<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you manage Check Point DNS requests logging in Cisco Umbrella in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247022#M48209</link>
    <description>&lt;P&gt;OK, thanks for clarification!&lt;/P&gt;&lt;P&gt;one idea:&lt;/P&gt;&lt;P&gt;configure an internal network with the internal IPs of your gateways. an example is attached as screnshot. now you can set up dns policy (or clone your existing) and match the "identities affected" on the internal network just created and disable logging or set it to security events only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;additional, you might want to have a look at the policy, if you want to have everything running through another filter, especially when logging is disabled, you might run into "strange behaviour", when filtering is active &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Apr 2025 15:28:13 GMT</pubDate>
    <dc:creator>Nüüül</dc:creator>
    <dc:date>2025-04-22T15:28:13Z</dc:date>
    <item>
      <title>How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246943#M48170</link>
      <description>&lt;P&gt;We have Check Point gateways and the majority of our log in Umbrella are from our gateways. How are others managing this? It almost makes the Cisco Umbrella logs unusable because the gateway trying to check the DNS to come to a determination if the site is good which then doubles the logs in Umbrella. We also noticed the updatable objects might be causing increased Umbrella logging as well.&lt;/P&gt;&lt;P&gt;Is anyone else dealing with this or have dealt with this issue between Check Point and Cisco Umbrella?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 19:19:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246943#M48170</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-21T19:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246944#M48171</link>
      <description>&lt;P&gt;Logically, sounds like best option would be to limit whats being logged on CP side, ie maybe disable logging on certain rules that would be causing this. Its been ages since I worked on Cisco umrella, but I dont recall any options to limit something like this on their end.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 19:47:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246944#M48171</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-21T19:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246945#M48172</link>
      <description>&lt;P&gt;The abundance of logging is from the Check Point DNS queries to Umbrella which then creates a log for each DNS request in Umbrella. This is causing the logs within Umbrella to be flooded with CP gateway DNS queries. Hopefully that further clarifies the issue we are seeing. Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 19:50:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246945#M48172</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-21T19:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246946#M48173</link>
      <description>&lt;P&gt;The gateway needs to use DNS for various functions.&lt;BR /&gt;You could configure the gateway to use a different DNS resolver, but then you might have issues with things like Updatable Objects.&lt;/P&gt;
&lt;P&gt;Can't you just disable logging for queries from the gateway on the Cisco Umbrella side?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 20:05:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246946#M48173</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-21T20:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246948#M48175</link>
      <description>&lt;P&gt;We've done this partially via a service account exclusion since some logs from CP were showing up as originating from our CP service account. The next step is entering in IP exclusions, but we have a lot of IPs to enter from our CP deployments.&lt;/P&gt;&lt;P&gt;I didn't know if anyone else is doing this any differently.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 20:10:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246948#M48175</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-21T20:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246954#M48179</link>
      <description>&lt;P&gt;To me, that would seem to be the best way.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 22:02:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246954#M48179</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-21T22:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246956#M48181</link>
      <description>&lt;P&gt;For what its worth, though I have a need to say this now, AI answers should be taken with a grain of salt, but I "ran" your question through chatgpt, since AI Copilot told me this is not strictly CP related, below is what I got from chatgpt.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;**************************&lt;/P&gt;
&lt;P class="" data-start="0" data-end="323"&gt;Managing &lt;STRONG data-start="9" data-end="44"&gt;Check Point DNS request logging&lt;/STRONG&gt; in &lt;STRONG data-start="48" data-end="66"&gt;Cisco Umbrella&lt;/STRONG&gt; typically involves making sure that your DNS traffic — which may originate from Check Point appliances or networks protected by them — is properly redirected to and logged by Cisco Umbrella. Here's how you'd go about setting it up and managing the logging:&lt;/P&gt;
&lt;HR data-start="325" data-end="328" /&gt;
&lt;H3 class="" data-start="330" data-end="399"&gt;&lt;span class="lia-unicode-emoji" title=":wrench:"&gt;🔧&lt;/span&gt; 1. &lt;STRONG data-start="340" data-end="399"&gt;Redirect DNS Traffic from Check Point to Cisco Umbrella&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P class="" data-start="400" data-end="528"&gt;To log DNS requests in Cisco Umbrella, you need to ensure that DNS queries from your network are sent to Umbrella's DNS servers:&lt;/P&gt;
&lt;UL data-start="530" data-end="601"&gt;
&lt;LI class="" data-start="530" data-end="601"&gt;
&lt;P class="" data-start="532" data-end="559"&gt;&lt;STRONG data-start="532" data-end="558"&gt;Cisco Umbrella DNS IPs&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL data-start="562" data-end="601"&gt;
&lt;LI class="" data-start="562" data-end="580"&gt;
&lt;P class="" data-start="564" data-end="580"&gt;&lt;CODE data-start="564" data-end="580"&gt;208.67.222.222&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="583" data-end="601"&gt;
&lt;P class="" data-start="585" data-end="601"&gt;&lt;CODE data-start="585" data-end="601"&gt;208.67.220.220&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 class="" data-start="603" data-end="625"&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; On Check Point:&lt;/H4&gt;
&lt;P class="" data-start="626" data-end="745"&gt;You need to configure the firewall/NAT rules to &lt;STRONG data-start="674" data-end="732"&gt;intercept and redirect DNS queries (UDP/53 and TCP/53)&lt;/STRONG&gt; to Umbrella:&lt;/P&gt;
&lt;UL data-start="747" data-end="1061"&gt;
&lt;LI class="" data-start="747" data-end="995"&gt;
&lt;P class="" data-start="749" data-end="771"&gt;&lt;STRONG data-start="749" data-end="770"&gt;Create a NAT Rule&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL data-start="774" data-end="995"&gt;
&lt;LI class="" data-start="774" data-end="810"&gt;
&lt;P class="" data-start="776" data-end="810"&gt;Original Source: Internal networks&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="813" data-end="840"&gt;
&lt;P class="" data-start="815" data-end="840"&gt;Original Destination: Any&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="843" data-end="879"&gt;
&lt;P class="" data-start="845" data-end="879"&gt;Original Service: DNS (UDP/TCP 53)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="882" data-end="911"&gt;
&lt;P class="" data-start="884" data-end="911"&gt;Translated Source: Original&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="914" data-end="962"&gt;
&lt;P class="" data-start="916" data-end="962"&gt;Translated Destination: Cisco Umbrella DNS IPs&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="965" data-end="995"&gt;
&lt;P class="" data-start="967" data-end="995"&gt;Translated Service: Original&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="997" data-end="1061"&gt;
&lt;P class="" data-start="999" data-end="1061"&gt;&lt;STRONG data-start="999" data-end="1039"&gt;Create an Access Control Policy Rule&lt;/STRONG&gt; to allow the traffic.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="" data-start="1063" data-end="1167"&gt;Alternatively, use &lt;STRONG data-start="1082" data-end="1100"&gt;DNS forwarding&lt;/STRONG&gt; if you're running a local DNS server — point it to Cisco Umbrella.&lt;/P&gt;
&lt;HR data-start="1169" data-end="1172" /&gt;
&lt;H3 class="" data-start="1174" data-end="1228"&gt;&lt;span class="lia-unicode-emoji" title=":memo:"&gt;📝&lt;/span&gt; 2. &lt;STRONG data-start="1184" data-end="1228"&gt;Enable DNS Logging in Umbrella Dashboard&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P class="" data-start="1229" data-end="1272"&gt;Once DNS traffic is being sent to Umbrella:&lt;/P&gt;
&lt;UL data-start="1274" data-end="1541"&gt;
&lt;LI class="" data-start="1274" data-end="1331"&gt;
&lt;P class="" data-start="1276" data-end="1331"&gt;Go to &lt;STRONG data-start="1282" data-end="1310"&gt;Cisco Umbrella Dashboard&lt;/STRONG&gt; → &lt;EM data-start="1313" data-end="1330"&gt;Activity Search&lt;/EM&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1332" data-end="1541"&gt;
&lt;P class="" data-start="1334" data-end="1427"&gt;Make sure your policy is set to &lt;STRONG data-start="1366" data-end="1390"&gt;log all DNS requests&lt;/STRONG&gt;, including allowed and blocked ones.&lt;/P&gt;
&lt;UL data-start="1430" data-end="1541"&gt;
&lt;LI class="" data-start="1430" data-end="1490"&gt;
&lt;P class="" data-start="1432" data-end="1490"&gt;Navigate to &lt;STRONG data-start="1444" data-end="1456"&gt;Policies&lt;/STRONG&gt; → choose your policy → &lt;EM data-start="1480" data-end="1489"&gt;Logging&lt;/EM&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1493" data-end="1541"&gt;
&lt;P class="" data-start="1495" data-end="1541"&gt;Set it to: &lt;STRONG data-start="1506" data-end="1541"&gt;Log all requests (Full logging)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR data-start="1543" data-end="1546" /&gt;
&lt;H3 class="" data-start="1548" data-end="1583"&gt;&lt;span class="lia-unicode-emoji" title=":chart_increasing:"&gt;📈&lt;/span&gt; 3. &lt;STRONG data-start="1558" data-end="1583"&gt;Verify &amp;amp; Monitor Logs&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P class="" data-start="1584" data-end="1648"&gt;Use the &lt;STRONG data-start="1592" data-end="1611"&gt;Activity Search&lt;/STRONG&gt; and &lt;STRONG data-start="1616" data-end="1627"&gt;Reports&lt;/STRONG&gt; tabs in Umbrella to:&lt;/P&gt;
&lt;UL data-start="1650" data-end="1862"&gt;
&lt;LI class="" data-start="1650" data-end="1717"&gt;
&lt;P class="" data-start="1652" data-end="1717"&gt;Monitor DNS requests by source IP, identity, domain, or category.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1718" data-end="1742"&gt;
&lt;P class="" data-start="1720" data-end="1742"&gt;Export logs if needed.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1743" data-end="1862"&gt;
&lt;P class="" data-start="1745" data-end="1862"&gt;Optionally, configure &lt;STRONG data-start="1767" data-end="1781"&gt;Log Export&lt;/STRONG&gt; to a SIEM using Umbrella’s &lt;STRONG data-start="1809" data-end="1825"&gt;Log Exporter&lt;/STRONG&gt; or &lt;STRONG data-start="1829" data-end="1849"&gt;Amazon S3 bucket&lt;/STRONG&gt; integration.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR data-start="1864" data-end="1867" /&gt;
&lt;H3 class="" data-start="1869" data-end="1903"&gt;&lt;span class="lia-unicode-emoji" title=":magnifying_glass_tilted_left:"&gt;🔍&lt;/span&gt; 4. &lt;STRONG data-start="1879" data-end="1903"&gt;Troubleshooting Tips&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="1904" data-end="2191"&gt;
&lt;LI class="" data-start="1904" data-end="1990"&gt;
&lt;P class="" data-start="1906" data-end="1990"&gt;Make sure no DNS queries are bypassing Umbrella (e.g., clients using hardcoded DNS).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1991" data-end="2085"&gt;
&lt;P class="" data-start="1993" data-end="2085"&gt;Enable &lt;STRONG data-start="2000" data-end="2036"&gt;DNSCrypt or DNS-over-HTTPS (DoH)&lt;/STRONG&gt; on compatible clients for security, if required.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="2086" data-end="2191"&gt;
&lt;P class="" data-start="2088" data-end="2191"&gt;In Check Point, use &lt;STRONG data-start="2108" data-end="2120"&gt;SmartLog&lt;/STRONG&gt; or &lt;STRONG data-start="2124" data-end="2137"&gt;SmartView&lt;/STRONG&gt; to verify that DNS traffic is being NAT-ed correctly.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 22 Apr 2025 01:05:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/246956#M48181</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-22T01:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247004#M48198</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what i understand:&lt;/P&gt;&lt;P&gt;your Check Point gateways are using Umbrella DNS Resolvers for DNS&lt;/P&gt;&lt;P&gt;your internal network is using it´s own (internal) DNS Servers, which then are using Umbrella as "Upstream resolver".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In umbrella both "use cases" are logged (worst, with same configured "identity" as source IP)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Depending on your umbrella subscription, for your internal dns servers using a umbrella VA as resolver (which then resolves via cisco) might be able to differentiate the requests sources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For me I am doing something similar with a customer. using a pair of Umbrella VAs as internal resolver and letting their gateways speak directly to umbrella.&lt;/P&gt;&lt;P&gt;At least you can now set a filter on what is interesting to you.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i got you wrong, please correct me.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 12:46:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247004#M48198</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2025-04-22T12:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247010#M48202</link>
      <description>&lt;P&gt;It's certainly working, I've just got too many logs in Umbrella from CP! Thanks again&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 14:35:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247010#M48202</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-22T14:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247011#M48203</link>
      <description>&lt;P&gt;Very nice, when you say you're letting the gateways use Umbrella directly do you mean you're setting the gateway DNS servers to Umbrella public IPs? Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1663"&gt;@Nüüül&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 14:37:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247011#M48203</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-22T14:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247012#M48204</link>
      <description>&lt;P&gt;Well, thank Chatgpt &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 14:39:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247012#M48204</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-22T14:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247015#M48205</link>
      <description>&lt;P&gt;Thats what i understood, you are already doing &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So, as an example:&lt;/P&gt;&lt;P&gt;Gateways are using 208.67.220.220/208.67.222.222 (or for ipv6&amp;nbsp;2620:119:35::35 / 2620:119:53::53)&lt;BR /&gt;- their public IPs are registered as "Network"&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;internally there are 2 virtual appliances of umbrella installed - lets say 10.0.0.35 and 10.0.0.53&lt;BR /&gt;- these are registered to the umbrella account (can be found at "sites and active directory")&lt;BR /&gt;- internal servers and so on are using these appliances&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this, gateways can resolve internet destinations via umbrella and umbrella admin can exclude "Network" addresses in their log searches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another way would be to use the virtual appliances for your gateways too (depends on how many branches and so on you have). For instance, when you need internal name resolving. The VA sends the internal requesting IP with it´s logs too, so that would be another way to filter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope it is kind of clear what i meant, if not, drop me a dm and we can discuss on your needs and so on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 15:00:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247015#M48205</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2025-04-22T15:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247016#M48206</link>
      <description>&lt;P&gt;We are using the Cisco Umbrella VA's&amp;nbsp; (CUVA) for everything and are getting too many logs in Umbrella. CP is essentially doubling up everything since the CUVA is resolving and the gateways are similarly resolving for their protections, from what I understand, as well as everything else CP is needing to resolve for updatable objects and the like.&lt;/P&gt;&lt;P&gt;When setting up the gateways to use the Umbrella public, instead of the CUVA's, do you see a reduction in Umbrella logs? I think you would and I think this is what we might try to do.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know if it's recommended to use a local DNS resolver for the gateways or does it matter? We've just always used local DNS resolvers since they're setup at all of our locations via the CUVA's since we've deployed Umbrella a couple years back. Thanks again&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1663"&gt;@Nüüül&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 15:05:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247016#M48206</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-22T15:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247017#M48207</link>
      <description>&lt;P&gt;As a baseline, our Cisco Rep told us we are using 10x the log storage of any other company our size! This is similar to what we are seeing in Umbrella because the logs from the gateways are drowning out all the other user logs in the system.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 15:07:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247017#M48207</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-22T15:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247022#M48209</link>
      <description>&lt;P&gt;OK, thanks for clarification!&lt;/P&gt;&lt;P&gt;one idea:&lt;/P&gt;&lt;P&gt;configure an internal network with the internal IPs of your gateways. an example is attached as screnshot. now you can set up dns policy (or clone your existing) and match the "identities affected" on the internal network just created and disable logging or set it to security events only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;additional, you might want to have a look at the policy, if you want to have everything running through another filter, especially when logging is disabled, you might run into "strange behaviour", when filtering is active &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 15:28:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247022#M48209</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2025-04-22T15:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247023#M48210</link>
      <description>&lt;P&gt;Very nice! I like that as another option to the exclusions list you can create. Thanks for taking the time to write that out, much appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 15:29:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247023#M48210</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-22T15:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247041#M48211</link>
      <description>&lt;P&gt;It would be nice to hear why you are using CISCOs Umbrella. A lot of the features of Umbrella are also available from Check Point. What are your goals to run with Umbrella?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 20:20:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247041#M48211</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2025-04-22T20:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247052#M48213</link>
      <description>&lt;P&gt;Hybrid workforce and easy integration mainly for our use case; we use Cisco AnyConnect via Cisco Secure Client and Umbrella integrates easily with that Cisco RA VPN solution. Assets on premise could be covered by CP but we don't utilize the Harmony endpoint products with CP.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 21:39:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247052#M48213</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-22T21:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247053#M48214</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7758"&gt;@Heath&lt;/a&gt;&amp;nbsp;Just curious, how do you like Cisco Umbrella? I personally never used it myself..&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 21:49:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247053#M48214</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-22T21:49:06Z</dc:date>
    </item>
    <item>
      <title>Re: How do you manage Check Point DNS requests logging in Cisco Umbrella</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247054#M48215</link>
      <description>&lt;P&gt;I really don't have anything to compare it to, but it's been easy to work with and setup. That's actually one product that Cisco has actually integrated well with other products, like the Secure Client agent. This was a big win for us.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 21:55:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-you-manage-Check-Point-DNS-requests-logging-in-Cisco/m-p/247054#M48215</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2025-04-22T21:55:35Z</dc:date>
    </item>
  </channel>
</rss>

