- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello everybody,
Actually we have several gateway clusters in our environment. By default we are logging DNS traffic (UDP 53) but we can see that actually only the connection itself is being logged
Does somebody know how to log the query in the DNS packet? I would like to see the queried domain in the log. I can see that there is a field named "DNS query" and "DNS Query Type" but both are empty so I think it should be an option to enable the gateway to fill that fields.
Thanks
What is the precise rule that is accepting the traffic?
I suspect it needs to done with an App Control rule (something that logs Detailed or Extended).
Our goal is having the queried domain name in the DNS logs, so as we can export it to a SIEM (via logexporter) and have the DNS request information, not only the connection.
We have some internal applications that tries to access different services (rare or custom protocols) and URLF/APP CONTROL does not show that information, but if we could log that in the DNS, at least we could see the domain name requested.
Thanks
any tip on how to achieve that, @PhoneBoy?
I thought there was an App Control signature that did this, but it doesn't appear there is one.
This is probably an RFE, but it might be worth a TAC case to confirm.
@CheckPoint
Come on,
years go by and such a simple issue is not resolved yet? Top next gen firewall can't cope with so trivial task as DNS queries logging? Are You serious?
Have you requested a RFE for this?
Yes, I have - right after Your question.
Thanks for hint.
what issue? can you please be more specific?
It's all about DNS transactions logging - mainly queries. It's simple UDP 53 plain text. Is there any way to show them in logs? Any sk number or something else?
Maybe this: https://support.checkpoint.com/results/sk/sk116694
Version is EOL but worth a shot.
Although DNS is getting more and more encrypted (the request). Then firewall cannot see it anymore.
Hi,
I have version R82. How can I make the "dns_query" field appear in the domain-udp query logs?
I tried the solutions from sk116694 and sk183647 without success, but it works in R81.20.
i checked around, i dont see any related open bugs. It is not on the known limitations for r82. sk183647 states also R82, so I expect it to be supported. I would open TAC case. Or you can open a topic for your issue and hope someone on the community has more info.
Got it. Please open a TAC request for this.
Let me ask what kind of SIEM do You have? Don't You have network sensor listening on the wire (TAP, port mirroring or promiscous)? Is Your issue resolved by now?
I'm looking to implement something similar - did you get anywhere with this?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 67 | |
| 39 | |
| 19 | |
| 16 | |
| 13 | |
| 11 | |
| 11 | |
| 10 | |
| 9 | |
| 8 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY