Download Complete PDF Send Feedback Print This Page

Synchronize Contents

Next

Introduction

Related Topics

SmartView Tracker Overview

Tracking Network Traffic

Log Suppression

SmartView Tracker GUI

SmartView Tracker Overview

You need different levels of tracking, depending on the data's importance. For example, while you may choose to track standard network patterns (e.g., your users' surfing patterns), this information is not urgent and you can inspect it at your convenience. If your network is being attacked, you must be alerted immediately.

Check Point products provide you with the ability to collect comprehensive information on your network activity in the form of logs. You can then audit these logs at any given time, analyze your traffic patterns and troubleshoot networking and security issues. The figure below illustrates the log collection and tracking process:

Log_Collection

The SmartDashboard allows you to customize your tracking settings for each Rule Base, by specifying per-rule whether or not to track the events that match it.

If you decide to track the events that match a certain rule, you can choose from a variety of tracking options, based on the information's urgency. For example, you can choose a standard Log for allowed http connections; opt for an Account log when you wish to save byte data; or issue an Alert (in addition to the log) when a connection's destination is your gateway. For a list of the available tracking options, right-click the relevant rule's Track column.

The gateways on which this Policy is installed collect data as specified in the Policy, and forward the logs to the Security Management server (and/or to Log Servers, depending on their settings). The logs are organized in files according to the order in which they arrived to the Security Management server. All new logs are saved to the fw.log file, except for audit (management-related) logs, which are saved to the fw.adtlog file.

The Security Management server makes these logs available for inspection via SmartView Tracker - a comprehensive auditing solution, enabling central management of both active and old logs of all Check Point products. You can conveniently customize searches to address your specific tracking needs; integrate the logs with the Check Point SmartReporter; or export them to text files or to an external Oracle database.

The Security Management server also performs the operations specified in the Policy for events matching certain rules (e.g., issuing an alert, sending email, running a user-defined script etc.).

In addition to the above solutions, you can benefit from the tracking and auditing capabilities of the following Check Point SmartConsole:

  • SmartView Monitor allows you to manage, view and test the status of various Check Point components throughout the system, as well as to generate reports on traffic on interfaces, specific Check Point products, and other Check Point system counters.
  • SmartReporter allows you to save consolidated records (as opposed to "raw" logs) and conveniently focus on events of interest.

Tracking Network Traffic

The SmartView Tracker can be used to track all daily network traffic and activity logged by any Check Point and OPSEC Partners log-generating product. It can also be used to give an indication of certain problems. Network administrators can use the log information for:

  • Detecting and monitoring security-related events.

    For example, alerts, repeated rejected connections or failed authentication attempts, might point to possible intrusion attempts.

  • Collection information about problematic issues.

    For example, a client has been authorized to establish a connection but the attempts to connect have failed. The SmartView Tracker might indicate that the Rule Base has been erroneously defined to block the client's connection attempts.

  • Statistical purposes such as analyzing network traffic patterns.

    For example, how many HTTP services were used during peak activity as opposed to Telnet services.

Log Suppression

The SmartView Tracker is designed to efficiently present the logs that are generated from Check Point products. To avoid displaying log entries for a frequently repeating event, SmartView Tracker displays the first instance of the event and then counts subsequent instances which occur in the next two minutes.

For as long as the event continues to occur, every two minutes SmartView Tracker shows a Log Suppression Report which contains the details of the event as well as the number of times the event occurred.

SmartView Tracker GUI

In the main window of SmartView Tracker, an entry in the Records pane is a record of an event that was logged according to a specific rule in the Rule Base. New records that are added to the fw.log file are automatically added to the Records pane as well.

To understand the figure, refer to the numbers in the figure and the following list.

  1. The Network & Endpoint, Active and Management modes display different types of logs.
  2. The Query Tree pane displays the Predefined and Custom queries.
  3. The Query Properties pane displays the properties of the fields in the Records pane.
  4. The Records pane displays the fields of each record in the log file.

The log fields displayed are a function of the following factors:

  • The software blade that generated the log, such as Firewall, VPN or IPS.
  • The type of operation performed, such as installation or opening a connection.

For example, when NAT is used, the address translation fields (with the 'Xlate' prefix, e.g., XlateSrc, XlateDst etc.) are displayed. When Firewall is used, IKE-related fields (e.g., IKE Cookiel, IKE CookieR etc.) are displayed.

SmartView Tracker Toolbar

Icon

Menu Command

Description

File > Open

Open an existing Log File.

File > Save As

Save the Log File under a new name in a new location.

File > Switch Active File

Open a new active Log File.

Tools > Remote Files Management

Remote log files management

View > Files Fetch Progress

Hide or show the Files Fetch Progress Window.

View > Query Tree

Hide or show the Query Tree on the left side of the window.

Query > Hide Identities

Hide or show user identities. Only users with relevant permissions can view identities.

Select a query > Query > Open

Open an existing Query.

Query > Save Query

Save the modifications you made to the custom Query.

Query > Save Query As

Save the Query under a new name in the Custom folder.

F1

Online Help

SmartView Tracker Query Toolbar

Note - Some of the toolbar buttons are shortcuts for menu commands. Some toolbar buttons do not have corresponding menu commands.

The following table describes the toolbar buttons for the Query Properties pane.

Icon

Description

Show or hide query properties.

Apply all filtering criteria.

Display the name of the host and the domain.

Display the type of service the port uses.

Show all null matches.

The Autoscroll button enables you to update the Log File to display all new log entries and place them at the end of the Log File.

Delete all filtering criteria in the Log File.

Find the specified text string in all fields.

Go to the top of the Log File.

Go to the bottom of the Log File.

Shows the total number of filtered records.

The Abort button enables you to stop loading Log data from the server or abort any action which is in progress or on queue to begin.

SmartView Tracker Actions

The following table gives a description of the different types of actions recorded by SmartView Tracker.

Action Filter

Description

Accept

The connection was allowed to proceed.

Reject

The connection was blocked.

Drop

The connection was dropped without notifying the source.

Detect

The connection was monitored without enforcing IPS protections.

Encrypt

The connection was encrypted.

Authcrypt

SecuRemote user logon.

Bypass

The connection passed transparently through InterSpect.

Flag

Flags the connection.

Login

A user logged into the system.

Reject

The connection was rejected.

VPN routing

The connection was routed through the gateway acting as a central hub.

Decrypt

The connection was decrypted.

Key Install

Encryption keys were created.

Authorize

Client Authentication logon.

Deauthorize

Client Authentication logoff.

Block

Connection blocked by Interspect.

Detect

Connection was detected by Interspect.

Inspect

Connection was subject to InterSpect configured protections.

Quarantine

The IP source address of the connection was quarantined by InterSpect.

Replace Malicious code

Malicious code in the connection was replaced.

DLP Actions

Specific actions for DLP incidents include:

DLP Action

Description

Ask User

DLP incident captured and put in Quarantine, user asked to decide what to do.

Do not Send

User decided to drop transmission that was captured by DLP.

Send

User decided to continue transmission after DLP notified that it may contain sensitive data.

Quarantine Expired

DLP captured data transmission cannot be sent because the user did not make a decision in time. Expired incidents may still be viewed, until they are deleted (routine cleanup process).

Prevent

DLP transmission was blocked.

Allow

DLP transmission was allowed; usually by exception to rule.

Inform User

DLP transmission was detected and allowed, and user notified.

Deleted Due To Quota

DLP incidents are deleted from gateway for disk space.

DLP General Columns

DLP incidents may show any of these columns and are available to all administrators.

DLP Columns

Description

Incident UID

Unique ID of the incident.

DLP Action Reason

Reason for the action. Possible values: Rulebase, Internal Error, Prior User Decision

Related Incident

Internal incident ID related to the current log.

DLP Transport

Protocol of the traffic of the incident: HTTP, FTP, SMTP.

Using the Incident UID as a key between multiple logs:

Each DLP incident has a unique ID included in the log and sent to the user as part of an email notification. User actions (Send, Do not Send) are assigned the same Incident UID that was assigned to the original DLP incident log.

If a user sends an email with a DLP violation and then decides to discard it, two logs are generated. The first log is a DLP incident log with Ask User action and is assigned an Incident UID. On the user action, the second log is generated with the same UID, with the Do not Send action.

Each matched data type generates its own log. The gateway makes sure that all the data type logs of one incident indicate the same unique Incident UID and rule action (Prevent, Ask, Inform, or Detect), even if data types were matched on different rules. The common action for an incident is the most restrictive.

For example, assume a transmission matches two data types. Each data type is used in a different rule. The action of one rule is Prevent. The action of another rule is Detect. The two logs that are generated will indicate Prevent as the action. (The action implemented will be Prevent.) The log of the Detect rule will show Rule Base (Action set by different rule) in the DLP Action Reason column.

DLP Restricted Columns

These columns are restricted to administrators with permissions.

Restricted Filters

Description

DLP Rule Name

Name of the DLP rule on which the incident was matched.

DLP Rule UID

Internal rule ID of the DLP rule on which the incident was matched.

Data Type UID

Internal ID of the data type on which the incident was matched.

Data Type Name

Name of the matched data type.

User Action Comment

Comment given by user when releasing the incident from the Portal.

DLP Recipients

For SMTP traffic, list of recipients of captured email.

Scanned Data Fragment

Captured data itself: email and attachment of SMTP, file of FTP, or HTTP traffic.

Message to User

Message sent, as configured by administrator, for the rule on which the incident was matched.

DLP Categories

Category of data type on which the incident was matched.

DLP Words List

If the data type on which the incident was matched included a word list (keywords, dictionary, and so on), the list of matched words.

Mail Subject

For SMTP traffic, the subject of captured email.

Identity Awareness Columns

Incidents for Identity Awareness show information about the AD name and IP address associations.

Identity Awareness Column

Description

Destination Machine Name

Resolved AD name of a machine associated with destination IP of a logged traffic.

Destination User Name

Resolved AD name of a user associated with destination IP of a logged traffic.

Source Machine Name

Resolved AD name of a machine associated with source IP of a logged traffic.

Source User Name

Resolved AD name of a user associated with source IP of a logged traffic.

IPS Columns

The Protection Type column is relevant to IPS protection incidents. You can filter for any of these types:

  • Application Control
  • Engine Settings
  • Geo Protection
  • Protocol Anomaly
  • Signature

Other columns specific to the IPS Software Blade:

  • Protected Server
  • Source Reputation
  • Destination Reputation
  • Client Type
  • Server Type

IPS-1 Columns

These columns are relevant for IPS-1 appliances.

IPS-1 Product Column

Description

RPC Service Number

Protocol detail.

VLAN ID

Internal ID of the VLAN.

MAC Destination Address
MAC Source Address

MAC address associated with destination or source machine.

Command

Used in protocol context and is name or identifier of the command used in the traffic of the attack.

Destination DHCP Hostname
Destination DNS Hostname
NetBIOS Destination Hostname
NetBIOS Source Hostname
Source DHCP Hostname
Source DNS Hostname

Name of the host associated with source or destination of the logged traffic according to the relevant resolving service. Not all those fields are filled in the same time.

Source OS
Destination OS

OS type of source or destination machine.

Email Address

Email address fetched from attack traffic.

Email Subject

Subject of the email caught in attack traffic.

Hostname

If in attack traffic we find host name that is unrelated to the either source or destination, it is given here.

HTTP Referer
HTTP Modifier
Cookie
URI
Payload

HTTP protocol elements.

Attack Assessment

Possible values: Failed, Successful, Unknown.

Attack Impact

Possible values: Admin Access, Code Execution, Data Access, Denial of Service, Information Gathering, Security Violation, Unknown, User Access.

Sensor Mode

Possible values: Invalid, Passive, Inline - Fail-open, Inline - Fail-closed, Inline - Monitor only.

Activated Quarantine

Whether attack caused quarantine.

SmartView Tracker Modes

SmartView Tracker consists of three different modes:

  • Log, the default mode, displays all logs in the current fw.log file. These include entries for security-related events logged by different Check Point software blades, as well as Check Point's OPSEC partners. New logs that are added to the fw.log file are added to the bottom of the Records pane.
  • Active allows you to focus on connections that are currently open through the Security Gateways that are logging to the active Log file.
  • Audit allows you to focus on management-related records, such as records of changes made to objects in the Rule Base and general SmartDashboard usage. This mode displays audit-specific data, such as the record's Administrator, Application or Operation details, which is read from the fw.adtlog file.

You can toggle between modes by clicking the desired tab.

 
Top of Page ©2013 Check Point Software Technologies Ltd. All rights reserved. Download Complete PDF Send Feedback Print