Getting Data In

Splunk Add-on for Checkpoint 4.0.0

arkonner
Path Finder

I have a checkpoint cluster configuration with a single management workstation - Installing the Add-on to establish the connection I got a huge volume of data - Should be possible to "filter" the checkpoint events in order to reduce it.

0 Karma
1 Solution

aosso
Path Finder

Hi,

Currently with this new version you can get this done with a props.conf/transforms.conf setup:

https://answers.splunk.com/comments/417715/view.html (this example only collects packets with status drop, reject and block)

View solution in original post

0 Karma

arkonner
Path Finder

This is exactly what I am looking for -

In the example under session opsecparsing] the Regex command allows only drop, reject and block - The regex should accept a command to exclude all different by "accept" like REGEX =! (accept)

[opsecparsing]
REGEX = (drop|reject|block)

props.conf

[opsec]
TRANSFORMS-drops = opsecnull, opsecparsing

#transforms.conf
[opsecnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[opsecparsing]
REGEX = (drop|reject|block)
DEST_KEY = queue
FORMAT = indexQueue

0 Karma

arrowecssupport
Communicator

Are you actually running Check Point 4.0?

0 Karma

aosso
Path Finder

Hi,

Currently with this new version you can get this done with a props.conf/transforms.conf setup:

https://answers.splunk.com/comments/417715/view.html (this example only collects packets with status drop, reject and block)

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...