Check Point Firewall
Integration version: 10.0
Configure Check Point Firewall integration in Google Security Operations
For detailed instructions on how to configure an integration in Google SecOps, see Configure integrations .
Integration parameters
Use the following parameters to configure the integration:
Parameter Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Instance Name
|
String | N/A | No | Name of the Instance you intend to configure integration for. |
Description
|
String | N/A | No | Description of the Instance. |
Server Address
|
String | xx.xx.xx.xx:443 | Yes | The IP address of the Check Point Firewall server. |
Username
|
String | N/A | Yes | The email address of the user which should be used to connect to the Check Point Firewall. |
Domain
|
String | N/A | No | The domain of the user. E.g. if the email address of the user is user@example.com
, the domain will be example.com
|
Password
|
Password | N/A | Yes | The password of the according user. |
Policy Name
|
String | standard | Yes | Name of the policy. |
Verify SSL
|
Checkbox | Unchecked | No | Use this checkbox, if your Check Point Firewall connection requires an SSL verification. |
Run Remotely
|
Checkbox | Unchecked | No | Check the field in order to run the configured integration remotely. Once checked, the option appears to select the remote user (agent). |
Actions
Add a SAM Rule
Description
Add a SAM (suspicious activity monitoring) rule for Check Point Firewall. Please refer to the Check Point fw_sam command criteria section documentation for available IP, netmask, port, and protocol combinations.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Security Gateway to Create SAM Rule on
|
String | N/A | Yes | Specify the name of Security Gateway to create a rule for. |
Source IP
|
String | N/A | No | Specify the source IP to be added to the rule. |
Source Netmask
|
String | N/A | No | Specify the source netmask to be added to the rule. |
Destination IP
|
String | N/A | No | Specify the destination IP to be added to the rule. |
Destination Netmask
|
String | N/A | No | Specify the destination netmask to be added to the rule. |
Port
|
Integer | N/A | No | Specify the port number to be added to the rule, for example, 5005. |
Protocol
|
String | N/A | No | Specify the protocol name to be added to the rule, for example, TCP. |
Expiration
|
Seconds | N/A | No | Specify for how long in seconds the newly added SAM rule should be active, for example, 4. If nothing is specified - then the rule never expires. |
Action for the Matching Connections
|
DDL | Drop | Yes | Specify the action that should be executed for the matching connections. |
How to Track Matching Connections
|
DDL | Log | Yes | Specify how to track matching connections. |
Close Connections
|
Checkbox | Checked | No | Specify if the existing matching connections should be closed. |
Run On
The action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
JSON Result
{
"tasks"
:
[
{
"uid"
:
"8163c4f0-a269-4628-9bb3-0ba597e9694c"
,
"name"
:
"gaia80.10 - CW Test fw sam"
,
"type"
:
"CdmTaskNotification"
,
"domain"
:
{
"uid"
:
"41e821a0-3720-11e3-aa6e-0800200c9fde"
,
"name"
:
"SMC User"
,
"domain-type"
:
"domain"
},
"task-id"
:
"4ca124e5-c9ce-45cf-8275-4b119e535d3e"
,
"task-name"
:
"gaia80.10 - CW Test fw sam"
,
"status"
:
"succeeded"
,
"progress-percentage"
:
100
,
"start-time"
:
{
"posix"
:
1594959450832
,
"iso-8601"
:
"2020-07-17T07:17+0300"
},
"last-update-time"
:
{
"posix"
:
1594959453264
,
"iso-8601"
:
"2020-07-17T07:17+0300"
},
"suppressed"
:
false
,
"task-details"
:
[
{
"uid"
:
"94108666-b9d6-4165-80ab-13078c03395b"
,
"name"
:
null
,
"domain"
:
{
"uid"
:
"41e821a0-3720-11e3-aa6e-0800200c9fde"
,
"name"
:
"SMC User"
,
"domain-type"
:
"domain"
},
"color"
:
"black"
,
"statusCode"
:
"succeeded"
,
"statusDescription"
:
"sam: request for 'Inhibit Drop Close src ip 8.9.10.11 on All' acknowledged, sam: gaia80.10 (0/1) successfully completed 'Inhibit Drop Close src ip 8.9.10.11 on All' processing, ..."
,
"taskNotification"
:
"8163c4f0-a269-4628-9bb3-0ba597e9694c"
,
"gatewayId"
:
"8f36a0de-e0d5-6347-ae51-6fb22d573f04"
,
"gatewayName"
:
""
,
"transactionId"
:
552194328
,
"responseMessage"
:
""
,
"responseError"
:
"c2FtOiByZXF1ZXN0IGZvciAnSW5oaWJpdCBEcm9wIENsb3NlIHNyYyBpcCA4LjkuMTAuMTEgb24gQWxsJyBhY2tub3dsZWRnZWQKc2FtOiBnYWlhODAuMTAgKDAvMSkgc3VjY2Vzc2Z1bGx5IGNvbXBsZXRlZCAnSW5oaWJpdCBEcm9wIENsb3NlIHNyYyBpcCA4LjkuMTAuMTEgb24gQWxsJyBwcm9jZXNzaW5nCnNhbTogcmVxdWVzdCBmb3IgJ0luaGliaXQgRHJvcCBDbG9zZSBzcmMgaXAgOC45LjEwLjExIG9uIEFsbCcgZG9uZQo="
,
"meta-info"
:
{
"validation-state"
:
"ok"
,
"last-modify-time"
:
{
"posix"
:
1594959453332
,
"iso-8601"
:
"2020-07-17T07:17+0300"
},
"last-modifier"
:
"admin"
,
"creation-time"
:
{
"posix"
:
1594959451003
,
"iso-8601"
:
"2020-07-17T07:17+0300"
},
"creator"
:
"admin"
},
"tags"
:
[],
"icon"
:
"General/globalsNa"
,
"comments"
:
""
,
"display-name"
:
""
,
"customFields"
:
null
}
],
"comments"
:
"Completed"
,
"color"
:
"black"
,
"icon"
:
"General/globalsNa"
,
"tags"
:
[],
"meta-info"
:
{
"lock"
:
"unlocked"
,
"validation-state"
:
"ok"
,
"last-modify-time"
:
{
"posix"
:
1594959453299
,
"iso-8601"
:
"2020-07-17T07:17+0300"
},
"last-modifier"
:
"admin"
,
"creation-time"
:
{
"posix"
:
1594959450933
,
"iso-8601"
:
"2020-07-17T07:17+0300"
},
"creator"
:
"admin"
},
"read-only"
:
false
}
]
}
Case Wall
The action should not fail nor stop a playbook execution:
- if successful: print "Successfully added SAM rule with the following command: {0}".format(script_text_from_run-script). If show-task return base64 encoded status message in responseError (or responseMessage) param - add it fo the response too: "fw sam command output: {0}".format(responseError.text)
- If show-task returns "partially succeeded" status: "SAM rule addition with the following fw sam command partially succeededsucceded: {0}".format(script_text_from_run-script). If show-task return base64 encoded status message in responseError (or responseMessage) param - add it fo the response too: "fw sam command output: {0}".format(responseError.text)
- If fail to add SAM rule, show-task returns failed: print "Failed to add SAM rule with the following command: {0}".format(script_text_from_run-script). If show-task return base64 encoded status message in responseError (or responseMessage) param - add it fo the response too: "fw sam command output: {0}".format(responseError.text)
- If Google SecOps action hit timeout waiting for show-task response or waiting for status to change from "in progress": print "Timeout waiting for addition of the following SAM rule: {0}".format(script_text_from_run-script).
The action should fail and stop a playbook execution:
- If fatal error, like wrong credentials, no connection to server, other: print "Failed to execute Add SAM Rule action! Error is {0}".format(exception.stacktrace)
Remove SAM Rule
Description
Remove a SAM (suspicious activity monitoring) rule from Check Point Firewall.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Security Gateway
|
String | N/A | Yes | Specify the name of Security Gateway from where to remove SAM Rule. |
Source IP
|
String | N/A | No | Specify the source IP to be added to the rule. |
Source Netmask
|
String | N/A | No | Specify the source netmask to be added to the rule. |
Destination IP
|
String | N/A | No | Specify the destination IP to be added to the rule. |
Destination Netmask
|
String | N/A | No | Specify the destination netmask to be added to the rule. |
Port
|
Integer | N/A | No | Specify the port number to be added to the rule, for example, 5005. |
Protocol
|
String | N/A | No | Specify the protocol name to be added to the rule, for example, TCP. |
Action for the Matching Connections
|
DDL | Drop Possible Values: Drop Reject Notify |
Yes | Specify the action that should be executed for the matching connections. |
How to Track Matching Connections
|
DDL | Log Possible Values: No Log Log Alert |
Yes | Specify how to track matching connections. |
Close Connections
|
Checkbox | Checked | No | Specify if the existing matching connections should be closed. |
Run On
The action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
JSON Result
{
"tasks"
:
[
{
"uid"
:
"6966d094-c7d9-4e46-a824-d4948be71b3e"
,
"name"
:
"gaia80.10 - Siemplify-generated-script"
,
"type"
:
"CdmTaskNotification"
,
"domain"
:
{
"uid"
:
"41e821a0-3720-11e3-aa6e-0800200c9fde"
,
"name"
:
"SMC User"
,
"domain-type"
:
"domain"
},
"task-id"
:
"77318892-48aa-4a38-ad94-b9322695c2c8"
,
"task-name"
:
"gaia80.10 - Siemplify-generated-script"
,
"status"
:
"succeeded"
,
"progress-percentage"
:
100
,
"start-time"
:
{
"posix"
:
1608120786139
,
"iso-8601"
:
"2020-12-16T14:13+0200"
},
"last-update-time"
:
{
"posix"
:
1608120788465
,
"iso-8601"
:
"2020-12-16T14:13+0200"
},
"suppressed"
:
false
,
"task-details"
:
[
{
"uid"
:
"c40132ac-547f-4fbf-b4bb-5c7efb7ed76b"
,
"name"
:
null
,
"domain"
:
{
"uid"
:
"41e821a0-3720-11e3-aa6e-0800200c9fde"
,
"name"
:
"SMC User"
,
"domain-type"
:
"domain"
},
"color"
:
"black"
,
"statusCode"
:
"succeeded"
,
"statusDescription"
:
""
,
"taskNotification"
:
"6966d094-c7d9-4e46-a824-d4948be71b3e"
,
"gatewayId"
:
"8f36a0de-e0d5-6347-ae51-6fb22d573f04"
,
"gatewayName"
:
""
,
"transactionId"
:
194990168
,
"responseMessage"
:
""
,
"responseError"
:
""
,
"meta-info"
:
{
"validation-state"
:
"ok"
,
"last-modify-time"
:
{
"posix"
:
1608120788509
,
"iso-8601"
:
"2020-12-16T14:13+0200"
},
"last-modifier"
:
"admin"
,
"creation-time"
:
{
"posix"
:
1608120786199
,
"iso-8601"
:
"2020-12-16T14:13+0200"
},
"creator"
:
"admin"
},
"tags"
:
[],
"icon"
:
"General/globalsNa"
,
"comments"
:
""
,
"display-name"
:
""
,
"customFields"
:
null
}
],
"comments"
:
"Completed"
,
"color"
:
"black"
,
"icon"
:
"General/globalsNa"
,
"tags"
:
[],
"meta-info"
:
{
"lock"
:
"unlocked"
,
"validation-state"
:
"ok"
,
"last-modify-time"
:
{
"posix"
:
1608120788491
,
"iso-8601"
:
"2020-12-16T14:13+0200"
},
"last-modifier"
:
"admin"
,
"creation-time"
:
{
"posix"
:
1608120786184
,
"iso-8601"
:
"2020-12-16T14:13+0200"
},
"creator"
:
"admin"
},
"read-only"
:
false
}
]
}
Case Wall
Result Type | Value / Description | Type |
---|---|---|
Output message*
|
The action should not fail nor stop a playbook execution: If status="succeeded" (is_success = true):"Successfully removed SAM rule from the Check Point Firewall using the command: {0}".format(command)
If status code != 200,401 in the first response(is_success=false):"Action wasn't able to remove the SAM rule using the command "{0}" in Check Point FireWall. Reason: {1}".format(command,message)
If in the second response statusCode == failed and base64 responseError is not available (is_success=false):"Action wasn't able to remove the SAM rule using the command "{0}" in Check Point FireWall."
