Loading

Checkpoint fields

Some checkpoint module

Module for parsing Checkpoint syslog.

checkpoint.confidence_level
Confidence level determined by ThreatCloud.

type: integer

checkpoint.calc_desc
Log description.

type: keyword

checkpoint.dst_country
Destination country.

type: keyword

checkpoint.dst_user_name
Connected user name on the destination IP.

type: keyword

checkpoint.email_id
Email number in smtp connection.

type: keyword

checkpoint.email_subject
Original email subject.

type: keyword

checkpoint.email_session_id
Connection uuid.

type: keyword

checkpoint.event_count
Number of events associated with the log.

type: long

checkpoint.sys_message
System messages

type: keyword

checkpoint.logid
System messages

type: keyword

checkpoint.failure_impact
The impact of update service failure.

type: keyword

checkpoint.id
Override application ID.

type: integer

checkpoint.identity_src
The source for authentication identity information.

type: keyword

checkpoint.information
Policy installation status for a specific blade.

type: keyword

checkpoint.layer_name
Layer name.

type: keyword

checkpoint.layer_uuid
Layer UUID.

type: keyword

checkpoint.log_id
Unique identity for logs.

type: integer

checkpoint.malware_family
Additional information on protection.

type: keyword

checkpoint.origin_sic_name
Machine SIC.

type: keyword

checkpoint.policy_mgmt
Name of the Management Server that manages this Security Gateway.

type: keyword

checkpoint.policy_name
Name of the last policy that this Security Gateway fetched.

type: keyword

checkpoint.protection_id
Protection malware id.

type: keyword

checkpoint.protection_name
Specific signature name of the attack.

type: keyword

checkpoint.protection_type
Type of protection used to detect the attack.

type: keyword

checkpoint.protocol
Protocol detected on the connection.

type: keyword

checkpoint.proxy_src_ip
Sender source IP (even when using proxy).

type: ip

checkpoint.rule
Matched rule number.

type: integer

checkpoint.rule_action
Action of the matched rule in the access policy.

type: keyword

checkpoint.scan_direction
Scan direction.

type: keyword

checkpoint.session_id
Log uuid.

type: keyword

checkpoint.source_os
OS which generated the attack.

type: keyword

checkpoint.src_country
Country name, derived from connection source IP address.

type: keyword

checkpoint.src_user_name
User name connected to source IP

type: keyword

checkpoint.ticket_id
Unique ID per file.

type: keyword

checkpoint.tls_server_host_name
SNI/CN from encrypted TLS connection used by URLF for categorization.

type: keyword

checkpoint.verdict
TE engine verdict Possible values: Malicious/Benign/Error.

type: keyword

checkpoint.user
Source user name.

type: keyword

checkpoint.vendor_list
The vendor name that provided the verdict for a malicious URL.

type: keyword

checkpoint.web_server_type
Web server detected in the HTTP response.

type: keyword

checkpoint.client_name
Client Application or Software Blade that detected the event.

type: keyword

checkpoint.client_version
Build version of SandBlast Agent client installed on the computer.

type: keyword

checkpoint.extension_version
Build version of the SandBlast Agent browser extension.

type: keyword

checkpoint.host_time
Local time on the endpoint computer.

type: keyword

checkpoint.installed_products
List of installed Endpoint Software Blades.

type: keyword

checkpoint.cc
The Carbon Copy address of the email.

type: keyword

checkpoint.parent_process_username
Owner username of the parent process of the process that triggered the attack.

type: keyword

checkpoint.process_username
Owner username of the process that triggered the attack.

type: keyword

checkpoint.audit_status
Audit Status. Can be Success or Failure.

type: keyword

checkpoint.objecttable
Table of affected objects.

type: keyword

checkpoint.objecttype
The type of the affected object.

type: keyword

checkpoint.operation_number
The operation nuber.

type: keyword

checkpoint.email_recipients_num
Amount of recipients whom the mail was sent to.

type: integer

checkpoint.suppressed_logs
Aggregated connections for five minutes on the same source, destination and port.

type: integer

checkpoint.blade_name
Blade name.

type: keyword

checkpoint.status
Ok/Warning/Error.

type: keyword

checkpoint.short_desc
Short description of the process that was executed.

type: keyword

checkpoint.long_desc
More information on the process (usually describing error reason in failure).

type: keyword

checkpoint.scan_hosts_hour
Number of unique hosts during the last hour.

type: integer

checkpoint.scan_hosts_day
Number of unique hosts during the last day.

type: integer

checkpoint.scan_hosts_week
Number of unique hosts during the last week.

type: integer

checkpoint.unique_detected_hour
Detected virus for a specific host during the last hour.

type: integer

checkpoint.unique_detected_day
Detected virus for a specific host during the last day.

type: integer

checkpoint.unique_detected_week
Detected virus for a specific host during the last week.

type: integer

checkpoint.scan_mail
Number of emails that were scanned by "AB malicious activity" engine.

type: integer

checkpoint.additional_ip
DNS host name.

type: keyword

checkpoint.description
Additional explanation how the security gateway enforced the connection.

type: keyword

checkpoint.email_spam_category
Email categories. Possible values: spam/not spam/phishing.

type: keyword

checkpoint.email_control_analysis
Message classification, received from spam vendor engine.

type: keyword

checkpoint.scan_results
"Infected"/description of a failure.

type: keyword

checkpoint.original_queue_id
Original postfix email queue id.

type: keyword

checkpoint.risk
Risk level we got from the engine.

type: keyword

checkpoint.roles
The role of identity.

type: keyword

checkpoint.observable_name
IOC observable signature name.

type: keyword

checkpoint.observable_id
IOC observable signature id.

type: keyword

checkpoint.observable_comment
IOC observable signature description.

type: keyword

checkpoint.indicator_name
IOC indicator name.

type: keyword

checkpoint.indicator_description
IOC indicator description.

type: keyword

checkpoint.indicator_reference
IOC indicator reference.

type: keyword

checkpoint.indicator_uuid
IOC indicator uuid.

type: keyword

checkpoint.app_desc
Application description.

type: keyword

checkpoint.app_id
Application ID.

type: integer

checkpoint.app_sig_id
IOC indicator description.

type: keyword

checkpoint.certificate_resource
HTTPS resource Possible values: SNI or domain name (DN).

type: keyword

checkpoint.certificate_validation
Precise error, describing HTTPS certificate failure under "HTTPS categorize websites" feature.

type: keyword

checkpoint.browse_time
Application session browse time.

type: keyword

checkpoint.limit_requested
Indicates whether data limit was requested for the session.

type: integer

checkpoint.limit_applied
Indicates whether the session was actually date limited.

type: integer

checkpoint.dropped_total
Amount of dropped packets (both incoming and outgoing).

type: integer

checkpoint.client_type_os
Client OS detected in the HTTP request.

type: keyword

checkpoint.name
Application name.

type: keyword

checkpoint.properties
Application categories.

type: keyword

checkpoint.sig_id
Application’s signature ID which how it was detected by.

type: keyword

checkpoint.desc
Override application description.

type: keyword

checkpoint.referrer_self_uid
UUID of the current log.

type: keyword

checkpoint.referrer_parent_uid
Log UUID of the referring application.

type: keyword

checkpoint.needs_browse_time
Browse time required for the connection.

type: integer

checkpoint.cluster_info
Cluster information. Possible options: Failover reason/cluster state changes/CP cluster or 3rd party.

type: keyword

checkpoint.sync
Sync status and the reason (stable, at risk).

type: keyword

checkpoint.file_direction
File direction. Possible options: upload/download.

type: keyword

checkpoint.invalid_file_size
File_size field is valid only if this field is set to 0.

type: integer

checkpoint.top_archive_file_name
In case of archive file: the file that was sent/received.

type: keyword

checkpoint.data_type_name
Data type in rulebase that was matched.

type: keyword

checkpoint.specific_data_type_name
Compound/Group scenario, data type that was matched.

type: keyword

checkpoint.word_list
Words matched by data type.

type: keyword

checkpoint.info
Special log message.

type: keyword

checkpoint.outgoing_url
URL related to this log (for HTTP).

type: keyword

checkpoint.dlp_rule_name
Matched rule name.

