Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

Introduction

The tables cef0.checkpoint.* identify events in CEF format generated by Check Point.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.<deviceVendor>.<deviceProduct>

In this case, the valid data tables are:

Tags

Devo tables

cef0.checkPoint.anti-malware

cef0.checkPoint.antiMalware

cef0.checkPoint.anti-virus

cef0.checkPoint.antiVirus

cef0.checkPoint.applicationControl

cef0.checkPoint.applicationControl

cef0.checkPoint.applicationControlAndUrlFiltering

cef0.checkPoint.applicationControlAndUrlFiltering

cef0.checkPoint.cli

cef0.checkPoint.cli

cef0.checkPoint.clustermgmt

cef0.checkPoint.clustermgmt

cef0.checkPoint.compliance

cef0.checkPoint.compliance

cef0.checkPoint.complianceBlade

cef0.checkPoint.complianceBlade

cef0.checkPoint.connectra

cef0.checkPoint.connectra

cef0.checkPoint.contentAwareness

cef0.checkPoint.contentAwareness

cef0.checkPoint.contract_client

cef0.checkPoint.contract_client

cef0.checkPoint.cpmiClient

cef0.checkPoint.cpmiClient

cef0.checkPoint.endpointManagement

cef0.checkPoint.endpointManagement

cef0.checkPoint.endpointSecurityConsole

cef0.checkPoint.endpointSecurityConsole

cef0.checkPoint.esod

cef0.checkPoint.esod

cef0.checkPoint.eventiaAnalyzerClient

cef0.checkPoint.eventiaAnalyzerClient

cef0.checkPoint.fde

cef0.checkPoint.fde

cef0.checkPoint.fg

cef0.checkPoint.fg

cef0.checkPoint.firewall

cef0.checkPoint.firewall

cef0.checkPoint.firewall1

cef0.checkPoint.firewall1

cef0.checkPoint.fwm

cef0.checkPoint.fwm

cef0.checkPoint.gcli

cef0.checkPoint.gcli

cef0.checkPoint.httpsInspection

cef0.checkPoint.httpsInspection

cef0.checkPoint.identityAwareness

cef0.checkPoint.identityAwareness

cef0.checkPoint.identityLogging

cef0.checkPoint.identityLogging

cef0.checkPoint.ips

cef0.checkPoint.ips

cef0.checkPoint.licenseMgmt

cef0.checkPoint.licenseMgmt

cef0.checkPoint.lineEditor

cef0.checkPoint.lineEditor

cef0.checkPoint.logSystem

cef0.checkPoint.logSystem

cef0.checkPoint.log-update

cef0.checkPoint.logUpdate

cef0.checkPoint.logsIndexer

cef0.checkPoint.logsIndexer

cef0.checkPoint.managementBlade

cef0.checkPoint.managementBlade

cef0.checkPoint.mepp

cef0.checkPoint.mepp

cef0.checkPoint.new-anti-virus

cef0.checkPoint.newAntiVirus

cef0.checkPoint.noProduct

cef0.checkPoint.noProduct

cef0.checkPoint.none

cef0.checkPoint.none

cef0.checkPoint.policyServer

cef0.checkPoint.policyServer

cef0.checkPoint.queryDatabase

cef0.checkPoint.queryDatabase

cef0.checkPoint.rad

cef0.checkPoint.rad

cef0.checkPoint.scheduledSystemUpdate

cef0.checkPoint.scheduledSystemUpdate

cef0.checkPoint.securityGatewayManagement

cef0.checkPoint.securityGatewayManagement

cef0.checkPoint.securityManagementServer

cef0.checkPoint.securityManagementServer

cef0.checkPoint.smartconsole

cef0.checkPoint.smartconsole

cef0.checkPoint.smartdashboard

cef0.checkPoint.smartdashboard

cef0.checkPoint.smartdefense

cef0.checkPoint.smartdefense

cef0.checkPoint.smartdefenseAndVpn1Firewall1

cef0.checkPoint.smartdefenseAndVpn1Firewall1

cef0.checkPoint.smartdomainManager

cef0.checkPoint.smartdomainManager

cef0.checkPoint.smarteventClient

cef0.checkPoint.smarteventClient

cef0.checkPoint.smartupdate

cef0.checkPoint.smartupdate

cef0.checkPoint.smartview

cef0.checkPoint.smartview

cef0.checkPoint.smartviewMonitor

cef0.checkPoint.smartviewMonitor

cef0.checkPoint.smartviewTracker

cef0.checkPoint.smartviewTracker

cef0.checkPoint.stormagent

cef0.checkPoint.stormagent

cef0.checkPoint.system

cef0.checkPoint.system

cef0.checkPoint.system-monitor

cef0.checkPoint.systemMonitor

cef0.checkPoint.threatEmulation

cef0.checkPoint.threatEmulation

cef0.checkPoint.threatExtraction

cef0.checkPoint.threatExtraction

cef0.checkPoint.unknown

cef0.checkPoint.unknown

cef0.checkPoint.url-filtering

cef0.checkPoint.urlFiltering

cef0.checkPoint.vpn1

cef0.checkPoint.vpn1

cef0.checkPoint.vpn1EmbeddedConnector

cef0.checkPoint.vpn1EmbeddedConnector

cef0.checkPoint.vpn1-firewall-1

cef0.checkPoint.vpn1Firewall1

cef0.checkPoint.vpn-1-firewall-1-and-content-awareness

cef0.checkPoint.vpn1Firewall1AndContentAwareness

cef0.checkPoint.vpn1Firewall1Smartdefense

cef0.checkPoint.vpn1Firewall1Smartdefense

cef0.checkPoint.webUi

cef0.checkPoint.webUi

cef0.checkPoint.web_api

cef0.checkPoint.web_api

cef0.checkPoint.zeroPhishing

cef0.checkPoint.zeroPhishing

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in these tables:

  • No labels