If in the second response statusCode == failed and base64 responseError is available (is_success=false):"Action wasn't able to remove the SAM rule using the command "{0}" in Check Point FireWall. Reason: {1}".format(command, base64 decoded responseError)
If timeout(is_success=false):"Action reached timeout, while waiting to remove SAM Rule. Command used: {0}".format(command)
Async message:Waiting for a task to remove the SAM rule to finish. The action should fail and stop a playbook execution: if fatal error, SDK error, like wrong credentials, no connection to server, other:"Error executing action "Update Alert Status". Reason: {0}''.format(error.Stacktrace) |
General |
Add IP to Group
Description
Updates the Google SecOps Blacklist group with new IP addresses.
Parameters
Parameters | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Blacklist Group Name
|
String | N/A | Yes | Name of the group. |
Run On
This action runs on the IP Address entity.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_blocked
|
True/False | is_blocked:False |
Add URL to Group
Description
Updates the group with the URL.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
URLs Group Name
|
String | N/A | Yes | Name of the group. |
Run On
This action runs on the URL entity.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_blocked
|
True/False | is_blocked:False |
List Layers on Site
Description
Retrieve all existing layers.
Parameters
N/A
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
List Policies on Site
Description
Retrieve all existing policies.
Parameters
N/A
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
Ping
Description
Test Connectivity.
Parameters
N/A
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
Remove IP From Group
Description
Updates the Google SecOps Blacklist group to NOT include the IP addresses.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Blacklist Group Name
|
String | N/A | Yes | Name of the group to remove the address range object from. |
Run On
This action runs on the IP Address entity.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_unblocked
|
True/False | is_unblocked:False |
Remove URL From Group
Description
Updates the group to NOT include the URL.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
URLs Group Name
|
String | N/A | Yes | Name of the group to remove the URL object from. |
Run On
This action runs on the URL entity.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_unblocked
|
True/False | is_unblocked:False |
Run Script
Description
Run the arbitrary script with Check Point run-script API call.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Script text
|
String | N/A | Yes | Script to execute. For example, fw sam command: fw sam -t 600 -I src 8.9.10.12 |
Target
|
String | N/A | Yes | Specify Check Point device to execute the script on, for example, gaia80.10 The parameter accepts multiple values as a comma-separated list. |
Run On
This action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
JSON Result
{
"tasks"
:
[{
"task-id"
:
"867fef24-647e-40ea-91ef-9b5f8ae83d07"
,
"status"
:
"succeeded"
,
"domain"
:
{
"domain-type"
:
"domain"
,
"uid"
:
"41e821a0-3720-11e3-aa6e-0800200c9fde"
,
"name"
:
"SMC User"
},
"start-time"
:
{
"posix"
:
1597737649683
,
"iso-8601"
:
"2020-08-18T11:00+0300"
},
"uid"
:
"bb5c4640-9774-45cd-8631-8e80518f4e18"
,
"tags"
:
[],
"last-update-time"
:
{
"posix"
:
1597737651783
,
"iso-8601"
:
"2020-08-18T11:00+0300"
},
"suppressed"
:
false
,
"progress-percentage"
:
100
,
"comments"
:
"Completed"
,
"task-name"
:
"gaia80.10 - Siemplify-generated-script"
,
"color"
:
"black"
,
"meta-info"
:
{
"creation-time"
:
{
"posix"
:
1597737649720
,
"iso-8601"
:
"2020-08-18T11:00+0300"
},
"validation-state"
:
"ok"
,
"creator"
:
"admin"
,
"lock"
:
"unlocked"
,
"last-modifier"
:
"admin"
,
"last-modify-time"
:
{
"posix"
:
1597737651810
,
"iso-8601"
:
"2020-08-18T11:00+0300"
}},
"task-details"
:
[{
"display-name"
:
""
,
"domain"
:
{
"domain-type"
:
"domain"
,
"uid"
:
"41e821a0-3720-11e3-aa6e-0800200c9fde"
,
"name"
:
"SMC User"
