TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
|---|---|---|---|---|---|---|---|
Checkpoint traffic logs | ✅ | ✅ | checkpoint_traffic | Syslog | S3 | ||
Check Point email security | ✅ | ✅ | ✅ | checkpoint_email_security | Json | S3 | |
Checkpoint EDR | checkpoint_edr | Syslog | S3 |
Overview
This article explains how to ingest your Check Point appliances' logs to Hunters.
Check Point Infinity's portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats.
Supported data types
Checkpoint traffic logs
Overview - Checkpoint traffic logs
Table name: checkpoint_traffic
Checkpoint traffic logs record data and analysis related to the flow of network traffic through Checkpoint firewall devices. These logs include detailed information on allowed and blocked traffic, tracking source and destination IP addresses, ports used, protocols, action taken by the firewall, and more. They are essential for security analysis, troubleshooting network issues, and ensuring compliance with security policies.
Send data to Hunters
💡Before you start
To complete the connection of these logs, you'll need to set up a Syslog server.
To complete the connection of these logs, you'll need to forward logs from Check Point's Log Exporter to a Syslog server and then ship them to AWS S3.
1. Forward Logs to the Syslog server
Follow Check Point's Log Export documentation to start forwarding logs from the Check Point log servers to your Syslog server. Be sure to ship the logs in the Syslog RFC 5424 format. If you are using Fluentd as your syslog server, set support_colonless_ident to false.
2. Ship the logs from the Syslog server to S3
📘 Useful resources
Use this detailed guide to learn how best to set up an S3 bucket for Hunters ingestion purposes and how to provide Hunters platform with access to the bucket.
Configure the Syslog server to ship the logs received to an S3 bucket shared with Hunters. If you're using Fluentd, make sure to send only the actual Syslog payload (the extradata section), by adding this clause to the out_s3 configuration:
<format>
@type single_value
message_key extradata
</format>
3. Verify files were written to S3
Browse to the S3 bucket to which the Syslog forwarder is set to send data.
Download the latest file and open it.
Make sure it is formatted as detailed in the Supported log formats section below.
4. Grant Hunters access to the S3 bucket
Complete the process as described in this guide.
Expected format
Hunters expects Check Point log files to be in the Check Point Syslog format, as outputted by the Check Point Log Exporter. The following is an example of a typical log line:
[action:"Accept"; flags:"000000"; ifdir:"inbound"; ifname:"eth3"; logid:"0";
origin:"192.168.1.1"; user:"John Smith (j.smith) "]
To achieve this result, send the logs as-is without extra wrappers and customizations. If you are using Fluentd as your Syslog server, additional instructions to achieve this can be found here.
Check Point Email Security
Overview - Check Point Email Security
Table name: checkpoint_email_security
Check Point Harmony Email & Collaboration (formerly Avanan) is an API-based email and collaboration security platform that connects directly to Microsoft 365, Google Workspace, and tools like Teams, OneDrive, and SharePoint to stop phishing, BEC, malware, and data loss before messages reach inboxes or files are shared. It analyzes content, links, and behavior using Check Point ThreatCloud intelligence and ML to detect zero-day threats, account takeover, graymail, and shadow IT. Deployment is lightweight (no MX change), policy-driven, and covers inbound, outbound, and internal email plus collaboration flows.
Send data to Hunters
Hunters supports the ingestion of Checkpoint-Email-Security logs using a S3 bucket.
To send data to Hunters:
Contact
check Pointsupport to learn how to route your Security logs to S3.Once the export is completed and the logs are collected to S3, follow the steps in this section.
Expected format
Hunters expects Check Point email security logs to be in the JSON format. The following is an example of a typical log line:
{
"event": {
"security_event": {
"entity_info": {
"entity_sub_type": "graymail",
"entity_type": "security_event",
"customer_farm": "mt-prod-***",
"customer_region": "us-***",
"customer_cluster": ["*"],
"customer_oem": "checkpoint",
"locale": "en-us",
"entity_reporter": "emails-***",
"entity_id": "evt-***",
"customer_domain": "org-***",
"entity_created": "2025-10-22T14:51:43.752958Z",
"entity_expiration": 1777560703
},
"entity_payload": {
"event_metadata": {
"sender_address": "<redacted_sender_email>",
"ap_detection_reasons": [
"No prior comms with sender",
"Low historical reputation",
"Suspicious-looking link",
"Suspicious-looking email text"
]
},
"confidence_level": 0,
"saas": "office365_emails",
"description_short": "Graymail detected in '<redacted_subject>' (<redacted_recipient>)",
"aggregation_id": "agg-***",
"current_state": "new",
"matched_security_tool": "avanan_ap_scan",
"event_trigger": { "type": "Policy", "id": "rule-***" },
"description_text": "Graymail detected in an email from <redacted_sender_email> - '<redacted_subject>' (<redacted_recipient>'s mailbox)",
"category": "graymail",
"confidence_indicator": "graymail",
"severity": 2
},
"saas_info": {
"entity_type": "office365_emails_email",
"saas_spam_verdict": "1",
"account_id": ["acct-***"],
"saas_actor_payload": {
"full_name": "<redacted_name>",
"email": "<redacted_recipient_email>",
"entity_id": "acct-***",
"is_external": false
}
},
"security_event_action": [],
"time": "2025-10-22T14:51:43.752437Z",
"_id": "doc-***"
},
"entity": {
"entity_info": {
"customer_domain": "org-***",
"customer_oem": "Check Point",
"entity_type": "office365_emails_email",
"entity_id": "mail-***",
"entity_reporter": "emails-***",
"entity_created": "2025-10-22T14:51:39.536937Z"
},
"entity_payload": {
"attachment_count": 0,
"body_content_type": "HTML",
"dkim_result": "pass",
"dmarc_result": "pass",
"from_domain": "<redacted_domain>",
"from_email": "<redacted_sender_email>",
"from_name": "<redacted_display_name>",
"is_incoming": true,
"network_message_id": "netmsg-***",
"orig_recipient": "<redacted_recipient_email>",
"recipients": ["<redacted_recipient_email>"],
"sent_datetime": "2025-10-22T14:51:31Z",
"size": 34568,
"spf_result": "pass",
"subject": "<redacted_subject>",
"to": ["<redacted_recipient_email>"],
"email_links": [
"https://<redacted_domain>/.../privacy_statement",
"https://<redacted_domain>/.../terms",
"https://<redacted_domain>/survey?...",
"https://<redacted_domain>/unsubscribe?email=<redacted>&..."
],
"email_links_domains": ["<redacted_domain_1>", "<redacted_domain_2>", "<redacted_domain_3>"]
},
"entity_security_result": {
"ap": [{
"sec_type": "ap",
"verdict": "graymail",
"payload": {
"reasons_by_category_list": ["Sender Reputation", "Links", "Email Text"],
"reasons_by_category": {
"Email Text": [{"short_text": "Suspicious-looking email text"}],
"Links": [{"short_text": "Suspicious-looking link"}],
"Sender Reputation": [
{"short_text": "No prior comms with sender"},
{"short_text": "Insignificant sender reputation"}
]
}
}
}],
"combined_verdict": { "ap": "graymail", "ms_defender": "clean", "shadow_it": "clean" },
"ms_defender": [{"sec_type": "ms_defender", "verdict": "clean"}],
"shadow_it": [{"sec_type": "shadow_it", "verdict": "clean"}]
},
"saas_info": {
"saas_actor_id": "<redacted_recipient_email>",
"saas_entity_created": "2025-10-22T14:51:33Z",
"saas_entity_type": "email",
"saas_id": "office365_emails"
},
"time": "2025-10-22T14:51:47.633925Z"
}
}
}
Check Point EDR logs
Overview - Checkpoint edr logs
Table name: checkpoint_edr
Check Point EDR logs represent the telemetry, security events, and operational activity generated by the Check Point Endpoint Security Client running on Windows, macOS, or Linux hosts. These logs typically include firewall enforcement events (such as inbound/outbound connection drops or allows), anti-malware update and detection telemetry, endpoint posture data (client version, installed blades, OS details), user identity information (username, SID, tenant), and policy metadata (policy name, GUID, rule name, rule ID). In addition to endpoint activity, the logs can also contain management-plane audit events, such as WEB_API logins, administrator actions, and Endpoint Security Console object modifications. Altogether, Check Point EDR logs provide a detailed picture of endpoint protections, network behavior, security policy application, user activity, and administrative operations across the environment.
Send data to Hunters
💡Before you start
To complete the connection of these logs, you'll need to set up a Syslog server.
To complete the connection of these logs, you'll need to forward logs from Check Point's Log Exporter to a Syslog server and then ship them to AWS S3.
You have to create a certificate (self-signed should be fine)
openssl genrsa -out checkpoint.key 2048
openssl req -new -key checkpoint.key -out checkpoint.csr
<fill out certificate>
openssl req -text -noout -verify -in checkpoint.csr
openssl x509 -req -days 365 -in checkpoint.csr -signkey checkpoint.key -out checkpoint.crt
cat checkpoint.crt checkpoint.key > checkpoint.pem
openssl pkcs12 -export \
-out checkpoint.pfx \
-inkey checkpoint.key \
-in checkpoint.crtTake the certificate, go to the Endpoint Settings → Certificate Management → add the certificates.
Common Name (CN) should be where the logs are sending to the syslog server (in many cases, the Cribl syslog address)
The certificate should have a password.
Endpoint Settings -> Export Events -> Add PW
.png?sv=2022-11-02&spr=https&st=2025-12-10T03%3A08%3A22Z&se=2025-12-10T03%3A27%3A22Z&sr=c&sp=r&sig=Tkm3%2F9gXRxFRcomWK9DjLS%2FHbWJDgO5een5oacgCZQk%3D)
1. Forward Logs to the Syslog server
Follow Check Point's Log Export documentation to start forwarding logs from the Check Point log servers to your Syslog server. Be sure to ship the logs in the Syslog RFC 5424 format. If you are using Fluentd as your syslog server, set support_colonless_ident to false.
2. Ship the logs from the Syslog server to S3
📘 Useful resources
Use this detailed guide to learn how best to set up an S3 bucket for Hunters ingestion purposes and how to provide Hunters platform with access to the bucket.
Configure the Syslog server to ship the logs received to an S3 bucket shared with Hunters. If you're using Fluentd, make sure to send only the actual Syslog payload (the extradata section), by adding this clause to the out_s3 configuration:
<format>
@type single_value
message_key extradata
</format>
3. Verify files were written to S3
Browse to the S3 bucket to which the Syslog forwarder is set to send data.
Download the latest file and open it.
Make sure it is formatted as detailed in the Supported log formats section below.
4. Grant Hunters access to the S3 bucket
Complete the process as described in this guide.
Expected format
Hunters expects Check Point log files to be in the Check Point Syslog format 5452, as outputted by the Check Point Log Exporter. The following is an example of a typical log line:
<134>1 2025-11-29T00:00:00Z i-AAAAAAAAAAAAAAA1 CheckPoint 12498 - [flags:"133440"; ifdir:"inbound"; ifname:"daemon"; loguid:"{0x692a3781,0x0,0x80164a4,0x186c30d2}"; origin:"1.1.1.1"; originsicname:"cn=cp_mgmt,o=gw-XXXXXX..YYYYYY"; sequencenum:"1"; time:"1764374400"; version:"5"; log_sys_message:"Log file has been switched to: 2025-11-29_000000.log"]
<134>1 2025-11-29T00:00:00Z i-AAAAAAAAAAAAAAA1 CheckPoint 12498 - [flags:"133472"; ifdir:"inbound"; ifname:"daemon"; loguid:"{0x692a3782,0x0,0x80164a4,0x186c30d2}"; origin:"1.1.1.1"; originsicname:"cn=cp_mgmt,o=gw-XXXXXX..YYYYYY"; sequencenum:"2"; time:"1764374400"; version:"5"; log_sys_message:"Log file has been switched to: 2025-11-29_000000.adtlog"]
<134>1 2025-11-29T00:00:03Z i-AAAAAAAAAAAAAAA1 CheckPoint 12498 - [action:"Drop"; flags:"131104"; ifdir:"inbound"; loguid:"{0x692a3784,0x0,0x80164a4,0x186c30d2}"; origin:"1.1.1.1"; originsicname:"cn=cp_mgmt,o=gw-XXXXXX..YYYYYY"; sequencenum:"1"; time:"1764374403"; version:"5"; additional_info:"Version: 'XXXX';Policy Name: 'Policy-Redacted'"; administrator:"admin@example.com"; machine:"host1"; objectname:"PolicyObject1"; objecttype:"Endpoint policy object"; operation:"Create Object"; product:"Endpoint Security Console"; subject:"Object Manipulation"; uid:"00000000-0000-0000-0000-000000000000"]
To achieve this result, send the logs as-is without extra wrappers and customizations. If you are using Fluentd as your Syslog server, additional instructions to achieve this can be found here.