- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi CheckMates!
We have a customer currently running R81.10 standalone deployment. They have several customers of their own, using their firewall.
Now my question is, how do we go about sending logs from specific rules to the relevant customers?
Things we have thought about as a solution:
User alert running a script forwarding the logs to their syslog server?
LEA Connector with filtering?
Log exporter with filtering?
(MDM is not an option)
Best Regards.
I don't seem to be able to filter by rule_uid, only by either action, blade or origin. Looking through the documentation in sk122323 it doesn't mention the rule_uid option. Perhaps I'm missing something?
Log Exporter would solve the case though, if i can get it set up with rule_uid filtering.
UPDATE:
In $EXPORTERDIR/targets/<Name of Log Exporter Configuration>/conf/FilterConfiguration.xml
<filters>
<filterGroup operator="and">
<field name="action" operator="and">
</field>
<field name="origin" operator="and">
</field>
<field name="product" operator="and">
</field>
<field name="rule_uid" operator="and">
<value operation="eq">[rule_uid]</value>
</field>
</filterGroup>
</filters>This seems to work in my case. Appreciate the assistance.
@CPRQ In your case, i think you can add "neq" (not equal) as the value operation, in order to negate one rule, and export the rest.
Log Exporter with filtering would probably be the best way to do this.
Do Log Exporter support filtering on a specific rule? e.g do not send log of the specific rule to SIEM.
You should be able to filter based on rule_uid.
I don't seem to be able to filter by rule_uid, only by either action, blade or origin. Looking through the documentation in sk122323 it doesn't mention the rule_uid option. Perhaps I'm missing something?
Log Exporter would solve the case though, if i can get it set up with rule_uid filtering.
UPDATE:
In $EXPORTERDIR/targets/<Name of Log Exporter Configuration>/conf/FilterConfiguration.xml
<filters>
<filterGroup operator="and">
<field name="action" operator="and">
</field>
<field name="origin" operator="and">
</field>
<field name="product" operator="and">
</field>
<field name="rule_uid" operator="and">
<value operation="eq">[rule_uid]</value>
</field>
</filterGroup>
</filters>This seems to work in my case. Appreciate the assistance.
@CPRQ In your case, i think you can add "neq" (not equal) as the value operation, in order to negate one rule, and export the rest.
The documentation suggests you should be able to do that.
In which case, it's probably worth a TAC case.
How about choose not to log on the specific rule? Since it's wont log the event, there's nothing to be forwarded to SIEM.
We want to log on CP log/mgmt server to see the log for troubleshooting purpose; but don't want to send that log to SIEM.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 17 | |
| 12 | |
| 11 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Thu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY