Back to Beats

Docs

x-pack/filebeat/module/checkpoint/_meta/docs.md

9.4.07.3 KB
Original Source

:::::{admonition} Prefer to use {{agent}} for this use case? Refer to the Elastic Integrations documentation.

::::{dropdown} Learn more {{agent}} is a single, unified way to add monitoring for logs, metrics, and other types of data to a host. It can also protect hosts from security threats, query data from operating systems, forward data from remote services or hardware, and more. Refer to the documentation for a detailed comparison of {{beats}} and {{agent}}.

::::

:::::

This is a module for Check Point firewall logs. It supports logs from the Log Exporter in the Syslog RFC 5424 format. If you need to ingest Check Point logs in CEF format then please use the CEF module (more fields are provided in the syslog output).

To configure a Log Exporter, please refer to the documentation by Check Point.

Example Log Exporter config:

cp_log_export add name testdestination target-server 192.168.1.1 target-port 9001 protocol udp format syslog

::::{tip} Read the quick start to learn how to configure and run modules. ::::

Compatibility [_compatibility_7]

This module has been tested against Check Point Log Exporter on R80.X but should also work with R77.30.

Configure the module [configuring-checkpoint-module]

You can further refine the behavior of the checkpoint module by specifying variable settings in the modules.d/checkpoint.yml file, or overriding settings at the command line.

You must enable at least one fileset in the module. Filesets are disabled by default.

Variable settings [checkpoint-settings]

Each fileset has separate variable settings for configuring the behavior of the module. If you don’t specify variable settings, the checkpoint module uses the defaults.

For advanced use cases, you can also override input settings. See Override input settings.

::::{tip} When you specify a setting at the command line, remember to prefix the setting with the module name, for example, checkpoint.firewall.var.paths instead of firewall.var.paths. ::::

firewall fileset settings [_firewall_fileset_settings]

Example config:

yaml
- module: checkpoint
  firewall:
    var.syslog_host: 0.0.0.0
    var.syslog_port: 9001

var.paths : An array of glob-based paths that specify where to look for the log files. All patterns supported by Go Glob are also supported here. For example, you can use wildcards to fetch all files from a predefined level of subdirectories: /path/to/log/*/*.log. This fetches all .log files from the subfolders of /path/to/log. It does not fetch log files from the /path/to/log folder itself. If this setting is left empty, Filebeat will choose log paths based on your operating system.

var.syslog_host : The interface to listen to UDP based syslog traffic. Defaults to localhost. Set to 0.0.0.0 to bind to all available interfaces.

var.syslog_port : The UDP port to listen for syslog traffic. Defaults to 9001.

var.timezone_offset : IANA time zone or time offset (e.g. +0200) to use when interpreting syslog timestamps without a time zone. Defaults to UTC.

var.tags : A list of tags to include in events. Including forwarded indicates that the events did not originate on this host and causes host.name to not be added to events. Defaults to [checkpoint-firewall, forwarded].

var.ssl : The SSL/TLS configuration for the filebeat instance. This can be used to enforce mutual TLS.

yaml
ssl:
  enabled: true
  certificate_authorities: ["my-ca.pem"]
  certificate: "filebeat-cert.pem"
  key: "filebeat-key.pem"
  client_authentication: "required"

Check Point devices [_check_point_devices_2]

This module will parse Check Point Syslog data as documented in: Checkpoint Log Fields Description.

Check Point Syslog extensions are mapped as follows to ECS:

Check Point FieldsECS Fields
actionevent.action
appi_namenetwork.application
app_riskevent.risk_score
app_rule_idrule.id
app_rule_namerule.name
bytesnetwork.bytes
categoriesrule.category
client_inbound_interfaceobserver.ingress.interface.name
client_outbound_bytessource.bytes
client_outbound_interfaceobserver.egress.interface.name
client_outbound_packetssource.packets
destination_dns_hostnamedestination.domain
dlp_file_namefile.name
dns_message_typedns.type
dns_typedns.question.type
domain_namedns.question.name
dstdestination.ip
dst_machine_namedestination.domain
dlp_rule_namerule.name
dlp_rule_uidrule.uuid
endpoint_ipobserver.ip
file_idfile.inode
file_typefile.type
file_namefile.name
file_sizefile.size
file_md5file.hash.md5
file_sha1file.hash.sha1
file_sha256file.hash.sha256
first_detectionevent.start
fromsource.user.email
ifdirnetwork.direction
industry_referencevulnerability.id
inzoneobserver.ingress.zone
last_detectionevent.end
loguidevent.id
mac_destination_addressdestination.mac
mac_source_addresssource.mac
malware_actionrule.description
matched_categoryrule.category
malware_rule_idrule.rule.id
messagemessage
methodhttp.request.method
originobserver.name
origin_ipobserver.ip
os_namehost.os.name
os_versionhost.os.version
outzoneobserver.egress.zone
packet_captureevent.url
packetsnetwork.packets
parent_process_md5process.parent.hash.md5
parent_process_nameprocess.parent.name
process_md5process.hash.md5
process_nameprocess.name
productobserver.product
protonetwork.iana_number
reasonmessage
received_bytesdestination.bytes
referrerhttp.request.referrer
rule_namerule.name
resourceurl.original
s_portsource.port
security_inzoneobserver.ingress.zone
security_outzoneobserver.egress.zone
sent_bytessource.bytes
sequencenumevent.sequence
servicedestination.port
service_idnetwork.application
service_namedestination.service.name
server_outbound_packetsdestination.packets
server_outbound_bytesdestination.bytes
severityevent.severity
smartdefense_profilerule.ruleset
srcsource.ip
src_machine_namesource.domain
src_user_groupsource.user.group.name
start_timeevent.start
statushttp.response.status_code
tiddns.id
time@timestamp
todestination.user.email
typeobserver.type
update_versionobserver.version
urlurl.original
user_groupgroup.name
usercheck_incident_uiddestination.user.id
web_client_typeuser_agent.name
xlatesrcsource.nat.ip
xlatedstdestination.nat.ip
xlatesportsource.nat.port
xlatedportdestination.nat.port