In This Section: |
This section introduces the logging and monitoring clients, and explains how to install and configure logging and monitoring products.
Monitor logs and events using customizable views and reports. Use these GUI clients:
SmartConsole > |
Analyze events that occur in your environment with customizable views and reports. The Logs view replaces the SmartView Tracker and SmartLog SmartConsole GUI clients. |
SmartView Web Application |
A SmartEvent Web application. It has the same real-time event monitoring and analysis views as SmartConsole, with the convenience of not having to install a client. Browse to: https://<Server IP>/smartview/ where Server IP is IP address of the Security Management Server or SmartEvent server. |
These GUI clients are still supported:
SmartEvent |
|
SmartView Monitor |
For more about monitoring, see Monitoring Traffic and Connections. |
To open the SmartEvent GUI client:
To open the SmartView Monitor GUI client:
Security Gateways generate logs, and the Security Management Server generates audit logs. The Security Policy that is installed on each Security Gateway determines which rules generate logs.
Logs can be stored on a:
To find out how much storage is necessary for logging, see sk87263.
In a Multi-Domain Security Management environment, the Security Gateways send logs to the Domain Server or to dedicated Domain Log Servers. The Multi-Domain Server generates logs, and they can be stored on the Multi-Domain Server or on a dedicated Multi-Domain Log Server. To learn how to deploy logging in a Multi-Domain Security Management environment, see the R80 Multi-Domain Security Management Administration Guide.
To decrease the load on the Security Management Server, you can install a dedicated Log Server and configure the gateways to send their logs to this Log Server. To see the logs from all the Log Servers, connect to the Security Management Server with SmartConsole, and go to the Logs & Monitor view Logs tab.
A Log Server handles log management activities:
You can enable logging on the Security Management Server, or deploy a dedicated Log Server. After you deploy the Log Server, you must configure the Security Gateways for logging
In This Section |
To deploy a dedicated Log Server, you must install it, and then connect it to the Security Management Server.
https://<ServerIP>
You can connect the R80 Log Server to an R80 Security Management Server.
To connect the R80 Log Server to an R80 Security Management Server:
Security Gateways can store their logs on:
To configure a Security Gateway for logging:
The Check Point Gateway window opens.
Log indexing on the Security Management Server or Log Server reduces the time it takes to run a query on the logs. Log indexing is enabled by default.
To manually enable Log Indexing:
The General Properties window opens.
To save disk storage space, a Log Server can be configured to work in non-index mode. If you disable log indexing, queries will take longer. You must disable it on all management and Log Server objects in the environment. You are not allowed to have some Log Servers in index mode and other Log Servers in non-index mode.
When log indexing is disabled, you must connect with SmartConsole to each Log Server separately to query its logs. When you connect to the management server you do not get a unified view of all logs, as in index mode. On each Log Server, the search is done in one log file at a time.
Note - You cannot enable SmartEvent or a SmartEvent Correlation Unit on a Log Server on which indexing is disabled, or on other server in the environment. SmartEvent and Correlation Units require indexing.
To disable Log Indexing:
The General Properties window opens.
To select a log file to search:
SmartEvent Server is integrated with the Security Management Server architecture. It communicates with Security Management Log Servers to read and analyze logs. You can enable SmartEvent on the Security Management Server or deploy it as a dedicated server.
You can deploy R80 SmartEvent on a dedicated server and connect it to Security Management Servers or Multi Domain servers of version R77.xx (or earlier). This lets you extend an R77.xx environment with the new capabilities of R80 SmartEvent.
Only a Security Management Server can also work as a SmartEvent Server. In a Multi-domain environment, you must install SmartEvent on a dedicated server.
Note - For R80, SmartReporter functionality (to generate reports on firewall and VPN activity) is integrated into SmartConsole. To enable this functionality, activate the firewall session event on the SmartEvent Policy tab. Select and enable Consolidated Sessions > Firewall Session. For more, see Connecting SmartEvent Server to a Security Management Server.
in This Section: |
To deploy SmartEvent, you need a special license or contract. To get an evaluation license, contact your sales representative. SmartEvent Server installed on an open server comes with a 45 day trial period.
Check Point software is activated with a License Key. To generate a License Key, you need a Certificate Key.
To use SmartEvent, see the requirements in the R80 Release Notes.
The Network Activity report gives information about Firewall connections. For example, top sources, destinations, and services. To create this report, the SmartEvent must make an index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
Note: This configuration increases the number of events a day by five. This can have a performance effect.
Allocate partition size:
Configure the components of the dedicated server for SmartEvent on a Smart-1 appliance, or on an open server.
To configure the SmartEvent components:
https://
<ServerIP>To learn how to run the First Time Configuration Wizard, see the R80 Installation and Upgrade Guide.
R80 SmartConsole has the Logs & Monitor catalog of views, which includes the views in the SmartEvent GUI.
This procedure explains how to configure a dedicated server for these components:
To connect R80 SmartEvent Server and Correlation Unit to R80 Security Management Server:
The Network Activity report gives information about Firewall connections. For example, top sources, destinations, and services. To create this report, SmartEvent must make an index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
This procedure explains how to configure a dedicated server for these components:
To connect R80 SmartEvent Server and Correlation Unit to an R77.xx Security Management Server:
$RTDIR/scripts/SmartEvent_R80_change_dbsync_mode.sh
cpstart
has finished and you have a prompt.cpconfig
(2) Administrator
to configure the SmartEvent Server administrators.Note – Administrators that are configured in R77.xx SmartDashboard cannot manage the R80 SmartEvent Server.
The Network Activity report gives information about Firewall connections. For example, top sources, destinations, and services. To create this report, SmartEvent must make an index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
Note: This configuration increases the number of events a day by five. This can have a performance effect.
You can configure a dedicated R80 server for SmartEvent components, and connect them to one or more Domains in an R80 Multi-Domain Security Management environment.
This procedure explains how to configure a dedicated server for these SmartEvent components:
Notes:
To connect R80 SmartEvent Server and Correlation Unit to an R80 Multi-Domain Server:
\Global
).Note - The primary GUI application is the R80 SmartConsole. With R80, some configurations can be done only in the SmartEvent GUI client.
The Network Activity report gives information about Firewall connections. For example, top sources, destinations, and services. To create this report, SmartEvent must make an index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
Note: This configuration increases the number of events a day by five. This can have a performance effect.
You can connect R80 SmartEvent components to one or more Domains in an R77.xx Multi-Domain Security Management environment.
This procedure explains how to configure a dedicated server for these components:
Configure SmartEvent to read logs from one domain or a number of domains.
To connect R80 SmartEvent Server and Correlation Unit to an R77.xx Multi-Domain Server:
$RTDIR/scripts/SmartEvent_R80_change_dbsync_mode.sh
cpstart
has finished and you have a prompt.Note - The primary GUI application is the R80 SmartConsole. With R80, some configurations can be done only in the SmartEvent GUI client.
The Network Activity report gives information about Firewall connections. For example, top sources, destinations, and services. To create this report, SmartEvent must make an index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
Note: This configuration increases the number of events a day by five. This can have a performance effect.
You can get logs from and send logs to a third-party Log Server. The Check Point Log Server and the third party Log Server use the LEA (Log Export API) protocol to read logs. By default, the Check Point Log Server uses port 18184 for this connection. If you configure the Log Server to use a different LEA port, you must manually configure the new port on the SmartEvent Server and on the SmartEvent Correlation Unit.
To change the default LEA port:
$INDEXERDIR/log_indexer_custom_settings.conf
in a text editor.:lea_port (<
new_port_number>)
cpstop
$FWDIR/conf/fwopsec.conf
in a text editor.lea_server auth_port <
new_port_number>
lea_server port 0
cpstart
To configure SmartEvent to read logs from an externally-managed Log Server or an external Security Management Server, see sk35288.
An externally managed Log Server is managed by a different Security Management Server than the one that manages the SmartEvent Server. An external Security Management Server is not the one that manages the SmartEvent Server.
You can give an administrator permissions for:
To define an administrator with these permissions:
To Create an Administrator
The New Administrator window opens.
Note - If you cannot clear a resource selection, the administrator access to it is mandatory, and you cannot make it invisible
Some resources do not have the Read or Write option. You can only select (for full permissions) or clear (for no permissions) these resources.
In the Profile object, select the features and the Read or Write administrator permissions for them.
Monitoring and Logging Features
These are some of the available features:
Events and Reports Features
These are the permissions for the SmartEvent GUI:
In Multi-Domain Security Management, each Event and Report is related to a Domain. Administrators can see events for Domains according to their permissions.
A Multi-Domain Security Management Policy administrator can be:
If you do not want to centrally manage administrators, and you use the local administrator defined for the SmartEvent Server, run this CLI command on the SmartEvent Server:
cpprod_util CPPROD_SetValue FW1 REMOTE_LOGIN 4 1 1
You can define a special permission profile for administrators that only see and generate SmartEvent reports. With this permission profile, Administrators can open the SmartEvent client, but only see the Reports tab. They cannot access other security information in SmartEvent. You can configure this permissions profile to apply to the Application & URL Filtering blade only, or apply to all blades.
To create a SmartEvent report-only permissions profile:
The profile shows in the Permission Profiles page.
The administrator can examine logs from a previously generated log file. This makes it possible to review security threats and pattern anomalies that occurred in the past, before SmartEvent was installed. You can investigate threats such as unauthorized scans targeting vulnerable hosts, unauthorized legions, denial of service attacks, network anomalies, and other host-based activity.
The administrator can review logs from a specific time period in the past and focus on deploying resources on threats that have been active for a period of time but may have been missed (for example, new events which may have been dynamically updated can now be processed over the previous period).
To detect suspicious logging activity (that is, suspicious according to the Event Policy on the SmartEvent GUI > Policy tab), run the offline log file through the Correlation Unit.
The settings to generate of Offline logs are in: SmartEvent GUI client > Policy tab > General Settings > Initial Settings > Offline Jobs, connected to the Security Management Server or Multi-Domain Server.
The settings are:
SmartEvent Correlation Unit: the machine that reads and processes the Offline Logs.
Log Server: the machine that contains the Offline Log files. SmartEvent makes a query to this Log Server to find out which log files are available.
Log File contains a list of available log files found on the selected Log Server. These log files will be processed by the SmartEvent Correlation Unit. In this window, select the log file from which to retrieve historical information.
To import offline log files, add events to the SmartEvent Server. By default, you can import the 14 most recent days of offline logs. To import more days of logs, change the log indexing settings.
To change log indexing settings:
Note - Do this to make it possible to import logs that are older than the last 14 days before the SmartEvent Server was installed.
# evstop
log_indexer_custom_settings.conf
cp $INDEXERDIR/log_indexer_custom_settings.conf $INDEXERDIR/log_indexer_custom_settings.conf_orig
$INDEXERDIR/log_indexer_custom_settings.conf
in a text editor.:time_restriction_for_fetch_all (
<existing_data>)
:time_restriction_for_fetch_all_disp (
<existing_data>)
:num_days_restriction_for_fetch_all_integrated (<days>)
<
days>
is the last number of days of logs to be indexed by the SmartEvent Server. For example, to import and index logs from the last 30 days of logs, give a value of 30.
Note - To decrease the performance effect while you index the offline logs, import only the necessary number of days of logs.
# evstart
To allow the SmartEvent Server to index offline log files:
<log file name>.log*
to $FWDIR/log
. Copy the files to the Log Server that sends logs to the SmartEvent Server.To run SmartEvent offline jobs for multiple log files, see: sk98894.