event.idm.read_only_udm.target.asset.ip , event.idm.read_only_udm.intermediary.ip |
Directly mapped from the origin field. |
origin_sic_name |
event.idm.read_only_udm.intermediary.asset_id , event.idm.read_only_udm.intermediary.labels[].value |
Directly mapped from the origin_sic_name field. Key is "Machine SIC". Asset ID is prefixed with "asset:". |
originsicname |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the originsicname field. Key is "originsicname". |
originsicname |
event.idm.read_only_udm.intermediary.asset_id , event.idm.read_only_udm.intermediary.labels[].value |
Directly mapped from the originsicname field. Key is "Machine SIC". Asset ID is prefixed with "asset:". |
os_name |
event.idm.read_only_udm.principal.asset.platform_software.platform |
If os_name contains "Win", maps to "WINDOWS". If it contains "MAC" or "IOS", maps to "MAC". If it contains "LINUX", maps to "LINUX". |
os_version |
event.idm.read_only_udm.principal.asset.platform_software.platform_patch_level |
Directly mapped from the os_version field. |
outzone |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the outzone field. Key is "outzone". |
packets |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the packets field. Key is "packets". |
packet_capture_name |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the packet_capture_name field. Key is "packet_capture_name". |
packet_capture_time |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the packet_capture_time field. Key is "packet_capture_time". |
packet_capture_unique_id |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the packet_capture_unique_id field. Key is "packet_capture_unique_id". |
parent_rule |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the parent_rule field. Key is "parent_rule". |
performance_impact |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the performance_impact field. Key is "performance_impact". |
policy_name |
event.idm.read_only_udm.security_result.detection_fields[].value |
Extracted from the __policy_id_tag field using grok and mapped. Key is "Policy Name". |
policy_time |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the policy_time field. Key is "policy_time". |
portal_message |
event.idm.read_only_udm.security_result.description |
Directly mapped from the portal_message field. |
principal_hostname |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip |
Directly mapped from the principal_hostname field if it's a valid IP address. |
principal_hostname |
event.idm.read_only_udm.principal.hostname , event.idm.read_only_udm.principal.asset.hostname |
Directly mapped from the principal_hostname field if it's not a valid IP address and not "Checkpoint". |
prod_family_label |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the ProductFamily field. Key is "ProductFamily". |
product |
event.idm.read_only_udm.metadata.product_name |
Directly mapped from the product field. |
product_family |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the product_family field. Key is "product_family". |
product_family |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the product_family field. Key is "product_family". |
ProductName |
event.idm.read_only_udm.metadata.product_name |
Directly mapped from the ProductName field when product is empty. |
product_name |
event.idm.read_only_udm.metadata.product_name |
Directly mapped from the product_name field. |
profile |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the profile field. Key is "profile". |
protocol |
event.idm.read_only_udm.network.application_protocol |
Directly mapped from the protocol field if it's "HTTP". |
proxy_src_ip |
event.idm.read_only_udm.principal.nat_ip |
Directly mapped from the proxy_src_ip field. |
reason |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the reason field. |
received_bytes |
event.idm.read_only_udm.network.received_bytes |
Directly mapped from the received_bytes field, converted to an unsigned integer. |
Reference |
event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value , event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the Reference field. Key is "Reference". Used to construct _vuln.name with attack . |
reject_id_kid |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the reject_id_kid field. Key is "reject_id_kid". |
resource |
event.idm.read_only_udm.target.url |
Parsed as JSON and mapped to the target URL. If parsing fails, it's directly mapped. |
resource |
event.idm.read_only_udm.additional.fields[].value.list_value.values[].string_value |
Parsed as JSON and each value in the resource array is added to the list. Key is "Resource". |
result |
event.idm.read_only_udm.metadata.event_timestamp |
Parsed with date_time to create the event timestamp. |
