Configuring Identity Logging for a Log Server

When you enable Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. on a Log ServerClosed Dedicated Check Point server that runs Check Point software to store and process logs., you add user and computer identification to Check Point logs. Administrators can then analyze network traffic and security-related events better.

The Log Server communicates with Active Directory servers. The Log Server stores the data extracted from the AD in an association map. When Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. generate a Check Point log entry and send it to the Log Server, the server gets the user and computer name from the association map entry that corresponds to the source IP address of the event log. It then adds this identity aware information to the log.

Enabling Identity Awareness on the Log Server for Identity Logging

Preliminary Actions

Before you enable Identity Awareness on the Log Server for Identity LoggingClosed Check Point Software Blade on a Management Server to view Identity Logs from the managed Security Gateways with enabled Identity Awareness Software Blade.:

  • Make sure there is network connectivity between the Log Server and the domain controller of your Active Directory environment.

  • Get the Active Directory administrator credentials.

Enabling Procedure

  1. Log in to SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on..

  2. From the Navigation Toolbar, click Gateways & Servers.

  3. Open the Log Server object.

  4. In the General Properties page, in the Management section, select Logging & StatusClosed Check Point Software Blade on a Management Server to view Security Logs from the managed Security Gateways. and Identity Awareness.

    The Identity Awareness Configuration wizard opens.

  5. On the Acquire Identities For Logs window, click OK.

  6. Click Next.

  7. The Identity Awareness is Now Active page opens with a summary of the acquisition methods.

  8. Click Finish.

  9. Optional: In the Log Server object, go to the Identity Awareness page and configure the applicable settings.

  10. Click OK.

WMI Performance

Bandwidth between the Log Server and Active Directory Domain Controllers

The amount of data transferred between the Log Server and domain controllers depends on the amount of events generated. The generated events include event logs and authentication events. The amounts vary according to the applications running in the network. Programs that have many authentication requests result in a larger amount of logs. The observed bandwidth range varies between 0.1 to 0.25 Mbps per each 1000 users.

CPU Impact

When using AD Query, the impact on the domain controller CPU is less than 3%.