<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logging with limited log samples? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213194#M65543</link>
    <description>&lt;P&gt;Actually, there is a feature that is specifically meant for this use-case and allows you to reduce the noise of highly repeating logs.&lt;/P&gt;
&lt;P&gt;It's not called "partial logging", but "Session Logs".&lt;/P&gt;
&lt;P&gt;If you open the Track settings on your rule with logging, you will see the default logging configuration:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Track Settings - Default.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25533iA21109435C4B51E7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Track Settings - Default.png" alt="Track Settings - Default.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;These default settings tell the gateway to create a new log for each connection attempt. In the case of DNS, indeed that means many logs that look the same as machines create a DNS request (and connection) for every DNS resolving.&lt;/P&gt;
&lt;P&gt;You can of course switch that rule to Track=None, but that indeed leaves you blind to all this traffic and requests.&lt;/P&gt;
&lt;P&gt;Instead, you can modify the Track settings to look like the below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Track Settings - Session Logs.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25534i76CA72335F64E240/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Track Settings - Session Logs.png" alt="Track Settings - Session Logs.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Deactivate "per Connection" logs and activate "per Session" logs.&lt;/P&gt;
&lt;P&gt;Session logs are an aggregation of all connection logs that have the same significant parameters (source, destination, port, action, user, ...). Once a new connection is opened a session log will be sent. Subsequent connections (that share the same significant parameters) will not send another log, instead every 10 minutes a log update will be sent on the session to state how many connections were seen in that time period. That way, if you double click a session log, you can still see how many connection, without having a dedicated log row for each connection.&lt;/P&gt;
&lt;P&gt;This reduces the noise and also reduces the load on your log server. We've seen customers reduce their total logging by 30%-60% by utilizing Session logs on noisy rules.&lt;/P&gt;</description>
    <pubDate>Sun, 05 May 2024 07:57:36 GMT</pubDate>
    <dc:creator>Tomer_Noy</dc:creator>
    <dc:date>2024-05-05T07:57:36Z</dc:date>
    <item>
      <title>Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210502#M65539</link>
      <description>&lt;P&gt;Hi Mate,&lt;/P&gt;&lt;P&gt;Do you know any way to enable limited logging on an access rule, say 5% rule hits are logged and the rest is not logged?&lt;/P&gt;&lt;P&gt;Why?&lt;BR /&gt;A typical access rule will have log enabled and all matches for that rule will be logged.&lt;BR /&gt;Some types of trafic (like DNS, NTP, SNMP and NETBIOS) will generate a lot of hits and you may opt to disable log for this 'noise'.&lt;BR /&gt;However that will leave you 'blind' both in terms of the direct trafic and in terms of statical reporting and other data processing.&lt;/P&gt;&lt;P&gt;BR Mille&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 22:05:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210502#M65539</guid>
      <dc:creator>Mille</dc:creator>
      <dc:date>2024-04-04T22:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210616#M65540</link>
      <description>&lt;P&gt;There is no partial logging.&lt;/P&gt;
&lt;P&gt;Best suggestions I can offer are:&lt;/P&gt;
&lt;P&gt;a. You can create build in filter that will filter unwanted logs from results&lt;/P&gt;
&lt;P&gt;b. Identify all the features of the noisy logs and instead of the current rule, replace action with layer. Under this layer, create the first rules with a combo of source, destination and service and don't log those. If you keep it well defined I don't think you should have issues.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 15:07:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210616#M65540</guid>
      <dc:creator>Amir_Senn</dc:creator>
      <dc:date>2024-04-07T15:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210675#M65541</link>
      <description>&lt;P&gt;Amir Senn, Thank you for the suggestions. I was hoping for some kind of partial logging.&lt;/P&gt;&lt;P&gt;/Mille&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 12:18:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210675#M65541</guid>
      <dc:creator>Mille</dc:creator>
      <dc:date>2024-04-08T12:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210820#M65542</link>
      <description>&lt;P&gt;You can also change the tracking options on layer suggestion to be session instead of connection. Should lower number of all logs that match the rule.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 11:45:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/210820#M65542</guid>
      <dc:creator>Amir_Senn</dc:creator>
      <dc:date>2024-04-09T11:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213194#M65543</link>
      <description>&lt;P&gt;Actually, there is a feature that is specifically meant for this use-case and allows you to reduce the noise of highly repeating logs.&lt;/P&gt;
&lt;P&gt;It's not called "partial logging", but "Session Logs".&lt;/P&gt;
&lt;P&gt;If you open the Track settings on your rule with logging, you will see the default logging configuration:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Track Settings - Default.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25533iA21109435C4B51E7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Track Settings - Default.png" alt="Track Settings - Default.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;These default settings tell the gateway to create a new log for each connection attempt. In the case of DNS, indeed that means many logs that look the same as machines create a DNS request (and connection) for every DNS resolving.&lt;/P&gt;
&lt;P&gt;You can of course switch that rule to Track=None, but that indeed leaves you blind to all this traffic and requests.&lt;/P&gt;
&lt;P&gt;Instead, you can modify the Track settings to look like the below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Track Settings - Session Logs.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25534i76CA72335F64E240/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Track Settings - Session Logs.png" alt="Track Settings - Session Logs.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Deactivate "per Connection" logs and activate "per Session" logs.&lt;/P&gt;
&lt;P&gt;Session logs are an aggregation of all connection logs that have the same significant parameters (source, destination, port, action, user, ...). Once a new connection is opened a session log will be sent. Subsequent connections (that share the same significant parameters) will not send another log, instead every 10 minutes a log update will be sent on the session to state how many connections were seen in that time period. That way, if you double click a session log, you can still see how many connection, without having a dedicated log row for each connection.&lt;/P&gt;
&lt;P&gt;This reduces the noise and also reduces the load on your log server. We've seen customers reduce their total logging by 30%-60% by utilizing Session logs on noisy rules.&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2024 07:57:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213194#M65543</guid>
      <dc:creator>Tomer_Noy</dc:creator>
      <dc:date>2024-05-05T07:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213451#M65544</link>
      <description>&lt;P&gt;Thanks for the solution. It work for me.&lt;/P&gt;&lt;P&gt;In my case I also had to make the same adjustment in both the Network access rule and in the Application rule as the policy does not use Layes.&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 08:35:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213451#M65544</guid>
      <dc:creator>Mille</dc:creator>
      <dc:date>2024-05-07T08:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213452#M65545</link>
      <description>&lt;P&gt;Great to hear&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I'm curious, by how much did that reduce your logging on those rules?&lt;/P&gt;
&lt;P&gt;For example, from 100K logs per day to 10K?&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 08:41:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213452#M65545</guid>
      <dc:creator>Tomer_Noy</dc:creator>
      <dc:date>2024-05-07T08:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Logging with limited log samples?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213476#M65546</link>
      <description>&lt;P&gt;Work in progress. An early result is 30K DNS connection logs is reduced to 6K session logs for 24/hours. It's about 80% reduction.&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 11:47:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logging-with-limited-log-samples/m-p/213476#M65546</guid>
      <dc:creator>Mille</dc:creator>
      <dc:date>2024-05-07T11:47:22Z</dc:date>
    </item>
  </channel>
</rss>