rt |
event.idm.read_only_udm.metadata.event_timestamp |
Parsed as milliseconds since epoch and converted to a timestamp. |
rule |
event.idm.read_only_udm.security_result.rule_name |
Directly mapped from the rule field. |
rule_action |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the rule_action field. Key is "rule_action". |
rule_name |
event.idm.read_only_udm.security_result.rule_name |
Directly mapped from the rule_name field. |
rule_uid |
event.idm.read_only_udm.security_result.rule_id |
Directly mapped from the rule_uid field. |
s_port |
event.idm.read_only_udm.principal.port |
Directly mapped from the s_port field, converted to an integer. |
scheme |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the scheme field. Key is "scheme". |
security_inzone |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the security_inzone field. Key is "security_inzone". |
security_outzone |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the security_outzone field. Key is "security_outzone". |
security_result_action |
event.idm.read_only_udm.security_result.action |
Directly mapped from the security_result_action field. |
sendtotrackerasadvancedauditlog |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the sendtotrackerasadvancedauditlog field. Key is "sendtotrackerasadvancedauditlog". |
sent_bytes |
event.idm.read_only_udm.network.sent_bytes |
Directly mapped from the sent_bytes field, converted to an unsigned integer. |
sequencenum |
event.idm.read_only_udm.additional.fields[].value.string_value |
Directly mapped from the sequencenum field. Key is "sequencenum". |
ser_agent_kid |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the ser_agent_kid field. Key is "ser_agent_kid". |
service |
event.idm.read_only_udm.target.port |
Directly mapped from the service field, converted to an integer. |
service_id |
event.idm.read_only_udm.network.application_protocol |
Directly mapped from the service_id field if it's "dhcp", "dns", "http", "https", or "quic", converted to uppercase. |
service_id |
event.idm.read_only_udm.principal.application |
Directly mapped from the service_id field if it's not one of the network application protocols. |
service_id |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the service_id field. Key is "service_id". |
session_description |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the session_description field. Key is "session_description". |
session_id |
event.idm.read_only_udm.network.session_id |
Directly mapped from the session_id field after removing curly braces. |
session_name |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the session_name field. Key is "session_name". |
session_uid |
event.idm.read_only_udm.network.session_id |
Directly mapped from the session_uid field after removing curly braces. |
Severity |
event.idm.read_only_udm.security_result.severity |
Mapped to "LOW", "MEDIUM", "HIGH", or "CRITICAL" based on the value of Severity . |
severity |
event.idm.read_only_udm.security_result.severity |
Mapped to "LOW", "MEDIUM", "HIGH", or "CRITICAL" based on the value of severity . |
site |
event.idm.read_only_udm.network.http.user_agent |
Directly mapped from the site field. |
smartdefense_profile |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the smartdefense_profile field. Key is "smartdefense_profile". |
snid |
event.idm.read_only_udm.network.session_id |
Directly mapped from the snid field if it's not empty or "0". |
sourceAddress |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip |
Directly mapped from the sourceAddress field. |
sourcePort |
event.idm.read_only_udm.principal.port |
Directly mapped from the sourcePort field, converted to an integer. |
sourceTranslatedAddress |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip |
Directly mapped from the sourceTranslatedAddress field. |
sourceTranslatedAddress |
event.idm.read_only_udm.principal.nat_ip |
Directly mapped from the sourceTranslatedAddress field. |
sourceTranslatedPort |
event.idm.read_only_udm.principal.port |
Directly mapped from the sourceTranslatedPort field, converted to an integer. |
sourceTranslatedPort |
event.idm.read_only_udm.principal.nat_port |
Directly mapped from the sourceTranslatedPort field, converted to an integer. |
sourceUserName |
event.idm.read_only_udm.principal.user.userid , event.idm.read_only_udm.principal.user.first_name , event.idm.read_only_udm.principal.user.last_name |
Parsed using grok to extract userid, first name, and last name. |
spt |
event.idm.read_only_udm.principal.port |
Directly mapped from the spt field, converted to an integer. |
src |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip |
Directly mapped from the src field. |
