|
2 | 2 |
|
3 | 3 | ## Overview |
4 | 4 |
|
5 | | -The Check Point integration for Elastic enables you to collect and monitor network security events, firewall traffic, and audit logs from Check Point Security Gateways and Management Servers. This integration facilitates centralized visibility into security policies, blocked connections, accepted connections, and VPN activity. By collecting and analyzing this data, you can enhance threat detection, incident response, and compliance auditing. |
| 5 | +The Check Point integration for Elastic collects logs from Check Point Security Gateways and Management Servers. This enables comprehensive security monitoring, threat detection, and network traffic analysis within the Elastic Stack. By ingesting Check Point logs, you can gain centralized visibility into firewall traffic, security policies, VPN activity, and system health to enhance your security posture. |
| 6 | + |
| 7 | +This integration facilitates: |
| 8 | +- Centralized visibility into security policies, blocked connections, accepted connections, and VPN activity. |
| 9 | +- Compliance auditing and reporting by centralizing Check Point logs. |
| 10 | +- Enhanced threat detection and incident response capabilities through real-time log analysis. |
| 11 | +- Monitoring of system health and administrator actions on Check Point appliances. |
6 | 12 |
|
7 | 13 | ### Compatibility |
8 | 14 |
|
9 | | -This integration is compatible with Check Point Security Gateways and Management Servers running R80.x, R81, and R81.x versions. It requires Kibana version 8.11.0 or later, or 9.0.0 or later. |
| 15 | +This integration is compatible with Check Point Security Gateways and Management Servers running R80.x, R81, and R81.x versions. |
| 16 | + |
| 17 | +This integration is compatible with Elastic Stack version 8.11.0 or higher. |
10 | 18 |
|
11 | 19 | ### How it works |
12 | 20 |
|
13 | | -This integration collects logs from Check Point devices using two primary methods: |
14 | | -- **Syslog (UDP/TCP)**: The Check Point Log Exporter forwards logs in Syslog format to the Elastic Agent. |
15 | | -- **Log file**: The Elastic Agent directly monitors and collects logs from files on the Check Point appliance, such as system logs. |
| 21 | +This integration collects logs from Check Point devices by receiving syslog data over TCP or UDP, or by reading directly from log files. An Elastic Agent is deployed on a host that is configured as a syslog receiver or has access to the log files. The agent forwards the logs to your Elastic deployment, where they can be monitored and analyzed. |
16 | 22 |
|
17 | 23 | ## What data does this integration collect? |
18 | 24 |
|
19 | | -The Check Point integration collects the following types of data: |
20 | | -* Check Point Security Gateway and Management Server logs in Syslog format (firewall connections, VPN, audit, system events). |
21 | | -* Check Point firewall connection logs (accept, drop, reject, etc.). |
22 | | -* VPN logs. |
23 | | -* SmartConsole audit logs (administrator actions on the Management Server). |
24 | | -* Gaia OS system-level logs (e.g., `/var/log/messages`, `/var/log/secure`, `/var/log/dmesg`) for appliance health and activity. |
| 25 | +The Check Point integration collects log messages of the following types: |
| 26 | +* Check Point Security Gateway and Management Server logs in Syslog format (firewall connections, VPN, audit, system events). |
| 27 | +* Check Point firewall connection logs (accept, drop, reject, etc.). |
| 28 | +* VPN logs. |
| 29 | +* SmartConsole audit logs (administrator actions on the Management Server). |
| 30 | +* Gaia OS system-level logs (e.g., `/var/log/messages`, `/var/log/secure`, `/var/log/dmesg`) for appliance health and activity. |
25 | 31 |
|
26 | 32 | ### Supported use cases |
27 | 33 |
|
28 | | -- Gain centralized visibility into security policies, blocked connections, accepted connections, and VPN activity. |
29 | | -- Facilitate compliance auditing and reporting by centralizing Check Point logs. |
30 | | -- Enhance threat detection and incident response capabilities through real-time log analysis. |
31 | | -- Monitor system health and administrator actions on Check Point appliances. |
| 34 | +- **Real-time Threat Detection**: Leverage Elastic SIEM to detect and respond to threats identified in firewall logs. |
| 35 | +- **Network Traffic Analysis**: Use Kibana dashboards to visualize and analyze network traffic patterns, helping to identify anomalies and optimize network performance. |
| 36 | +- **Compliance and Auditing**: Maintain a searchable, long-term archive of firewall logs to meet compliance requirements and conduct security audits. |
| 37 | +- **Incident Response**: Accelerate incident investigation by correlating firewall data with other security and observability data sources within Elastic. |
32 | 38 |
|
33 | 39 | ## What do I need to use this integration? |
34 | 40 |
|
35 | 41 | ### Vendor prerequisites |
36 | 42 |
|
37 | | -- Administrative access to Check Point SmartConsole. |
38 | | -- SSH access to Check Point Security Gateways or Management Servers. |
39 | | -- Knowledge of your Check Point environment, including IP addresses of Gateways/Management Servers. |
40 | | -- Ensure network connectivity and open ports (e.g., UDP/TCP 514 or a custom port) between your Check Point devices and the Elastic Agent. |
| 43 | +- Administrative access to Check Point SmartConsole. |
| 44 | +- SSH access to Check Point Security Gateways or Management Servers (required for logfile collection and potentially for advanced troubleshooting). |
| 45 | +- Knowledge of your Check Point environment, including IP addresses of Gateways/Management Servers. |
| 46 | +- Ensure network connectivity and open ports (e.g., UDP/TCP 514 or a custom port) between your Check Point devices and the Elastic Agent acting as the log collector. |
41 | 47 |
|
42 | 48 | ### Elastic prerequisites |
43 | 49 |
|
44 | | -- An active Elastic Stack deployment (Elasticsearch and Kibana) compatible with the integration. |
45 | | -- An Elastic Agent deployed and enrolled in Fleet. |
| 50 | +- An active Elastic Stack deployment (Elasticsearch and Kibana) compatible with the integration (Kibana 8.11.0+ or 9.0.0+). |
| 51 | +- An Elastic Agent deployed and enrolled in Fleet, configured to receive logs from Check Point devices. |
| 52 | +- Network connectivity between the Elastic Agent and the Check Point devices. |
46 | 53 |
|
47 | 54 | ## How do I deploy this integration? |
48 | 55 |
|
49 | 56 | ### Agent-based deployment |
50 | 57 |
|
51 | | -Elastic Agent must be installed to stream data from the syslog or log file receiver and ship it to Elastic. For more details, check the Elastic Agent [installation instructions](https://www.elastic.co/guide/en/fleet/current/install-elastic-agents.html). |
| 58 | +Elastic Agent must be installed on a host that will act as the syslog or log file receiver. For more details, check the Elastic Agent [installation instructions](https://www.elastic.co/guide/en/fleet/current/install-elastic-agents.html). You can install only one Elastic Agent per host. |
52 | 59 |
|
53 | | -### Onboard / configure |
| 60 | +Elastic Agent is required to stream data from the syslog or log file receiver and ship the data to Elastic, where the events will then be processed via the integration's ingest pipelines. |
54 | 61 |
|
55 | | -#### Vendor set up steps |
| 62 | +### Set up steps in Check Point |
56 | 63 |
|
57 | | -##### For UDP/TCP (Syslog) Collection: |
| 64 | +#### For UDP/TCP (Syslog) Collection: |
58 | 65 |
|
59 | 66 | 1. **Configure Log Exporter in SmartConsole:** |
60 | | - * For each Check Point device, create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C_____2) in Check Point SmartConsole. |
61 | | - * Navigate to **Objects > More object types > Server > Log Exporter/SIEM**. |
62 | | - * Set the **Target Server** to the IP address of your Elastic Agent. |
63 | | - * Specify the **Target Port** (e.g., `9001`). |
64 | | - * Select the **Protocol** (**UDP** or **TCP**). |
65 | | - * Choose the **Format** as **Syslog**. |
| 67 | + - For each Check Point Security Gateway or Management Server you wish to monitor, create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C%5F%5F%5F%5F%5F2) in Check Point SmartConsole. |
| 68 | + - Navigate to **Objects > More object types > Server > Log Exporter/SIEM**. |
| 69 | + - **Name:** Provide a descriptive name for the Log Exporter (e.g., `Elastic_Agent_Syslog_Export`). |
| 70 | + - **Target Server:** Set this to the IP address or hostname of your log collector (e.g., Elastic Agent). |
| 71 | + - **Target Port:** Specify the port number on which your log collector is listening (e.g., `514` for standard Syslog UDP/TCP, or a custom port like `9001` as often used by Elastic Agent). |
| 72 | + - **Protocol:** Select either **UDP** or **TCP**. The Check Point integration supports both. |
| 73 | + - **Format:** Choose **Syslog**. |
| 74 | + - **Export additional log fields:** (Optional) Select any additional fields you wish to export. |
| 75 | + - **Filter (Optional):** Define a filter if you only want to send specific log types or severities. |
| 76 | + - Click **OK** to save the Log Exporter configuration. |
66 | 77 | 2. **Install Policy:** |
67 | | - * Install the updated policy on the relevant Security Gateways or Management Server. |
| 78 | + - After configuring the Log Exporter, install the updated policy on the relevant Security Gateways or Management Server for the changes to take effect. |
68 | 79 |
|
69 | | -##### For Logfile Collection: |
| 80 | +#### For Logfile Collection: |
70 | 81 |
|
71 | 82 | 1. **Access the Check Point Appliance:** |
72 | | - * Connect to the Check Point device via SSH. |
| 83 | + - Connect to the Check Point Security Gateway or Management Server via SSH. |
73 | 84 | 2. **Identify Log File Locations:** |
74 | | - * System logs are typically in `/var/log/` (e.g., `/var/log/messages`, `/var/log/secure`). |
75 | | - * Management Server audit logs can be found in `$FWDIR/log/cpm.elg`. |
76 | | - |
77 | | -#### Kibana set up steps |
78 | | - |
79 | | -1. In Kibana, navigate to **Integrations** > **Check Point**. |
80 | | -2. Click **Add Check Point**. |
81 | | -3. Add the integration to an Elastic Agent policy. |
82 | | -4. Configure the input type: |
83 | | - * **For UDP/TCP (Syslog)**: Select the **Collect Check Point firewall logs (input: tcp)** or **(input: udp)**. Specify the `Syslog Host` and `Syslog Port` to match the Log Exporter configuration. |
84 | | - * **For Logfile Collection**: Select the **Collect Check Point firewall logs (input: logfile)**. Provide the `Paths` to the log files. |
85 | | -5. Save the integration. |
86 | | - |
87 | | -### Validation |
| 85 | + - **Gaia OS System Logs:** Standard Linux system logs are located in `/var/log/`. These include: |
| 86 | + - `/var/log/messages`: General system messages. |
| 87 | + - `/var/log/secure`: Authentication and authorization messages. |
| 88 | + - `/var/log/dmesg`: Kernel ring buffer messages. |
| 89 | + - **Management Server Logs:** |
| 90 | + - `$FWDIR/log/cpm.elg`: For SmartConsole audit events, which can be useful for auditing administrator actions. |
| 91 | +3. **Configure your Log Collector:** |
| 92 | + - Point your log file collector (Elastic Agent) to the desired log file paths on the Check Point appliance. Ensure the collector has appropriate permissions to read these files. |
| 93 | + - **Important:** For proprietary binary logs (e.g., `$FWDIR/log/fw.log`), a generic log collector will not be able to parse the content effectively. If security events are required, use the Log Exporter (Syslog) method. For standard text-based system logs (e.g., `/var/log/messages`), direct collection is viable. |
| 94 | + |
| 95 | +### Set up steps in Kibana |
| 96 | + |
| 97 | +1. In Kibana, navigate to **Management > Integrations**. |
| 98 | +2. Search for "Check Point" and select the integration. |
| 99 | +3. Click **Add Check Point**. |
| 100 | +4. Follow the prompts to add the integration to an existing Elastic Agent policy or create a new one. |
| 101 | +5. Configure the input types based on your vendor setup: |
| 102 | + - **For UDP/TCP (Syslog)**: |
| 103 | + - Select **Collect Check Point firewall logs (input: tcp)** or **(input: udp)**. |
| 104 | + - Specify the `Syslog Host` (IP address of the Elastic Agent where logs will be received). |
| 105 | + - Specify the `Syslog Port` (e.g., `9001` or `514`), ensuring it matches the `Target Port` configured in your Check Point Log Exporter. |
| 106 | + - **For Logfile Collection**: |
| 107 | + - Select **Collect Check Point firewall logs (input: logfile)**. |
| 108 | + - Provide the `Paths` to the desired log files on the Check Point appliance (e.g., `/var/log/messages`, `$FWDIR/log/cpm.elg`). |
| 109 | +6. Save the integration. The Elastic Agent will automatically update its configuration and begin ingesting data. |
| 110 | + |
| 111 | +### Validation Steps |
| 112 | + |
| 113 | +After configuring both the Check Point Log Exporter and the Elastic Agent integration: |
88 | 114 |
|
89 | 115 | 1. **Trigger Data Flow on Check Point:** |
90 | | - * Generate network traffic to create firewall logs. |
91 | | - * Perform an action in SmartConsole to generate audit logs. |
| 116 | + - **For firewall logs**: On a Check Point Security Gateway, generate some network traffic to ensure firewall logs are generated. |
| 117 | + - **For audit logs**: Perform an action in SmartConsole to generate audit logs on the Management Server. |
| 118 | + - **For system logs**: Log in/out of the Check Point appliance via SSH or perform routine system commands. |
92 | 119 | 2. **Check Data in Kibana:** |
93 | | - * Navigate to **Discover** and select the `checkpoint.firewall` data view. |
94 | | - * Verify that logs are being ingested and parsed correctly. |
95 | | - * Explore the provided Check Point dashboards. |
| 120 | + - Navigate to **Discover** in Kibana. |
| 121 | + - Filter by `data_stream.dataset : checkpoint.firewall`. |
| 122 | + - Verify that logs are being ingested and parsed correctly, looking for recent timestamps. |
| 123 | + - Explore the provided Check Point dashboards (e.g., Overview, Addresses and Ports) to see if data populates as expected. |
96 | 124 |
|
97 | 125 | ## Troubleshooting |
98 | 126 |
|
99 | | -- **No data in Kibana**: Verify network connectivity between the Check Point device and the Elastic Agent. Ensure the Log Exporter policy is installed and the port/IP settings match in both configurations. |
100 | | -- **Parsing issues**: Ensure the format in the Log Exporter is set to `Syslog`. |
101 | | -- **Fingerprint collisions**: In some instances firewall events may have the same Checkpoint `loguid` and arrive during the same timestamp resulting in a fingerprint collision. To avoid this [enable semi-unified logging](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Appendix.htm?TocPath=Log%20Exporter%7C_____9) in the Checkpoint dashboard. |
| 127 | +### Common Configuration Issues |
| 128 | + |
| 129 | +- **No data collected in Kibana**: |
| 130 | + - **Network Connectivity**: Verify network connectivity between your Check Point device and the Elastic Agent. Check any intermediate firewalls or security groups that might block Syslog traffic. |
| 131 | + - **Policy Installation**: Ensure the Log Exporter policy has been successfully installed on the relevant Check Point Security Gateway or Management Server. |
| 132 | + - **Port/IP Mismatch**: Double-check that the `Target Server` IP and `Target Port` in SmartConsole's Log Exporter match the `Syslog Host` and `Syslog Port` in the Elastic Agent integration. |
| 133 | + - **Elastic Agent Status**: Confirm the Elastic Agent is running and healthy. Check its logs for any errors related to input listeners. |
| 134 | + - **Logfile Permissions**: For logfile collection, ensure the Elastic Agent has appropriate read permissions on the specified log file paths. |
| 135 | +- **Data collected, but parsing issues or missing fields**: |
| 136 | + - **Syslog Format**: Ensure the `Format` in Check Point Log Exporter is explicitly set to `Syslog`. |
| 137 | + - **Input Type Mismatch**: Verify that the correct input type (UDP, TCP, or Logfile) is selected and configured in the Elastic Agent integration. |
102 | 138 |
|
103 | | -For additional help, check the [Common problems](https://www.elastic.co/guide/en/fleet/current/troubleshooting.html) documentation. |
| 139 | +### Ingestion Errors |
104 | 140 |
|
105 | | -## Scaling |
| 141 | +- Check the Elastic Agent logs for any specific error messages related to log processing, parsing failures, or communication with Elasticsearch. |
| 142 | +- In Kibana Discover, look for documents with an `error.message` field, which can indicate issues during ingestion or processing. |
| 143 | +- In some instances, firewall events may have the same Checkpoint `loguid` and arrive at the same timestamp, resulting in a fingerprint collision. To avoid this, [enable semi-unified logging](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Appendix.htm?TocPath=Log%20Exporter%7C_____9) in the Checkpoint dashboard. |
106 | 144 |
|
107 | | -For high-volume environments, consider deploying multiple Elastic Agents to distribute the log collection load. Refer to Check Point's documentation for sizing guidelines. For more information on scaling, see the [Ingest Architectures](https://www.elastic.co/guide/en/ingest/current/ingest-reference-architectures.html) documentation. |
| 145 | +### Vendor Resources |
| 146 | + |
| 147 | +- [Check Point R81 Logging and Monitoring Administration Guide - Log Exporter Configuration](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C%5F%5F%5F%5F%5F2) |
| 148 | +- [Check Point sk122323: R80.x / R81.x Log Exporter command line utility](https://support.checkpoint.com/results/sk/sk122323) |
| 149 | + |
| 150 | +## Performance and scaling |
| 151 | + |
| 152 | +For high-volume environments, consider deploying multiple Elastic Agents to distribute the log collection load. Check Point's Log Exporter allows for flexible log forwarding, including the ability to send logs to multiple targets, enabling distributed log collection setups. |
| 153 | + |
| 154 | +For more information on architectures that can be used for scaling this integration, check the [Ingest Architectures](https://www.elastic.co/docs/manage-data/ingest/ingest-reference-architectures) documentation. |
108 | 155 |
|
109 | 156 | ## Reference |
110 | 157 |
|
111 | 158 | ### firewall |
112 | 159 |
|
113 | | -The `firewall` data stream collects log entries from the Check Point Log Exporter in Syslog format. |
| 160 | +The `firewall` data stream provides events from Check Point devices, including firewall traffic, VPN logs, audit logs, and system events. |
114 | 161 |
|
115 | 162 | #### firewall fields |
116 | 163 |
|
117 | 164 | {{ fields "firewall" }} |
118 | 165 |
|
| 166 | +#### firewall sample event |
| 167 | + |
119 | 168 | {{ event "firewall" }} |
120 | 169 |
|
121 | 170 | ### Inputs used |
122 | | - |
123 | | -{{ inputDocs }} |
| 171 | +{{ inputDocs }} |
0 commit comments