- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Q&A is listed below.
Slides are attached below the video.
This session generally applies to both.
A Check Point log server can be configured to ingest syslog, which means that SmartEvent can potentially process these logs as well. However, this will likely require parsers, which will have to be developed separately.
In some high-volume environments, this may be required. Best to consult with your Check Point SE to fully understand the environment and requirements.
If you want SmartEvent disabled for longer periods of time, uncheck the relevant options in the management blade and Install Database. This shouldn’t remove any related settings.
Yes
The legacy SAM mechanism is used, which in current versions is SecureXL friendly.
$INDEXERDIR (environment variable in expert mode) points to the correct locations. The method for changing the directory for these items is documented in sk66003.
When you click on Logs and Monitor in SmartConsole, you will see in the bottom left “External Apps” one of which is SmartEvent Settings and Policy.
There is a “Best Practices” Compliance blade report, and you have Compliance Blade free of charge for the first year with your management server license. More reports, both for SmartEvent and Compliance blades can be found in the CheckMates Toolbox.
It depends on your precise requirements.
use custom reactions
That’s a function of the Access Policy configuration for the relevant rules. Rules involving App Control/URL Filtering will log send/received bytes automatically, for other rules, you may need to enable Accounting in the Track field of the relevant rules.
Reporting functionality requires a SmartEvent license. Without SmartEvent license, you can still create dashboards in SmartView.
It has some pre-defined options and also could be customized
Not currently supported on VSX and Maestro due to the fact SAM rules are not supported on these gateway types.
Try to query SAM or SAM Rule.
The UI specifies the log fields that can be used, which are all indexed by SmartEvent. Some identity fields are obfuscated by default though but there's also a way to cancel the obfuscation. It is not possible to run reports on unindexed log fields.
You can remove automatic reaction to disable it. If you mean the entire event, you can uncheck the checkbox in SmartEvent GUI
You can exclude hosts or network for each event or for all of them in global exclusions.
Indexing incoming (or historical) logs is the primary CPU usage. Note that this CPU usage is scheduled with lower priority so if the CPU is needed for other purposes, it will be allocated accordingly. Best to engage with the TAC to assist in troubleshooting.
This data should be exported as part of the standard migration tools (e.g. migrate_server)
Connection logs are not processed by default as they require heavier processing (correlation).
Not at this time. Please discuss such requirements with your local Check Point office.
There is a logging/reporting section available in the Quantum Training material. Please check with your local team to inquire about training offerings. Professional Services assistance is also available.
A good starting point is using the built in Threat Prevention view, which can be modified and extended as needed.
Auto-refreshing views are currently only available in SmartView.
As a starting point, use the specifications for the Smart-1 appliance that most closely matches your requirements. Make sure you also follow our best practices for installing Security Management in a virtual machine. For further assistance, engage with your Check Point SE.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY