Check Point provides hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management. This integration allows you to send Check Point logs to your Layerlog SIEM account.
Configuration
Before you begin, you’ll need:
- Check Point Log Exporter
- Filebeat 7 or Filebeat 6
- Root access
Configure Check Point Log Exporter
Configure your Check Point Log Exporter to send logs to your Filebeat server.
For complete details on configuring Log Exporter, see Check Point Log Export from Check Point.
Option 1: Export logs for all domains
cp_log_export add name logzio_filebeat_exporter \
target-server <<FILEBEAT-IP-ADDRESS>> \
target-port 514 \
protocol udp \
format syslog \
--apply-now
Option 2: Export logs for a specific domain
cp_log_export add name logzio_filebeat_exporter \
domain-server <<YOUR-DOMAIN>> \
target-server <<FILEBEAT-IP-ADDRESS>> \
target-port 514 \
protocol udp \
format syslog \
--apply-now
If you restart the management server, you’ll need to run cp_log_export again
to restart the exporter.
Download the Layerlog public certificate to your credentials server
For HTTPS shipping, download the Layerlog public certificate to your certificate authority folder.
sudo curl https://raw.githubusercontent.com/logzio/public-certificates/master/AAACertificateServices.crt --create-dirs -o /etc/pki/tls/certs/COMODORSADomainValidationSecureServerCA.crt
Add UDP traffic as an input
In the Filebeat configuration file (/etc/filebeat/filebeat.yml), add UDP to the filebeat.inputs section.
Replace <<LOG-SHIPPING-TOKEN>> with the token of the account you want to ship to.
# ...
filebeat.inputs:
- type: udp
max_message_size: 10MiB
host: "0.0.0.0:514"
fields:
logzio_codec: plain
# Your Layerlog account token. You can find your token at
# http://panel.layerlog.com/#/dashboard/settings/manage-accounts
token: <<LOG-SHIPPING-TOKEN>>
type: checkpoint
fields_under_root: true
encoding: utf-8
ignore_older: 3h
If you’re running Filebeat 7, paste this code block. Otherwise, you can leave it out.
# ... For Filebeat 7 only ...
filebeat.registry.path: /var/lib/filebeat
processors:
- rename:
fields:
- from: "agent"
to: "filebeat_agent"
ignore_missing: true
- rename:
fields:
- from: "log.file.path"
to: "source"
ignore_missing: true
If you’re running Filebeat 6, paste this code block.
# ... For Filebeat 6 only ...
registry_file: /var/lib/filebeat/registry
Set Layerlog as the output
If Layerlog is not an output, add it now. Remove all other outputs.
Replace <<LISTENER-HOST>> with the host for your region. For example, listener.layerlog.com if your account is hosted on AWS US East, or listener-nl.layerlog.com if hosted on Azure West Europe.
# ...
output.logstash:
hosts: ["<<LISTENER-HOST>>:5015"]
ssl:
certificate_authorities: ['/etc/pki/tls/certs/COMODORSADomainValidationSecureServerCA.crt']
Start Filebeat
Start or restart Filebeat for the changes to take effect.
Check Layerlog for your logs
Give your logs some time to get from your system to ours, and then open Kibana.
If you still don’t see your logs, see log shipping troubleshooting.