- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
While working with a siem, the use of logs exporter has been a good upgrade from opsec lea. But as you can see in the screenshot; all the important messages are being reported in the default_device_message section. Hence to normalize and take important bits of information; like HTTP login; user= admin ; it is required to extract these fields. Hence for a wide range of syslog messages; a number of signatures need to be added.
Is there any provision of important fields within default_device_message being extracted within log as in case of source address :: src=...........?
Help would be much appreciated.
Gaia (the underlying OS based on Linux) generates its own logs independent of Access Control and Threat Prevention.
Normally, these logs are kept entirely separate, but can be sent to the same logs that get exported via Log Exporter.
This does not happen by default.
You can set/change that here from the WebUI on the relevant device(s):
Most of the OS logs have completely different context from the things we log with Access Control and Threat Prevention.
As such, all the information from the OS logs is generally put into a single log field.
You can verify this by reviewing the actual log entries in SmartConsole/SmartView.
When those logs are exported via Log Exporter, they likewise end up in a single log field.
In other words, this is working as expected.
If you export syslog directly from the devices themselves to the SIEM, it's possible the information might be parsed differently.
I do have other logs too ... but they are of the similar structure with most of the message within the default_message field. What would be the issue with the exporter? How can this issue be solved?
Gaia (the underlying OS based on Linux) generates its own logs independent of Access Control and Threat Prevention.
Normally, these logs are kept entirely separate, but can be sent to the same logs that get exported via Log Exporter.
This does not happen by default.
You can set/change that here from the WebUI on the relevant device(s):
Most of the OS logs have completely different context from the things we log with Access Control and Threat Prevention.
As such, all the information from the OS logs is generally put into a single log field.
You can verify this by reviewing the actual log entries in SmartConsole/SmartView.
When those logs are exported via Log Exporter, they likewise end up in a single log field.
In other words, this is working as expected.
If you export syslog directly from the devices themselves to the SIEM, it's possible the information might be parsed differently.
thanks !!! you cleared the doubt...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 16 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY