Collect Check Point firewall logs
This parser extracts Check Point firewall logs. It handles both CEF and non-CEF formatted messages, including syslog, key-value pairs, and JSON. It normalizes fields, maps them to the UDM, and performs specific logic for login/logout, network connections, and security events. It enriches the data with contextual information like geolocation and threat intelligence.
Before you begin
- Ensure that you have a Google Security Operations instance.
- Ensure that you are using Windows 2016 or later, or a Linux host with systemd.
- If running behind a proxy, ensure firewall ports are open.
- Ensure that you have privileged access to a Check Point Firewall.
Get Google SecOps ingestion authentication file
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Collection Agents.
- Download the Ingestion Authentication File.
Get Google SecOps customer ID
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Profile.
- Copy and save the Customer IDfrom the Organization Detailssection.
Install Bindplane Agent
- For Windows installation, run the following script:
msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quiet
- For Linux installation, run the following script:
sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.sh
- Additional installation options can be found in this installation guide .
Configure Bindplane Agent to ingest Syslog and send to Google SecOps
- Access the machine where Bindplane is installed.
-
Edit the
config.yaml
file as follows:receivers: udplog: # Replace the below port <54525> and IP <0.0.0.0> with your specific values listen_address: "0.0.0.0:54525" exporters: chronicle/chronicle_w_labels: compression: gzip # Adjust the creds location below according the placement of the credentials file you downloaded creds: '{ json file for creds }' # Replace <customer_id> below with your actual ID that you copied customer_id: <customer_id> endpoint: malachiteingestion-pa.googleapis.com # You can apply ingestion labels below as preferred ingestion_labels: log_type: SYSLOG namespace: Checkpoint_Firewall raw_log_field: body service: pipelines: logs/source0__chronicle_w_labels-0: receivers: - udplog exporters: - chronicle/chronicle_w_labels
-
Restart the Bindplane Agent to apply the changes:
sudo systemctl restart bindplane
Configure Syslog Export in a Check Point Firewall
- Sign in to the Check Point firewall UI using a privileged account.
- Go to Logs & Monitoring > Log Servers.
- Navigate to Syslog Servers.
- Click Configure, and set the following values:
- Protocol: select UDPto send security logs and/or system logs.
- Name: provide a unique name (for example, Bindplane_Server).
- IP Address: provide your syslog server IP address (Bindplane IP).
- Port: provide your syslog server Port (Bindplane Port).
- Select Enable log server.
- Select logs to forward: Both system and security logs.
- Click Apply.
UDM Mapping Table
Log Field | UDM Mapping | Logic |
---|---|---|
Action
|
event.idm.read_only_udm.security_result.action_details
|
Directly mapped from the Action
field. |
Activity
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the Activity
field. |
additional_info
|
event.idm.read_only_udm.security_result.description
|
Directly mapped from the additional_info
field. |
administrator
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the administrator
field. Key is "administrator". |
aggregated_log_count
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the aggregated_log_count
field. Key is "aggregated_log_count". |
appi_name
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the appi_name
field. Key is "appi_name". |
app_category
|
event.idm.read_only_udm.security_result.category_details
|
Directly mapped from the app_category
field. |
app_properties
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the app_properties
field. Key is "app_properties". |
app_risk
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the app_risk
field. Key is "app_risk". |
app_session_id
|
event.idm.read_only_udm.network.session_id
|
Directly mapped from the app_session_id
field, converted to a string. |
attack
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the attack
field when Info
is present. |
attack
|
event.idm.read_only_udm.security_result.threat_name
|
Directly mapped from the attack
field when Info
is present. |
attack_info
|
event.idm.read_only_udm.security_result.description
|
Directly mapped from the attack_info
field. |
auth_status
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the auth_status
field. |
browse_time
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the browse_time
field. Key is "browse_time". |
bytes
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the bytes
field. Key is "bytes". |
bytes
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the bytes
field. Key is "bytes". |
calc_service
