IoT Virtual Patch Protection

The IoT Virtual Patch is a proactive security feature that helps organizations reduce the risk of newly discovered software vulnerabilities, even before official vendor patches are available. It acts as a temporary shield at runtime, blocking known exploit techniques and minimizing exposure during the critical window between vulnerability discovery and patch release.

Virtual Patch Configuration APIs

You can manage the Virtual Patch feature using two REST APIs. These APIs support offline and automated management and let you change how the patching system works and upload custom protection rules. You send requests to these APIs from the local machine using HTTP.

  • Set Virtual Patch Policy: Choose how the system reacts to threats—block them, log them, or turn off protection.

  • Set Virtual Patch Signatures: Add or update detection rules that help the system recognize known attacks.

To request custom signatures, contact Check Point Support and provide relevant traffic samples. We will review the data and generate tailored protections for your environment.

Logs and Events

The Nano Agent saves the logs locally in the /var/log/nano-agent/cp-nano-orchestration.log file.

IoT Virtual Patch Log

When a Virtual Patch event is triggered, it generates a detailed log entry. This entry explains what was detected, why it matched, and how the system responded.

See below the field descriptions.

Field

Type

Description

matchedSignatureConfidence

String

Indicates the detection engine's confidence level in matching the exploit. Values: High, Medium, or Low. Higher values indicate more reliable detection.

matchedSignaturePerformance

String

Represents the expected system performance impact of the signature. Values: Low, Medium, or High.

matchedSignatureSeverity

String

Describes the potential impact of the attack if successful. Values: Critical, High, Medium, Low.

matchedSignatureCVE

String

Lists CVE identifiers associated with the detected exploit. Useful for correlating logs with known vulnerabilities.

signatureVersion

String

Identifies the version of the deployed signature package at the time of detection. Used for auditing and troubleshooting.

protectionId

String

Human-readable identifier for the protection that triggered the detection (for example, exploit category or affected product).

indicatorsSource

String

Specifies the source of Threat Intelligence used to generate the detection logic (for example, Check Point).

indicatorsVersion

String

Specifies the version number of the indicators feed (for example, Threat Intelligence or signature database). Useful for version tracking.

waapIncidentType

String

Categorizes the attack by type, such as Injection, XSS, Traversal, etc. Used for classification and filtering.

matchedSample

String

Contains the raw HTTP request sample that triggered the signature. Critical for forensic analysis and investigation.

matchedSignatureYear

String

Indicates the year the signature was released or the vulnerability was published. Helps assess signature age.

waapOverride

String

Indicates whether any manual override (policy change or admin action) affected the decision. None means no override is applied.

securityAction

String

The action taken by the system when the signature matched. Values: Prevent or Detect.