type: keyword

checkpoint.dlp_recipients
Mail recipients.

type: keyword

checkpoint.dlp_subject
Mail subject.

type: keyword

checkpoint.dlp_word_list
Phrases matched by data type.

type: keyword

checkpoint.dlp_template_score
Template data type match score.

type: keyword

checkpoint.message_size
Mail/post size.

type: integer

checkpoint.dlp_incident_uid
Unique ID of the matched rule.

type: keyword

checkpoint.dlp_related_incident_uid
Other ID related to this one.

type: keyword

checkpoint.dlp_data_type_name
Matched data type.

type: keyword

checkpoint.dlp_data_type_uid
Unique ID of the matched data type.

type: keyword

checkpoint.dlp_violation_description
Violation descriptions described in the rulebase.

type: keyword

checkpoint.dlp_relevant_data_types
In case of Compound/Group: the inner data types that were matched.

type: keyword

checkpoint.dlp_action_reason
Action chosen reason.

type: keyword

checkpoint.dlp_categories
Data type category.

type: keyword

checkpoint.dlp_transint
HTTP/SMTP/FTP.

type: keyword

checkpoint.duplicate
Log marked as duplicated, when mail is split and the Security Gateway sees it twice.

type: keyword

checkpoint.incident_extension
Matched data type.

type: keyword

checkpoint.matched_file
Unique ID of the matched data type.

type: keyword

checkpoint.matched_file_text_segments
Fingerprint: number of text segments matched by this traffic.

type: integer

checkpoint.matched_file_percentage
Fingerprint: match percentage of the traffic.

type: integer

checkpoint.dlp_additional_action
Watermark/None.

type: keyword

checkpoint.dlp_watermark_profile
Watermark which was applied.

type: keyword

checkpoint.dlp_repository_id
ID of scanned repository.

type: keyword

checkpoint.dlp_repository_root_path
Repository path.

type: keyword

checkpoint.scan_id
Sequential number of scan.

type: keyword

checkpoint.special_properties
If this field is set to 1 the log will not be shown (in use for monitoring scan progress).

type: integer

checkpoint.dlp_repository_total_size
Repository size.

type: integer

checkpoint.dlp_repository_files_number
Number of files in repository.

type: integer

checkpoint.dlp_repository_scanned_files_number
Number of scanned files in repository.

type: integer

checkpoint.duration
Scan duration.

type: keyword

checkpoint.dlp_fingerprint_long_status
Scan status - long format.

type: keyword

checkpoint.dlp_fingerprint_short_status
Scan status - short format.

type: keyword

checkpoint.dlp_repository_directories_number
Number of directories in repository.

type: integer

checkpoint.dlp_repository_unreachable_directories_number
Number of directories the Security Gateway was unable to read.

type: integer

checkpoint.dlp_fingerprint_files_number
Number of successfully scanned files in repository.

type: integer

checkpoint.dlp_repository_skipped_files_number
Skipped number of files because of configuration.

type: integer

checkpoint.dlp_repository_scanned_directories_number
Amount of directories scanned.

type: integer

checkpoint.number_of_errors
Number of files that were not scanned due to an error.

type: integer

checkpoint.next_scheduled_scan_date
Next scan scheduled time according to time object.

type: keyword

checkpoint.dlp_repository_scanned_total_size
Size scanned.

type: integer

checkpoint.dlp_repository_reached_directories_number
Number of scanned directories in repository.

type: integer

checkpoint.dlp_repository_not_scanned_directories_percentage
Percentage of directories the Security Gateway was unable to read.

type: integer

checkpoint.speed
Current scan speed.

type: integer

checkpoint.dlp_repository_scan_progress
Scan percentage.

type: integer

checkpoint.sub_policy_name
Layer name.

type: keyword

checkpoint.sub_policy_uid
Layer uid.

type: keyword

checkpoint.fw_message
Used for various firewall errors.

type: keyword

checkpoint.message
ISP link has failed.

type: keyword

checkpoint.isp_link
Name of ISP link.

type: keyword

checkpoint.fw_subproduct
Can be vpn/non vpn.

type: keyword

checkpoint.sctp_error
Error information, what caused sctp to fail on out_of_state.

type: keyword

checkpoint.chunk_type
Chunck of the sctp stream.

type: keyword

checkpoint.sctp_association_state
The bad state you were trying to update to.

type: keyword

checkpoint.tcp_packet_out_of_state
State violation.

type: keyword

checkpoint.tcp_flags
TCP packet flags (SYN, ACK, etc.,).

type: keyword

checkpoint.connectivity_level
Log for a new connection in wire mode.

type: keyword

checkpoint.ip_option
IP option that was dropped.

type: integer

checkpoint.tcp_state
Log reinting a tcp state change.

type: keyword

checkpoint.expire_time
Connection closing time.

type: keyword

checkpoint.icmp_type
In case a connection is ICMP, type info will be added to the log.

type: integer

checkpoint.icmp_code
In case a connection is ICMP, code info will be added to the log.

type: integer

checkpoint.rpc_prog
Log for new RPC state - prog values.

type: integer

checkpoint.dce-rpc_interface_uuid
Log for new RPC state - UUID values

type: keyword

checkpoint.elapsed
Time passed since start time.

type: keyword

checkpoint.icmp
Number of packets, received by the client.

type: keyword

checkpoint.capture_uuid
UUID generated for the capture. Used when enabling the capture when logging.

type: keyword

checkpoint.diameter_app_ID
The ID of diameter application.

type: integer

checkpoint.diameter_cmd_code
Diameter not allowed application command id.

type: integer

checkpoint.diameter_msg_type
Diameter message type.

type: keyword

checkpoint.cp_message
Used to log a general message.

type: integer

checkpoint.log_delay
Time left before deleting template.

type: integer

checkpoint.attack_status
In case of a malicious event on an endpoint computer, the status of the attack.

type: keyword

checkpoint.impacted_files
In case of an infection on an endpoint computer, the list of files that the malware impacted.

type: keyword

checkpoint.remediated_files
In case of an infection and a successful cleaning of that infection, this is a list of remediated files on the computer.

type: keyword

checkpoint.triggered_by
The name of the mechanism that triggered the Software Blade to enforce a protection.

type: keyword

checkpoint.https_inspection_rule_id
ID of the matched rule.

type: keyword

checkpoint.https_inspection_rule_name
Name of the matched rule.

type: keyword

checkpoint.app_properties
List of all found categories.

type: keyword

checkpoint.https_validation
Precise error, describing HTTPS inspection failure.

type: keyword

checkpoint.https_inspection_action
HTTPS inspection action (Inspect/Bypass/Error).

type: keyword

checkpoint.icap_service_id
Service ID, can work with multiple servers, treated as services.

type: integer

checkpoint.icap_server_name
Server name.

type: keyword

checkpoint.internal_error
Internal error, for troubleshooting

type: keyword

checkpoint.icap_more_info
Free text for verdict.

type: integer

checkpoint.reply_status
ICAP reply status code, e.g. 200 or 204.

type: integer

checkpoint.icap_server_service
Service name, as given in the ICAP URI

type: keyword

checkpoint.mirror_and_decrypt_type
Information about decrypt and forward. Possible values: Mirror only, Decrypt and mirror, Partial mirroring (HTTPS inspection Bypass).

type: keyword

checkpoint.interface_name
Designated interface for mirror And decrypt.

type: keyword

checkpoint.session_uid
HTTP session-id.

type: keyword

checkpoint.broker_publisher
IP address of the broker publisher who shared the session information.

type: ip

checkpoint.src_user_dn
User distinguished name connected to source IP.

type: keyword

checkpoint.proxy_user_name
User name connected to proxy IP.

type: keyword

checkpoint.proxy_machine_name
Machine name connected to proxy IP.

type: integer

checkpoint.proxy_user_dn
User distinguished name connected to proxy IP.

type: keyword

checkpoint.query
DNS query.

type: keyword

checkpoint.dns_query
DNS query.

type: keyword

checkpoint.inspection_item
Blade element performed inspection.

type: keyword

checkpoint.performance_impact
Protection performance impact.

type: integer

checkpoint.inspection_category
Inspection category: protocol anomaly, signature etc.

type: keyword

checkpoint.inspection_profile
Profile which the activated protection belongs to.

type: keyword

checkpoint.summary
Summary message of a non-compliant DNS traffic drops or detects.

type: keyword

checkpoint.question_rdata
List of question records domains.

type: keyword

checkpoint.answer_rdata
List of answer resource records to the questioned domains.

type: keyword

checkpoint.authority_rdata
List of authoritative servers.

type: keyword

checkpoint.additional_rdata
List of additional resource records.

type: keyword

checkpoint.files_names
List of files requested by FTP.

type: keyword

checkpoint.ftp_user
FTP username.

type: keyword

checkpoint.mime_from
Sender’s address.

type: keyword

checkpoint.mime_to
List of receiver address.

type: keyword

checkpoint.bcc
List of BCC addresses.

type: keyword

checkpoint.content_type
Mail content type. Possible values: application/msword, text/html, image/gif etc.

type: keyword

checkpoint.user_agent
String identifying requesting software user agent.

type: keyword

checkpoint.referrer
Referrer HTTP request header, previous web page address.

type: keyword

checkpoint.http_location
Response header, indicates the URL to redirect a page to.

type: keyword

checkpoint.content_disposition
Indicates how the content is expected to be displayed inline in the browser.

type: keyword

checkpoint.via
Via header is added by proxies for tracking purposes to avoid sending reqests in loop.

type: keyword

checkpoint.http_server
Server HTTP header value, contains information about the software used by the origin server, which handles the request.

type: keyword

checkpoint.content_length
Indicates the size of the entity-body of the HTTP header.

type: keyword

checkpoint.authorization
Authorization HTTP header value.

type: keyword

checkpoint.http_host
Domain name of the server that the HTTP request is sent to.

type: keyword

checkpoint.inspection_settings_log
Indicats that the log was released by inspection settings.

type: keyword

checkpoint.cvpn_resource
Mobile Access application.

type: keyword

checkpoint.cvpn_category
Mobile Access application type.

type: keyword

checkpoint.url
Translated URL.

type: keyword

checkpoint.reject_id
A reject ID that corresponds to the one presented in the Mobile Access error page.

type: keyword

checkpoint.fs-proto
The file share protocol used in mobile acess file share application.

type: keyword

checkpoint.app_package
Unique identifier of the application on the protected mobile device.

type: keyword

checkpoint.appi_name
Name of application downloaded on the protected mobile device.

type: keyword

checkpoint.app_repackaged
Indicates whether the original application was repackage not by the official developer.

type: keyword

checkpoint.app_sid_id
Unique SHA identifier of a mobile application.

type: keyword

checkpoint.app_version
Version of the application downloaded on the protected mobile device.

type: keyword

checkpoint.developer_certificate_name
Name of the developer’s certificate that was used to sign the mobile application.

type: keyword

checkpoint.email_control
Engine name.

type: keyword

checkpoint.email_message_id
Email session id (uniqe ID of the mail).

type: keyword

checkpoint.email_queue_id
Postfix email queue id.

type: keyword

checkpoint.email_queue_name
Postfix email queue name.

type: keyword

checkpoint.file_name
Malicious file name.

type: keyword

checkpoint.failure_reason
MTA failure description.

type: keyword

checkpoint.email_headers
String containing all the email headers.

type: keyword

checkpoint.arrival_time
Email arrival timestamp.

type: keyword

checkpoint.email_status
Describes the email’s state. Possible options: delivered, deferred, skipped, bounced, hold, new, scan_started, scan_ended

type: keyword

checkpoint.status_update
Last time log was updated.

type: keyword

checkpoint.delivery_time
Timestamp of when email was delivered (MTA finished handling the email.

type: keyword

checkpoint.links_num
Number of links in the mail.

type: integer

checkpoint.attachments_num
Number of attachments in the mail.

type: integer

checkpoint.email_content
Mail contents. Possible options: attachments/links & attachments/links/text only.

type: keyword

checkpoint.allocated_ports
Amount of allocated ports.

type: integer

checkpoint.capacity
Capacity of the ports.

type: integer

checkpoint.ports_usage
Percentage of allocated ports.

type: integer

checkpoint.nat_exhausted_pool
4-tuple of an exhausted pool.

type: keyword

checkpoint.nat_rulenum
NAT rulebase first matched rule.

type: integer

checkpoint.nat_addtnl_rulenum
When matching 2 automatic rules , second rule match will be shown otherwise field will be 0.

type: integer

checkpoint.message_info
Used for information messages, for example:NAT connection has ended.

type: keyword

checkpoint.nat46
NAT 46 status, in most cases "enabled".

type: keyword

checkpoint.end_time
TCP connection end time.

type: keyword

checkpoint.tcp_end_reason
Reason for TCP connection closure.

type: keyword

checkpoint.cgnet
Describes NAT allocation for specific subscriber.

type: keyword

checkpoint.subscriber
Source IP before CGNAT.

type: ip

checkpoint.hide_ip
Source IP which will be used after CGNAT.

type: ip

checkpoint.int_start
Subscriber start int which will be used for NAT.

type: integer

checkpoint.int_end
Subscriber end int which will be used for NAT.

type: integer

checkpoint.packet_amount
Amount of packets dropped.

type: integer

checkpoint.monitor_reason
Aggregated logs of monitored packets.

type: keyword

checkpoint.drops_amount
Amount of multicast packets dropped.

type: integer

checkpoint.securexl_message
Two options for a SecureXL message: 1. Missed accounting records after heavy load on logging system. 2. FW log message regarding a packet drop.

type: keyword

checkpoint.conns_amount
Connections amount of aggregated log info.

type: integer

checkpoint.scope
IP related to the attack.

type: keyword

checkpoint.analyzed_on
Check Point ThreatCloud / emulator name.

type: keyword

checkpoint.detected_on
System and applications version the file was emulated on.

type: keyword

checkpoint.dropped_file_name
List of names dropped from the original file.

type: keyword

checkpoint.dropped_file_type
List of file types dropped from the original file.

type: keyword

checkpoint.dropped_file_hash
List of file hashes dropped from the original file.

type: keyword

checkpoint.dropped_file_verdict
List of file verdics dropped from the original file.

type: keyword

checkpoint.emulated_on
Images the files were emulated on.

type: keyword

checkpoint.extracted_file_type
Types of extracted files in case of an archive.

type: keyword

checkpoint.extracted_file_names
Names of extracted files in case of an archive.

type: keyword

checkpoint.extracted_file_hash
Archive hash in case of extracted files.

type: keyword

checkpoint.extracted_file_verdict
Verdict of extracted files in case of an archive.

type: keyword

checkpoint.extracted_file_uid
UID of extracted files in case of an archive.

type: keyword

checkpoint.mitre_initial_access
The adversary is trying to break into your network.

type: keyword

checkpoint.mitre_execution
The adversary is trying to run malicious code.

type: keyword

checkpoint.mitre_persistence
The adversary is trying to maintain his foothold.

type: keyword

checkpoint.mitre_privilege_escalation
The adversary is trying to gain higher-level permissions.

type: keyword

checkpoint.mitre_defense_evasion
The adversary is trying to avoid being detected.

type: keyword

checkpoint.mitre_credential_access
The adversary is trying to steal account names and passwords.

type: keyword

checkpoint.mitre_discovery
The adversary is trying to expose information about your environment.

type: keyword

checkpoint.mitre_lateral_movement
The adversary is trying to explore your environment.

type: keyword

checkpoint.mitre_collection
The adversary is trying to collect data of interest to achieve his goal.

type: keyword

checkpoint.mitre_command_and_control
The adversary is trying to communicate with compromised systems in order to control them.

type: keyword

checkpoint.mitre_exfiltration
The adversary is trying to steal data.

type: keyword

checkpoint.mitre_impact
The adversary is trying to manipulate, interrupt, or destroy your systems and data.

type: keyword

checkpoint.parent_file_hash
Archive’s hash in case of extracted files.

type: keyword

checkpoint.parent_file_name
Archive’s name in case of extracted files.

type: keyword

checkpoint.parent_file_uid
Archive’s UID in case of extracted files.

type: keyword

checkpoint.similiar_iocs
Other IoCs similar to the ones found, related to the malicious file.

type: keyword

checkpoint.similar_hashes
Hashes found similar to the malicious file.

type: keyword

checkpoint.similar_strings
Strings found similar to the malicious file.

type: keyword

checkpoint.similar_communication
Network action found similar to the malicious file.

type: keyword

checkpoint.te_verdict_determined_by
Emulators determined file verdict.

type: keyword

checkpoint.packet_capture_unique_id
Identifier of the packet capture files.

type: keyword

checkpoint.total_attachments
The number of attachments in an email.

type: integer

checkpoint.additional_info
ID of original file/mail which are sent by admin.

type: keyword

checkpoint.content_risk
File risk.

type: integer

checkpoint.operation
Operation made by Threat Extraction.

type: keyword

checkpoint.scrubbed_content
Active content that was found.

type: keyword

checkpoint.scrub_time
Extraction process duration.

type: keyword

checkpoint.scrub_download_time
File download time from resource.

type: keyword

checkpoint.scrub_total_time
Threat extraction total file handling time.

type: keyword

checkpoint.scrub_activity
The result of the extraction

type: keyword

checkpoint.watermark
Reports whether watermark is added to the cleaned file.

type: keyword

checkpoint.snid
The Check Point session ID.

type: keyword

checkpoint.source_object
Matched object name on source column.

type: keyword

checkpoint.destination_object
Matched object name on destination column.

type: keyword

checkpoint.drop_reason
Drop reason description.

type: keyword

checkpoint.hit
Number of hits on a rule.

type: integer

checkpoint.rulebase_id
Layer number.

type: integer

checkpoint.first_hit_time
First hit time in current interval.

type: integer

checkpoint.last_hit_time
Last hit time in current interval.

type: integer

checkpoint.rematch_info
Information sent when old connections cannot be matched during policy installation.

type: keyword

checkpoint.last_rematch_time
Connection rematched time.

type: keyword

checkpoint.action_reason
Connection drop reason.

type: integer

checkpoint.action_reason_msg
Connection drop reason message.

type: keyword

checkpoint.c_bytes
Boolean value indicates whether bytes sent from the client side are used.

type: integer

checkpoint.context_num
Serial number of the log for a specific connection.

type: integer

checkpoint.match_id
Private key of the rule

type: integer

checkpoint.alert
Alert level of matched rule (for connection logs).

type: keyword

checkpoint.parent_rule
Parent rule number, in case of inline layer.

type: integer

checkpoint.match_fk
Rule number.

type: integer

checkpoint.dropped_outgoing
Number of outgoing bytes dropped when using UP-limit feature.

type: integer

checkpoint.dropped_incoming
Number of incoming bytes dropped when using UP-limit feature.

type: integer

checkpoint.media_type
Media used (audio, video, etc.)

type: keyword

checkpoint.sip_reason
Explains why source_ip isn’t allowed to redirect (handover).

type: keyword

checkpoint.voip_method
Registration request.

type: keyword

checkpoint.registered_ip-phones
Registered IP-Phones.

type: keyword

checkpoint.voip_reg_user_type
Registered IP-Phone type.

type: keyword

checkpoint.voip_call_id
Call-ID.

type: keyword

checkpoint.voip_reg_int
Registration port.

type: integer

checkpoint.voip_reg_ipp
Registration IP protocol.

type: integer

checkpoint.voip_reg_period
Registration period.

type: integer

checkpoint.voip_log_type
VoIP log types. Possible values: reject, call, registration.

type: keyword

checkpoint.src_phone_number
Source IP-Phone.

type: keyword

checkpoint.voip_from_user_type
Source IP-Phone type.

type: keyword

checkpoint.dst_phone_number
Destination IP-Phone.

type: keyword

checkpoint.voip_to_user_type
Destination IP-Phone type.

type: keyword

checkpoint.voip_call_dir
Call direction: in/out.

type: keyword

checkpoint.voip_call_state
Call state. Possible values: in/out.

type: keyword

checkpoint.voip_call_term_time
Call termination time stamp.

type: keyword

checkpoint.voip_duration
Call duration (seconds).

type: keyword

checkpoint.voip_media_port
Media int.

type: keyword

checkpoint.voip_media_ipp
Media IP protocol.

type: keyword

checkpoint.voip_est_codec
Estimated codec.

type: keyword

checkpoint.voip_exp
Expiration.

type: integer

checkpoint.voip_attach_sz
Attachment size.

type: integer

checkpoint.voip_attach_action_info
Attachment action Info.

type: keyword

checkpoint.voip_media_codec
Estimated codec.

type: keyword

checkpoint.voip_reject_reason
Reject reason.

type: keyword

checkpoint.voip_reason_info
Information.

type: keyword

checkpoint.voip_config
Configuration.

type: keyword

checkpoint.voip_reg_server
Registrar server IP address.

type: ip

checkpoint.scv_user
Username whose packets are dropped on SCV.

type: keyword

checkpoint.scv_message_info
Drop reason.

type: keyword

checkpoint.ppp
Authentication status.

type: keyword

checkpoint.scheme
Describes the scheme used for the log.

type: keyword

checkpoint.auth_method
Password authentication protocol used (PAP or EAP).

type: keyword

checkpoint.auth_status
The authentication status for an event.

type: keyword

checkpoint.machine
L2TP machine which triggered the log and the log refers to it.

type: keyword

checkpoint.vpn_feature_name
L2TP /IKE / Link Selection.

type: keyword

checkpoint.reject_category
Authentication failure reason.

type: keyword

checkpoint.peer_ip_probing_status_update
IP address response status.

type: keyword

checkpoint.peer_ip
IP address which the client connects to.

type: keyword

checkpoint.peer_gateway
Main IP of the peer Security Gateway.

type: ip

checkpoint.link_probing_status_update
IP address response status.

type: keyword

checkpoint.source_interface
External Interface name for source interface or Null if not found.

type: keyword

checkpoint.next_hop_ip
Next hop IP address.

type: keyword

checkpoint.srckeyid
Initiator Spi ID.

type: keyword

checkpoint.dstkeyid
Responder Spi ID.

type: keyword

checkpoint.encryption_failure
Message indicating why the encryption failed.

type: keyword

checkpoint.ike_ids
All QM ids.

type: keyword

checkpoint.community
Community name for the IPSec key and the use of the IKEv.

type: keyword

checkpoint.ike
IKEMode (PHASE1, PHASE2, etc..).

type: keyword

checkpoint.cookieI
Initiator cookie.

type: keyword

checkpoint.cookieR
Responder cookie.

type: keyword

checkpoint.msgid
Message ID.

type: keyword

checkpoint.methods
IPSEc methods.

type: keyword

checkpoint.connection_uid
Calculation of md5 of the IP and user name as UID.

type: keyword

checkpoint.site_name
Site name.

type: keyword

checkpoint.esod_rule_name
Unknown rule name.

type: keyword

checkpoint.esod_rule_action
Unknown rule action.

type: keyword

checkpoint.esod_rule_type
Unknown rule type.

type: keyword

checkpoint.esod_noncompliance_reason
Non-compliance reason.

type: keyword

checkpoint.esod_associated_policies
Associated policies.

type: keyword

checkpoint.spyware_name
Spyware name.

type: keyword

checkpoint.spyware_type
Spyware type.

type: keyword

checkpoint.anti_virus_type
Anti virus type.

type: keyword

checkpoint.end_user_firewall_type
End user firewall type.

type: keyword

checkpoint.esod_scan_status
Scan failed.

type: keyword

checkpoint.esod_access_status
Access denied.

type: keyword

checkpoint.client_type
Endpoint Connect.

type: keyword

checkpoint.precise_error
HTTP parser error.

type: keyword

checkpoint.method
HTTP method.

type: keyword

checkpoint.trusted_domain
In case of phishing event, the domain, which the attacker was impersonating.

type: keyword

checkpoint.comment
type: keyword
checkpoint.conn_direction
Connection direction

type: keyword

checkpoint.db_ver
Database version

type: keyword

checkpoint.update_status
Status of database update

type: keyword