},
"gatewayName"
:
""
,
"uid"
:
"b4a71da3-60fc-4785-a379-3bb9f7a0ff2f"
,
"icon"
:
"General/globalsNa"
,
"tags"
:
[],
"color"
:
"black"
,
"comments"
:
""
,
"name"
:
null
,
"responseError"
:
""
,
"taskNotification"
:
"bb5c4640-9774-45cd-8631-8e80518f4e18"
,
"responseMessage"
:
""
,
"gatewayId"
:
"8f36a0de-e0d5-6347-ae51-6fb22d573f04"
,
"transactionId"
:
931053033
,
"meta-info"
:
{
"creation-time"
:
{
"posix"
:
1597737649735
,
"iso-8601"
:
"2020-08-18T11:00+0300"
},
"last-modify-time"
:
{
"posix"
:
1597737651840
,
"iso-8601"
:
"2020-08-18T11:00+0300"
},
"creator"
:
"admin"
,
"validation-state"
:
"ok"
,
"last-modifier"
:
"admin"
},
"customFields"
:
null
,
"statusDescription"
:
""
,
"statusCode"
:
"succeeded"
}],
"icon"
:
"General/globalsNa"
,
"type"
:
"CdmTaskNotification"
,
"read-only"
:
false
,
"name"
:
"gaia80.10 - Siemplify-generated-script"
}]
}
Case Wall
The action should not fail nor stop a playbook execution:
- If successful run: print "Script executed successfully."
If show-task return base64 encoded status message in responseError (or responseMessage) param - add it fo the response too: "Script output: {0}".format(responseError.text) - If script returns other status rather than succeeded: print "Failed to execute provided script"
If show-task return base64 encoded status message in responseError (or responseMessage) param - add it fo the response too: "Script output: {0}".format(responseError.text)"
The action should fail and stop a playbook execution:
- If fatal error, like wrong credentials, no connection to server, other : print "Failed to execute action! Error is {0}".format(exception.stacktrace)
Show Logs
Description
Retrieve logs from Check Point FireWall based on the filter.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Query Filter
|
String | N/A | No | Specify the query filter that will be used to return logs. |
Time Frame
|
DDL | Last Hour Possible Values: Today Yesterday Last Hour Last 24 Hours Last 30 Days This Week This Month All Time |
Yes | Specify what time frame should be used for log retrieval. |
Log Type
|
DDL | Log Possible Values: Log Audit |
Yes | Specify what type of logs should be returned. |
Max Logs To Return
|
Integer | 50 | No | Specify how many logs to return. Maximum is 100. This is Check Point FireWall limitation. |
Run On
This action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
JSON Result
{
"logs"
:
[
{
"subject"
:
"Object Manipulation"
,
"confidence_level"
:
"N/A"
,
"description"
:
"Engine mode: changed from 'by_policy' to 'detect_only' "
,
"type"
:
"System Alert"
,
"orig_log_server_attr"
:
[
{
"isCHKPObject"
:
"true"
,
"uuid"
:
"8f36a0de-e0d5-6347-ae51-6fb22d573f04"
,
"resolved"
:
"gaia80.10"
}
],
"cb_log_type"
:
"Security Alert"
,
"user_field"
:
"admin"
,
"administrator"
:
"admin"
,
"index_time"
:
"2020-10-14T21:35:45Z"
,
"d_name"
:
"Check that each Gateway's Anti-Bot configuration is activated according to the policy"
,
"violation_date"
:
"3/6/2020 15:03"
,
"id"
:
"ac1eca60-81b3-d219-5f87-6f2f000105e8"
,
"rounded_received_bytes"
:
"0"
,
"cb_title"
:
"Best Practice AB104 status decreased. New Status: Medium"
,
"cb_old_status"
:
"Secure"
,
"lastUpdateSeqNum"
:
"1513"
,
"severity"
:
"Critical"
,
"product_family"
:
"Network"
,
"product"
:
"Compliance Blade"
,
"sequencenum"
:
"1513"
,
"rounded_sent_bytes"
:
"0"
,
"cb_scan_id"
:
"Thu Oct 15 00:35:39 2020"
,
"orig_log_server"
:
"172.30.202.96"
,
"cb_changed_objects"
:
"ABSettings_8F36A0DE-E0D5-6347-AE51-6FB22D573F04"
,
"additional_info"
:
"Security Alert: Best Practice status was reduced"
,
"cb_status"
:
"Medium"
,
"orig"
:
"gaia80.10"
,
"marker"
:
"@A@@B@1602709200@C@1513"
,
"rounded_bytes"
:
"0"
,
"orig_log_server_ip"
:
"172.30.202.96"
,
"stored"
:
"true"
,
"calc_desc"
:
"Best Practice AB104 status decreased. New Status: Medium"
,
"logid"
:
"134283267"
,
"time"
:
"2020-10-14T21:35:43Z"
,
"cb_recommendation"
:
"Each Gateway should be configured to work according to the profiles defined in the Anti-Bot policy. The Activation Mode should be set to 'According to Policy' and not 'Detect Only'."
,
"best_practice_id"
:
"AB104"
,
"lastUpdateTime"
:
"1602711343000"
}
],
"logs-count"
:
1
,
"query-id"
:
"admin_6e9fce3a-4cd7-48b9-a3e7-14b701fb204c"
}
Case Wall
Result Type | Value / Description | Type |
---|---|---|
Output message*
|
The action should not fail nor stop a playbook execution: If status code 200 (is_success = true): Print "Successfully retrieved logs from Check Point FireWall!"
Print "Action wasn't able to retrieve logs from Check Point FireWall! Reason: {0}. Code: {1}".format(message, code)
The action should fail and stop a playbook execution: If fatal error, like wrong credentials, no connection to server, other : Print "Error executing action "Show Logs". Reason: {0}''.format(error.Stacktrace) |
General |
Case Wall Table Log type = Log |
Case Wall Name:Results Case Wall Columns: ID (mapped as id) Title (mapped as cb_title) Severity (mapped as severity) Subject (mapped as subject) Index Time (mapped as index_time) |
General |
Case Wall Table Log type = Audit |
Case Wall Name:Results Case Wall Columns: ID (mapped as id) Title (mapped as calc_desc) Severity (mapped as severity) Subject (mapped as subject) Time (mapped as time) |
General |
Download Log Attachment
Description
Download log attachments from Check Point FireWall.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Log IDs
|
String | N/A | Yes | Specify the comma-separated list of log IDs from which you want to download attachments. |
Download Folder Path
|
String | N/A | Yes | Specify the absolute path for the folder where the action should store the attachments. |
Create Case Wall Attachment
|
Checkbox | N/A | No | If enabled, action will create a case wall attachment for each successfully downloaded file. Note: that attachment will only be created if it"s size is less than 3 MB. |
Run On
This action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
JSON Result
{
"tasks"
:
[
{
"task-id"
:
"01234567-89ab-cdef-8273-cee81a82701c"
,
"task-name"
:
"Packet Capture operation"
,
"status"
:
"succeeded"
,
"progress-percentage"
:
100
,
"suppressed"
:
false
,
"task-details"
:
[
{
"attachments"
:
[
{
"base64-data"
:
"..."
,
"file-name"
:
"Anti-Virus-blob-time1602759307.id5a5b7500.blade05.cap"
}
]
}
]
"absolute_path"
:
"{folder_path}"
}
]
}
Case Wall
Result Type | Value / Description | Type |
---|---|---|
Output message*
|
The action should not fail nor stop a playbook execution: If "status" == "succeeded" for at least one log (is_success = true): Print "Successfully retrieved attachments in Check Point FireWall from the following logs:{0}".format(log ids)
Print "Action wasn't able to retrieve attachments in Check Point FireWall from the following logs:{0}".format(log ids)
If "status" != "succeeded" for all logs (is_success = true): Print "No attachments were downloaded"
The action should fail and stop a playbook execution: if fatal error, like wrong credentials, no connection to server, other: Print "Error executing action "Download Log Attachment". Reason: {0}''.format(error.Stacktrace) |
General |
Case Wall Attachment
|
If it"s not reaching the size limit. For each successful attachment download. "{0}".format(task-details/attachment/file-name) |
General |
Need more help? Get answers from Community members and Google SecOps professionals.