cef0.checkpoint
Introduction
The tables cef0.checkpoint.* identify events in CEF format generated by Check Point.
Tag structure
Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.
In this case, the valid data tables are:
Tag | Devo table |
---|---|
cef0.checkPoint.antiMalware | cef0.checkPoint.antiMalware |
cef0.checkPoint.applicationControlAndUrlFiltering | cef0.checkPoint.applicationControlAndUrlFiltering |
cef0.checkPoint.cli | cef0.checkPoint.cli |
cef0.checkPoint.clustermgmt | cef0.checkPoint.clustermgmt |
cef0.checkPoint.compliance | cef0.checkPoint.compliance |
cef0.checkPoint.complianceBlade | cef0.checkPoint.complianceBlade |
cef0.checkPoint.connectra | cef0.checkPoint.connectra |
cef0.checkPoint.contentAwareness | cef0.checkPoint.contentAwareness |
cef0.checkPoint.contract_client | cef0.checkPoint.contract_client |
cef0.checkPoint.cpmiClient | cef0.checkPoint.cpmiClient |
cef0.checkPoint.endpointManagement | cef0.checkPoint.endpointManagement |
cef0.checkPoint.endpointSecurityConsole | cef0.checkPoint.endpointSecurityConsole |
cef0.checkPoint.esod | cef0.checkPoint.esod |
cef0.checkPoint.eventiaAnalyzerClient | cef0.checkPoint.eventiaAnalyzerClient |
cef0.checkPoint.fde | cef0.checkPoint.fde |
cef0.checkPoint.fg | cef0.checkPoint.fg |
cef0.checkPoint.firewall | cef0.checkPoint.firewall |
cef0.checkPoint.firewall1 | cef0.checkPoint.firewall1 |
cef0.checkPoint.fwm | cef0.checkPoint.fwm |
cef0.checkPoint.gcli | cef0.checkPoint.gcli |
cef0.checkPoint.identityAwareness | cef0.checkPoint.identityAwareness |
cef0.checkPoint.identityLogging | cef0.checkPoint.identityLogging |
cef0.checkPoint.ips | cef0.checkPoint.ips |
cef0.checkPoint.licenseMgmt | cef0.checkPoint.licenseMgmt |
cef0.checkPoint.lineEditor | cef0.checkPoint.lineEditor |
cef0.checkPoint.logSystem | cef0.checkPoint.logSystem |
cef0.checkPoint.logsIndexer | cef0.checkPoint.logsIndexer |
cef0.checkPoint.managementBlade | cef0.checkPoint.managementBlade |
cef0.checkPoint.mepp | cef0.checkPoint.mepp |
cef0.checkPoint.newAntiVirus | cef0.checkPoint.newAntiVirus |
cef0.checkPoint.noProduct | cef0.checkPoint.noProduct |
cef0.checkPoint.none | cef0.checkPoint.none |
cef0.checkPoint.policyServer | cef0.checkPoint.policyServer |
cef0.checkPoint.queryDatabase | cef0.checkPoint.queryDatabase |
cef0.checkPoint.rad | cef0.checkPoint.rad |
cef0.checkPoint.scheduledSystemUpdate | cef0.checkPoint.scheduledSystemUpdate |
cef0.checkPoint.securityGatewayManagement | cef0.checkPoint.securityGatewayManagement |
cef0.checkPoint.securityManagementServer | cef0.checkPoint.securityManagementServer |
cef0.checkPoint.smartconsole | cef0.checkPoint.smartconsole |
cef0.checkPoint.smartdashboard | cef0.checkPoint.smartdashboard |
cef0.checkPoint.smartdefense | cef0.checkPoint.smartdefense |
cef0.checkPoint.smartdefenseAndVpn1Firewall1 | cef0.checkPoint.smartdefenseAndVpn1Firewall1 |
cef0.checkPoint.smartdomainManager | cef0.checkPoint.smartdomainManager |
cef0.checkPoint.smarteventClient | cef0.checkPoint.smarteventClient |
cef0.checkPoint.smartupdate | cef0.checkPoint.smartupdate |
cef0.checkPoint.smartview | cef0.checkPoint.smartview |
cef0.checkPoint.smartviewMonitor | cef0.checkPoint.smartviewMonitor |
cef0.checkPoint.smartviewTracker | cef0.checkPoint.smartviewTracker |
cef0.checkPoint.stormagent | cef0.checkPoint.stormagent |
cef0.checkPoint.system | cef0.checkPoint.system |
cef0.checkPoint.systemMonitor | cef0.checkPoint.systemMonitor |
cef0.checkPoint.threatEmulation | cef0.checkPoint.threatEmulation |
cef0.checkPoint.threatExtraction | cef0.checkPoint.threatExtraction |
cef0.checkPoint.unknown | cef0.checkPoint.unknown |
cef0.checkPoint.urlFiltering | cef0.checkPoint.urlFiltering |
cef0.checkPoint.vpn1 | cef0.checkPoint.vpn1 |
cef0.checkPoint.vpn1EmbeddedConnector | cef0.checkPoint.vpn1EmbeddedConnector |
cef0.checkPoint.vpn1Firewall1AndContentAwareness | cef0.checkPoint.vpn1Firewall1AndContentAwareness |
cef0.checkPoint.vpn1Firewall1Smartdefense | cef0.checkPoint.vpn1Firewall1Smartdefense |
cef0.checkPoint.web_api | cef0.checkPoint.web_api |
cef0.checkPoint.zeroPhishing | cef0.checkPoint.zeroPhishing |
How is the data sent to Devo?
Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.
Log samples
The following are sample logs sent to some of the cef0.checkpoint tables. Find how the information will be parsed in your data table under each sample log.
Extra columns
Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.