- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hey,
I deployed Anti-Virus and Anti-Bot for a customer, for now without HTTPS inspection and just in detect mode for testing. The customer is expecting some log reports showing what's going on, but all my logs look as on the attached screenshots. I opened a TAC case but they just told me that my config is correct and they have no idea, but I need to test a few URL's and provide the timestamps for this testing. Getting the customer to do these tests is not easy so I thought I'll ask in the meanwhile here, maybe someone had a similar issue?
Result is the same whether I use SmartConsole or SmartView. Doesn't show anything more in the Corelated events report either.
IPS logs look fine, it's just the anti-bot/virus blades acting up.
Which version & JHF is this system, have you tried CheckME as a method of generating relevant logs for review?
Presume the gateway also has visibility of the DNS traffic?
In a lab environment with minimal traffic the control logs will stand out, not sure it's relevant to the original post.
Thats true, though I did lots of AV tests in that lab.
Andy
I will try disable blade later, install policy, re-enable, push policy again and test...want to see if it makes any difference.
Andy
Hey @robertp
I just tested process I mentioned to Chris and it does appear it made the difference, but will give it more time to confirm. Not sure if it would work in your case, but maybe worth trying, as long as there no too many references that would require to be removed prior to disabling the blade.
Andy
For what its worth, I did same test in R82 jumbo 19 (latest one), but no difference.
Did you open TAC ticket for this?
Andy
Hi, I did, but due to the fact I couldn't get the customer to do the test required by TAC (that's a long story..) they closed the ticket. Trying to figure it out on my own for now until I get a testing VM in the customer environment.
I did the exact same config for another customer and that works fine. The only difference is, that this one has a SmartEvent server, and I'm thinking if it's not the issue here.
Hm..not sure if smart even would make any difference, as I tested with dedicated smart event in R81.20 lab. In R82 lab, its integrated into standalone lab.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 10 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY