<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log DNS query in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206478#M39007</link>
    <description>&lt;P&gt;Have you requested a RFE for this?&lt;/P&gt;</description>
    <pubDate>Tue, 20 Feb 2024 08:38:04 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2024-02-20T08:38:04Z</dc:date>
    <item>
      <title>Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/143867#M22380</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually we have several gateway clusters in our environment. By default we are logging DNS traffic (UDP 53) but we can see that actually only the connection itself is being logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does somebody know how to log the query in the DNS packet? I would like to see the queried domain in the log. I can see that there is a field named "DNS query" and "DNS Query Type" but both are empty so I think it should be an option to enable the gateway to fill that fields.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 09:17:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/143867#M22380</guid>
      <dc:creator>jgarcias</dc:creator>
      <dc:date>2022-03-16T09:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/143973#M22384</link>
      <description>&lt;P&gt;What is the precise rule that is accepting the traffic?&lt;BR /&gt;I suspect it needs to done with an App Control rule (something that logs Detailed or Extended).&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 19:15:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/143973#M22384</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-16T19:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/144020#M22388</link>
      <description>&lt;P&gt;Our goal is having the queried domain name in the DNS logs, so as we can export it to a SIEM (via logexporter) and have the DNS request information, not only the connection.&lt;/P&gt;&lt;P&gt;We have some internal applications that tries to access different services (rare or custom protocols) and URLF/APP CONTROL does not show that information, but if we could log that in the DNS, at least we could see the domain name requested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 09:24:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/144020#M22388</guid>
      <dc:creator>jgarcias</dc:creator>
      <dc:date>2022-03-17T09:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/144156#M22415</link>
      <description>&lt;P&gt;any tip on how to achieve that,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 12:44:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/144156#M22415</guid>
      <dc:creator>jgarcias</dc:creator>
      <dc:date>2022-03-18T12:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/144178#M22423</link>
      <description>&lt;P&gt;I thought there was an App Control signature that did this, but it doesn't appear there is one.&lt;BR /&gt;This is probably an RFE, but it might be worth a TAC case to confirm.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 16:19:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/144178#M22423</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-18T16:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/154117#M26049</link>
      <description>&lt;P&gt;I'm looking to implement something similar - did you get anywhere with this?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 15:52:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/154117#M26049</guid>
      <dc:creator>liwo</dc:creator>
      <dc:date>2022-07-28T15:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206475#M39004</link>
      <description>&lt;P&gt;@CheckPoint&lt;/P&gt;&lt;P&gt;Come on,&lt;/P&gt;&lt;P&gt;years go by and such a simple issue is not resolved yet? Top next gen firewall can't cope with so trivial task as DNS queries logging? Are You serious?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 08:23:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206475#M39004</guid>
      <dc:creator>CheckMate-R77</dc:creator>
      <dc:date>2024-02-20T08:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206477#M39006</link>
      <description>&lt;P&gt;Let me ask what kind of SIEM do You have? Don't You have network sensor listening on the wire (TAP, port mirroring or promiscous)? Is Your issue resolved by now?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 08:30:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206477#M39006</guid>
      <dc:creator>CheckMate-R77</dc:creator>
      <dc:date>2024-02-20T08:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206478#M39007</link>
      <description>&lt;P&gt;Have you requested a RFE for this?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 08:38:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206478#M39007</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-02-20T08:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206515#M39009</link>
      <description>&lt;P&gt;what issue? can you please be more specific?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 12:19:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206515#M39009</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-02-20T12:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206791#M39058</link>
      <description>&lt;P&gt;Yes, I have - right after Your question.&lt;/P&gt;&lt;P&gt;Thanks for hint.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 07:27:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206791#M39058</guid>
      <dc:creator>CheckMate-R77</dc:creator>
      <dc:date>2024-02-22T07:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206793#M39060</link>
      <description>&lt;P&gt;It's all about DNS transactions logging - mainly queries. It's simple UDP 53 plain text. Is there any way to show them in logs? Any sk number or something else?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 07:38:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206793#M39060</guid>
      <dc:creator>CheckMate-R77</dc:creator>
      <dc:date>2024-02-22T07:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206796#M39061</link>
      <description>&lt;P&gt;Maybe this:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk116694" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk116694&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Version is EOL but worth a shot.&lt;/P&gt;
&lt;P&gt;Although DNS is getting more and more encrypted (the request). Then firewall cannot see it anymore.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 08:16:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206796#M39061</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-02-22T08:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206798#M39063</link>
      <description>&lt;P&gt;Got it. Please open a TAC request for this.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 08:32:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/206798#M39063</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-02-22T08:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/274225#M104463</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I have version R82. How can I make the "dns_query" field appear in the domain-udp query logs?&lt;BR /&gt;I tried the solutions from sk116694 and sk183647 without success, but it works in R81.20.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 10:45:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/274225#M104463</guid>
      <dc:creator>PA</dc:creator>
      <dc:date>2026-03-26T10:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: Log DNS query</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/274285#M104485</link>
      <description>&lt;P&gt;i checked around, i dont see any related open bugs. It is not on the known limitations for r82. sk183647 states also R82, so I expect it to be supported. I would open TAC case. Or you can open a topic for your issue and hope someone on the community has more info.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 21:54:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-DNS-query/m-p/274285#M104485</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-03-26T21:54:15Z</dc:date>
    </item>
  </channel>
</rss>

