Supported Indicator Files
Indicator Pattern of relevant observable malicious activity in an operational cyber domain, with relevant information on how to interpret it and how to handle it. files must be in CSV or STIX
Structured Threat Information eXpression™. A language that describes cyber threat information in a standardized and structured way. XML (STIX 1.0) format:
-
SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. supports CSV files only in the Check Point format.
-
The CLI also supports other formats of CSV files, as long as their upload complies with the applicable syntax rules.
Each record in CSV Check Point format and the STIX XML (STIX 1.0) format must have these fields (files in other CSV format do not have to include all these fields, see Importing Threat Indicator Files through the CLI and Importing External Custom Intelligence Feeds in CLI).

-
If an optional field is empty, the default value is used.
-
If a mandatory field is empty, the Indicator file does not load.

Observable Type |
Validation Criteria |
---|---|
URL |
Any valid URL |
Domain |
Any URL domain |
IP |
Standard IPv4 address |
IP Range |
A range of valid IPv4 addresses, separated by a hyphen: |
MD5 |
Any valid MD5 |
SHA1 |
Any valid SHA1 |
SHA256 |
Any valid SHA256 |
Mail-subject |
Any non-empty text string |
Mail-to Mail-from Mail-cc Mail-reply-to |
Can be one of these:
|
|
Notes:
|