src_ip |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip |
Directly mapped from the src_ip field. |
src_localhost |
event.idm.read_only_udm.principal.hostname , event.idm.read_only_udm.principal.asset.hostname |
Directly mapped from the src_localhost field. src_ip is set to "127.0.0.1". |
src_machine_name |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the src_machine_name field. Key is "src_machine_name". |
src_port |
event.idm.read_only_udm.principal.port |
Directly mapped from the src_port field, converted to an integer. |
src_user |
event.idm.read_only_udm.principal.user.userid |
Directly mapped from the src_user field. |
src_user_dn |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the src_user_dn field. Key is "src_user_dn". |
src_user_name |
event.idm.read_only_udm.principal.user.userid |
Directly mapped from the src_user_name field. |
sub_policy_name |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the sub_policy_name field. Key is "sub_policy_name". |
sub_policy_uid |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the sub_policy_uid field. Key is "sub_policy_uid". |
subject |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the subject field. Key is "subject". |
subscription_stat_desc |
event.idm.read_only_udm.security_result.summary |
Directly mapped from the subscription_stat_desc field. |
tags |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the tags field. Key is "tags". |
tar_user |
event.idm.read_only_udm.target.user.userid |
Directly mapped from the tar_user field. |
target_port |
event.idm.read_only_udm.target.port |
Directly mapped from the target_port field. |
tcp_flags |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the tcp_flags field. Key is "tcp_flags". |
tcp_packet_out_of_state |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the tcp_packet_out_of_state field. Key is "tcp_packet_out_of_state". |
time |
event.idm.read_only_udm.metadata.event_timestamp |
Parsed and converted to a timestamp using various date formats. |
ts |
event.idm.read_only_udm.metadata.event_timestamp |
Parsed with ds and tz to create the event timestamp. |
type |
event.idm.read_only_udm.security_result.rule_type |
Directly mapped from the type field. |
tz |
event.idm.read_only_udm.metadata.event_timestamp |
Used with ds and ts to construct the event timestamp. |
update_count |
event.idm.read_only_udm.security_result.detection_fields[].value |
Directly mapped from the update_count field. Key is "update_count". |
URL |
event.idm.read_only_udm.security_result.about.url |
Directly mapped from the URL field. |
user |
event.idm.read_only_udm.principal.user.userid |
Directly mapped from the user field. |
user_agent |
event.idm.read_only_udm.network.http.user_agent |
Directly mapped from the user_agent field. Also parsed and mapped to event.idm.read_only_udm.network.http.parsed_user_agent . |
userip |
event.idm.read_only_udm.principal.ip , event.idm.read_only_udm.principal.asset.ip |
Directly mapped from the userip field if it's a valid IP address. |
UUid |
event.idm.read_only_udm.metadata.product_log_id |
Directly mapped from the UUid field after removing curly braces. |
version |
event.idm.read_only_udm.metadata.product_version |
Directly mapped from the version field. |
web_client_type |
event.idm.read_only_udm.network.http.user_agent |
Directly mapped from the web_client_type field. |
xlatedport |
event.idm.read_only_udm.target.nat_port |
Directly mapped from the xlatedport field, converted to an integer. |
xlatedst |
event.idm.read_only_udm.target.nat_ip |
Directly mapped from the xlatedst field. |
xlatesport |
event.idm.read_only_udm.principal.nat_port |
Directly mapped from the xlatesport field, converted to an integer. |
xlatesrc |
event.idm.read_only_udm.principal.nat_ip |
Directly mapped from the xlatesrc field. |
event.idm.read_only_udm.metadata.vendor_name |
Check Point |
Hardcoded value. |
event.idm.read_only_udm.metadata.log_type |
CHECKPOINT_FIREWALL |
Hardcoded value. |
event.idm.read_only_udm.security_result.rule_type |
Firewall Rule |
Default value, unless overridden by specific logic. |
event.idm.is_alert |
true |
Set to true if alert field is "yes". |
has_principal |
true |
Set to true when principal IP or hostname is extracted. |
has_target |
true |
Set to true when target IP or hostname is extracted. |
Changes
2024-05-29
- Mapped "layer_uuid_rule_uuid" to "security_result.rule_id".
- Mapped "domain" to "principal.administrative_domain".
- Mapped "fservice", "appi_name", "app_risk", and "policy_name" to "security_result.detection_fields".
- Mapped "packets", "__id", "dedup_time", "browse_time", "bytes", "product_family", "hll_key", and "calc_service" to "additional.fields".
- Mapped "id" to "metadata.product_log_id".
- Mapped "orig_log_server" to "principal.resource.product_object_id".
- Mapped "environment_id" to "target.resource.product_object_id".
- Mapped "client_outbound_packets" and "client_inbound_packets" to "principal.resource.attribute.labels".
- Mapped "server_outbound_bytes" and "server_inbound_bytes" to "target.resource.attribute.labels".
- Mapped "orig" to "principal.hostname" and "principal.asset.hostname".
- Mapped "orig_log_server_ip" to "principal.ip" and "principal.asset.ip".
- Mapped "proto" to "network.ip_protocol".
2024-05-20
- Added a Grok pattern to extract "inter_host".
- Mapped "inter_host" to "intermediary.hostname".
2024-04-19
- Enhancement and Bug-Fix:
- Mapped "origin" to "target.ip" and "target.asset.ip".
- Added new Grok patterns to parse new format of SYSLOG logs.
- Mapped "smartdefense_profile", "malware_rule_id", and "malware_rule_name" to "security_result.detection_fields".
- Mapped "sequencenum", "description_url", "industry_reference", "mitre_execution", "packet_capture_name", "packet_capture_unique_id", "packet_capture_time", and "performance_impact" to "additional.fields".
- Mapped "version" to "metadata.product_version".
- Mapped "http_host" to "target.resource.attribute.labels".
- Mapped "log_id" to "metadata.product_log_id".
- Mapped "user_agent" to "network.http.user_agent" and "http.parsed_user_agent".
- Mapped "hostname", "dvc", and "principal_hostname" to "target.hostname" and "target.asset.hostname".
- If "has_principal" is "true", "has_target" is "true", and "Action"/"action" is "Log In" or "Failed Log In" or "Failed Login" or "Update", then set "metadata.event_type" to "USER_LOGIN" and "extensions.auth.type" to "AUTHTYPE_UNSPECIFIED".
- If "has_principal" is "true", "has_target" is "true", and "Action"/"act"/"event_type" is "Log Out" or "Logout", then set "metadata.event_type" to "USER_LOGOUT" and "extensions.auth.type" to "AUTHTYPE_UNSPECIFIED".
- If "has_principal" is "true", "has_target" is "true", then set "metadata.event_type" to "NETWORK_CONNECTION".
- If "has_principal" is "true", "has_target" is "false", then set "metadata.event_type" to "STATUS_UPDATE".
2024-02-07
- added mapping for the following fields:
- Mapped "protection_id", "malware_action", "malware_family,protection_name", "protection_type" to "security_result.detection_fields".
- Mapped "confidence_level" to "security_result.confidence" and "security_result.confidence_details".
2024-02-05
- added mapping for the following fields:
- Mapped "method" to "network.http.method".
2024-01-24
- added mapping for the following fields:
- Mapped "method" to "network.http.method".
- Mapped "duration" to "network.session_duration.seconds".
- Mapped "additional_info" to "security_result.description".
- Mapped "operation" to "security_result.summary".
- Mapped "subject" to "metadata.description".
- Mapped "principal_hostname" to "intermediary.hostname".
- Mapped "tcp_packet_out_of_state", "aggregated_log_count", "connection_count", "appi_name", "src_user_dn",
- "update_count", "additional_info", "administrator", "operation", "sendtotrackerasadvancedauditlog",
- "subject", "fieldschanges", "logic_changes", "objecttype", "session_description",
- "session_name" to "security_result.detection_fields".
2023-12-27
- added mapping for the following fields:
- Mapped "flags" to "security_result.detection_fields".
- Mapped "tcp_flags" to "security_result.detection_fields".
- Mapped "tcp_packet_out_of_state" to "security_result.detection_fields".
2023-12-11
- If "principal_hostname" is a valid ip, mapped it to "principal.ip".
- If "principal_hostname" is not a valid ip, mapped it to "principal.hostname".
- Mapped "sport_svc" to "principal.port".
- Mapped "ProductFamily" to "additional.fields".
- Mapped "mitre_initial_access" to "security_result.detection_fields".
- Mapped "policy_time" to "security_result.detection_fields".
- Mapped "profile" to "security_result.detection_fields".
- Mapped "reject_id_kid" to "security_result.detection_fields".
