<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Customized smartview reports in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36323#M97216</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Kim,&lt;/P&gt;&lt;P&gt;lets start from the protections them self's(in your query) :&lt;/P&gt;&lt;P&gt;&lt;EM style="border: 0px; background-color: #f6f6f6; color: #000000; font-weight: inherit;"&gt;NOT on SSL Enforcement Violation -&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;look at&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102989"&gt;CVE-2014-3566&lt;/A&gt;&amp;nbsp;- i believe that you would like to see this kind of attacks - maybe you want "NOT scanner" instead?(in most of the scanners signatures you will have it written in the name so it will deduce most of them).&lt;/P&gt;&lt;P&gt;&lt;EM style="border: 0px; background-color: #f6f6f6; color: #000000; font-weight: inherit;"&gt;NOT "Web Server Enforcement Violation"&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;look at "&lt;A href="https://www.checkpoint.com/defense/advisories/public/2014/cpai-2014-1846.html"&gt;GNU Bash Remote Code Execution&lt;/A&gt;" (a part of this violation) - i believe that you want to see this kind of information. and its the same for like the first 'Violation', a general 'not scanner' will&amp;nbsp;present the need in your case(in most cases).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so - change the query for "NOT scanner"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now - the intelligence part is very interesting and lets take '&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102673"&gt;CVE-2014-6271&lt;/A&gt;' (a part of Web Server Enforcement Violation' for example:&lt;/P&gt;&lt;P&gt;when we prevent/Detect this kind of attack, we write for you \interesting things inside the log : you will see on 'Ser Agent Kid' &amp;amp; 'resource' fields a relevant data that will&amp;nbsp;present what the attacker was trying to do (depends on the attack type ofcorse).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i will advice you to collect this intelligence data for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;testing it by your self (does it work for the admin in the network)&lt;/LI&gt;&lt;LI&gt;find F/P and add exception&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now - &lt;SPAN style="text-decoration: underline;"&gt;what should you do from now?&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;if your&amp;nbsp;need is "present for me the targeted hosts" - the easy way is to exclude SMTP and scanners (will clean &lt;SPAN style="text-decoration: underline;"&gt;most&lt;/SPAN&gt; of the attacks not answering your question)&lt;/LI&gt;&lt;LI&gt;add to smart-log table those two fields (Ser Agent Kid &amp;amp; Resource) so you will be able to see them without looking on the logs them selfs.&lt;/LI&gt;&lt;LI&gt;Widgets&lt;UL&gt;&lt;LI&gt;add a table widget that present:&lt;UL&gt;&lt;LI&gt;Destination&lt;/LI&gt;&lt;LI&gt;attack name&lt;/LI&gt;&lt;LI&gt;resource&lt;/LI&gt;&lt;LI&gt;ser agent kid&lt;/LI&gt;&lt;LI&gt;logs (count them)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;add&amp;nbsp;a time line&amp;nbsp;and divide the columns into the attack types ( in this way you will see that in day X you&amp;nbsp;had Y attacks from Z type) -&amp;nbsp;it will look like that:&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63929_Untitled.png" style="width: 778px; height: 138px;" /&gt;&lt;/P&gt;&lt;P&gt;the &lt;SPAN style="color: #339966;"&gt;green&lt;/SPAN&gt;&amp;nbsp;is:&amp;nbsp;&lt;A href="https://www.checkpoint.com/defense/advisories/public/2014/cpai-17-mar1.html"&gt;Web servers PHPMyAdmin Misconfiguration Code Injection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Oren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 18 Mar 2018 06:50:05 GMT</pubDate>
    <dc:creator>Oren_Koren</dc:creator>
    <dc:date>2018-03-18T06:50:05Z</dc:date>
    <item>
      <title>Customized smartview reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36322#M97215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Been playing around SmartView to generate a customized view for an report to bring value to the business.&lt;/P&gt;&lt;P&gt;Right now just working with containers and infografic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my result until now, and still working on it, changing the filters and what to look after.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been asking the questions of how many of our public hosts have been scanned by attackers which either been prevented or detected, and how many of these&amp;nbsp;hosts have the attackers used advanced exploits against each hosts and again prevented or detected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63924_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if the advanced attacks view is configured the right way.&lt;/P&gt;&lt;P&gt;Not sure if I should exclude the SSL and Scanner and Web Server Enforcement Violations attempt but to my knowledge it is only scanners like Shodan or Nessus etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My query is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fieldname is Source (attackers ip)&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;EM&gt;Blade = IPS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Action = Prevent&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Severity = Medium OR High OR Critical&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Confidence Level =&amp;nbsp;&amp;nbsp;Medium OR High OR Critical&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Protection type NOT Engine Settings&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Type NOT Control&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Attack name NOT&amp;nbsp;&lt;SPAN style="color: #000000;"&gt;"SSL Enforcement Violation" NOT "Scanner Enforcement Violation" NOT "Web Server Enforcement Violation"&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Destination: "ip address a.b.d.