Collect Check Point firewall logs

Supported in:

This parser extracts Check Point firewall logs. It handles both CEF and non-CEF formatted messages, including syslog, key-value pairs, and JSON. It normalizes fields, maps them to the UDM, and performs specific logic for login/logout, network connections, and security events. It enriches the data with contextual information like geolocation and threat intelligence.

Before you begin

  • Ensure that you have a Google Security Operations instance.
  • Ensure that you are using Windows 2016 or later, or a Linux host with systemd.
  • If running behind a proxy, ensure firewall ports are open.
  • Ensure that you have privileged access to a Check Point Firewall.

Get Google SecOps ingestion authentication file

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Collection Agents.
  3. Download the Ingestion Authentication File.

Get Google SecOps customer ID

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Profile.
  3. Copy and save the Customer ID from the Organization Details section.

Install BindPlane Agent

  1. For Windows installation, run the following script:
    msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quiet
  2. For Linux installation, run the following script:
    sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.sh
  3. Additional installation options can be found in this installation guide.

Configure BindPlane Agent to ingest Syslog and send to Google SecOps

  1. Access the machine where BindPlane is installed.
  2. Edit the config.yaml file as follows:

    receivers:
        udplog:
            # Replace the below port <54525> and IP <0.0.0.0> with your specific values
            listen_address: "0.0.0.0:54525" 
    
    exporters:
        chronicle/chronicle_w_labels:
            compression: gzip
            # Adjust the creds location below according the placement of the credentials file you downloaded
            creds: '{ json file for creds }'
            # Replace <customer_id> below with your actual ID that you copied
            customer_id: <customer_id>
            endpoint: malachiteingestion-pa.googleapis.com
            # You can apply ingestion labels below as preferred
            ingestion_labels:
            log_type: SYSLOG
            namespace: Checkpoint_Firewall
            raw_log_field: body
    service:
        pipelines:
            logs/source0__chronicle_w_labels-0:
                receivers:
                    - udplog
                exporters:
                    - chronicle/chronicle_w_labels
    
  3. Restart the BindPlane Agent to apply the changes:

    sudo systemctl restart bindplane
    

Configure Syslog Export in a Check Point Firewall

  1. Sign in to the Check Point firewall UI using a privileged account.
  2. Go to Logs & Monitoring > Log Servers.
  3. Navigate to Syslog Servers.
  4. Click Configure, and set the following values:
    • Protocol: select UDP to send security logs and/or system logs.
    • Name: provide a unique name (for example, Bindplane_Server).
    • IP Address: provide your syslog server IP address (Bindplane IP).
    • Port: provide your syslog server Port (Bindplane Port).
  5. Select Enable log server.
  6. Select logs to forward: Both system and security logs.
  7. Click Apply.

UDM Mapping Table

Log Field UDM Mapping Logic
Action event.idm.read_only_udm.security_result.action_details Directly mapped from the Action field.
Activity event.idm.read_only_udm.security_result.summary Directly mapped from the Activity field.
additional_info event.idm.read_only_udm.security_result.description Directly mapped from the additional_info field.
administrator event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the administrator field. Key is "administrator".
aggregated_log_count event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the aggregated_log_count field. Key is "aggregated_log_count".
appi_name event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the appi_name field. Key is "appi_name".
app_category event.idm.read_only_udm.security_result.category_details Directly mapped from the app_category field.
app_properties event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the app_properties field. Key is "app_properties".
app_risk event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the app_risk field. Key is "app_risk".
app_session_id event.idm.read_only_udm.network.session_id Directly mapped from the app_session_id field, converted to a string.
attack event.idm.read_only_udm.security_result.summary Directly mapped from the attack field when Info is present.
attack event.idm.read_only_udm.security_result.threat_name Directly mapped from the attack field when Info is present.
attack_info event.idm.read_only_udm.security_result.description Directly mapped from the attack_info field.
auth_status event.idm.read_only_udm.security_result.summary Directly mapped from the auth_status field.
browse_time event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the browse_time field. Key is "browse_time".
bytes event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the bytes field. Key is "bytes".
bytes event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the bytes field. Key is "bytes".
calc_service event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the calc_service field. Key is "calc_service".
category event.idm.read_only_udm.security_result.category_details Directly mapped from the category field.
client_version event.idm.read_only_udm.intermediary.platform_version Directly mapped from the client_version field.
conn_direction event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the conn_direction field. Key is "conn_direction".
conn_direction event.idm.read_only_udm.network.direction If conn_direction is "Incoming", maps to "INBOUND". Otherwise, maps to "OUTBOUND".
connection_count event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the connection_count field. Key is "connection_count".
contract_name event.idm.read_only_udm.security_result.description Directly mapped from the contract_name field.
cs2 event.idm.read_only_udm.security_result.rule_name Directly mapped from the cs2 field.
date_time event.idm.read_only_udm.metadata.event_timestamp Parsed and converted to a timestamp using various date formats.
dedup_time event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the dedup_time field. Key is "dedup_time".
desc event.idm.read_only_udm.security_result.summary Directly mapped from the desc field.
description event.idm.read_only_udm.security_result.description Directly mapped from the description field.
description_url event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the description_url field. Key is "description_url".
destinationAddress event.idm.read_only_udm.target.ip, event.idm.read_only_udm.target.asset.ip Directly mapped from the destinationAddress field.
destinationPort event.idm.read_only_udm.target.port Directly mapped from the destinationPort field, converted to an integer.
destinationTranslatedAddress event.idm.read_only_udm.target.ip, event.idm.read_only_udm.target.asset.ip Directly mapped from the destinationTranslatedAddress field.
destinationTranslatedAddress event.idm.read_only_udm.target.nat_ip Directly mapped from the destinationTranslatedAddress field.
destinationTranslatedPort event.idm.read_only_udm.target.port Directly mapped from the destinationTranslatedPort field, converted to an integer.
destinationTranslatedPort event.idm.read_only_udm.target.nat_port Directly mapped from the destinationTranslatedPort field, converted to an integer.
deviceCustomString2 event.idm.read_only_udm.security_result.rule_name Directly mapped from the deviceCustomString2 field.
deviceDirection event.idm.read_only_udm.network.direction If deviceDirection is 0, maps to "OUTBOUND". If 1, maps to "INBOUND".
domain event.idm.read_only_udm.principal.administrative_domain Directly mapped from the domain field.
domain_name event.idm.read_only_udm.principal.administrative_domain Directly mapped from the domain_name field.
drop_reason event.idm.read_only_udm.security_result.summary Directly mapped from the drop_reason field.
ds event.idm.read_only_udm.metadata.event_timestamp Used with ts and tz to construct the event timestamp.
dst event.idm.read_only_udm.target.ip, event.idm.read_only_udm.target.asset.ip Directly mapped from the dst field.
dst_country event.idm.read_only_udm.target.location.country_or_region Directly mapped from the dst_country field.
dst_ip event.idm.read_only_udm.target.ip, event.idm.read_only_udm.target.asset.ip Directly mapped from the dst_ip field.
dpt event.idm.read_only_udm.target.port Directly mapped from the dpt field, converted to an integer.
duration event.idm.read_only_udm.network.session_duration.seconds Directly mapped from the duration field, converted to an integer, if greater than 0.
duser event.idm.read_only_udm.target.user.email_addresses, event.idm.read_only_udm.target.user.user_display_name Directly mapped from the duser field if it matches an email address format.
environment_id event.idm.read_only_udm.target.resource.product_object_id Directly mapped from the environment_id field.
event_type event.idm.read_only_udm.metadata.event_type Determined by logic based on the presence of certain fields and values. Defaults to GENERIC_EVENT if no specific event type is identified. Can be NETWORK_CONNECTION, USER_LOGIN, USER_CHANGE_PASSWORD, USER_LOGOUT, NETWORK_HTTP, or STATUS_UPDATE.
fieldschanges event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the fieldschanges field. Key is "fieldschanges".
flags event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the flags field. Key is "flags".
flexString2 event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the flexString2 field. Key is the value of flexString2Label.
from_user event.idm.read_only_udm.principal.user.userid Directly mapped from the from_user field.
fservice event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the fservice field. Key is "fservice".
fw_subproduct event.idm.read_only_udm.metadata.product_name Directly mapped from the fw_subproduct field when product is empty.
geoip_dst.country_name event.idm.read_only_udm.target.location.country_or_region Directly mapped from the geoip_dst.country_name field.
hll_key event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the hll_key field. Key is "hll_key".
hostname event.idm.read_only_udm.target.hostname, event.idm.read_only_udm.target.asset.hostname, event.idm.read_only_udm.intermediary.hostname Directly mapped from the hostname field when inter_host is empty.
http_host event.idm.read_only_udm.target.resource.attribute.labels[].value Directly mapped from the http_host field. Key is "http_host".
id event.idm.read_only_udm.metadata.product_log_id Directly mapped from the _id field.
identity_src event.idm.read_only_udm.target.application Directly mapped from the identity_src field.
identity_type event.idm.read_only_udm.extensions.auth.type If identity_type is "user", maps to "VPN". Otherwise, maps to "MACHINE".
if_direction event.idm.read_only_udm.network.direction Directly mapped from the if_direction field, converted to uppercase.
ifdir event.idm.read_only_udm.network.direction Directly mapped from the ifdir field, converted to uppercase.
ifname event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the ifname field. Key is "ifname".
IKE event.idm.read_only_udm.metadata.description Directly mapped from the IKE field.
inzone event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the inzone field. Key is "inzone".
industry_reference event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the industry_reference field. Key is "industry_reference".
instance_id event.idm.read_only_udm.principal.hostname, event.idm.read_only_udm.principal.asset.hostname Directly mapped from the instance_id field.
inter_host event.idm.read_only_udm.intermediary.hostname Directly mapped from the inter_host field.
ip_proto event.idm.read_only_udm.network.ip_protocol Determined based on the proto field or service field. Can be TCP, UDP, ICMP, IP6IN4, or GRE.
ipv6_dst event.idm.read_only_udm.target.ip, event.idm.read_only_udm.target.asset.ip Directly mapped from the ipv6_dst field.
ipv6_src event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip Directly mapped from the ipv6_src field.
layer_name event.idm.read_only_udm.security_result.rule_set_display_name, event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the layer_name field. Key is "layer_name".
layer_uuid event.idm.read_only_udm.security_result.rule_set, event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the layer_uuid field after removing curly braces. Key is "layer_uuid".
layer_uuid_rule_uuid event.idm.read_only_udm.security_result.rule_id Directly mapped from the layer_uuid_rule_uuid field after removing brackets and quotes.
log_id event.idm.read_only_udm.metadata.product_log_id Directly mapped from the log_id field.
log_type event.idm.read_only_udm.metadata.log_type Directly mapped from the log_type field. Hardcoded to "CHECKPOINT_FIREWALL".
loguid event.idm.read_only_udm.metadata.product_log_id Directly mapped from the loguid field after removing curly braces.
logic_changes event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the logic_changes field. Key is "logic_changes".
localhost event.idm.read_only_udm.target.hostname, event.idm.read_only_udm.target.asset.hostname Directly mapped from the localhost field. dst_ip is set to "127.0.0.1".
malware_action event.idm.read_only_udm.security_result.detection_fields[].value, event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value Directly mapped from the malware_action field. Key is "malware_action".
malware_family event.idm.read_only_udm.security_result.detection_fields[].value, event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value Directly mapped from the malware_family field. Key is "malware_family".
malware_rule_id event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the malware_rule_id field after removing curly braces. Key is "Malware Rule ID".
malware_rule_name event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the malware_rule_name field. Key is "Malware Rule Name".
match_id event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the match_id field. Key is "match_id".
matched_category event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the matched_category field. Key is "matched_category".
message_info event.idm.read_only_udm.metadata.description Directly mapped from the message_info field.
method event.idm.read_only_udm.network.http.method Directly mapped from the method field.
mitre_execution event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the mitre_execution field. Key is "mitre_execution".
mitre_initial_access event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the mitre_initial_access field. Key is "mitre_initial_access".
nat_rulenum event.idm.read_only_udm.security_result.rule_id Directly mapped from the nat_rulenum field, converted to a string.
objecttype event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the objecttype field. Key is "objecttype".
operation event.idm.read_only_udm.security_result.summary Directly mapped from the operation field.
operation event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the operation field. Key is "operation".
orig event.idm.read_only_udm.principal.hostname, event.idm.read_only_udm.principal.asset.hostname Directly mapped from the orig field.
origin event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip, event.idm.read_only_udm.target.ip, event.idm.read_only_udm.target.asset.ip, event.idm.read_only_udm.intermediary.ip Directly mapped from the origin field.
origin_sic_name event.idm.read_only_udm.intermediary.asset_id, event.idm.read_only_udm.intermediary.labels[].value Directly mapped from the origin_sic_name field. Key is "Machine SIC". Asset ID is prefixed with "asset:".
originsicname event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the originsicname field. Key is "originsicname".
originsicname event.idm.read_only_udm.intermediary.asset_id, event.idm.read_only_udm.intermediary.labels[].value Directly mapped from the originsicname field. Key is "Machine SIC". Asset ID is prefixed with "asset:".
os_name event.idm.read_only_udm.principal.asset.platform_software.platform If os_name contains "Win", maps to "WINDOWS". If it contains "MAC" or "IOS", maps to "MAC". If it contains "LINUX", maps to "LINUX".
os_version event.idm.read_only_udm.principal.asset.platform_software.platform_patch_level Directly mapped from the os_version field.
outzone event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the outzone field. Key is "outzone".
packets event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the packets field. Key is "packets".
packet_capture_name event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the packet_capture_name field. Key is "packet_capture_name".
packet_capture_time event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the packet_capture_time field. Key is "packet_capture_time".
packet_capture_unique_id event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the packet_capture_unique_id field. Key is "packet_capture_unique_id".
parent_rule event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the parent_rule field. Key is "parent_rule".
performance_impact event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the performance_impact field. Key is "performance_impact".
policy_name event.idm.read_only_udm.security_result.detection_fields[].value Extracted from the __policy_id_tag field using grok and mapped. Key is "Policy Name".
policy_time event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the policy_time field. Key is "policy_time".
portal_message event.idm.read_only_udm.security_result.description Directly mapped from the portal_message field.
principal_hostname event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip Directly mapped from the principal_hostname field if it's a valid IP address.
principal_hostname event.idm.read_only_udm.principal.hostname, event.idm.read_only_udm.principal.asset.hostname Directly mapped from the principal_hostname field if it's not a valid IP address and not "Checkpoint".
prod_family_label event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the ProductFamily field. Key is "ProductFamily".
product event.idm.read_only_udm.metadata.product_name Directly mapped from the product field.
product_family event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the product_family field. Key is "product_family".
product_family event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the product_family field. Key is "product_family".
ProductName event.idm.read_only_udm.metadata.product_name Directly mapped from the ProductName field when product is empty.
product_name event.idm.read_only_udm.metadata.product_name Directly mapped from the product_name field.
profile event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the profile field. Key is "profile".
protocol event.idm.read_only_udm.network.application_protocol Directly mapped from the protocol field if it's "HTTP".
proxy_src_ip event.idm.read_only_udm.principal.nat_ip Directly mapped from the proxy_src_ip field.
reason event.idm.read_only_udm.security_result.summary Directly mapped from the reason field.
received_bytes event.idm.read_only_udm.network.received_bytes Directly mapped from the received_bytes field, converted to an unsigned integer.
Reference event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value, event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the Reference field. Key is "Reference". Used to construct _vuln.name with attack.
reject_id_kid event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the reject_id_kid field. Key is "reject_id_kid".
resource event.idm.read_only_udm.target.url Parsed as JSON and mapped to the target URL. If parsing fails, it's directly mapped.
resource event.idm.read_only_udm.additional.fields[].value.list_value.values[].string_value Parsed as JSON and each value in the resource array is added to the list. Key is "Resource".
result event.idm.read_only_udm.metadata.event_timestamp Parsed with date_time to create the event timestamp.
rt event.idm.read_only_udm.metadata.event_timestamp Parsed as milliseconds since epoch and converted to a timestamp.
rule event.idm.read_only_udm.security_result.rule_name Directly mapped from the rule field.
rule_action event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the rule_action field. Key is "rule_action".
rule_name event.idm.read_only_udm.security_result.rule_name Directly mapped from the rule_name field.
rule_uid event.idm.read_only_udm.security_result.rule_id Directly mapped from the rule_uid field.
s_port event.idm.read_only_udm.principal.port Directly mapped from the s_port field, converted to an integer.
scheme event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the scheme field. Key is "scheme".
security_inzone event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the security_inzone field. Key is "security_inzone".
security_outzone event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the security_outzone field. Key is "security_outzone".
security_result_action event.idm.read_only_udm.security_result.action Directly mapped from the security_result_action field.
sendtotrackerasadvancedauditlog event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the sendtotrackerasadvancedauditlog field. Key is "sendtotrackerasadvancedauditlog".
sent_bytes event.idm.read_only_udm.network.sent_bytes Directly mapped from the sent_bytes field, converted to an unsigned integer.
sequencenum event.idm.read_only_udm.additional.fields[].value.string_value Directly mapped from the sequencenum field. Key is "sequencenum".
ser_agent_kid event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the ser_agent_kid field. Key is "ser_agent_kid".
service event.idm.read_only_udm.target.port Directly mapped from the service field, converted to an integer.
service_id event.idm.read_only_udm.network.application_protocol Directly mapped from the service_id field if it's "dhcp", "dns", "http", "https", or "quic", converted to uppercase.
service_id event.idm.read_only_udm.principal.application Directly mapped from the service_id field if it's not one of the network application protocols.
service_id event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the service_id field. Key is "service_id".
session_description event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the session_description field. Key is "session_description".
session_id event.idm.read_only_udm.network.session_id Directly mapped from the session_id field after removing curly braces.
session_name event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the session_name field. Key is "session_name".
session_uid event.idm.read_only_udm.network.session_id Directly mapped from the session_uid field after removing curly braces.
Severity event.idm.read_only_udm.security_result.severity Mapped to "LOW", "MEDIUM", "HIGH", or "CRITICAL" based on the value of Severity.
severity event.idm.read_only_udm.security_result.severity Mapped to "LOW", "MEDIUM", "HIGH", or "CRITICAL" based on the value of severity.
site event.idm.read_only_udm.network.http.user_agent Directly mapped from the site field.
smartdefense_profile event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the smartdefense_profile field. Key is "smartdefense_profile".
snid event.idm.read_only_udm.network.session_id Directly mapped from the snid field if it's not empty or "0".
sourceAddress event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip Directly mapped from the sourceAddress field.
sourcePort event.idm.read_only_udm.principal.port Directly mapped from the sourcePort field, converted to an integer.
sourceTranslatedAddress event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip Directly mapped from the sourceTranslatedAddress field.
sourceTranslatedAddress event.idm.read_only_udm.principal.nat_ip Directly mapped from the sourceTranslatedAddress field.
sourceTranslatedPort event.idm.read_only_udm.principal.port Directly mapped from the sourceTranslatedPort field, converted to an integer.
sourceTranslatedPort event.idm.read_only_udm.principal.nat_port Directly mapped from the sourceTranslatedPort field, converted to an integer.
sourceUserName event.idm.read_only_udm.principal.user.userid, event.idm.read_only_udm.principal.user.first_name, event.idm.read_only_udm.principal.user.last_name Parsed using grok to extract userid, first name, and last name.
spt event.idm.read_only_udm.principal.port Directly mapped from the spt field, converted to an integer.
src event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip Directly mapped from the src field.
src_ip event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip Directly mapped from the src_ip field.
src_localhost event.idm.read_only_udm.principal.hostname, event.idm.read_only_udm.principal.asset.hostname Directly mapped from the src_localhost field. src_ip is set to "127.0.0.1".
src_machine_name event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the src_machine_name field. Key is "src_machine_name".
src_port event.idm.read_only_udm.principal.port Directly mapped from the src_port field, converted to an integer.
src_user event.idm.read_only_udm.principal.user.userid Directly mapped from the src_user field.
src_user_dn event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the src_user_dn field. Key is "src_user_dn".
src_user_name event.idm.read_only_udm.principal.user.userid Directly mapped from the src_user_name field.
sub_policy_name event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the sub_policy_name field. Key is "sub_policy_name".
sub_policy_uid event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the sub_policy_uid field. Key is "sub_policy_uid".
subject event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the subject field. Key is "subject".
subscription_stat_desc event.idm.read_only_udm.security_result.summary Directly mapped from the subscription_stat_desc field.
tags event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the tags field. Key is "tags".
tar_user event.idm.read_only_udm.target.user.userid Directly mapped from the tar_user field.
target_port event.idm.read_only_udm.target.port Directly mapped from the target_port field.
tcp_flags event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the tcp_flags field. Key is "tcp_flags".
tcp_packet_out_of_state event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the tcp_packet_out_of_state field. Key is "tcp_packet_out_of_state".
time event.idm.read_only_udm.metadata.event_timestamp Parsed and converted to a timestamp using various date formats.
ts event.idm.read_only_udm.metadata.event_timestamp Parsed with ds and tz to create the event timestamp.
type event.idm.read_only_udm.security_result.rule_type Directly mapped from the type field.
tz event.idm.read_only_udm.metadata.event_timestamp Used with ds and ts to construct the event timestamp.
update_count event.idm.read_only_udm.security_result.detection_fields[].value Directly mapped from the update_count field. Key is "update_count".
URL event.idm.read_only_udm.security_result.about.url Directly mapped from the URL field.
user event.idm.read_only_udm.principal.user.userid Directly mapped from the user field.
user_agent event.idm.read_only_udm.network.http.user_agent Directly mapped from the user_agent field. Also parsed and mapped to event.idm.read_only_udm.network.http.parsed_user_agent.
userip event.idm.read_only_udm.principal.ip, event.idm.read_only_udm.principal.asset.ip Directly mapped from the userip field if it's a valid IP address.
UUid event.idm.read_only_udm.metadata.product_log_id Directly mapped from the UUid field after removing curly braces.
version event.idm.read_only_udm.metadata.product_version Directly mapped from the version field.
web_client_type event.idm.read_only_udm.network.http.user_agent Directly mapped from the web_client_type field.
xlatedport event.idm.read_only_udm.target.nat_port Directly mapped from the xlatedport field, converted to an integer.
xlatedst event.idm.read_only_udm.target.nat_ip Directly mapped from the xlatedst field.
xlatesport event.idm.read_only_udm.principal.nat_port Directly mapped from the xlatesport field, converted to an integer.
xlatesrc event.idm.read_only_udm.principal.nat_ip Directly mapped from the xlatesrc field.
event.idm.read_only_udm.metadata.vendor_name Check Point Hardcoded value.
event.idm.read_only_udm.metadata.log_type CHECKPOINT_FIREWALL Hardcoded value.
event.idm.read_only_udm.security_result.rule_type Firewall Rule Default value, unless overridden by specific logic.
event.idm.is_alert true Set to true if alert field is "yes".
has_principal true Set to true when principal IP or hostname is extracted.
has_target true Set to true when target IP or hostname is extracted.

Changes

2024-05-29

  • Mapped "layer_uuid_rule_uuid" to "security_result.rule_id".
  • Mapped "domain" to "principal.administrative_domain".
  • Mapped "fservice", "appi_name", "app_risk", and "policy_name" to "security_result.detection_fields".
  • Mapped "packets", "__id", "dedup_time", "browse_time", "bytes", "product_family", "hll_key", and "calc_service" to "additional.fields".
  • Mapped "id" to "metadata.product_log_id".
  • Mapped "orig_log_server" to "principal.resource.product_object_id".
  • Mapped "environment_id" to "target.resource.product_object_id".
  • Mapped "client_outbound_packets" and "client_inbound_packets" to "principal.resource.attribute.labels".
  • Mapped "server_outbound_bytes" and "server_inbound_bytes" to "target.resource.attribute.labels".
  • Mapped "orig" to "principal.hostname" and "principal.asset.hostname".
  • Mapped "orig_log_server_ip" to "principal.ip" and "principal.asset.ip".
  • Mapped "proto" to "network.ip_protocol".

2024-05-20

  • Added a Grok pattern to extract "inter_host".
  • Mapped "inter_host" to "intermediary.hostname".

2024-04-19

  • Enhancement and Bug-Fix:
  • Mapped "origin" to "target.ip" and "target.asset.ip".
  • Added new Grok patterns to parse new format of SYSLOG logs.
  • Mapped "smartdefense_profile", "malware_rule_id", and "malware_rule_name" to "security_result.detection_fields".
  • Mapped "sequencenum", "description_url", "industry_reference", "mitre_execution", "packet_capture_name", "packet_capture_unique_id", "packet_capture_time", and "performance_impact" to "additional.fields".
  • Mapped "version" to "metadata.product_version".
  • Mapped "http_host" to "target.resource.attribute.labels".
  • Mapped "log_id" to "metadata.product_log_id".
  • Mapped "user_agent" to "network.http.user_agent" and "http.parsed_user_agent".
  • Mapped "hostname", "dvc", and "principal_hostname" to "target.hostname" and "target.asset.hostname".
  • If "has_principal" is "true", "has_target" is "true", and "Action"/"action" is "Log In" or "Failed Log In" or "Failed Login" or "Update", then set "metadata.event_type" to "USER_LOGIN" and "extensions.auth.type" to "AUTHTYPE_UNSPECIFIED".
  • If "has_principal" is "true", "has_target" is "true", and "Action"/"act"/"event_type" is "Log Out" or "Logout", then set "metadata.event_type" to "USER_LOGOUT" and "extensions.auth.type" to "AUTHTYPE_UNSPECIFIED".
  • If "has_principal" is "true", "has_target" is "true", then set "metadata.event_type" to "NETWORK_CONNECTION".
  • If "has_principal" is "true", "has_target" is "false", then set "metadata.event_type" to "STATUS_UPDATE".

2024-02-07

  • added mapping for the following fields:
  • Mapped "protection_id", "malware_action", "malware_family,protection_name", "protection_type" to "security_result.detection_fields".
  • Mapped "confidence_level" to "security_result.confidence" and "security_result.confidence_details".

2024-02-05

  • added mapping for the following fields:
  • Mapped "method" to "network.http.method".

2024-01-24

  • added mapping for the following fields:
  • Mapped "method" to "network.http.method".
  • Mapped "duration" to "network.session_duration.seconds".
  • Mapped "additional_info" to "security_result.description".
  • Mapped "operation" to "security_result.summary".
  • Mapped "subject" to "metadata.description".
  • Mapped "principal_hostname" to "intermediary.hostname".
  • Mapped "tcp_packet_out_of_state", "aggregated_log_count", "connection_count", "appi_name", "src_user_dn",
  • "update_count", "additional_info", "administrator", "operation", "sendtotrackerasadvancedauditlog",
  • "subject", "fieldschanges", "logic_changes", "objecttype", "session_description",
  • "session_name" to "security_result.detection_fields".

2023-12-27

  • added mapping for the following fields:
  • Mapped "flags" to "security_result.detection_fields".
  • Mapped "tcp_flags" to "security_result.detection_fields".
  • Mapped "tcp_packet_out_of_state" to "security_result.detection_fields".

2023-12-11

  • If "principal_hostname" is a valid ip, mapped it to "principal.ip".
  • If "principal_hostname" is not a valid ip, mapped it to "principal.hostname".
  • Mapped "sport_svc" to "principal.port".
  • Mapped "ProductFamily" to "additional.fields".
  • Mapped "mitre_initial_access" to "security_result.detection_fields".
  • Mapped "policy_time" to "security_result.detection_fields".
  • Mapped "profile" to "security_result.detection_fields".
  • Mapped "reject_id_kid" to "security_result.detection_fields".
  • Mapped "ser_agent_kid" to "security_result.detection_fields".

2023-10-11

  • If "product" is "New Anti Virus", then the mapping from "firewall management node" to "principal.hostname" is removed and instead mapped to "security_result.detection_fields".

2023-07-06

  • added mapping for the following fields:
  • Mapped "app_category" to "security_result.category_details".
  • Mapped "matched_category" to "security_result.detection_fields".
  • Mapped "app_properties" to "security_result.detection_fields".

2023-06-14

  • added mapping for following fields
  • Mapped "conn_direction" to "additional.fields".
  • Modified gsub's so as not to replace the ":" with "=" from actual values.

2023-05-12

  • added mapping for following fields
  • Mapped "rule_name" to "security_result.rule_name".
  • Mapped "rule","sub_policy_name","sub_policy_uid","smartdefense_profile","tags","flexString2" to "security_result.detection_fields".
  • Added new Grok pattern to support the new log formats.
  • Mapped "dvc" to "intermediary.hostname".
  • Mapped "hostname" to "intermediary.hostname".
  • Mapped "origin_sic_name" to "intermediary.asset_id".
  • Mapped "conn_direction" to "network.ip_protocol".
  • Mapped "ifname" to "security_result.detection_fields".
  • Mapped "security_inzone" to "security_result.detection_fields".
  • Mapped "match_id" to "security_result.detection_fields".
  • Mapped "parent_rule" to "security_result.detection_fields".
  • Mapped "security_outzone" to "security_result.detection_fields".
  • Mapped "sub_policy_name" to "security_result.detection_fields".
  • Mapped "sub_policy_uid" to "security_result.detection_fields".
  • Mapped "drop_reason" to "security_result.summary".
  • Mapped "reason" to "security_result.summary".
  • Mapped "xlatesport" to "principal.nat_port".
  • Mapped "xlatedport" to "target.nat_port".
  • Mapped "ipv6_dst" to "target.ip".
  • Mapped "ipv6_src" to "principal.ip".

2023-04-24

  • Added support for logs with CEF format.

2022-11-18

  • Modified mapping for "service" and mapped it to "target.port".

2022-10-27

  • Added conditional check for "attack","attack_info","policy_name".
  • Added grok pattern to retrieve "principal_hostname".
  • Added gsub to change "=" to ":".
  • Modified mapping for "service" and mapped it to "target.resource.attribute.labels".

2022-10-13

  • Mapped the field 'fw_subproduct' to 'metadata.product_name'.
  • Added grok pattern to extract the ip form the field 'src'.

2022-08-30

  • Merged the changes of Customer-specific versions to default.
  • Undropped the logs containing "*****" in UserCheck.

2022-08-18

  • Mapped "portal_message" to "security_result.description".
  • Mapped "security_result.category" as "SOFTWARE_MALICIOUS" in case "portal_message" contains keywords "malware/malicious".
  • Mapped "URL" to "security_result.about.url".
  • Mapped "Activity" to "security_result.summary".
  • Mapped "Reference" to "security_result.about.resource.attribute.labels".
  • Modified "event_type" from "GENERIC_EVENT" to "STATUS_UPDATE" by replicating the value of "intermediary.ip" to "principal.ip".

2022-08-12

  • Mapped "malware_action", "malware_family,protection_name", "protection_type" to "security_result.about.resource.attribute.labels".
  • Mapped "src_machine_name" to "security_result.detection_fields".

2022-06-30

  • Mapped "message_info" to "metadata.description".

2022-06-17

  • Added conditional checks for fields "nat_rulenum", "rule", "sent_bytes", "received_bytes", "s_port", "service".
  • Modified event_types for the following cases:
  • "GENERIC_EVENT" to "NETWORK_CONNECTION" where "principal.ip or principal.hostname" and "target.ip or target.hostname" are not null.
  • "GENERIC_EVENT" to "STATUS_UNCATEGORIZED" where "principal.ip or principal.hostname" is not null.

2022-06-14

  • Modified the parser to parse more logs by removing the condition check for passwd.

2022-06-07

  • Mapped src_machine_name to security_result.detection_fields.

2022-05-19

  • Mapped inzone, outzone, layer_name, layer_uuid and policy_name to security_result.detection_fields.
  • Mapped service_id to principal.application.