- Mapped "ser_agent_kid" to "security_result.detection_fields".
2023-10-11
- If "product" is "New Anti Virus", then the mapping from "firewall management node" to "principal.hostname" is removed and instead mapped to "security_result.detection_fields".
2023-07-06
- added mapping for the following fields:
- Mapped "app_category" to "security_result.category_details".
- Mapped "matched_category" to "security_result.detection_fields".
- Mapped "app_properties" to "security_result.detection_fields".
2023-06-14
- added mapping for following fields
- Mapped "conn_direction" to "additional.fields".
- Modified gsub's so as not to replace the ":" with "=" from actual values.
2023-05-12
- added mapping for following fields
- Mapped "rule_name" to "security_result.rule_name".
- Mapped "rule","sub_policy_name","sub_policy_uid","smartdefense_profile","tags","flexString2" to "security_result.detection_fields".
- Added new Grok pattern to support the new log formats.
- Mapped "dvc" to "intermediary.hostname".
- Mapped "hostname" to "intermediary.hostname".
- Mapped "origin_sic_name" to "intermediary.asset_id".
- Mapped "conn_direction" to "network.ip_protocol".
- Mapped "ifname" to "security_result.detection_fields".
- Mapped "security_inzone" to "security_result.detection_fields".
- Mapped "match_id" to "security_result.detection_fields".
- Mapped "parent_rule" to "security_result.detection_fields".
- Mapped "security_outzone" to "security_result.detection_fields".
- Mapped "sub_policy_name" to "security_result.detection_fields".
- Mapped "sub_policy_uid" to "security_result.detection_fields".
- Mapped "drop_reason" to "security_result.summary".
- Mapped "reason" to "security_result.summary".
- Mapped "xlatesport" to "principal.nat_port".
- Mapped "xlatedport" to "target.nat_port".
- Mapped "ipv6_dst" to "target.ip".
- Mapped "ipv6_src" to "principal.ip".
2023-04-24
- Added support for logs with CEF format.
2022-11-18
- Modified mapping for "service" and mapped it to "target.port".
2022-10-27
- Added conditional check for "attack","attack_info","policy_name".
- Added grok pattern to retrieve "principal_hostname".
- Added gsub to change "=" to ":".
- Modified mapping for "service" and mapped it to "target.resource.attribute.labels".
2022-10-13
- Mapped the field 'fw_subproduct' to 'metadata.product_name'.
- Added grok pattern to extract the ip form the field 'src'.
2022-08-30
- Merged the changes of Customer-specific versions to default.
- Undropped the logs containing "*****" in UserCheck.
2022-08-18
- Mapped "portal_message" to "security_result.description".
- Mapped "security_result.category" as "SOFTWARE_MALICIOUS" in case "portal_message" contains keywords "malware/malicious".
- Mapped "URL" to "security_result.about.url".
- Mapped "Activity" to "security_result.summary".
- Mapped "Reference" to "security_result.about.resource.attribute.labels".
- Modified "event_type" from "GENERIC_EVENT" to "STATUS_UPDATE" by replicating the value of "intermediary.ip" to "principal.ip".
2022-08-12
- Mapped "malware_action", "malware_family,protection_name", "protection_type" to "security_result.about.resource.attribute.labels".
- Mapped "src_machine_name" to "security_result.detection_fields".
2022-06-30
- Mapped "message_info" to "metadata.description".
2022-06-17
- Added conditional checks for fields "nat_rulenum", "rule", "sent_bytes", "received_bytes", "s_port", "service".
- Modified event_types for the following cases:
- "GENERIC_EVENT" to "NETWORK_CONNECTION" where "principal.ip or principal.hostname" and "target.ip or target.hostname" are not null.
- "GENERIC_EVENT" to "STATUS_UNCATEGORIZED" where "principal.ip or principal.hostname" is not null.
2022-06-14
- Modified the parser to parse more logs by removing the condition check for passwd.
2022-06-07
- Mapped src_machine_name to security_result.detection_fields.
2022-05-19
- Mapped inzone, outzone, layer_name, layer_uuid and policy_name to security_result.detection_fields.
- Mapped service_id to principal.application.