- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi CP,
Regrading to Threat Prevention log if we not see a few days it's cause from Policy or anything ?
Could be several things probably best reviewed via a remote session rather than guessing.
With that said are you still receiving normal firewall logs from the same Gateways or no?
We got the firewall logs as normal on the same gateway. And just last few days that we did not get threat prevention logs.
Which JHF take is applied to this environment and are the relevant Threat Prevention blades still enabled on the gateway object?
Additionally would anyone have configured fast_accel rules recently?
Again, probably best to contact TAC to review via a remote session.
Threat prevention blades are still enable on the gateway object and as I mention we did not change anything on on that.
Again please provide all the requested info as follows:
- Which Jumbo/JHF version is installed on-top of R81.10?
- Output of command: fw stat -b AMW
- Run CheckME and review logs
If you don't wish to do so here for whatever reason then please consult further with TAC via a remote session to diagnose the problem more efficiently.
May I ask you, Normally threat prevention logs are always detect right?
No they will typically be either Detect or Prevent depending on your configuration/policy and the type of threat encountered.
Please review your smartlog filters...
Yes, I concern because it's just last week that I can not see the logs detection and prevention. That I think it may any issue.
There isn't sufficient information available here to say apart from the obvious categories
Please expand the IPS log card if you need further insight
Might just be that the gateway is not sending logs:
Or some configuration issue.
Did you see TP logs before?
Do you see firewall logs?
Might be that the rule is set not to track?
Can you check the Threat Prevention Policy is installed properly?
Please share the output of fw stat -b AMW on the Security Gateway
We did not change anything on threat prevention policy. And just last few days did not get threat prevention logs.
Please provide output of fw stat -b AMW run on the gateway as requested earlier in the thread.
http://www.cpcheckme.com will light up your Threat Prevention logs and tell you if it is working correctly.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
2 | |
1 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY