Importing External Custom Intelligence Feeds in CLI

You can import threat indicator feeds from external sources directly to the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.. After you import the feeds for the first time and install policy, the Security Gateway automatically pulls and enforces the indicator file each time the file is updated. The Security Gateway imports the file over HTTP or HTTPS, or by reading from a local file or folder.

Important - You must import the feed files on each Security Gateway and Cluster MemberClosed Security Gateway that is part of a cluster. separately.

Automated custom intelligence feeds support STIXClosed Structured Threat Information eXpression™. A language that describes cyber threat information in a standardized and structured way. XML (STIX 1.0) files, CSV files in Check Point format, and CSV files in other formats.

To import Threat IndicatorClosed Pattern of relevant observable malicious activity in an operational cyber domain, with relevant information on how to interpret it and how to handle it. files in a CSV format that is different than the Check Point CSV format, follow the syntax rules provided in this section.

Examples

To learn more about Custom Intelligence Feeds, see sk132193.