For long-term monitoring with fw ctl zdebug + drop (the "+" ensures you see drops by SecureXL which are rather rare) I wouldn't recommend piping the full output to a grep like that. While the overwhelming majority of packets are accepted and don't show up in the zdebug output, the commencement of a DoS attack or even port scan will cause the amount of output to increase rapidly and potentially impact the performance (or worse) of the firewall.
What I would recommend is something like this in one window:
fw ctl zdebug + drop > output.txt
Then after a few seconds (long enough for the zdebug to fully initialize) do this in another window:
fw ctl set str simple_debug_filter_daddr_1 DESTINATION_IP
Then after hitting CNTRL+C to stop the zdebug in the first window, now run this command in the second window just in case:
fw ctl debug 0 (to ensure your filter has been unset, the zdebug being stopped should do this automatically though)
The second command will filter the output inside the debug itself and substantially reduce the chance of a DoS flooding the output. Unfortunately you can't run that fw ctl set command before starting the zdebug as it will just get reset by the zdebug when it starts (and usually when it ends).
If anyone knows how to add/set simple_debug_filter_daddr_1 to the zdebug as part of invoking the zdebug in a single command I'd be all ears.
Attend my online "Be your Own TAC: Part Deux" CheckMates event
March 27th with sessions for both the EMEA and Americas time zones