Check Point Harmony Endpoint

edit

Version

0.2.0 [beta] This functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features. (View all)

Compatible Kibana version(s)

8.14.0 or higher

Supported Serverless project types
What’s this?

Security
Observability

Subscription level
What’s this?

Basic

Level of support
What’s this?

Elastic

The Check Point Harmony Endpoint integration allows you to ingest data from Harmony Endpoint management service(https://www.checkpoint.com/harmony/endpoint/).

Harmony Endpoint EPMaaS (Endpoint Management as a Service) is the cloud service to manage policies and deployments for Endpoint Security. It provides advanced threat prevention and detection capabilities to safeguard endpoints from malware, ransomware, and other sophisticated attacks. The solution offers real-time protection through behavioral analysis, machine learning, and threat intelligence.

For details please refer to the Harmony Endpoint Admin guide

Setup

edit
To collect data from Check Point Harmony Endpoint, the following parameters from your Harmony Endpoint instance are required:
edit
  1. Server URL
  2. Client ID
  3. Secret key

To use this integration generate an API Key. API key consists of Client ID and Secret Key. Users can create API Keys by browsing to Infinity Portal at GLOBAL SETTINGS > API Keys. When creating an API Key, make sure that Service is set to Logs as a Service.

To create an API key please refer to Check Point’s Infinity API Guide. A list of servers can also be found there.

Following are optional parameters which are used for fine-tuning:
edit
  1. Initial Interval: Initial interval for which existing logs will be pulled.
  2. Interval: Interval at which new logs will be pulled.
  3. Limit: Sets the number of results to return per API search query.
  4. Page Limit: Sets the number of results to return per page, in API search query.
Enabling Integration in Elastic
edit
  1. In Kibana go to Management > Integrations
  2. In "Search for integrations" search bar, type Check Point Harmony Endpoint
  3. Click on the "Check Point Harmony Endpoint" integration from the search results.
  4. Click on the "Add Check Point Harmony Endpoint" button to add the integration.
  5. Add all the required integration configuration parameters, such as Server URL, Client ID, Secret Key. For all data streams, these parameters must be provided in order to retrieve logs.
  6. Save the integration.

Data Streams:

edit
  1. Anti-bot: This is behavioral protection against bots. A single bot can create multiple threats. Cybercriminals often use bots in Advanced Persistent Threat (APT) attacks to target specific individuals or organizations.
  2. Anti-Malware: Protects computers from viruses, spyware, and other malicious software. It uses real-time and scheduled scans to detect and neutralize threats before they can harm your computer.
  3. Forensics: This component monitors file operations, processes, and network activity for suspicious behavior. It analyzes attacks detected by other client components or the Check Point Security Gateway and applies remediation to malicious files.
  4. Threat Emulation: Detects zero-day and unknown attacks. Files on the endpoint computer are sent to a sandbox for emulation to uncover evasive zero-day attacks.
  5. Threat Extraction: Proactively protects users from downloaded malicious files. It quickly delivers safe files while inspecting the originals for potential threats.
  6. URL Filtering: Defines which websites are accessible within your organization. The URL Filtering policy consists of selected sites and the mode of operation applied to them.
  7. Zero-phishing: Examines various website characteristics to ensure a site isn’t impersonating another to maliciously collect personal information. It generates alerts for potential phishing sites.

Logs Reference

edit
Anti-bot
edit

This is Anti-bot dataset.

Example

An example event for antibot looks as following:

{
    "@timestamp": "2024-09-02T08:53:44.000Z",
    "agent": {
        "ephemeral_id": "cebc2bcd-9723-4948-bfd6-fc0e0dfd5784",
        "id": "d4e5bf31-1f9a-4721-9f32-d3d87eca6898",
        "name": "elastic-agent-88462",
        "type": "filebeat",
        "version": "8.15.1"
    },
    "checkpoint_harmony_endpoint": {
        "antibot": {
            "advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"Anti Bot exclusions\",\"exclusion_type\":\"URL\",\"exclusion_value\":{\"default_value\":\"http://www.threat-cloud.com/test/files/MediumConfidenceBot.html\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
            "client": {
                "name": "Check Point Endpoint Security Client",
                "version": "88.50.0213"
            },
            "confidence_level": "Medium",
            "description": "Detected bot activity [Anti-Bot test.TC.e]. To exclude: On the Harmony Endpoint Management add an exclusion of type \"URL\" with value: \"http://www.threat-cloud.com/test/files/MediumConfidenceBot.html\"",
            "event_type": "Anti Bot Event",
            "installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
            "malware": {
                "action": "Communication with C&C"
            },
            "packet_capture": "Packet Capture",
            "packet_capture_unique_id": "6c239c74-89a9-4797-ab6b-75a2b2a6afd7",
            "policy": {
                "date": "2024-08-29T13:12:51.0000000Z",
                "name": "Default Anti-Bot settings",
                "number": 2
            },
            "product": {
                "family": "Endpoint",
                "name": "Anti-Bot"
            },
            "protection_type": "URL Reputation",
            "proxy_src_ip": "89.160.20.128",
            "sequencenum": 16777215,
            "severity": "Critical",
            "tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
            "type": "Log"
        }
    },
    "data_stream": {
        "dataset": "checkpoint_harmony_endpoint.antibot",
        "namespace": "78732",
        "type": "logs"
    },
    "destination": {
        "geo": {
            "country_name": "UnitedStates"
        },
        "ip": "89.160.20.128"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "d4e5bf31-1f9a-4721-9f32-d3d87eca6898",
        "snapshot": false,
        "version": "8.15.1"
    },
    "event": {
        "action": "Detect",
        "agent_id_status": "verified",
        "category": [
            "malware"
        ],
        "dataset": "checkpoint_harmony_endpoint.antibot",
        "id": "a4640108-91b1-0f19-66d5-7d9d00000000",
        "ingested": "2024-10-24T05:31:25Z",
        "kind": "event",
        "module": "checkpoint_harmony_endpoint",
        "type": [
            "info"
        ]
    },
    "file": {
        "hash": {
            "md5": "bd075be9d011daaa82c3f9ff2572076e"
        },
        "name": "chrome.exe",
        "size": 2742376,
        "type": "exe"
    },
    "host": {
        "hostname": "DESKTOP-E2P4OL0",
        "ip": [
            "10.35.38.102"
        ],
        "name": "DESKTOP-E2P4OL0",
        "os": {
            "name": "Microsoft Windows 10 Pro",
            "version": "10.0-19045-SP0.0-SMP"
        },
        "type": [
            "Desktop"
        ]
    },
    "input": {
        "type": "cel"
    },
    "process": {
        "user": {
            "name": "admin"
        }
    },
    "related": {
        "hash": [
            "bd075be9d011daaa82c3f9ff2572076e"
        ],
        "hosts": [
            "DESKTOP-E2P4OL0"
        ],
        "ip": [
            "10.35.38.102",
            "89.160.20.128"
        ],
        "user": [
            "admin"
        ]
    },
    "rule": {
        "name": "Anti-Bot test.TC.e"
    },
    "tags": [
        "forwarded"
    ],
    "url": {
        "original": "www.threat-cloud.com"
    },
    "user": {
        "domain": "SMC User",
        "id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
        "name": [
            "admin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

checkpoint_harmony_endpoint.antibot.advanced_info

Internal field used for configuring exclusions

keyword

checkpoint_harmony_endpoint.antibot.attack_status

Status of attack

keyword

checkpoint_harmony_endpoint.antibot.client.name

Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client

keyword

checkpoint_harmony_endpoint.antibot.client.version

Build version of Harmony Endpoint client installed on the computer

version

checkpoint_harmony_endpoint.antibot.confidence_level

Confidence level

keyword

checkpoint_harmony_endpoint.antibot.description

Details of the event

text

checkpoint_harmony_endpoint.antibot.detected_by

Component which detected Event

keyword

checkpoint_harmony_endpoint.antibot.dst_country

Destination Country

keyword

checkpoint_harmony_endpoint.antibot.event_type

Name of the event

keyword

checkpoint_harmony_endpoint.antibot.installed_products

List of installed Endpoint Software Blades

keyword

checkpoint_harmony_endpoint.antibot.malware.action

Malware action

keyword

checkpoint_harmony_endpoint.antibot.packet_capture

Link to the PCAP traffic capture file with the recorded malicious connection.

keyword

checkpoint_harmony_endpoint.antibot.packet_capture_unique_id

Unique Packet Capture ID

keyword

checkpoint_harmony_endpoint.antibot.policy.date

Date of policy

date

checkpoint_harmony_endpoint.antibot.policy.name

Name of policy

keyword

checkpoint_harmony_endpoint.antibot.policy.number

Version number of policy

integer

checkpoint_harmony_endpoint.antibot.product.family

The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile)

keyword

checkpoint_harmony_endpoint.antibot.product.name

Product Name

keyword

checkpoint_harmony_endpoint.antibot.protection_type

Source of detection - can be IOC when manually configured, or URL/IP/CMI Reputation

keyword

checkpoint_harmony_endpoint.antibot.proxy_src_ip

Address where traffic was sent

ip

checkpoint_harmony_endpoint.antibot.resource

Resource from the HTTP request

keyword

checkpoint_harmony_endpoint.antibot.sequencenum

Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs)

integer

checkpoint_harmony_endpoint.antibot.service_domain

Service Domain Name

keyword

checkpoint_harmony_endpoint.antibot.severity

Event severity

keyword

checkpoint_harmony_endpoint.antibot.src

Client source IP address

ip

checkpoint_harmony_endpoint.antibot.suspicious_events

ID of EFR report, if relevant/exists

text

checkpoint_harmony_endpoint.antibot.tenant_id

Tenant ID

keyword

checkpoint_harmony_endpoint.antibot.type

Log type

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

input.type

Input type

keyword

A range of ECS fields are also exported. They are described in the ECS documentation.

Anti-Malware
edit

This is Anti-Malware dataset.

Example

An example event for antimalware looks as following:

{
    "@timestamp": "2024-09-02T09:09:07.000Z",
    "agent": {
        "ephemeral_id": "972620ca-77a9-4305-991a-5bd475860580",
        "id": "4cdb965a-db2a-4ec3-9abf-6e20dbb120c9",
        "name": "elastic-agent-21918",
        "type": "filebeat",
        "version": "8.15.1"
    },
    "checkpoint_harmony_endpoint": {
        "antimalware": {
            "action_details": "Infected",
            "advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"File & Folder exclusions (system, scheduled and on-demand)\",\"exclusion_type\":\"Path\",\"exclusion_value\":{\"default_value\":\"md5:\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"md5 taken from file C:\\\\\Users\\\\\admin\\\\\AppData\\\\\Local\\\\\Temp\\\\\9e68140d-22bb-4e96-8aaa-70ec80eb2dc4.tmp\"}}]",
            "client": {
                "name": "Check Point Endpoint Security Client",
                "version": "88.50.0213"
            },
            "confidence_level": "High",
            "connectivity_state": "Connected",
            "engine_version": "3.90",
            "event_type": "Infection",
            "installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
            "malware": {
                "category": "Malware"
            },
            "packet_capture": "Packet Capture",
            "packet_capture_unique_id": "31dc576b-7192-49bf-b2fc-b40c93f84b7c",
            "policy": {
                "date": "2024-08-29T13:12:46.0000000Z",
                "name": "Default Anti-Malware settings for the entire organization",
                "number": 3
            },
            "product": {
                "family": "Endpoint",
                "name": "Anti-Malware"
            },
            "protection_type": "Protection",
            "sequencenum": 16777215,
            "severity": "High",
            "signature_version": "202409011444",
            "src": "10.35.38.102",
            "tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
            "type": "Log"
        }
    },
    "data_stream": {
        "dataset": "checkpoint_harmony_endpoint.antimalware",
        "namespace": "85578",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "4cdb965a-db2a-4ec3-9abf-6e20dbb120c9",
        "snapshot": false,
        "version": "8.15.1"
    },
    "event": {
        "action": "Detect",
        "agent_id_status": "verified",
        "category": [
            "malware"
        ],
        "dataset": "checkpoint_harmony_endpoint.antimalware",
        "id": "a4640108-91b1-0f19-66d5-815d0000000f",
        "ingested": "2024-10-24T05:32:25Z",
        "kind": "alert",
        "module": "checkpoint_harmony_endpoint",
        "type": [
            "info"
        ]
    },
    "file": {
        "name": "9e68140d-22bb-4e96-8aaa-70ec80eb2dc4.tmp"
    },
    "host": {
        "hostname": "DESKTOP-E2P4OL0",
        "ip": [
            "10.35.38.102"
        ],
        "name": "DESKTOP-E2P4OL0",
        "os": {
            "name": "Microsoft Windows 10 Pro",
            "version": "10.0-19045-SP0.0-SMP"
        },
        "type": [
            "Desktop"
        ]
    },
    "input": {
        "type": "cel"
    },
    "related": {
        "hosts": [
            "DESKTOP-E2P4OL0"
        ],
        "ip": [
            "10.35.38.102"
        ],
        "user": [
            "admin"
        ]
    },
    "rule": {
        "name": "Mal/ShellDl-A"
    },
    "source": {
        "ip": [
            "10.35.38.102"
        ]
    },
    "tags": [
        "forwarded"
    ],
    "user": {
        "domain": "SMC User",
        "id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
        "name": [
            "admin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

checkpoint_harmony_endpoint.antimalware.Number_of_items.detected

Number of detected items

integer

checkpoint_harmony_endpoint.antimalware.Number_of_items.scanned

Number of scan items

integer

checkpoint_harmony_endpoint.antimalware.Number_of_items.treated

Number of treated items

integer

checkpoint_harmony_endpoint.antimalware.action_details

Malware action details

keyword

checkpoint_harmony_endpoint.antimalware.advanced_info

Internal field used for configuring exclusions

text

checkpoint_harmony_endpoint.antimalware.attack_status

Status of attack

keyword

checkpoint_harmony_endpoint.antimalware.client.name

Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client

keyword

checkpoint_harmony_endpoint.antimalware.client.version

Build version of Harmony Endpoint client installed on the computer

version

checkpoint_harmony_endpoint.antimalware.confidence_level

Confidence level

keyword

checkpoint_harmony_endpoint.antimalware.connectivity_state

Type of currently applied AM policy (Connected/Disconnected/Restricted)

keyword

checkpoint_harmony_endpoint.antimalware.description

Details of the event

text

checkpoint_harmony_endpoint.antimalware.detected_by

Component which detected Event

keyword

checkpoint_harmony_endpoint.antimalware.duration

Scan duration

long

checkpoint_harmony_endpoint.antimalware.engine_version

Engine Version

keyword

checkpoint_harmony_endpoint.antimalware.event_type

Name of the event

keyword

checkpoint_harmony_endpoint.antimalware.installed_products

List of installed Endpoint Software Blades

keyword

checkpoint_harmony_endpoint.antimalware.integrity_av_invoke_type

Type of scan

keyword

checkpoint_harmony_endpoint.antimalware.malware.category

Malware category

keyword

checkpoint_harmony_endpoint.antimalware.orig

ip

checkpoint_harmony_endpoint.antimalware.os_name

Name of the OS installed on the source endpoint computer

keyword

checkpoint_harmony_endpoint.antimalware.os_version

Build version of the OS installed on the source endpoint computer

keyword

checkpoint_harmony_endpoint.antimalware.packet_capture

Link to the PCAP traffic capture file with the recorded malicious connection.

keyword

checkpoint_harmony_endpoint.antimalware.packet_capture_unique_id

Unique Packet Capture ID

keyword

checkpoint_harmony_endpoint.antimalware.policy.date

Date of policy

date

checkpoint_harmony_endpoint.antimalware.policy.name

Name of policy

keyword

checkpoint_harmony_endpoint.antimalware.policy.number

Version number of policy

integer

checkpoint_harmony_endpoint.antimalware.product.family

The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile)

keyword

checkpoint_harmony_endpoint.antimalware.product.name

Product Name

keyword

checkpoint_harmony_endpoint.antimalware.protection_type

Source of detection - can be IOC when manually configured, or URL/IP/CMI Reputation

keyword

checkpoint_harmony_endpoint.antimalware.proxy_src_ip

Address where traffic was sent

ip

checkpoint_harmony_endpoint.antimalware.result

Update result

keyword

checkpoint_harmony_endpoint.antimalware.sequencenum

Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs)

integer

checkpoint_harmony_endpoint.antimalware.service_domain

Service Domain Name

keyword

checkpoint_harmony_endpoint.antimalware.severity

Event severity

keyword

checkpoint_harmony_endpoint.antimalware.signature_version

signarure version

keyword

checkpoint_harmony_endpoint.antimalware.src

Client source IP address

ip

checkpoint_harmony_endpoint.antimalware.suspicious_events

Identified suspicious events

text

checkpoint_harmony_endpoint.antimalware.tenant_id

Tenant ID

keyword

checkpoint_harmony_endpoint.antimalware.type

Log type

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

input.type

Input type

keyword

A range of ECS fields are also exported. They are described in the ECS documentation.

Forensics
edit

This is Forensics dataset.

Example

An example event for forensics looks as following:

{
    "@timestamp": "2024-09-03T08:53:12.000Z",
    "agent": {
        "ephemeral_id": "76820ab1-9086-4fc7-975c-2e7cda1f601c",
        "id": "3df1f948-9917-4dc4-a724-f2b5934a6652",
        "name": "elastic-agent-71957",
        "type": "filebeat",
        "version": "8.15.1"
    },
    "checkpoint_harmony_endpoint": {
        "forensics": {
            "attack_status": "Dormant",
            "client": {
                "name": "Check Point Endpoint Security Client",
                "version": "88.50.0213"
            },
            "confidence_level": "High",
            "description": "To exclude the file: On the Harmony Endpoint Management add this sha1 exclusion: 62f0bd56-b0e1235b-99940b34-916c19ec-fac8e80c Attack status: Dormant.",
            "detected_by": "Endpoint File Reputation",
            "event_type": "Forensics Case Analysis",
            "installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
            "malware": {},
            "packet_capture": "Packet Capture",
            "packet_capture_unique_id": "0acd55a9-f241-4097-a699-6b7e41cd26af",
            "policy": {
                "date": "2024-09-02T06:23:25.0000000Z",
                "name": "Default Forensics settings",
                "number": 3
            },
            "product": {
                "family": "Endpoint",
                "name": "Forensics"
            },
            "protection_type": "File Reputation",
            "remediated_files": "malz5.zip(Remediation disabled in policy)",
            "sequencenum": 1,
            "service_domain": "ep-demo",
            "severity": "Critical",
            "src": "10.35.38.102",
            "suspicious_events": "System Shutdown / Reboot: ; ",
            "tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
            "type": "Log"
        }
    },
    "data_stream": {
        "dataset": "checkpoint_harmony_endpoint.forensics",
        "namespace": "38429",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "3df1f948-9917-4dc4-a724-f2b5934a6652",
        "snapshot": false,
        "version": "8.15.1"
    },
    "event": {
        "action": "Detect",
        "agent_id_status": "verified",
        "category": [
            "malware"
        ],
        "dataset": "checkpoint_harmony_endpoint.forensics",
        "id": "a4640108-91b1-0f19-66d6-ceb500000000",
        "ingested": "2024-10-24T05:33:21Z",
        "kind": "alert",
        "module": "checkpoint_harmony_endpoint",
        "type": [
            "info"
        ]
    },
    "file": {
        "hash": {
            "md5": "1468c1908845ef238f7f196809946288",
            "sha1": "62f0bd56b0e1235b99940b34916c19ecfac8e80c"
        },
        "name": "malz5.zip",
        "path": "c:\\users\\admin\\downloads\\malz5.zip",
        "size": 12707198,
        "type": "zip"
    },
    "host": {
        "hostname": "DESKTOP-E2P4OL0",
        "ip": [
            "10.35.38.102"
        ],
        "name": "DESKTOP-E2P4OL0",
        "os": {
            "name": "Microsoft Windows 10 Pro",
            "version": "10.0-19045-SP0.0-SMP"
        },
        "type": [
            "Desktop"
        ]
    },
    "input": {
        "type": "cel"
    },
    "related": {
        "hash": [
            "1468c1908845ef238f7f196809946288",
            "62f0bd56b0e1235b99940b34916c19ecfac8e80c"
        ],
        "hosts": [
            "DESKTOP-E2P4OL0"
        ],
        "ip": [
            "10.35.38.102"
        ],
        "user": [
            "admin"
        ]
    },
    "rule": {
        "name": "Gen.Rep.zip"
    },
    "tags": [
        "forwarded"
    ],
    "user": {
        "domain": "SMC User",
        "id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
        "name": [
            "admin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

checkpoint_harmony_endpoint.forensics.action_details

Malware action details

keyword

checkpoint_harmony_endpoint.forensics.attack_status

Status of attack

keyword

checkpoint_harmony_endpoint.forensics.client.name

Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client

keyword

checkpoint_harmony_endpoint.forensics.client.version

Build version of Harmony Endpoint client installed on the computer

version

checkpoint_harmony_endpoint.forensics.confidence_level

Confidence level

keyword

checkpoint_harmony_endpoint.forensics.description

Details of the event

text

checkpoint_harmony_endpoint.forensics.detected_by

Component which detected Event

keyword

checkpoint_harmony_endpoint.forensics.event_type

Name of the event

keyword

checkpoint_harmony_endpoint.forensics.installed_products

List of installed Endpoint Software Blades

keyword

checkpoint_harmony_endpoint.forensics.malware.action

Malware action

keyword

checkpoint_harmony_endpoint.forensics.packet_capture

Link to the PCAP traffic capture file with the recorded malicious connection.

keyword

checkpoint_harmony_endpoint.forensics.packet_capture_unique_id

ID of EFR report

keyword

checkpoint_harmony_endpoint.forensics.policy.date

Date of policy

date

checkpoint_harmony_endpoint.forensics.policy.name

Name of policy

keyword

checkpoint_harmony_endpoint.forensics.policy.number

Version number of policy

integer

checkpoint_harmony_endpoint.forensics.product.family

The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile)

keyword

checkpoint_harmony_endpoint.forensics.product.name

Product Name

keyword

checkpoint_harmony_endpoint.forensics.protection_type

Source of detection - can be IOC when manually configured, or URL/IP/CMI Reputation

keyword

checkpoint_harmony_endpoint.forensics.remediated_files

Remediated files

keyword

checkpoint_harmony_endpoint.forensics.sequencenum

Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs)

integer

checkpoint_harmony_endpoint.forensics.service_domain

Service Domain Name

keyword

checkpoint_harmony_endpoint.forensics.severity

Event severity

keyword

checkpoint_harmony_endpoint.forensics.src

Client source IP address

ip

checkpoint_harmony_endpoint.forensics.suspicious_events

Events that lead to the trigger

text

checkpoint_harmony_endpoint.forensics.tenant_id

Tenant ID

keyword

checkpoint_harmony_endpoint.forensics.type

Log type

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

input.type

Input type

keyword

A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)

Threat Emulation
edit

This is Threat Emulation dataset.

Example

An example event for threatemulation looks as following:

{
    "@timestamp": "2024-09-02T09:04:54.000Z",
    "agent": {
        "ephemeral_id": "8723e6bf-0b1a-4a95-95b6-d5e11a0380a7",
        "id": "9f7d3384-0b1f-462c-9d71-0e0580545765",
        "name": "elastic-agent-95748",
        "type": "filebeat",
        "version": "8.15.1"
    },
    "checkpoint_harmony_endpoint": {
        "threatemulation": {
            "advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"Threat Emulation, Extraction and Zero Phishing Exclusions\",\"exclusion_type\":\"SHA1\",\"exclusion_value\":{\"default_value\":\"9d3395d94c6bbba52abf0e6afcbf4ca312597c21\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
            "analyzed_on": "Check Point Threat Emulation Cloud",
            "client": {
                "name": "Check Point Endpoint Security Client",
                "version": "88.50.0213"
            },
            "confidence_level": "High",
            "description": "Endpoint TE detected malicious file (681573a2-414a-4f7d-9683-177df4f8ca7f.tmp) . To exclude the file: On the Harmony Endpoint Management add this sha1 exclusion: 9d3395d9-4c6bbba5-2abf0e6a-fcbf4ca3-12597c21",
            "event_type": "TE Event",
            "incident_uid": "74a33ecb-1b91-4c25-a136-1989eb175638",
            "installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
            "malware": {
                "action": "Adware\",\"Solimba\",\"Trojan\",\"behavior"
            },
            "packet_capture": "Packet Capture",
            "packet_capture_unique_id": "5e3302e5-3f73-4b77-beec-2849003e9d47",
            "policy": {
                "date": "2024-08-29T13:12:50.0000000Z",
                "name": "Default Threat Extraction, Emulation and Anti-Exploit settings for the entire organization",
                "number": 3
            },
            "product": {
                "family": "Endpoint",
                "name": "Threat Emulation"
            },
            "protection_type": "File System Emulation",
            "sequencenum": 16777215,
            "severity": "Critical",
            "src": "10.35.38.102",
            "tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
            "type": "Log",
            "verdict": "Malicious"
        }
    },
    "data_stream": {
        "dataset": "checkpoint_harmony_endpoint.threatemulation",
        "namespace": "43839",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "9f7d3384-0b1f-462c-9d71-0e0580545765",
        "snapshot": false,
        "version": "8.15.1"
    },
    "event": {
        "action": "Detect",
        "agent_id_status": "verified",
        "category": [
            "malware"
        ],
        "dataset": "checkpoint_harmony_endpoint.threatemulation",
        "id": "a4640108-91b1-0f19-66d5-803100000012",
        "ingested": "2024-10-24T05:34:17Z",
        "kind": "alert",
        "module": "checkpoint_harmony_endpoint",
        "type": [
            "info"
        ]
    },
    "file": {
        "hash": {
            "md5": "ebe8b633d231bbfee9543d744a2ab59d",
            "sha1": "9d3395d94c6bbba52abf0e6afcbf4ca312597c21"
        },
        "name": "681573a2-414a-4f7d-9683-177df4f8ca7f.tmp",
        "path": "C:\\Users\\admin\\Downloads\\681573a2-414a-4f7d-9683-177df4f8ca7f.tmp",
        "size": 139648,
        "type": "zip"
    },
    "host": {
        "hostname": "DESKTOP-E2P4OL0",
        "ip": [
            "10.35.38.102"
        ],
        "name": "DESKTOP-E2P4OL0",
        "os": {
            "name": "Microsoft Windows 10 Pro",
            "version": "10.0-19045-SP0.0-SMP"
        },
        "type": [
            "Desktop"
        ]
    },
    "input": {
        "type": "cel"
    },
    "related": {
        "hash": [
            "ebe8b633d231bbfee9543d744a2ab59d",
            "9d3395d94c6bbba52abf0e6afcbf4ca312597c21"
        ],
        "hosts": [
            "DESKTOP-E2P4OL0"
        ],
        "ip": [
            "10.35.38.102"
        ],
        "user": [
            "admin"
        ]
    },
    "rule": {
        "name": "Gen.SB.zip"
    },
    "tags": [
        "forwarded"
    ],
    "user": {
        "domain": "SMC User",
        "id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
        "name": [
            "admin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

checkpoint_harmony_endpoint.threatemulation.advanced_info

Internal field used for configuring exclusions

text

checkpoint_harmony_endpoint.threatemulation.analyzed_on

Asset used for emulation - can be "Check Point Threat Emulation Cloud", "Check Point Appliance", or "Harmony Local Cache"

keyword

checkpoint_harmony_endpoint.threatemulation.client.name

Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client

keyword

checkpoint_harmony_endpoint.threatemulation.client.version

Build version of Harmony Endpoint client installed on the computer

version

checkpoint_harmony_endpoint.threatemulation.confidence_level

Can be Low/Medium/High/N-A

keyword

checkpoint_harmony_endpoint.threatemulation.description

Details of the event

text

checkpoint_harmony_endpoint.threatemulation.event_type

Name of the event

keyword

checkpoint_harmony_endpoint.threatemulation.incident_uid

ID of EFR report, if relevant/exists

keyword

checkpoint_harmony_endpoint.threatemulation.installed_products

List of installed Endpoint Software Blades

keyword

checkpoint_harmony_endpoint.threatemulation.malware.action

Additional info about malware category or actions that led to detection

keyword

checkpoint_harmony_endpoint.threatemulation.orig

ip

checkpoint_harmony_endpoint.threatemulation.packet_capture

Link to the PCAP traffic capture file with the recorded malicious connection.

keyword

checkpoint_harmony_endpoint.threatemulation.packet_capture_unique_id

ID of EFR report, if relevant/exists

keyword

checkpoint_harmony_endpoint.threatemulation.policy.date

Date of policy

date

checkpoint_harmony_endpoint.threatemulation.policy.name

Name of policy

keyword

checkpoint_harmony_endpoint.threatemulation.policy.number

Version number of policy

integer

checkpoint_harmony_endpoint.threatemulation.product.family

The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile)

keyword

checkpoint_harmony_endpoint.threatemulation.product.name

Product Name

keyword

checkpoint_harmony_endpoint.threatemulation.protection_type

Type of detection

keyword

checkpoint_harmony_endpoint.threatemulation.reason

Information on the error occured

keyword

checkpoint_harmony_endpoint.threatemulation.resource

Resource from the HTTP request

keyword

checkpoint_harmony_endpoint.threatemulation.sequencenum

Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs)

integer

checkpoint_harmony_endpoint.threatemulation.severity

Event severity

keyword

checkpoint_harmony_endpoint.threatemulation.src

Client source IP address

ip

checkpoint_harmony_endpoint.threatemulation.tenant_id

Tenant ID

keyword

checkpoint_harmony_endpoint.threatemulation.type

Log type

keyword

checkpoint_harmony_endpoint.threatemulation.verdict

Can be Malicious/Benign

keyword

checkpoint_harmony_endpoint.threatemulation.web_client_type

When relevant, name of the browser (Chrome, Edge, …)

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

input.type

Input type

keyword

A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)

Threat Extraction
edit

This is Threat Extraction dataset.

Example

An example event for threatextraction looks as following:

{
    "@timestamp": "2024-09-02T09:21:42.000Z",
    "agent": {
        "ephemeral_id": "b2ca27d2-5544-4cc2-9491-f91097060c1c",
        "id": "82b03ad0-7025-436d-9e81-8a39705e0152",
        "name": "elastic-agent-30042",
        "type": "filebeat",
        "version": "8.15.1"
    },
    "checkpoint_harmony_endpoint": {
        "threatextraction": {
            "advanced_info": " \"disable_exclusion\": true ",
            "client": {
                "name": "Check Point Endpoint Security Client",
                "version": "88.50.0213"
            },
            "confidence_level": "High",
            "description": "File is not supported for extraction",
            "event_type": "TEX Event",
            "installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
            "malware": {
                "action": "Not Supported"
            },
            "policy": {
                "date": "2024-08-29T13:12:50.0000000Z",
                "name": "Default Threat Extraction, Emulation and Anti-Exploit settings for the entire organization",
                "number": 3
            },
            "product": {
                "family": "Endpoint",
                "name": "Threat Extraction"
            },
            "protection_type": "Content Removal",
            "sequencenum": 1,
            "severity": "Informational",
            "src": "10.35.38.102",
            "tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
            "type": "Log",
            "web_client_type": "Chrome"
        }
    },
    "data_stream": {
        "dataset": "checkpoint_harmony_endpoint.threatextraction",
        "namespace": "81720",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "82b03ad0-7025-436d-9e81-8a39705e0152",
        "snapshot": false,
        "version": "8.15.1"
    },
    "event": {
        "action": "Extract",
        "agent_id_status": "verified",
        "category": [
            "malware"
        ],
        "dataset": "checkpoint_harmony_endpoint.threatextraction",
        "id": "a4640108-91b1-0f19-66d5-83f100000019",
        "ingested": "2024-10-24T05:35:11Z",
        "kind": "alert",
        "module": "checkpoint_harmony_endpoint",
        "type": [
            "info"
        ]
    },
    "file": {
        "hash": {
            "sha1": "no-sha1"
        },
        "name": "mirai.sh4",
        "path": "blob:https://github.com/6bd30ea7-29a8-4dd2-9056-f5077632e110",
        "size": 0,
        "type": "sh4"
    },
    "host": {
        "hostname": "DESKTOP-E2P4OL0",
        "ip": [
            "10.35.38.102"
        ],
        "name": "DESKTOP-E2P4OL0",
        "os": {
            "name": "Microsoft Windows 10 Pro",
            "version": "10.0-19045-SP0.0-SMP"
        },
        "type": [
            "Desktop"
        ]
    },
    "input": {
        "type": "cel"
    },
    "related": {
        "hash": [
            "no-sha1"
        ],
        "hosts": [
            "DESKTOP-E2P4OL0"
        ],
        "ip": [
            "10.35.38.102"
        ],
        "user": [
            "admin"
        ]
    },
    "rule": {
        "name": "Extract potentially malicious content"
    },
    "tags": [
        "forwarded"
    ],
    "user": {
        "domain": "SMC User",
        "id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
        "name": [
            "admin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

checkpoint_harmony_endpoint.threatextraction.advanced_info

Internal field used for configuring exclusions

text

checkpoint_harmony_endpoint.threatextraction.analyzed_on

Describes location where threat is analyzed.

keyword

checkpoint_harmony_endpoint.threatextraction.client.name

Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client

keyword

checkpoint_harmony_endpoint.threatextraction.client.version

Build version of Harmony Endpoint client installed on the computer

version

checkpoint_harmony_endpoint.threatextraction.confidence_level

Can be Low/Medim/High/N-A

keyword

checkpoint_harmony_endpoint.threatextraction.description

Details of the event

text

checkpoint_harmony_endpoint.threatextraction.event_type

Name of the event

keyword

checkpoint_harmony_endpoint.threatextraction.incident_uid

ID of EFR report, if relevant/exists

keyword

checkpoint_harmony_endpoint.threatextraction.installed_products

List of installed Endpoint Software Blades

keyword

checkpoint_harmony_endpoint.threatextraction.malware.action

Additional info about the extraction - can be Extracted, Verified, Oversized, Not Supported, Corrupted file

keyword

checkpoint_harmony_endpoint.threatextraction.orig

ip

checkpoint_harmony_endpoint.threatextraction.packet_capture

Link to the PCAP traffic capture file with the recorded malicious connection.

keyword

checkpoint_harmony_endpoint.threatextraction.policy.date

Date of policy

date

checkpoint_harmony_endpoint.threatextraction.policy.name

Name of policy

keyword

checkpoint_harmony_endpoint.threatextraction.policy.number

Version number of policy

integer

checkpoint_harmony_endpoint.threatextraction.product.family

The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile)

keyword

checkpoint_harmony_endpoint.threatextraction.product.name

Product Name

keyword

checkpoint_harmony_endpoint.threatextraction.protection_type

Type of detection

keyword

checkpoint_harmony_endpoint.threatextraction.resource

Resource from the HTTP request

keyword

checkpoint_harmony_endpoint.threatextraction.sequencenum

Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs)

integer

checkpoint_harmony_endpoint.threatextraction.severity

Event severity

keyword

checkpoint_harmony_endpoint.threatextraction.src

Client source IP address

ip

checkpoint_harmony_endpoint.threatextraction.tenant_id

Tenant ID

keyword

checkpoint_harmony_endpoint.threatextraction.type

Log type

keyword

checkpoint_harmony_endpoint.threatextraction.web_client_type

When relevant, name of the browser (Chrome, Edge, …)

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

input.type

Input type

keyword

A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)

URL Filtering
edit

This is URL Filtering dataset.

Example

An example event for urlfiltering looks as following:

{
    "@timestamp": "2024-09-06T10:07:43.000Z",
    "agent": {
        "ephemeral_id": "95fc55ec-9d54-4116-87cc-a4fe3767eba0",
        "id": "3c23eeec-fde0-4811-91a1-6bc5b403c95e",
        "name": "elastic-agent-18777",
        "type": "filebeat",
        "version": "8.15.1"
    },
    "checkpoint_harmony_endpoint": {
        "urlfiltering": {
            "advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"URL Filtering exclusions\",\"exclusion_type\":\"Domain\",\"exclusion_value\":{\"default_value\":\"secure.indeed.com\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
            "app": {
                "id": "0",
                "properties": "Job Search / Careers, Business / Economy"
            },
            "appi_name": "secure.indeed.com",
            "client": {
                "name": "Check Point Endpoint Security Client",
                "version": "88.50.0213"
            },
            "description": "URLF Info Event",
            "event_type": "URLF Info Event",
            "installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
            "matched_category": "Job Search / Careers",
            "policy": {
                "date": "2024-09-06T09:57:28.0000000Z",
                "name": "Default Anti-Bot settings",
                "number": 4
            },
            "process_exe_path": "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
            "product": {
                "family": "Endpoint",
                "name": "URL Filtering"
            },
            "protection_type": "URL Filtering",
            "sequencenum": 16777215,
            "severity": "Informational",
            "src": "10.35.38.102",
            "tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
            "type": "Log",
            "usercheck_incident_uid": "b04d8940",
            "web_client_type": "Chrome"
        }
    },
    "data_stream": {
        "dataset": "checkpoint_harmony_endpoint.urlfiltering",
        "namespace": "69408",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "3c23eeec-fde0-4811-91a1-6bc5b403c95e",
        "snapshot": false,
        "version": "8.15.1"
    },
    "event": {
        "action": "Detect",
        "agent_id_status": "verified",
        "category": [
            "malware"
        ],
        "dataset": "checkpoint_harmony_endpoint.urlfiltering",
        "id": "a4640108-91b1-0f19-66da-d62100000013",
        "ingested": "2024-10-24T05:36:11Z",
        "kind": "alert",
        "module": "checkpoint_harmony_endpoint",
        "type": [
            "info"
        ]
    },
    "host": {
        "hostname": "DESKTOP-E2P4OL0",
        "ip": [
            "10.35.38.102"
        ],
        "name": "DESKTOP-E2P4OL0",
        "os": {
            "name": "Microsoft Windows 10 Pro",
            "version": "10.0-19045-SP0.0-SMP"
        },
        "type": [
            "Desktop"
        ]
    },
    "input": {
        "type": "cel"
    },
    "related": {
        "hosts": [
            "DESKTOP-E2P4OL0"
        ],
        "ip": [
            "10.35.38.102"
        ],
        "user": [
            "admin"
        ]
    },
    "rule": {
        "name": "gen.urlf"
    },
    "tags": [
        "forwarded"
    ],
    "url": {
        "domain": "secure.indeed.com",
        "original": "https://secure.indeed.com/auth?branding=save-profile-modal&tmpl=inline&from=act_zeroauth_profile_tst&iframe_tk=9a019527-a6f1-4b3d-b803-2b25bb46b1db&hl=en_IN&co=IN",
        "path": "/auth",
        "query": "branding=save-profile-modal&tmpl=inline&from=act_zeroauth_profile_tst&iframe_tk=9a019527-a6f1-4b3d-b803-2b25bb46b1db&hl=en_IN&co=IN",
        "scheme": "https"
    },
    "user": {
        "domain": "SMC User",
        "id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
        "name": [
            "admin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

checkpoint_harmony_endpoint.urlfiltering.advanced_info

Internal field used for configuring exclusions

text

checkpoint_harmony_endpoint.urlfiltering.analyzed_on

Describes location where threat is analyzed.

keyword

checkpoint_harmony_endpoint.urlfiltering.app.id

Application ID

keyword

checkpoint_harmony_endpoint.urlfiltering.app.properties

All categories application belongs to

text

checkpoint_harmony_endpoint.urlfiltering.app_properties

Application categories

keyword

checkpoint_harmony_endpoint.urlfiltering.appi_name

Requested website (domain only, without path)

text

checkpoint_harmony_endpoint.urlfiltering.client.name

Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client

keyword

checkpoint_harmony_endpoint.urlfiltering.client.version

Build version of Harmony Endpoint client installed on the computer

version

checkpoint_harmony_endpoint.urlfiltering.confidence_level

Can be Low/Medim/High/N-A

keyword

checkpoint_harmony_endpoint.urlfiltering.description

Details of the event

text

checkpoint_harmony_endpoint.urlfiltering.dst

Destination IP address

ip

checkpoint_harmony_endpoint.urlfiltering.event_type

Name of the event

keyword

checkpoint_harmony_endpoint.urlfiltering.installed_products

List of installed Endpoint Software Blades

keyword

checkpoint_harmony_endpoint.urlfiltering.matched_category

Matched category

keyword

checkpoint_harmony_endpoint.urlfiltering.orig

ip

checkpoint_harmony_endpoint.urlfiltering.packet_capture

Link to the PCAP traffic capture file with the recorded malicious connection.

keyword

checkpoint_harmony_endpoint.urlfiltering.policy.date

Date of policy

date

checkpoint_harmony_endpoint.urlfiltering.policy.name

Name of policy

keyword

checkpoint_harmony_endpoint.urlfiltering.policy.number

Version number of policy

integer

checkpoint_harmony_endpoint.urlfiltering.process_exe_path

Path to Process’s executable

keyword

checkpoint_harmony_endpoint.urlfiltering.product.family

The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile)

keyword

checkpoint_harmony_endpoint.urlfiltering.product.name

Product Name

keyword

checkpoint_harmony_endpoint.urlfiltering.protection_type

Type of detection

keyword

checkpoint_harmony_endpoint.urlfiltering.resource

Resource from the HTTP request

keyword

checkpoint_harmony_endpoint.urlfiltering.sequencenum

Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs)

integer

checkpoint_harmony_endpoint.urlfiltering.severity

Event severity

keyword

checkpoint_harmony_endpoint.urlfiltering.src

Client source IP address

ip

checkpoint_harmony_endpoint.urlfiltering.tenant_id

Tenant ID

keyword

checkpoint_harmony_endpoint.urlfiltering.type

Log type

keyword

checkpoint_harmony_endpoint.urlfiltering.usercheck_incident_uid

Internal ID of user confirmation

keyword

checkpoint_harmony_endpoint.urlfiltering.web_client_type

When relevant, name of the browser (Chrome, Edge, …)

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

input.type

Input type

keyword

A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)

Zero-phishing
edit

This is Zero-Phishing dataset.

Example

An example event for zerophishing looks as following:

{
    "@timestamp": "2024-09-02T08:51:08.000Z",
    "agent": {
        "ephemeral_id": "9fc6c363-e390-492c-bfdf-684e4d20aff8",
        "id": "64f03e47-f005-4ecd-8d91-e63af37617a3",
        "name": "elastic-agent-34074",
        "type": "filebeat",
        "version": "8.15.1"
    },
    "checkpoint_harmony_endpoint": {
        "zerophishing": {
            "advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"Threat Emulation, Extraction and Zero Phishing Exclusions\",\"exclusion_type\":\"Domain\",\"exclusion_value\":{\"default_value\":\"main.sbm-demo.xyz\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
            "client": {
                "name": "Check Point Endpoint Security Client",
                "version": "88.50.0213"
            },
            "confidence_level": "High",
            "description": "Deceptive site (https://main.sbm-demo.xyz/zero-phishing) was detected.",
            "event_type": "Phishing Event",
            "extension_version": "Check Point Endpoint Security Client",
            "installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
            "malware": {},
            "policy": {
                "date": "2024-08-29T13:12:50.0000000Z",
                "name": "Default Threat Extraction, Emulation and Anti-Exploit settings for the entire organization",
                "number": 3
            },
            "product": {
                "family": "Endpoint",
                "name": "Zero Phishing"
            },
            "protection_type": "Phishing",
            "sequencenum": 16777215,
            "severity": "High",
            "src": "10.35.38.102",
            "tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
            "type": "Log",
            "web_client_type": "Chrome"
        }
    },
    "data_stream": {
        "dataset": "checkpoint_harmony_endpoint.zerophishing",
        "namespace": "39288",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "64f03e47-f005-4ecd-8d91-e63af37617a3",
        "snapshot": false,
        "version": "8.15.1"
    },
    "event": {
        "action": "Detect",
        "agent_id_status": "verified",
        "category": [
            "malware"
        ],
        "dataset": "checkpoint_harmony_endpoint.zerophishing",
        "id": "a4640108-91b1-0f19-66d5-7d6100000004",
        "ingested": "2024-10-24T05:37:11Z",
        "kind": "alert",
        "module": "checkpoint_harmony_endpoint",
        "type": [
            "info"
        ]
    },
    "host": {
        "hostname": "DESKTOP-E2P4OL0",
        "ip": [
            "10.35.38.102"
        ],
        "name": "DESKTOP-E2P4OL0",
        "os": {
            "name": "Microsoft Windows 10 Pro",
            "version": "10.0-19045-SP0.0-SMP"
        },
        "type": [
            "Desktop"
        ]
    },
    "input": {
        "type": "cel"
    },
    "related": {
        "hosts": [
            "DESKTOP-E2P4OL0"
        ],
        "ip": [
            "10.35.38.102"
        ],
        "user": [
            "admin"
        ]
    },
    "rule": {
        "name": "gen.ba.phishing"
    },
    "tags": [
        "forwarded"
    ],
    "url": {
        "domain": "main.sbm-demo.xyz",
        "original": "https://main.sbm-demo.xyz/zero-phishing",
        "path": "/zero-phishing",
        "scheme": "https"
    },
    "user": {
        "domain": "SMC User",
        "id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
        "name": [
            "admin"
        ]
    }
}
Exported fields
Field Description Type

@timestamp

Event timestamp.

date

checkpoint_harmony_endpoint.zerophishing.advanced_info

Internal field used for configuring exclusions

text

checkpoint_harmony_endpoint.zerophishing.client.name

Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client

keyword

checkpoint_harmony_endpoint.zerophishing.client.version

Build version of Harmony Endpoint client installed on the computer

version

checkpoint_harmony_endpoint.zerophishing.confidence_level

Can be Low/Medim/High/N-A

keyword

checkpoint_harmony_endpoint.zerophishing.description

Details of the event

text

checkpoint_harmony_endpoint.zerophishing.event_type

Name of the event

keyword

checkpoint_harmony_endpoint.zerophishing.extension_version

Browser Extention version

keyword

checkpoint_harmony_endpoint.zerophishing.installed_products

List of installed Endpoint Software Blades

keyword

checkpoint_harmony_endpoint.zerophishing.malware.action

Additional information about detection, for example "User reused corporate credentials"

keyword

checkpoint_harmony_endpoint.zerophishing.orig

ip

checkpoint_harmony_endpoint.zerophishing.policy.date

Date of policy

date

checkpoint_harmony_endpoint.zerophishing.policy.name

Name of policy

keyword

checkpoint_harmony_endpoint.zerophishing.policy.number

Version number of policy

integer

checkpoint_harmony_endpoint.zerophishing.product.family

The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile)

keyword

checkpoint_harmony_endpoint.zerophishing.product.name

Product Name

keyword

checkpoint_harmony_endpoint.zerophishing.protection_type

Type of detection

keyword

checkpoint_harmony_endpoint.zerophishing.resource

Resource from the HTTP request

keyword

checkpoint_harmony_endpoint.zerophishing.sequencenum

Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs)

integer

checkpoint_harmony_endpoint.zerophishing.severity

Event severity

keyword

checkpoint_harmony_endpoint.zerophishing.src

Client source IP address

ip

checkpoint_harmony_endpoint.zerophishing.tenant_id

Tenant ID

keyword

checkpoint_harmony_endpoint.zerophishing.type

Log type

keyword

checkpoint_harmony_endpoint.zerophishing.web_client_type

When relevant, name of the browser (Chrome, Edge, …)

keyword

data_stream.dataset

Data stream dataset.

constant_keyword

data_stream.namespace

Data stream namespace.

constant_keyword

data_stream.type

Data stream type.

constant_keyword

input.type

Input type

keyword

A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)

Changelog

edit
Changelog
Version Details Kibana version(s)

0.2.0

Enhancement (View pull request)
Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error".

0.1.1

Bug fix (View pull request)
Put the dashboard screenshot first, update base_url var.

0.1.0

Enhancement (View pull request)
Initial release of the Check Point Harmony Endpoint package