For what its worth, though I have a need to say this now, AI answers should be taken with a grain of salt, but I "ran" your question through chatgpt, since AI Copilot told me this is not strictly CP related, below is what I got from chatgpt.
Andy
**************************
Managing Check Point DNS request logging in Cisco Umbrella typically involves making sure that your DNS traffic — which may originate from Check Point appliances or networks protected by them — is properly redirected to and logged by Cisco Umbrella. Here's how you'd go about setting it up and managing the logging:
🔧 1. Redirect DNS Traffic from Check Point to Cisco Umbrella
To log DNS requests in Cisco Umbrella, you need to ensure that DNS queries from your network are sent to Umbrella's DNS servers:
-
Cisco Umbrella DNS IPs:
-
208.67.222.222
-
208.67.220.220
✅ On Check Point:
You need to configure the firewall/NAT rules to intercept and redirect DNS queries (UDP/53 and TCP/53) to Umbrella:
Alternatively, use DNS forwarding if you're running a local DNS server — point it to Cisco Umbrella.
📝 2. Enable DNS Logging in Umbrella Dashboard
Once DNS traffic is being sent to Umbrella:
-
Go to Cisco Umbrella Dashboard → Activity Search.
-
Make sure your policy is set to log all DNS requests, including allowed and blocked ones.
📈 3. Verify & Monitor Logs
Use the Activity Search and Reports tabs in Umbrella to:
-
Monitor DNS requests by source IP, identity, domain, or category.
-
Export logs if needed.
-
Optionally, configure Log Export to a SIEM using Umbrella’s Log Exporter or Amazon S3 bucket integration.
🔍 4. Troubleshooting Tips
-
Make sure no DNS queries are bypassing Umbrella (e.g., clients using hardcoded DNS).
-
Enable DNSCrypt or DNS-over-HTTPS (DoH) on compatible clients for security, if required.
-
In Check Point, use SmartLog or SmartView to verify that DNS traffic is being NAT-ed correctly.
Best,
Andy