Check Point Firewall

Version: CheckPoint version R80.10 and above

CheckPoint is a cyber security architecture which offers the perfect combination of proven security, easy deployment, and effective management by consolidating key security applications (firewall, VPN, intrusion prevention, and antivirus and more) into a single, efficiently managed solution.

Netsurion’s Open XDR platform integrates with CheckPoint, collects logs from it and creates detailed reports, alerts, dashboards, and saved searches. These attributes of Netsurion helps user to view and receive the critical and relevant information with respect to security, operations and compliance.

Reports contain a detailed summary of events such as failed user authentications, passed authentications in network devices, firewall allowed and denied traffic, anti-malware events, data loss and prevention events, VPN login and logout, and many more in column-value pair.

Alerts are triggered as soon as a critical event are received by Netsurion’s Open XDR platform for CheckPoint, such as failed authentications, invalid HTTP request from an endpoint, or detection of an DLP event, etc.

Dashboards represent activities occurring in CheckPoint. These includes, actions applied on endpoint requests, summary of DLP events, firewall traffic events by source and destination IP address, etc.

These attributes or configurations of Netsurion allows administrators to quickly take appropriate actions against any threat/adversaries trying to jeopardize an organization’s normal operation.

Once CheckPoint is configured to deliver events to Netsurion manager alerts, dashboards, and reports can be configured into Netsurion.

Alerts

Type Name Description
Security CheckPoint – Attacks detected This alert is triggered when an event associated with intrusion prevention is logged by CheckPoint.
Security CheckPoint – Configuration Changes detected This alert is triggered when a user performs configuration changes in CheckPoint.
Security CheckPoint – DLP event has been detected This alert is triggered when an event associated with data Loss and prevention is logged by CheckPoint.
Security CheckPoint – Failed login attempt detected This alert is triggered when an endpoint user/machine had a failed login attempt.

Reports

Type Name Description
Security Checkpoint – Failed login activity This report outlines the summary of endpoint user/machine failed login activity. It includes, username, source IP address, authentication type, Identity type, log datetime, etc.
Security Checkpoint – URL Filtering activities This report outlines the summary of events that are related to URL filtering that controls access to millions of web sites by category, users, groups, and machines to protect users from malicious sites. It includes, URL accessed, endpoint IP, user agent, log datetime, etc.
Security Checkpoint – Attacks Detected This report outlines the summary of events that are related to intrusion prevention. It includes, URL, protocol type, attack severity, protection name/type, attack category, etc.
Security Checkpoint – DLP activities This report outlines the summary of data loss and prevention events. It includes, action type, sender address, recipient address, email subject, scanning direction, etc.
Security Checkpoint – Anti Malware activities This report outlines the summary of events that are associated with anti-malware activities, i.e. events where viruses, spyware, keystroke loggers, trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. It includes, endpoint username, anti-virus name, event type, OS name/version, scan status, etc.
Security Checkpoint – Denied traffic activities This report outlines the summary of denied traffic in CheckPoint firewall. It includes, source IP address, destination address, action type, service Id, etc.
Operations Checkpoint – VPN login and logout This report outlines the summary of VPN/SSLVPN login and logout activities. It includes, endpoint IP address, login option, failure reason, etc.
Operations Checkpoint – Logout activity This report outlines the summary of endpoint user/machine logout activity. It includes, username, source IP address, authentication type, Identity type, log datetime, etc.
Operations Checkpoint – Login activity This report outlines the summary of endpoint user login activity. It includes, username, source IP address, authentication type, log datetime, etc.
Compliance Checkpoint – HTTPS Inspection activities This report outlines the summary of events that are related to traffic that are encrypted by HTTPS. It includes, URL, endpoint IP address, source port, action type, application category, etc.

Documentation:

The configuration details are consistent with Netsurion version 9.2 and later, CheckPoint version R80.10 and above.

Download Integration guide and How-to Guide for more information and to configuration instructions.