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the calc_service
field. Key is "calc_service". |
category
|
event.idm.read_only_udm.security_result.category_details
|
Directly mapped from the category
field. |
client_version
|
event.idm.read_only_udm.intermediary.platform_version
|
Directly mapped from the client_version
field. |
conn_direction
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the conn_direction
field. Key is "conn_direction". |
conn_direction
|
event.idm.read_only_udm.network.direction
|
If conn_direction
is "Incoming", maps to "INBOUND". Otherwise, maps to "OUTBOUND". |
connection_count
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the connection_count
field. Key is "connection_count". |
contract_name
|
event.idm.read_only_udm.security_result.description
|
Directly mapped from the contract_name
field. |
cs2
|
event.idm.read_only_udm.security_result.rule_name
|
Directly mapped from the cs2
field. |
date_time
|
event.idm.read_only_udm.metadata.event_timestamp
|
Parsed and converted to a timestamp using various date formats. |
dedup_time
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the dedup_time
field. Key is "dedup_time". |
desc
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the desc
field. |
description
|
event.idm.read_only_udm.security_result.description
|
Directly mapped from the description
field. |
description_url
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the description_url
field. Key is "description_url". |
destinationAddress
|
event.idm.read_only_udm.target.ip
, event.idm.read_only_udm.target.asset.ip
|
Directly mapped from the destinationAddress
field. |
destinationPort
|
event.idm.read_only_udm.target.port
|
Directly mapped from the destinationPort
field, converted to an integer. |
destinationTranslatedAddress
|
event.idm.read_only_udm.target.ip
, event.idm.read_only_udm.target.asset.ip
|
Directly mapped from the destinationTranslatedAddress
field. |
destinationTranslatedAddress
|
event.idm.read_only_udm.target.nat_ip
|
Directly mapped from the destinationTranslatedAddress
field. |
destinationTranslatedPort
|
event.idm.read_only_udm.target.port
|
Directly mapped from the destinationTranslatedPort
field, converted to an integer. |
destinationTranslatedPort
|
event.idm.read_only_udm.target.nat_port
|
Directly mapped from the destinationTranslatedPort
field, converted to an integer. |
deviceCustomString2
|
event.idm.read_only_udm.security_result.rule_name
|
Directly mapped from the deviceCustomString2
field. |
deviceDirection
|
event.idm.read_only_udm.network.direction
|
If deviceDirection
is 0, maps to "OUTBOUND". If 1, maps to "INBOUND". |
domain
|
event.idm.read_only_udm.principal.administrative_domain
|
Directly mapped from the domain
field. |
domain_name
|
event.idm.read_only_udm.principal.administrative_domain
|
Directly mapped from the domain_name
field. |
drop_reason
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the drop_reason
field. |
ds
|
event.idm.read_only_udm.metadata.event_timestamp
|
Used with ts
and tz
to construct the event timestamp. |
dst
|
event.idm.read_only_udm.target.ip
, event.idm.read_only_udm.target.asset.ip
|
Directly mapped from the dst
field. |
dst_country
|
event.idm.read_only_udm.target.location.country_or_region
|
Directly mapped from the dst_country
field. |
dst_ip
|
event.idm.read_only_udm.target.ip
, event.idm.read_only_udm.target.asset.ip
|
Directly mapped from the dst_ip
field. |
dpt
|
event.idm.read_only_udm.target.port
|
Directly mapped from the dpt
field, converted to an integer. |
duration
|
event.idm.read_only_udm.network.session_duration.seconds
|
Directly mapped from the duration
field, converted to an integer, if greater than 0. |
duser
|
event.idm.read_only_udm.target.user.email_addresses
, event.idm.read_only_udm.target.user.user_display_name
|
Directly mapped from the duser
field if it matches an email address format. |
environment_id
|
event.idm.read_only_udm.target.resource.product_object_id
|
Directly mapped from the environment_id
field. |
event_type
|
event.idm.read_only_udm.metadata.event_type
|
Determined by logic based on the presence of certain fields and values. Defaults to GENERIC_EVENT
if no specific event type is identified. Can be NETWORK_CONNECTION
, USER_LOGIN
, USER_CHANGE_PASSWORD
, USER_LOGOUT
, NETWORK_HTTP
, or STATUS_UPDATE
. |
fieldschanges
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the fieldschanges
field. Key is "fieldschanges". |
flags
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the flags
field. Key is "flags". |
flexString2
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the flexString2
field. Key is the value of flexString2Label
. |
from_user
|
event.idm.read_only_udm.principal.user.userid
|
Directly mapped from the from_user
field. |
fservice
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the fservice
field. Key is "fservice". |
fw_subproduct
|
event.idm.read_only_udm.metadata.product_name
|
Directly mapped from the fw_subproduct
field when product
is empty. |
geoip_dst.country_name
|
event.idm.read_only_udm.target.location.country_or_region
|
Directly mapped from the geoip_dst.country_name
field. |
hll_key
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the hll_key
field. Key is "hll_key". |
hostname
|
event.idm.read_only_udm.target.hostname
, event.idm.read_only_udm.target.asset.hostname
, event.idm.read_only_udm.intermediary.hostname
|
Directly mapped from the hostname
field when inter_host
is empty. |
http_host
|
event.idm.read_only_udm.target.resource.attribute.labels[].value
|
Directly mapped from the http_host
field. Key is "http_host". |
id
|
event.idm.read_only_udm.metadata.product_log_id
|
Directly mapped from the _id
field. |
identity_src
|
event.idm.read_only_udm.target.application
|
Directly mapped from the identity_src
field. |
identity_type
|
event.idm.read_only_udm.extensions.auth.type
|
If identity_type
is "user", maps to "VPN". Otherwise, maps to "MACHINE". |
if_direction
|
event.idm.read_only_udm.network.direction
|
Directly mapped from the if_direction
field, converted to uppercase. |
ifdir
|
event.idm.read_only_udm.network.direction
|
Directly mapped from the ifdir
field, converted to uppercase. |
ifname
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the ifname
field. Key is "ifname". |
IKE
|
event.idm.read_only_udm.metadata.description
|
Directly mapped from the IKE
field. |
inzone
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the inzone
field. Key is "inzone". |
industry_reference
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the industry_reference
field. Key is "industry_reference". |
instance_id
|
event.idm.read_only_udm.principal.hostname
, event.idm.read_only_udm.principal.asset.hostname
|
Directly mapped from the instance_id
field. |
inter_host
|
event.idm.read_only_udm.intermediary.hostname
|
Directly mapped from the inter_host
field. |
ip_proto
|
event.idm.read_only_udm.network.ip_protocol
|
Determined based on the proto
field or service
field. Can be TCP, UDP, ICMP, IP6IN4, or GRE. |
ipv6_dst
|
event.idm.read_only_udm.target.ip
, event.idm.read_only_udm.target.asset.ip
|
Directly mapped from the ipv6_dst
field. |
ipv6_src
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
|
Directly mapped from the ipv6_src
field. |
layer_name
|
event.idm.read_only_udm.security_result.rule_set_display_name
, event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the layer_name
field. Key is "layer_name". |
layer_uuid
|
event.idm.read_only_udm.security_result.rule_set
, event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the layer_uuid
field after removing curly braces. Key is "layer_uuid". |
layer_uuid_rule_uuid
|
event.idm.read_only_udm.security_result.rule_id
|
Directly mapped from the layer_uuid_rule_uuid
field after removing brackets and quotes. |
log_id
|
event.idm.read_only_udm.metadata.product_log_id
|
Directly mapped from the log_id
field. |
log_type
|
event.idm.read_only_udm.metadata.log_type
|
Directly mapped from the log_type
field. Hardcoded to "CHECKPOINT_FIREWALL". |
loguid
|
event.idm.read_only_udm.metadata.product_log_id
|
Directly mapped from the loguid
field after removing curly braces. |
logic_changes
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the logic_changes
field. Key is "logic_changes". |
localhost
|
event.idm.read_only_udm.target.hostname
, event.idm.read_only_udm.target.asset.hostname
|
Directly mapped from the localhost
field. dst_ip
is set to "127.0.0.1". |
malware_action
|
event.idm.read_only_udm.security_result.detection_fields[].value
, event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value
|
Directly mapped from the malware_action
field. Key is "malware_action". |
malware_family
|
event.idm.read_only_udm.security_result.detection_fields[].value
, event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value
|
Directly mapped from the malware_family
field. Key is "malware_family". |
malware_rule_id
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the malware_rule_id
field after removing curly braces. Key is "Malware Rule ID". |
malware_rule_name
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the malware_rule_name
field. Key is "Malware Rule Name". |
match_id
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the match_id
field. Key is "match_id". |
matched_category
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the matched_category
field. Key is "matched_category". |
message_info
|
event.idm.read_only_udm.metadata.description
|
Directly mapped from the message_info
field. |
method
|
event.idm.read_only_udm.network.http.method
|
Directly mapped from the method
field. |
mitre_execution
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the mitre_execution
field. Key is "mitre_execution". |
mitre_initial_access
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the mitre_initial_access
field. Key is "mitre_initial_access". |
nat_rulenum
|
event.idm.read_only_udm.security_result.rule_id
|
Directly mapped from the nat_rulenum
field, converted to a string. |
objecttype
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the objecttype
field. Key is "objecttype". |
operation
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the operation
field. |
operation
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the operation
field. Key is "operation". |
orig
|
event.idm.read_only_udm.principal.hostname
, event.idm.read_only_udm.principal.asset.hostname
|
Directly mapped from the orig
field. |
origin
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
, event.idm.read_only_udm.target.ip
, event.idm.read_only_udm.target.asset.ip
, event.idm.read_only_udm.intermediary.ip
|
Directly mapped from the origin
field. |
origin_sic_name
|
event.idm.read_only_udm.intermediary.asset_id
, event.idm.read_only_udm.intermediary.labels[].value
|
Directly mapped from the origin_sic_name
field. Key is "Machine SIC". Asset ID is prefixed with "asset:". |
originsicname
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the originsicname
field. Key is "originsicname". |
originsicname
|
event.idm.read_only_udm.intermediary.asset_id
, event.idm.read_only_udm.intermediary.labels[].value
|
Directly mapped from the originsicname
field. Key is "Machine SIC". Asset ID is prefixed with "asset:". |
os_name
|
event.idm.read_only_udm.principal.asset.platform_software.platform
|
If os_name
contains "Win", maps to "WINDOWS". If it contains "MAC" or "IOS", maps to "MAC". If it contains "LINUX", maps to "LINUX". |
os_version
|
event.idm.read_only_udm.principal.asset.platform_software.platform_patch_level
|
Directly mapped from the os_version
field. |
outzone
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the outzone
field. Key is "outzone". |
packets
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the packets
field. Key is "packets". |
packet_capture_name
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the packet_capture_name
field. Key is "packet_capture_name". |
packet_capture_time
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the packet_capture_time
field. Key is "packet_capture_time". |
packet_capture_unique_id
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the packet_capture_unique_id
field. Key is "packet_capture_unique_id". |
parent_rule
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the parent_rule
field. Key is "parent_rule". |
performance_impact
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the performance_impact
field. Key is "performance_impact". |
policy_name
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Extracted from the __policy_id_tag
field using grok and mapped. Key is "Policy Name". |
policy_time
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the policy_time
field. Key is "policy_time". |
portal_message
|
event.idm.read_only_udm.security_result.description
|
Directly mapped from the portal_message
field. |
principal_hostname
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
|
Directly mapped from the principal_hostname
field if it's a valid IP address. |
principal_hostname
|
event.idm.read_only_udm.principal.hostname
, event.idm.read_only_udm.principal.asset.hostname
|
Directly mapped from the principal_hostname
field if it's not a valid IP address and not "Checkpoint". |
prod_family_label
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the ProductFamily
field. Key is "ProductFamily". |
product
|
event.idm.read_only_udm.metadata.product_name
|
Directly mapped from the product
field. |
product_family
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the product_family
field. Key is "product_family". |
product_family
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the product_family
field. Key is "product_family". |
ProductName
|
event.idm.read_only_udm.metadata.product_name
|
Directly mapped from the ProductName
field when product
is empty. |
product_name
|
event.idm.read_only_udm.metadata.product_name
|
Directly mapped from the product_name
field. |
profile
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the profile
field. Key is "profile". |
protocol
|
event.idm.read_only_udm.network.application_protocol
|
Directly mapped from the protocol
field if it's "HTTP". |
proxy_src_ip
|
event.idm.read_only_udm.principal.nat_ip
|
Directly mapped from the proxy_src_ip
field. |
reason
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the reason
field. |
received_bytes
|
event.idm.read_only_udm.network.received_bytes
|
Directly mapped from the received_bytes
field, converted to an unsigned integer. |
Reference
|
event.idm.read_only_udm.security_result.about.resource.attribute.labels[].value
, event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the Reference
field. Key is "Reference". Used to construct _vuln.name
with attack
. |
reject_id_kid
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the reject_id_kid
field. Key is "reject_id_kid". |
resource
|
event.idm.read_only_udm.target.url
|
Parsed as JSON and mapped to the target URL. If parsing fails, it's directly mapped. |
resource
|
event.idm.read_only_udm.additional.fields[].value.list_value.values[].string_value
|
Parsed as JSON and each value in the resource
array is added to the list. Key is "Resource". |
result
|
event.idm.read_only_udm.metadata.event_timestamp
|
Parsed with date_time
to create the event timestamp. |
rt
|
event.idm.read_only_udm.metadata.event_timestamp
|
Parsed as milliseconds since epoch and converted to a timestamp. |
rule
|
event.idm.read_only_udm.security_result.rule_name
|
Directly mapped from the rule
field. |
rule_action
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the rule_action
field. Key is "rule_action". |
rule_name
|
event.idm.read_only_udm.security_result.rule_name
|
Directly mapped from the rule_name
field. |
rule_uid
|
event.idm.read_only_udm.security_result.rule_id
|
Directly mapped from the rule_uid
field. |
s_port
|
event.idm.read_only_udm.principal.port
|
Directly mapped from the s_port
field, converted to an integer. |
scheme
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the scheme
field. Key is "scheme". |
security_inzone
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the security_inzone
field. Key is "security_inzone". |
security_outzone
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the security_outzone
field. Key is "security_outzone". |
security_result_action
|
event.idm.read_only_udm.security_result.action
|
Directly mapped from the security_result_action
field. |
sendtotrackerasadvancedauditlog
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the sendtotrackerasadvancedauditlog
field. Key is "sendtotrackerasadvancedauditlog". |
sent_bytes
|
event.idm.read_only_udm.network.sent_bytes
|
Directly mapped from the sent_bytes
field, converted to an unsigned integer. |
sequencenum
|
event.idm.read_only_udm.additional.fields[].value.string_value
|
Directly mapped from the sequencenum
field. Key is "sequencenum". |
ser_agent_kid
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the ser_agent_kid
field. Key is "ser_agent_kid". |
service
|
event.idm.read_only_udm.target.port
|
Directly mapped from the service
field, converted to an integer. |
service_id
|
event.idm.read_only_udm.network.application_protocol
|
Directly mapped from the service_id
field if it's "dhcp", "dns", "http", "https", or "quic", converted to uppercase. |
service_id
|
event.idm.read_only_udm.principal.application
|
Directly mapped from the service_id
field if it's not one of the network application protocols. |
service_id
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the service_id
field. Key is "service_id". |
session_description
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the session_description
field. Key is "session_description". |
session_id
|
event.idm.read_only_udm.network.session_id
|
Directly mapped from the session_id
field after removing curly braces. |
session_name
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the session_name
field. Key is "session_name". |
session_uid
|
event.idm.read_only_udm.network.session_id
|
Directly mapped from the session_uid
field after removing curly braces. |
Severity
|
event.idm.read_only_udm.security_result.severity
|
Mapped to "LOW", "MEDIUM", "HIGH", or "CRITICAL" based on the value of Severity
. |
severity
|
event.idm.read_only_udm.security_result.severity
|
Mapped to "LOW", "MEDIUM", "HIGH", or "CRITICAL" based on the value of severity
. |
site
|
event.idm.read_only_udm.network.http.user_agent
|
Directly mapped from the site
field. |
smartdefense_profile
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the smartdefense_profile
field. Key is "smartdefense_profile". |
snid
|
event.idm.read_only_udm.network.session_id
|
Directly mapped from the snid
field if it's not empty or "0". |
sourceAddress
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
|
Directly mapped from the sourceAddress
field. |
sourcePort
|
event.idm.read_only_udm.principal.port
|
Directly mapped from the sourcePort
field, converted to an integer. |
sourceTranslatedAddress
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
|
Directly mapped from the sourceTranslatedAddress
field. |
sourceTranslatedAddress
|
event.idm.read_only_udm.principal.nat_ip
|
Directly mapped from the sourceTranslatedAddress
field. |
sourceTranslatedPort
|
event.idm.read_only_udm.principal.port
|
Directly mapped from the sourceTranslatedPort
field, converted to an integer. |
sourceTranslatedPort
|
event.idm.read_only_udm.principal.nat_port
|
Directly mapped from the sourceTranslatedPort
field, converted to an integer. |
sourceUserName
|
event.idm.read_only_udm.principal.user.userid
, event.idm.read_only_udm.principal.user.first_name
, event.idm.read_only_udm.principal.user.last_name
|
Parsed using grok to extract userid, first name, and last name. |
spt
|
event.idm.read_only_udm.principal.port
|
Directly mapped from the spt
field, converted to an integer. |
src
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
|
Directly mapped from the src
field. |
src_ip
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
|
Directly mapped from the src_ip
field. |
src_localhost
|
event.idm.read_only_udm.principal.hostname
, event.idm.read_only_udm.principal.asset.hostname
|
Directly mapped from the src_localhost
field. src_ip
is set to "127.0.0.1". |
src_machine_name
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the src_machine_name
field. Key is "src_machine_name". |
src_port
|
event.idm.read_only_udm.principal.port
|
Directly mapped from the src_port
field, converted to an integer. |
src_user
|
event.idm.read_only_udm.principal.user.userid
|
Directly mapped from the src_user
field. |
src_user_dn
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the src_user_dn
field. Key is "src_user_dn". |
src_user_name
|
event.idm.read_only_udm.principal.user.userid
|
Directly mapped from the src_user_name
field. |
sub_policy_name
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the sub_policy_name
field. Key is "sub_policy_name". |
sub_policy_uid
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the sub_policy_uid
field. Key is "sub_policy_uid". |
subject
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the subject
field. Key is "subject". |
subscription_stat_desc
|
event.idm.read_only_udm.security_result.summary
|
Directly mapped from the subscription_stat_desc
field. |
tags
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the tags
field. Key is "tags". |
tar_user
|
event.idm.read_only_udm.target.user.userid
|
Directly mapped from the tar_user
field. |
target_port
|
event.idm.read_only_udm.target.port
|
Directly mapped from the target_port
field. |
tcp_flags
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the tcp_flags
field. Key is "tcp_flags". |
tcp_packet_out_of_state
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the tcp_packet_out_of_state
field. Key is "tcp_packet_out_of_state". |
time
|
event.idm.read_only_udm.metadata.event_timestamp
|
Parsed and converted to a timestamp using various date formats. |
ts
|
event.idm.read_only_udm.metadata.event_timestamp
|
Parsed with ds
and tz
to create the event timestamp. |
type
|
event.idm.read_only_udm.security_result.rule_type
|
Directly mapped from the type
field. |
tz
|
event.idm.read_only_udm.metadata.event_timestamp
|
Used with ds
and ts
to construct the event timestamp. |
update_count
|
event.idm.read_only_udm.security_result.detection_fields[].value
|
Directly mapped from the update_count
field. Key is "update_count". |
URL
|
event.idm.read_only_udm.security_result.about.url
|
Directly mapped from the URL
field. |
user
|
event.idm.read_only_udm.principal.user.userid
|
Directly mapped from the user
field. |
user_agent
|
event.idm.read_only_udm.network.http.user_agent
|
Directly mapped from the user_agent
field. Also parsed and mapped to event.idm.read_only_udm.network.http.parsed_user_agent
. |
userip
|
event.idm.read_only_udm.principal.ip
, event.idm.read_only_udm.principal.asset.ip
|
Directly mapped from the userip
field if it's a valid IP address. |
UUid
|
event.idm.read_only_udm.metadata.product_log_id
|
Directly mapped from the UUid
field after removing curly braces. |
version
|
event.idm.read_only_udm.metadata.product_version
|
Directly mapped from the version
field. |
web_client_type
|
event.idm.read_only_udm.network.http.user_agent
|
Directly mapped from the web_client_type
field. |
xlatedport
|
event.idm.read_only_udm.target.nat_port
|
Directly mapped from the xlatedport
field, converted to an integer. |
xlatedst
|
event.idm.read_only_udm.target.nat_ip
|
Directly mapped from the xlatedst
field. |
xlatesport
|
event.idm.read_only_udm.principal.nat_port
|
Directly mapped from the xlatesport
field, converted to an integer. |
xlatesrc
|
event.idm.read_only_udm.principal.nat_ip
|
Directly mapped from the xlatesrc
field. |
event.idm.read_only_udm.metadata.vendor_name
|
Check Point
|
Hardcoded value. |
event.idm.read_only_udm.metadata.log_type
|
CHECKPOINT_FIREWALL
|
Hardcoded value. |
event.idm.read_only_udm.security_result.rule_type
|
Firewall Rule
|
Default value, unless overridden by specific logic. |
has_principal
|
true
|
Set to true when principal IP or hostname is extracted. |
has_target
|
true
|
Set to true when target IP or hostname is extracted. |
Need more help? Get answers from Community members and Google SecOps professionals.