- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hey gang.
Is there a way to see when a source NET gets blocked via the SmartEvent automatic action rule "Block source"?
We have it set for a 10 minute block and I'd like to see the logs that show this.
Thank you!
-Joe
Hey brother,
I would call TAC and see if they can provide quick answer via remote. I think in smart console, not certain what filter can be used for that, as its not technically "searchable" by blade itself.
Best,
Andy
This adds a SAM rule. You can watch SAM rules in SmartView Monitor and there's also syntax for GWs to show SAM policy (found this: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Multi-DomainSecurityManagement_Adm...).
@Amir_Senn I can never remember, will try it later in the lab...adding sam rules does not need policy install, right?
Best,
Andy
Correct
Thats what I thought...thanks!
Good morning Amir and thank you.
I've set two rules under "Scans" as you can see using SmartEvent. The automatic actions are email and block source. See Pic:
When I go into SmartView Monitor there are no rules active:
Any ideas about what may be wrong?
Thanks again!
Hey brother,
I could be mistaken when I say this, but Im fairly positive blocking those settings in smart event does NOT add any entries in SAM rules portion.
Also, question for @Amir_Senn ...sorry to hit you with so many ?s, apologies, but just curious, is there a way to say add bulk of IPs in sv monitor for sam rules, ie import csv file rather than keep adding entries manually? I checked all the settings, but does not appear that might be possible...
Best,
Andy
Thanks Andy. So the rules I added are not SAM rules or...they are but not shown in SmartView Monitor (if that's the case that's confusing no?)
From the link I published before, the syntax for adding a rule is this:
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
I think that even a bash script can be easily implemented here.
Every IP has it's own row, with a loop according to the number of rows in the file. If you want all settings to be the same you can just insert IP in appropriate place in the command. Additional fields will require additional columns in the file.
Definitely adds SAM rule. Here's an example I just did in my lab:
If you don't see a rule there I would say the thing to check is that the event you selected was matched. Best way to see is if a correlated event log was created:
I would also suggest using Infinity Playblocks which is a much more advanced and modern solution.
You will be able to view the relevant logs because they are associated with an Ordered Layer associated with Playblocks.
https://www.checkpoint.com/infinity/playblocks/
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 13 | |
| 11 | |
| 10 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 6 | |
| 6 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY