CPLogInvestigator

Description

This heuristic tool can analyze the specified logs files from managed Security Gateways and show:

Important - You can run this command only in the Expert mode.

Syntax

CPLogInvestigator

      [-h]

      [-d]

      [-a]

      [{-i /<Path>/<Name of Log File> | -f <Path to Directory>}]

      [-l]

      [-m]

      [-p]

      [-u <Number of Users>]

Parameters

Parameter

Description

-h

Shows the built-in help.

No Parameters

Analyzes the events in all the $FWDIR/log/*.log files (the activeClosed State of a Cluster Member that is fully operational: (1) In ClusterXL, this applies to the state of the Security Gateway component (2) In 3rd-party / OPSEC cluster, this applies to the state of the cluster State Synchronization mechanism. log and the rotated logs).

The default analysis duration for each log file is 60 seconds.

-d

Runs the command in debug mode.

Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a file, or use the script command to save the entire CLI session.

This option "-d" is not supported (ignored) when specified together with the option "-p".

-a

Analyzes the events in all the "*.log" files - the active log and the rotated logs.

The default path is $FWDIR/log/.

The default analysis duration is 60 seconds.

If the number of log files is large, and the log files are large, then the analysis can take significant time.

-f <Path to Directory>

Analyzes the events in all the "*.log" files in the specified directory.

This parameter must the last parameter in the syntax.

-i /<Path>/<Name of Log File>

Analyzes the events in the specified log file.

This parameter must the last parameter in the syntax.

-l

Limits the duration of the analysis to 60 seconds.

-m

Saves the number of logs for each minute of analyzes log files in the output file called "logPerMinute.txt" in the current working directory.

-p

Shows the daily estimated number of logs from each Software Blade that generated these logs.

-u <Number of Users>

Specifies the number of required users to show estimations for events from the Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI. and the URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. Software Blades.

Examples