*"&lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are your though about this view? Would it provide any value for you, or what kind of questions do you ask to get intelligence from your logs?&lt;/P&gt;&lt;P&gt;Which answers are you asking for while trying to extract threat intelligence?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions or ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note! I can recommend this webinar&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7185-security-visibility-best-practices-with-smartevent"&gt;Security Visibility Best Practices with SmartEvent&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Mar 2018 20:00:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36322#M97215</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2018-03-17T20:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: Customized smartview reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36323#M97216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Kim,&lt;/P&gt;&lt;P&gt;lets start from the protections them self's(in your query) :&lt;/P&gt;&lt;P&gt;&lt;EM style="border: 0px; background-color: #f6f6f6; color: #000000; font-weight: inherit;"&gt;NOT on SSL Enforcement Violation -&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;look at&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102989"&gt;CVE-2014-3566&lt;/A&gt;&amp;nbsp;- i believe that you would like to see this kind of attacks - maybe you want "NOT scanner" instead?(in most of the scanners signatures you will have it written in the name so it will deduce most of them).&lt;/P&gt;&lt;P&gt;&lt;EM style="border: 0px; background-color: #f6f6f6; color: #000000; font-weight: inherit;"&gt;NOT "Web Server Enforcement Violation"&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;look at "&lt;A href="https://www.checkpoint.com/defense/advisories/public/2014/cpai-2014-1846.html"&gt;GNU Bash Remote Code Execution&lt;/A&gt;" (a part of this violation) - i believe that you want to see this kind of information. and its the same for like the first 'Violation', a general 'not scanner' will&amp;nbsp;present the need in your case(in most cases).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so - change the query for "NOT scanner"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now - the intelligence part is very interesting and lets take '&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102673"&gt;CVE-2014-6271&lt;/A&gt;' (a part of Web Server Enforcement Violation' for example:&lt;/P&gt;&lt;P&gt;when we prevent/Detect this kind of attack, we write for you \interesting things inside the log : you will see on 'Ser Agent Kid' &amp;amp; 'resource' fields a relevant data that will&amp;nbsp;present what the attacker was trying to do (depends on the attack type ofcorse).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i will advice you to collect this intelligence data for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;testing it by your self (does it work for the admin in the network)&lt;/LI&gt;&lt;LI&gt;find F/P and add exception&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now - &lt;SPAN style="text-decoration: underline;"&gt;what should you do from now?&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;if your&amp;nbsp;need is "present for me the targeted hosts" - the easy way is to exclude SMTP and scanners (will clean &lt;SPAN style="text-decoration: underline;"&gt;most&lt;/SPAN&gt; of the attacks not answering your question)&lt;/LI&gt;&lt;LI&gt;add to smart-log table those two fields (Ser Agent Kid &amp;amp; Resource) so you will be able to see them without looking on the logs them selfs.&lt;/LI&gt;&lt;LI&gt;Widgets&lt;UL&gt;&lt;LI&gt;add a table widget that present:&lt;UL&gt;&lt;LI&gt;Destination&lt;/LI&gt;&lt;LI&gt;attack name&lt;/LI&gt;&lt;LI&gt;resource&lt;/LI&gt;&lt;LI&gt;ser agent kid&lt;/LI&gt;&lt;LI&gt;logs (count them)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;add&amp;nbsp;a time line&amp;nbsp;and divide the columns into the attack types ( in this way you will see that in day X you&amp;nbsp;had Y attacks from Z type) -&amp;nbsp;it will look like that:&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63929_Untitled.png" style="width: 778px; height: 138px;" /&gt;&lt;/P&gt;&lt;P&gt;the &lt;SPAN style="color: #339966;"&gt;green&lt;/SPAN&gt;&amp;nbsp;is:&amp;nbsp;&lt;A href="https://www.checkpoint.com/defense/advisories/public/2014/cpai-17-mar1.html"&gt;Web servers PHPMyAdmin Misconfiguration Code Injection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Oren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Mar 2018 06:50:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36323#M97216</guid>
      <dc:creator>Oren_Koren</dc:creator>
      <dc:date>2018-03-18T06:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: Customized smartview reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36324#M97217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for explaining why I am missing out some very important incident if I filter out "SSL Enforcement Violations" and "Web Server Enforcement Violations". I get the point, and I will adjust my view to get a better understanding.&lt;/P&gt;&lt;P&gt;I am also afraid of filtering too much out which could be important.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try out your suggestions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really liked your presentation on getting the numbers right. And I see first IPS logs, Anti-bot and Anti-virus logs that one needs to look into to get a better understanding.&lt;/P&gt;&lt;P&gt;For the 107.881 Threat Prevention logs, I would like to narrow down to real advanced attacks which have been going on for the week.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63930_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have told in other settings that one needs to focus on the important logs. With the below SmartEvent Report with 30 advanced attack, I would like to focus on advanced exploits used for an attacks but prevented by the IPS blade, and I guess the 4 logs that needs action would be those that have been detected and possible provided access to the attacker.&amp;nbsp;Like the attempt to use of using the&amp;nbsp;&lt;EM&gt;apache struts vulnerability&lt;/EM&gt; attack that have been used against many public Apache installation. That one is a nasty one, that gain remote access to execute commands on the apache servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have I misunderstood any thing here?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63931_pastedImage_2.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those advanced attacks, while looking into the the following fields in SmartEvent logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Blade: IPS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Severity level: Medium OR High OR Critical&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #333333; background-color: #f6f6f6; border: 0px;"&gt;Confidence Level =&amp;nbsp;&amp;nbsp;Medium OR High OR Critical&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #333333; background-color: #f6f6f6; border: 0px;"&gt;Suppressed logs =&amp;nbsp; more than 1 incident&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #333333; background-color: #f6f6f6; border: 0px;"&gt;I have tried to filter our attacks that is not generated internally to externally.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #333333; background-color: #f6f6f6; border: 0px;"&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Here you see that last 7 days with different kinds of attacks from outside in.&lt;/P&gt;&lt;P&gt;For example I do not have any IoT presented public but still an advanced exploit other than a normal scanner like Shodan etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63934_pastedImage_6.png" style="width: 620px; height: 298px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These I want to present in my SmartEvent Report. 42 advanced attack last 7 days but prevented, and none detected by IPS. But after a drill down on the report, I could see how advanced the attack have been? But will it then be the real view of reality?&lt;/P&gt;&lt;P&gt;I would like to generate a company threat report, without to much explanation, but still being able to see the real picture of reality.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kim&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Mar 2018 16:17:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36324#M97217</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2018-03-18T16:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: Customized smartview reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36325#M97218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Kim,&lt;/P&gt;&lt;P&gt;i want to start from the following flow:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63936_Picture1.png" style="width: 620px; height: 263px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now lets ask our-self what are the important flows(order based):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Detect/Prevent -&amp;gt; Infection -&amp;nbsp;you need to have action on it(if your policy is according to Check Point recommendation. the DNS trap log will be in detect but the malware will not connect outside)&lt;/LI&gt;&lt;LI&gt;Detect -&amp;gt;&amp;nbsp;why it wasn't prevented - you need to have action on it(policy or network side)&lt;/LI&gt;&lt;LI&gt;Prevent/Detect - who is the 'harmful' user in my network&lt;/LI&gt;&lt;LI&gt;Prevent/Detect - find an unknown server&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;*i can think about lots of others relevant &amp;amp; important flows but we need to start from something not so overwhelming.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by looking on those events and aggregate them - you will have a VERY SMALL numbers of incidents to look on.&lt;/P&gt;&lt;P&gt;(&lt;SPAN style="text-decoration: underline;"&gt;in your case and based on what you wrote - 0 incident to look on&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;i had a work-shop with a customer few days ago (2000~ hosts in the network) and we sew&amp;nbsp;the same thing.&lt;/P&gt;&lt;P&gt;0 security events that need to have action because of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you are interested to see ALL of&amp;nbsp;the attacks==Detected+Prevented in your network (and you have the time for it) - you can look on the other flows and query &lt;SPAN style="text-decoration: underline;"&gt;based on business questions&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;intelligence part&lt;/STRONG&gt; - you should take ones a month a time to look on the&amp;nbsp;intelligence you have in your logs. we prevented/detected according to policy but see the real 'attack line' and deep-dive to the actual attack line that the attacker was trying to run will make us all a better security experts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;reporting&lt;/STRONG&gt; - you can create a report like you create a View (same thing for you) - the best thing is to create the view and play with it, then create the report and generate it automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;one last thing - there are &lt;SPAN style="text-decoration: underline;"&gt;lots&lt;/SPAN&gt; of technics to find cyber security incidents in a network based on Check Point logs (high ports connections, timing of connection, amount of data sent/received, applications, logins, etc...) you should start from Threat Prevention blades logs and understand them. then&amp;nbsp;create the relevant views for your questions.&lt;/P&gt;&lt;P&gt;after that (and if you have the time for it) - dive in to 'behavioral analysis'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hope&amp;nbsp;my answer will&amp;nbsp;help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Oren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Mar 2018 20:00:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Customized-smartview-reports/m-p/36325#M97218</guid>
      <dc:creator>Oren_Koren</dc:creator>
      <dc:date>2018-03-18T20:00:11Z</dc:date>
    </item>
  </channel>
</rss>

