- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
🍿 Many checks already included
💬 Comment to have your own checks added
SmartConsole Extension to add Policy Audit, an extensible policy and objects auditing tool, to the right global pane.
Extension URL: https://dannyjung.de/policyaudit.json
Installation: SmartConsole > Manage & Settings > Preferences > SmartConsole Extensions
🍿 Many checks already included
💬 Comment to have your own checks added
SmartConsole Extension to add Policy Audit, an extensible policy and objects auditing tool, to the right global pane.
Extension URL: https://dannyjung.de/policyaudit.json
Installation: SmartConsole > Manage & Settings > Preferences > SmartConsole Extensions
Wow @Danny , AMAZING! Something I noticed, though not sure its cause I checked in R82.10 demo smart console, but I see below for stealth rule, mentions not covered for mgmt object, but odd.
Its brilliant! Even lets you choose different policy packages as well, so many awesome options.
@the_rock : All centrally managed gateways, even branch office gateways, should also protect connections to their central management. Also demo mode is not a good way to test this, because it's quite limited, i.e. details-level full is restricted.
@the_rock : All centrally managed gateways, even branch office gateways, should also protect connections to their central management. Also demo mode is not a good way to test this, because it's quite limited, i.e. details-level full is restricted.
;Hi Danny,
one thing I noticed as an improvment:
An Any-Any Rule with Action "inner layer" should not be shown in my point of view. Rules within an layer should anyways.
Best,
Markus
Never noticed that the other day Markus, but definitely logical suggestion, in my opinion.
@Markus1634 : This is fixed now in version v1.1, so please try again.
@Markus1634 : This is fixed now in version v1.1, so please try again.
;Hi Danny
I've tried with Smartconsole R81.20 Last take 81.20.9700.675, but not detect the policy and when I display the options appear the re-luck the smartconsole.
however, in r82.10 working fine!
Hi Danny, this is really great. Love the tool so far. Quick question I was checking out the SSH service check, found a significant amount of old vs ssh_v2 usage. It says to use the replace option, where is that? I also see a commit button at the bottom, can you explain that for me ?
Thanks
Doug
Hi Danny, this is really great. Love the tool so far. Quick question I was checking out the SSH service check, found a significant amount of old vs ssh_v2 usage. It says to use the replace option, where is that? I also see a commit button at the bottom, can you explain that for me ?
Thanks
Doug
@DP7 : To replace ssh, run <Where Used>, then click on <Replace>, select ssh_version_2 as replacement, check <Objects> and <Policies> and click on <Replace>. Enjoy.
Commit mode just activates request-commit, so users can choose the review and commit every API request performed by the extension. Try it out. You can always switch back to auto mode.
@DP7 : To replace ssh, run <Where Used>, then click on <Replace>, select ssh_version_2 as replacement, check <Objects> and <Policies> and click on <Replace>. Enjoy.
Commit mode just activates request-commit, so users can choose the review and commit every API request performed by the extension. Try it out. You can always switch back to auto mode.
Hey @Danny ! Great contribution!
This is a very valuable extension that definitely helps a lot in identifying management improvements in firewalls.
I have a couple of questions:
-I know this may not be considered an official tool, but what exactly does the extension?
My previous question is to find out:
-How can I tell customers that the extension uses administrator credentials to run and does not expose or use sensitive information about the rules on an unknown external server?
-In short, how does this extension protect the integrity and privacy of SmartConsole settings?
My main concern is how to assure the customer that the information is accessed securely and that there is no server that takes and stores that information in an unauthorized way.
Hey
@Danny ! Great contribution!
This is a very valuable extension that definitely helps a lot in identifying management improvements in firewalls.
I have a couple of questions:
-I know this may not be considered an official tool, but what exactly does the extension?
My previous question is to find out:
-How can I tell customers that the extension uses administrator credentials to run and does not expose or use sensitive information about the rules on an unknown external server?
-I
...;Great questions — privacy and security are absolutely valid concerns when introducing any third-party tooling into a management environment, so let me walk through exactly how this extension works.
What does the extension actually do?
This Policy Audit extension consists of just two files: a JSON manifest and a single HTML file. There is no backend, no installer, no service, and no external dependency. Once loaded, it runs entirely inside SmartConsole itself — the same way the built-in SmartConsole CLI works. It uses SmartConsole's native API bridge to issue read-only commands (e.g. show packages, show access-rulebase), iterates through the results using local JavaScript functions, and renders the findings visually inside the SmartConsole panel. That's it.
No external access — by design and by architecture
The manifest explicitly declares only two permissions:
get-read-only-sessionrun-read-only-commandsThese are the only capabilities SmartConsole grants to the extension. With these permissions, the extension cannot write, modify, install, or publish any policy. It can only read — and it has no mechanism to send anything anywhere. There is no external URL, no telemetry, no analytics call, and no server of any kind receiving data. The single readable HTML file itself can be inspected in any text editor to verify this and is therefore fully auditable.
Furthermore, since the extension runs inside SmartConsole's sandboxed extension frame, it cannot reach external network destinations even if someone tried to modify it to do so — the SmartConsole process controls what the extension can communicate with.
Full transparency via Commit mode
For customers who want complete visibility into every API call the extension makes, there is a built-in "Commit mode" toggle. In this mode, every read request is shown to the user in a dialogue box before it is executed, requiring explicit confirmation. This gives administrators a full, step-by-step audit trail of exactly what data the extension accesses — nothing runs silently in the background.
How to uninstall
Removing the extension is straightforward:
Great questions — privacy and security are absolutely valid concerns when introducing any third-party tooling into a management environment, so let me walk through exactly how this extension works.
What does the extension actually do?
This Policy Audit extension consists of just two files: a JSON manifest and a single HTML file. There is no backend, no installer, no service, and no external dependency. Once loaded, it runs entirely inside SmartConsole itself — the
...;Great extension ... very usefull ... great job ... just a question, I'm using the extension with Smartconsole R81.20, if I check the Zero-hit rules, if I press the button "go to " nothing happens, is it right? A part from this I confirm that the extension is great.
Great extension ... very usefull ... great job ... just a question, I'm using the extension with Smartconsole R81.20, if I check the Zero-hit rules, if I press the button "go to " nothing happens, is it right? A part from this I confirm that the extension is great.
;@simonemantovani: I'm glad that you find it useful. The <Go to> button sometimes take a bit. I suggest to navigate to the 'Security Policies' menu in SmartConsole and then press the <Go to> button, to help it to navigate to the selected rule.
@simonemantovani: I'm glad that you find it useful. The <Go to> button sometimes take a bit. I suggest to navigate to the 'Security Policies' menu in SmartConsole and then press the <Go to> button, to help it to navigate to the selected rule.
;Hi, I tried the extension and it is excellent and very useful. Thank you very much for the effort.
What I noticed is that the GO TO button does not navigate to the relevant rule.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY