Check Point Harmony Endpoint
Collect logs from Check Point Harmony Endpoint
Version | 0.1.1 (View all) |
Compatible Kibana version(s) | 8.14.0 or higher |
Supported Serverless project types | Security Observability |
Subscription level | Basic |
Level of support | Elastic |
The Check Point Harmony Endpoint integration allows you to ingest data from Harmony Endpoint management service(https://www.checkpoint.com/harmony/endpoint/).
Harmony Endpoint EPMaaS (Endpoint Management as a Service) is the cloud service to manage policies and deployments for Endpoint Security. It provides advanced threat prevention and detection capabilities to safeguard endpoints from malware, ransomware, and other sophisticated attacks. The solution offers real-time protection through behavioral analysis, machine learning, and threat intelligence.
For details please refer to the Harmony Endpoint Admin guide
Setup
To collect data from Check Point Harmony Endpoint, the following parameters from your Harmony Endpoint instance are required:
- Server URL
- Client ID
- Secret key
To use this integration generate an API Key. API key consists of Client ID and Secret Key. Users can create API Keys by browsing to Infinity Portal at GLOBAL SETTINGS > API Keys. When creating an API Key, make sure that Service is set to Logs as a Service.
To create an API key please refer to Check Point's Infinity API Guide. A list of servers can also be found there.
Following are optional parameters which are used for fine-tuning:
- Initial Interval: Initial interval for which existing logs will be pulled.
- Interval: Interval at which new logs will be pulled.
- Limit: Sets the number of results to return per API search query.
- Page Limit: Sets the number of results to return per page, in API search query.
Enabling Integration in Elastic
- In Kibana go to Management > Integrations
- In "Search for integrations" search bar, type Check Point Harmony Endpoint
- Click on the "Check Point Harmony Endpoint" integration from the search results.
- Click on the "Add Check Point Harmony Endpoint" button to add the integration.
- Add all the required integration configuration parameters, such as Server URL, Client ID, Secret Key. For all data streams, these parameters must be provided in order to retrieve logs.
- Save the integration.
Data Streams:
- Anti-bot: This is behavioral protection against bots. A single bot can create multiple threats. Cybercriminals often use bots in Advanced Persistent Threat (APT) attacks to target specific individuals or organizations.
- Anti-Malware: Protects computers from viruses, spyware, and other malicious software. It uses real-time and scheduled scans to detect and neutralize threats before they can harm your computer.
- Forensics: This component monitors file operations, processes, and network activity for suspicious behavior. It analyzes attacks detected by other client components or the Check Point Security Gateway and applies remediation to malicious files.
- Threat Emulation: Detects zero-day and unknown attacks. Files on the endpoint computer are sent to a sandbox for emulation to uncover evasive zero-day attacks.
- Threat Extraction: Proactively protects users from downloaded malicious files. It quickly delivers safe files while inspecting the originals for potential threats.
- URL Filtering: Defines which websites are accessible within your organization. The URL Filtering policy consists of selected sites and the mode of operation applied to them.
- Zero-phishing: Examines various website characteristics to ensure a site isn't impersonating another to maliciously collect personal information. It generates alerts for potential phishing sites.
Logs Reference
Anti-bot
This is Anti-bot
dataset.
An example event for antibot
looks as following:
{
"@timestamp": "2024-09-02T08:53:44.000Z",
"agent": {
"ephemeral_id": "cebc2bcd-9723-4948-bfd6-fc0e0dfd5784",
"id": "d4e5bf31-1f9a-4721-9f32-d3d87eca6898",
"name": "elastic-agent-88462",
"type": "filebeat",
"version": "8.15.1"
},
"checkpoint_harmony_endpoint": {
"antibot": {
"advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"Anti Bot exclusions\",\"exclusion_type\":\"URL\",\"exclusion_value\":{\"default_value\":\"http://www.threat-cloud.com/test/files/MediumConfidenceBot.html\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
"client": {
"name": "Check Point Endpoint Security Client",
"version": "88.50.0213"
},
"confidence_level": "Medium",
"description": "Detected bot activity [Anti-Bot test.TC.e]. To exclude: On the Harmony Endpoint Management add an exclusion of type \"URL\" with value: \"http://www.threat-cloud.com/test/files/MediumConfidenceBot.html\"",
"event_type": "Anti Bot Event",
"installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
"malware": {
"action": "Communication with C&C"
},
"packet_capture": "Packet Capture",
"packet_capture_unique_id": "6c239c74-89a9-4797-ab6b-75a2b2a6afd7",
"policy": {
"date": "2024-08-29T13:12:51.0000000Z",
"name": "Default Anti-Bot settings",
"number": 2
},
"product": {
"family": "Endpoint",
"name": "Anti-Bot"
},
"protection_type": "URL Reputation",
"proxy_src_ip": "89.160.20.128",
"sequencenum": 16777215,
"severity": "Critical",
"tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
"type": "Log"
}
},
"data_stream": {
"dataset": "checkpoint_harmony_endpoint.antibot",
"namespace": "78732",
"type": "logs"
},
"destination": {
"geo": {
"country_name": "UnitedStates"
},
"ip": "89.160.20.128"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "d4e5bf31-1f9a-4721-9f32-d3d87eca6898",
"snapshot": false,
"version": "8.15.1"
},
"event": {
"action": "Detect",
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "checkpoint_harmony_endpoint.antibot",
"id": "a4640108-91b1-0f19-66d5-7d9d00000000",
"ingested": "2024-10-24T05:31:25Z",
"kind": "event",
"module": "checkpoint_harmony_endpoint",
"type": [
"info"
]
},
"file": {
"hash": {
"md5": "bd075be9d011daaa82c3f9ff2572076e"
},
"name": "chrome.exe",
"size": 2742376,
"type": "exe"
},
"host": {
"hostname": "DESKTOP-E2P4OL0",
"ip": [
"10.35.38.102"
],
"name": "DESKTOP-E2P4OL0",
"os": {
"name": "Microsoft Windows 10 Pro",
"version": "10.0-19045-SP0.0-SMP"
},
"type": [
"Desktop"
]
},
"input": {
"type": "cel"
},
"process": {
"user": {
"name": "admin"
}
},
"related": {
"hash": [
"bd075be9d011daaa82c3f9ff2572076e"
],
"hosts": [
"DESKTOP-E2P4OL0"
],
"ip": [
"10.35.38.102",
"89.160.20.128"
],
"user": [
"admin"
]
},
"rule": {
"name": "Anti-Bot test.TC.e"
},
"tags": [
"forwarded"
],
"url": {
"original": "www.threat-cloud.com"
},
"user": {
"domain": "SMC User",
"id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
"name": [
"admin"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_harmony_endpoint.antibot.advanced_info | Internal field used for configuring exclusions | keyword |
checkpoint_harmony_endpoint.antibot.attack_status | Status of attack | keyword |
checkpoint_harmony_endpoint.antibot.client.name | Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client | keyword |
checkpoint_harmony_endpoint.antibot.client.version | Build version of Harmony Endpoint client installed on the computer | version |
checkpoint_harmony_endpoint.antibot.confidence_level | Confidence level | keyword |
checkpoint_harmony_endpoint.antibot.description | Details of the event | text |
checkpoint_harmony_endpoint.antibot.detected_by | Component which detected Event | keyword |
checkpoint_harmony_endpoint.antibot.dst_country | Destination Country | keyword |
checkpoint_harmony_endpoint.antibot.event_type | Name of the event | keyword |
checkpoint_harmony_endpoint.antibot.installed_products | List of installed Endpoint Software Blades | keyword |
checkpoint_harmony_endpoint.antibot.malware.action | Malware action | keyword |
checkpoint_harmony_endpoint.antibot.packet_capture | Link to the PCAP traffic capture file with the recorded malicious connection. | keyword |
checkpoint_harmony_endpoint.antibot.packet_capture_unique_id | Unique Packet Capture ID | keyword |
checkpoint_harmony_endpoint.antibot.policy.date | Date of policy | date |
checkpoint_harmony_endpoint.antibot.policy.name | Name of policy | keyword |
checkpoint_harmony_endpoint.antibot.policy.number | Version number of policy | integer |
checkpoint_harmony_endpoint.antibot.product.family | The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile) | keyword |
checkpoint_harmony_endpoint.antibot.product.name | Product Name | keyword |
checkpoint_harmony_endpoint.antibot.protection_type | Source of detection - can be IOC when manually configured, or URL/IP/CMI Reputation | keyword |
checkpoint_harmony_endpoint.antibot.proxy_src_ip | Address where traffic was sent | ip |
checkpoint_harmony_endpoint.antibot.resource | Resource from the HTTP request | keyword |
checkpoint_harmony_endpoint.antibot.sequencenum | Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs) | integer |
checkpoint_harmony_endpoint.antibot.service_domain | Service Domain Name | keyword |
checkpoint_harmony_endpoint.antibot.severity | Event severity | keyword |
checkpoint_harmony_endpoint.antibot.src | Client source IP address | ip |
checkpoint_harmony_endpoint.antibot.suspicious_events | ID of EFR report, if relevant/exists | text |
checkpoint_harmony_endpoint.antibot.tenant_id | Tenant ID | keyword |
checkpoint_harmony_endpoint.antibot.type | Log type | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
input.type | Input type | keyword |
A range of ECS fields are also exported. They are described in the ECS documentation.
Anti-Malware
This is Anti-Malware
dataset.
An example event for antimalware
looks as following:
{
"@timestamp": "2024-09-02T09:09:07.000Z",
"agent": {
"ephemeral_id": "972620ca-77a9-4305-991a-5bd475860580",
"id": "4cdb965a-db2a-4ec3-9abf-6e20dbb120c9",
"name": "elastic-agent-21918",
"type": "filebeat",
"version": "8.15.1"
},
"checkpoint_harmony_endpoint": {
"antimalware": {
"action_details": "Infected",
"advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"File & Folder exclusions (system, scheduled and on-demand)\",\"exclusion_type\":\"Path\",\"exclusion_value\":{\"default_value\":\"md5:\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"md5 taken from file C:\\\\Users\\\\admin\\\\AppData\\\\Local\\\\Temp\\\\9e68140d-22bb-4e96-8aaa-70ec80eb2dc4.tmp\"}}]",
"client": {
"name": "Check Point Endpoint Security Client",
"version": "88.50.0213"
},
"confidence_level": "High",
"connectivity_state": "Connected",
"engine_version": "3.90",
"event_type": "Infection",
"installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
"malware": {
"category": "Malware"
},
"packet_capture": "Packet Capture",
"packet_capture_unique_id": "31dc576b-7192-49bf-b2fc-b40c93f84b7c",
"policy": {
"date": "2024-08-29T13:12:46.0000000Z",
"name": "Default Anti-Malware settings for the entire organization",
"number": 3
},
"product": {
"family": "Endpoint",
"name": "Anti-Malware"
},
"protection_type": "Protection",
"sequencenum": 16777215,
"severity": "High",
"signature_version": "202409011444",
"src": "10.35.38.102",
"tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
"type": "Log"
}
},
"data_stream": {
"dataset": "checkpoint_harmony_endpoint.antimalware",
"namespace": "85578",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "4cdb965a-db2a-4ec3-9abf-6e20dbb120c9",
"snapshot": false,
"version": "8.15.1"
},
"event": {
"action": "Detect",
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "checkpoint_harmony_endpoint.antimalware",
"id": "a4640108-91b1-0f19-66d5-815d0000000f",
"ingested": "2024-10-24T05:32:25Z",
"kind": "alert",
"module": "checkpoint_harmony_endpoint",
"type": [
"info"
]
},
"file": {
"name": "9e68140d-22bb-4e96-8aaa-70ec80eb2dc4.tmp"
},
"host": {
"hostname": "DESKTOP-E2P4OL0",
"ip": [
"10.35.38.102"
],
"name": "DESKTOP-E2P4OL0",
"os": {
"name": "Microsoft Windows 10 Pro",
"version": "10.0-19045-SP0.0-SMP"
},
"type": [
"Desktop"
]
},
"input": {
"type": "cel"
},
"related": {
"hosts": [
"DESKTOP-E2P4OL0"
],
"ip": [
"10.35.38.102"
],
"user": [
"admin"
]
},
"rule": {
"name": "Mal/ShellDl-A"
},
"source": {
"ip": [
"10.35.38.102"
]
},
"tags": [
"forwarded"
],
"user": {
"domain": "SMC User",
"id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
"name": [
"admin"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_harmony_endpoint.antimalware.Number_of_items.detected | Number of detected items | integer |
checkpoint_harmony_endpoint.antimalware.Number_of_items.scanned | Number of scan items | integer |
checkpoint_harmony_endpoint.antimalware.Number_of_items.treated | Number of treated items | integer |
checkpoint_harmony_endpoint.antimalware.action_details | Malware action details | keyword |
checkpoint_harmony_endpoint.antimalware.advanced_info | Internal field used for configuring exclusions | text |
checkpoint_harmony_endpoint.antimalware.attack_status | Status of attack | keyword |
checkpoint_harmony_endpoint.antimalware.client.name | Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client | keyword |
checkpoint_harmony_endpoint.antimalware.client.version | Build version of Harmony Endpoint client installed on the computer | version |
checkpoint_harmony_endpoint.antimalware.confidence_level | Confidence level | keyword |
checkpoint_harmony_endpoint.antimalware.connectivity_state | Type of currently applied AM policy (Connected/Disconnected/Restricted) | keyword |
checkpoint_harmony_endpoint.antimalware.description | Details of the event | text |
checkpoint_harmony_endpoint.antimalware.detected_by | Component which detected Event | keyword |
checkpoint_harmony_endpoint.antimalware.duration | Scan duration | long |
checkpoint_harmony_endpoint.antimalware.engine_version | Engine Version | keyword |
checkpoint_harmony_endpoint.antimalware.event_type | Name of the event | keyword |
checkpoint_harmony_endpoint.antimalware.installed_products | List of installed Endpoint Software Blades | keyword |
checkpoint_harmony_endpoint.antimalware.integrity_av_invoke_type | Type of scan | keyword |
checkpoint_harmony_endpoint.antimalware.malware.category | Malware category | keyword |
checkpoint_harmony_endpoint.antimalware.orig | ip | |
checkpoint_harmony_endpoint.antimalware.os_name | Name of the OS installed on the source endpoint computer | keyword |
checkpoint_harmony_endpoint.antimalware.os_version | Build version of the OS installed on the source endpoint computer | keyword |
checkpoint_harmony_endpoint.antimalware.packet_capture | Link to the PCAP traffic capture file with the recorded malicious connection. | keyword |
checkpoint_harmony_endpoint.antimalware.packet_capture_unique_id | Unique Packet Capture ID | keyword |
checkpoint_harmony_endpoint.antimalware.policy.date | Date of policy | date |
checkpoint_harmony_endpoint.antimalware.policy.name | Name of policy | keyword |
checkpoint_harmony_endpoint.antimalware.policy.number | Version number of policy | integer |
checkpoint_harmony_endpoint.antimalware.product.family | The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile) | keyword |
checkpoint_harmony_endpoint.antimalware.product.name | Product Name | keyword |
checkpoint_harmony_endpoint.antimalware.protection_type | Source of detection - can be IOC when manually configured, or URL/IP/CMI Reputation | keyword |
checkpoint_harmony_endpoint.antimalware.proxy_src_ip | Address where traffic was sent | ip |
checkpoint_harmony_endpoint.antimalware.result | Update result | keyword |
checkpoint_harmony_endpoint.antimalware.sequencenum | Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs) | integer |
checkpoint_harmony_endpoint.antimalware.service_domain | Service Domain Name | keyword |
checkpoint_harmony_endpoint.antimalware.severity | Event severity | keyword |
checkpoint_harmony_endpoint.antimalware.signature_version | signarure version | keyword |
checkpoint_harmony_endpoint.antimalware.src | Client source IP address | ip |
checkpoint_harmony_endpoint.antimalware.suspicious_events | Identified suspicious events | text |
checkpoint_harmony_endpoint.antimalware.tenant_id | Tenant ID | keyword |
checkpoint_harmony_endpoint.antimalware.type | Log type | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
input.type | Input type | keyword |
A range of ECS fields are also exported. They are described in the ECS documentation.
Forensics
This is Forensics
dataset.
An example event for forensics
looks as following:
{
"@timestamp": "2024-09-03T08:53:12.000Z",
"agent": {
"ephemeral_id": "76820ab1-9086-4fc7-975c-2e7cda1f601c",
"id": "3df1f948-9917-4dc4-a724-f2b5934a6652",
"name": "elastic-agent-71957",
"type": "filebeat",
"version": "8.15.1"
},
"checkpoint_harmony_endpoint": {
"forensics": {
"attack_status": "Dormant",
"client": {
"name": "Check Point Endpoint Security Client",
"version": "88.50.0213"
},
"confidence_level": "High",
"description": "To exclude the file: On the Harmony Endpoint Management add this sha1 exclusion: 62f0bd56-b0e1235b-99940b34-916c19ec-fac8e80c Attack status: Dormant.",
"detected_by": "Endpoint File Reputation",
"event_type": "Forensics Case Analysis",
"installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
"malware": {},
"packet_capture": "Packet Capture",
"packet_capture_unique_id": "0acd55a9-f241-4097-a699-6b7e41cd26af",
"policy": {
"date": "2024-09-02T06:23:25.0000000Z",
"name": "Default Forensics settings",
"number": 3
},
"product": {
"family": "Endpoint",
"name": "Forensics"
},
"protection_type": "File Reputation",
"remediated_files": "malz5.zip(Remediation disabled in policy)",
"sequencenum": 1,
"service_domain": "ep-demo",
"severity": "Critical",
"src": "10.35.38.102",
"suspicious_events": "System Shutdown / Reboot: ; ",
"tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
"type": "Log"
}
},
"data_stream": {
"dataset": "checkpoint_harmony_endpoint.forensics",
"namespace": "38429",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "3df1f948-9917-4dc4-a724-f2b5934a6652",
"snapshot": false,
"version": "8.15.1"
},
"event": {
"action": "Detect",
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "checkpoint_harmony_endpoint.forensics",
"id": "a4640108-91b1-0f19-66d6-ceb500000000",
"ingested": "2024-10-24T05:33:21Z",
"kind": "alert",
"module": "checkpoint_harmony_endpoint",
"type": [
"info"
]
},
"file": {
"hash": {
"md5": "1468c1908845ef238f7f196809946288",
"sha1": "62f0bd56b0e1235b99940b34916c19ecfac8e80c"
},
"name": "malz5.zip",
"path": "c:\\users\\admin\\downloads\\malz5.zip",
"size": 12707198,
"type": "zip"
},
"host": {
"hostname": "DESKTOP-E2P4OL0",
"ip": [
"10.35.38.102"
],
"name": "DESKTOP-E2P4OL0",
"os": {
"name": "Microsoft Windows 10 Pro",
"version": "10.0-19045-SP0.0-SMP"
},
"type": [
"Desktop"
]
},
"input": {
"type": "cel"
},
"related": {
"hash": [
"1468c1908845ef238f7f196809946288",
"62f0bd56b0e1235b99940b34916c19ecfac8e80c"
],
"hosts": [
"DESKTOP-E2P4OL0"
],
"ip": [
"10.35.38.102"
],
"user": [
"admin"
]
},
"rule": {
"name": "Gen.Rep.zip"
},
"tags": [
"forwarded"
],
"user": {
"domain": "SMC User",
"id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
"name": [
"admin"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_harmony_endpoint.forensics.action_details | Malware action details | keyword |
checkpoint_harmony_endpoint.forensics.attack_status | Status of attack | keyword |
checkpoint_harmony_endpoint.forensics.client.name | Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client | keyword |
checkpoint_harmony_endpoint.forensics.client.version | Build version of Harmony Endpoint client installed on the computer | version |
checkpoint_harmony_endpoint.forensics.confidence_level | Confidence level | keyword |
checkpoint_harmony_endpoint.forensics.description | Details of the event | text |
checkpoint_harmony_endpoint.forensics.detected_by | Component which detected Event | keyword |
checkpoint_harmony_endpoint.forensics.event_type | Name of the event | keyword |
checkpoint_harmony_endpoint.forensics.installed_products | List of installed Endpoint Software Blades | keyword |
checkpoint_harmony_endpoint.forensics.malware.action | Malware action | keyword |
checkpoint_harmony_endpoint.forensics.packet_capture | Link to the PCAP traffic capture file with the recorded malicious connection. | keyword |
checkpoint_harmony_endpoint.forensics.packet_capture_unique_id | ID of EFR report | keyword |
checkpoint_harmony_endpoint.forensics.policy.date | Date of policy | date |
checkpoint_harmony_endpoint.forensics.policy.name | Name of policy | keyword |
checkpoint_harmony_endpoint.forensics.policy.number | Version number of policy | integer |
checkpoint_harmony_endpoint.forensics.product.family | The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile) | keyword |
checkpoint_harmony_endpoint.forensics.product.name | Product Name | keyword |
checkpoint_harmony_endpoint.forensics.protection_type | Source of detection - can be IOC when manually configured, or URL/IP/CMI Reputation | keyword |
checkpoint_harmony_endpoint.forensics.remediated_files | Remediated files | keyword |
checkpoint_harmony_endpoint.forensics.sequencenum | Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs) | integer |
checkpoint_harmony_endpoint.forensics.service_domain | Service Domain Name | keyword |
checkpoint_harmony_endpoint.forensics.severity | Event severity | keyword |
checkpoint_harmony_endpoint.forensics.src | Client source IP address | ip |
checkpoint_harmony_endpoint.forensics.suspicious_events | Events that lead to the trigger | text |
checkpoint_harmony_endpoint.forensics.tenant_id | Tenant ID | keyword |
checkpoint_harmony_endpoint.forensics.type | Log type | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
input.type | Input type | keyword |
A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)
Threat Emulation
This is Threat Emulation
dataset.
An example event for threatemulation
looks as following:
{
"@timestamp": "2024-09-02T09:04:54.000Z",
"agent": {
"ephemeral_id": "8723e6bf-0b1a-4a95-95b6-d5e11a0380a7",
"id": "9f7d3384-0b1f-462c-9d71-0e0580545765",
"name": "elastic-agent-95748",
"type": "filebeat",
"version": "8.15.1"
},
"checkpoint_harmony_endpoint": {
"threatemulation": {
"advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"Threat Emulation, Extraction and Zero Phishing Exclusions\",\"exclusion_type\":\"SHA1\",\"exclusion_value\":{\"default_value\":\"9d3395d94c6bbba52abf0e6afcbf4ca312597c21\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
"analyzed_on": "Check Point Threat Emulation Cloud",
"client": {
"name": "Check Point Endpoint Security Client",
"version": "88.50.0213"
},
"confidence_level": "High",
"description": "Endpoint TE detected malicious file (681573a2-414a-4f7d-9683-177df4f8ca7f.tmp) . To exclude the file: On the Harmony Endpoint Management add this sha1 exclusion: 9d3395d9-4c6bbba5-2abf0e6a-fcbf4ca3-12597c21",
"event_type": "TE Event",
"incident_uid": "74a33ecb-1b91-4c25-a136-1989eb175638",
"installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
"malware": {
"action": "Adware\",\"Solimba\",\"Trojan\",\"behavior"
},
"packet_capture": "Packet Capture",
"packet_capture_unique_id": "5e3302e5-3f73-4b77-beec-2849003e9d47",
"policy": {
"date": "2024-08-29T13:12:50.0000000Z",
"name": "Default Threat Extraction, Emulation and Anti-Exploit settings for the entire organization",
"number": 3
},
"product": {
"family": "Endpoint",
"name": "Threat Emulation"
},
"protection_type": "File System Emulation",
"sequencenum": 16777215,
"severity": "Critical",
"src": "10.35.38.102",
"tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
"type": "Log",
"verdict": "Malicious"
}
},
"data_stream": {
"dataset": "checkpoint_harmony_endpoint.threatemulation",
"namespace": "43839",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "9f7d3384-0b1f-462c-9d71-0e0580545765",
"snapshot": false,
"version": "8.15.1"
},
"event": {
"action": "Detect",
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "checkpoint_harmony_endpoint.threatemulation",
"id": "a4640108-91b1-0f19-66d5-803100000012",
"ingested": "2024-10-24T05:34:17Z",
"kind": "alert",
"module": "checkpoint_harmony_endpoint",
"type": [
"info"
]
},
"file": {
"hash": {
"md5": "ebe8b633d231bbfee9543d744a2ab59d",
"sha1": "9d3395d94c6bbba52abf0e6afcbf4ca312597c21"
},
"name": "681573a2-414a-4f7d-9683-177df4f8ca7f.tmp",
"path": "C:\\Users\\admin\\Downloads\\681573a2-414a-4f7d-9683-177df4f8ca7f.tmp",
"size": 139648,
"type": "zip"
},
"host": {
"hostname": "DESKTOP-E2P4OL0",
"ip": [
"10.35.38.102"
],
"name": "DESKTOP-E2P4OL0",
"os": {
"name": "Microsoft Windows 10 Pro",
"version": "10.0-19045-SP0.0-SMP"
},
"type": [
"Desktop"
]
},
"input": {
"type": "cel"
},
"related": {
"hash": [
"ebe8b633d231bbfee9543d744a2ab59d",
"9d3395d94c6bbba52abf0e6afcbf4ca312597c21"
],
"hosts": [
"DESKTOP-E2P4OL0"
],
"ip": [
"10.35.38.102"
],
"user": [
"admin"
]
},
"rule": {
"name": "Gen.SB.zip"
},
"tags": [
"forwarded"
],
"user": {
"domain": "SMC User",
"id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
"name": [
"admin"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_harmony_endpoint.threatemulation.advanced_info | Internal field used for configuring exclusions | text |
checkpoint_harmony_endpoint.threatemulation.analyzed_on | Asset used for emulation - can be "Check Point Threat Emulation Cloud", "Check Point Appliance", or "Harmony Local Cache" | keyword |
checkpoint_harmony_endpoint.threatemulation.client.name | Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client | keyword |
checkpoint_harmony_endpoint.threatemulation.client.version | Build version of Harmony Endpoint client installed on the computer | version |
checkpoint_harmony_endpoint.threatemulation.confidence_level | Can be Low/Medium/High/N-A | keyword |
checkpoint_harmony_endpoint.threatemulation.description | Details of the event | text |
checkpoint_harmony_endpoint.threatemulation.event_type | Name of the event | keyword |
checkpoint_harmony_endpoint.threatemulation.incident_uid | ID of EFR report, if relevant/exists | keyword |
checkpoint_harmony_endpoint.threatemulation.installed_products | List of installed Endpoint Software Blades | keyword |
checkpoint_harmony_endpoint.threatemulation.malware.action | Additional info about malware category or actions that led to detection | keyword |
checkpoint_harmony_endpoint.threatemulation.orig | ip | |
checkpoint_harmony_endpoint.threatemulation.packet_capture | Link to the PCAP traffic capture file with the recorded malicious connection. | keyword |
checkpoint_harmony_endpoint.threatemulation.packet_capture_unique_id | ID of EFR report, if relevant/exists | keyword |
checkpoint_harmony_endpoint.threatemulation.policy.date | Date of policy | date |
checkpoint_harmony_endpoint.threatemulation.policy.name | Name of policy | keyword |
checkpoint_harmony_endpoint.threatemulation.policy.number | Version number of policy | integer |
checkpoint_harmony_endpoint.threatemulation.product.family | The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile) | keyword |
checkpoint_harmony_endpoint.threatemulation.product.name | Product Name | keyword |
checkpoint_harmony_endpoint.threatemulation.protection_type | Type of detection | keyword |
checkpoint_harmony_endpoint.threatemulation.reason | Information on the error occured | keyword |
checkpoint_harmony_endpoint.threatemulation.resource | Resource from the HTTP request | keyword |
checkpoint_harmony_endpoint.threatemulation.sequencenum | Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs) | integer |
checkpoint_harmony_endpoint.threatemulation.severity | Event severity | keyword |
checkpoint_harmony_endpoint.threatemulation.src | Client source IP address | ip |
checkpoint_harmony_endpoint.threatemulation.tenant_id | Tenant ID | keyword |
checkpoint_harmony_endpoint.threatemulation.type | Log type | keyword |
checkpoint_harmony_endpoint.threatemulation.verdict | Can be Malicious/Benign | keyword |
checkpoint_harmony_endpoint.threatemulation.web_client_type | When relevant, name of the browser (Chrome, Edge, …) | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
input.type | Input type | keyword |
A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)
Threat Extraction
This is Threat Extraction
dataset.
An example event for threatextraction
looks as following:
{
"@timestamp": "2024-09-02T09:21:42.000Z",
"agent": {
"ephemeral_id": "b2ca27d2-5544-4cc2-9491-f91097060c1c",
"id": "82b03ad0-7025-436d-9e81-8a39705e0152",
"name": "elastic-agent-30042",
"type": "filebeat",
"version": "8.15.1"
},
"checkpoint_harmony_endpoint": {
"threatextraction": {
"advanced_info": " \"disable_exclusion\": true ",
"client": {
"name": "Check Point Endpoint Security Client",
"version": "88.50.0213"
},
"confidence_level": "High",
"description": "File is not supported for extraction",
"event_type": "TEX Event",
"installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
"malware": {
"action": "Not Supported"
},
"policy": {
"date": "2024-08-29T13:12:50.0000000Z",
"name": "Default Threat Extraction, Emulation and Anti-Exploit settings for the entire organization",
"number": 3
},
"product": {
"family": "Endpoint",
"name": "Threat Extraction"
},
"protection_type": "Content Removal",
"sequencenum": 1,
"severity": "Informational",
"src": "10.35.38.102",
"tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
"type": "Log",
"web_client_type": "Chrome"
}
},
"data_stream": {
"dataset": "checkpoint_harmony_endpoint.threatextraction",
"namespace": "81720",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "82b03ad0-7025-436d-9e81-8a39705e0152",
"snapshot": false,
"version": "8.15.1"
},
"event": {
"action": "Extract",
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "checkpoint_harmony_endpoint.threatextraction",
"id": "a4640108-91b1-0f19-66d5-83f100000019",
"ingested": "2024-10-24T05:35:11Z",
"kind": "alert",
"module": "checkpoint_harmony_endpoint",
"type": [
"info"
]
},
"file": {
"hash": {
"sha1": "no-sha1"
},
"name": "mirai.sh4",
"path": "blob:https://github.com/6bd30ea7-29a8-4dd2-9056-f5077632e110",
"size": 0,
"type": "sh4"
},
"host": {
"hostname": "DESKTOP-E2P4OL0",
"ip": [
"10.35.38.102"
],
"name": "DESKTOP-E2P4OL0",
"os": {
"name": "Microsoft Windows 10 Pro",
"version": "10.0-19045-SP0.0-SMP"
},
"type": [
"Desktop"
]
},
"input": {
"type": "cel"
},
"related": {
"hash": [
"no-sha1"
],
"hosts": [
"DESKTOP-E2P4OL0"
],
"ip": [
"10.35.38.102"
],
"user": [
"admin"
]
},
"rule": {
"name": "Extract potentially malicious content"
},
"tags": [
"forwarded"
],
"user": {
"domain": "SMC User",
"id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
"name": [
"admin"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_harmony_endpoint.threatextraction.advanced_info | Internal field used for configuring exclusions | text |
checkpoint_harmony_endpoint.threatextraction.analyzed_on | Describes location where threat is analyzed. | keyword |
checkpoint_harmony_endpoint.threatextraction.client.name | Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client | keyword |
checkpoint_harmony_endpoint.threatextraction.client.version | Build version of Harmony Endpoint client installed on the computer | version |
checkpoint_harmony_endpoint.threatextraction.confidence_level | Can be Low/Medim/High/N-A | keyword |
checkpoint_harmony_endpoint.threatextraction.description | Details of the event | text |
checkpoint_harmony_endpoint.threatextraction.event_type | Name of the event | keyword |
checkpoint_harmony_endpoint.threatextraction.incident_uid | ID of EFR report, if relevant/exists | keyword |
checkpoint_harmony_endpoint.threatextraction.installed_products | List of installed Endpoint Software Blades | keyword |
checkpoint_harmony_endpoint.threatextraction.malware.action | Additional info about the extraction - can be Extracted, Verified, Oversized, Not Supported, Corrupted file | keyword |
checkpoint_harmony_endpoint.threatextraction.orig | ip | |
checkpoint_harmony_endpoint.threatextraction.packet_capture | Link to the PCAP traffic capture file with the recorded malicious connection. | keyword |
checkpoint_harmony_endpoint.threatextraction.policy.date | Date of policy | date |
checkpoint_harmony_endpoint.threatextraction.policy.name | Name of policy | keyword |
checkpoint_harmony_endpoint.threatextraction.policy.number | Version number of policy | integer |
checkpoint_harmony_endpoint.threatextraction.product.family | The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile) | keyword |
checkpoint_harmony_endpoint.threatextraction.product.name | Product Name | keyword |
checkpoint_harmony_endpoint.threatextraction.protection_type | Type of detection | keyword |
checkpoint_harmony_endpoint.threatextraction.resource | Resource from the HTTP request | keyword |
checkpoint_harmony_endpoint.threatextraction.sequencenum | Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs) | integer |
checkpoint_harmony_endpoint.threatextraction.severity | Event severity | keyword |
checkpoint_harmony_endpoint.threatextraction.src | Client source IP address | ip |
checkpoint_harmony_endpoint.threatextraction.tenant_id | Tenant ID | keyword |
checkpoint_harmony_endpoint.threatextraction.type | Log type | keyword |
checkpoint_harmony_endpoint.threatextraction.web_client_type | When relevant, name of the browser (Chrome, Edge, …) | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
input.type | Input type | keyword |
A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)
URL Filtering
This is URL Filtering
dataset.
An example event for urlfiltering
looks as following:
{
"@timestamp": "2024-09-06T10:07:43.000Z",
"agent": {
"ephemeral_id": "95fc55ec-9d54-4116-87cc-a4fe3767eba0",
"id": "3c23eeec-fde0-4811-91a1-6bc5b403c95e",
"name": "elastic-agent-18777",
"type": "filebeat",
"version": "8.15.1"
},
"checkpoint_harmony_endpoint": {
"urlfiltering": {
"advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"URL Filtering exclusions\",\"exclusion_type\":\"Domain\",\"exclusion_value\":{\"default_value\":\"secure.indeed.com\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
"app": {
"id": "0",
"properties": "Job Search / Careers, Business / Economy"
},
"appi_name": "secure.indeed.com",
"client": {
"name": "Check Point Endpoint Security Client",
"version": "88.50.0213"
},
"description": "URLF Info Event",
"event_type": "URLF Info Event",
"installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
"matched_category": "Job Search / Careers",
"policy": {
"date": "2024-09-06T09:57:28.0000000Z",
"name": "Default Anti-Bot settings",
"number": 4
},
"process_exe_path": "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
"product": {
"family": "Endpoint",
"name": "URL Filtering"
},
"protection_type": "URL Filtering",
"sequencenum": 16777215,
"severity": "Informational",
"src": "10.35.38.102",
"tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
"type": "Log",
"usercheck_incident_uid": "b04d8940",
"web_client_type": "Chrome"
}
},
"data_stream": {
"dataset": "checkpoint_harmony_endpoint.urlfiltering",
"namespace": "69408",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "3c23eeec-fde0-4811-91a1-6bc5b403c95e",
"snapshot": false,
"version": "8.15.1"
},
"event": {
"action": "Detect",
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "checkpoint_harmony_endpoint.urlfiltering",
"id": "a4640108-91b1-0f19-66da-d62100000013",
"ingested": "2024-10-24T05:36:11Z",
"kind": "alert",
"module": "checkpoint_harmony_endpoint",
"type": [
"info"
]
},
"host": {
"hostname": "DESKTOP-E2P4OL0",
"ip": [
"10.35.38.102"
],
"name": "DESKTOP-E2P4OL0",
"os": {
"name": "Microsoft Windows 10 Pro",
"version": "10.0-19045-SP0.0-SMP"
},
"type": [
"Desktop"
]
},
"input": {
"type": "cel"
},
"related": {
"hosts": [
"DESKTOP-E2P4OL0"
],
"ip": [
"10.35.38.102"
],
"user": [
"admin"
]
},
"rule": {
"name": "gen.urlf"
},
"tags": [
"forwarded"
],
"url": {
"domain": "secure.indeed.com",
"original": "https://secure.indeed.com/auth?branding=save-profile-modal&tmpl=inline&from=act_zeroauth_profile_tst&iframe_tk=9a019527-a6f1-4b3d-b803-2b25bb46b1db&hl=en_IN&co=IN",
"path": "/auth",
"query": "branding=save-profile-modal&tmpl=inline&from=act_zeroauth_profile_tst&iframe_tk=9a019527-a6f1-4b3d-b803-2b25bb46b1db&hl=en_IN&co=IN",
"scheme": "https"
},
"user": {
"domain": "SMC User",
"id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
"name": [
"admin"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_harmony_endpoint.urlfiltering.advanced_info | Internal field used for configuring exclusions | text |
checkpoint_harmony_endpoint.urlfiltering.analyzed_on | Describes location where threat is analyzed. | keyword |
checkpoint_harmony_endpoint.urlfiltering.app.id | Application ID | keyword |
checkpoint_harmony_endpoint.urlfiltering.app.properties | All categories application belongs to | text |
checkpoint_harmony_endpoint.urlfiltering.app_properties | Application categories | keyword |
checkpoint_harmony_endpoint.urlfiltering.appi_name | Requested website (domain only, without path) | text |
checkpoint_harmony_endpoint.urlfiltering.client.name | Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client | keyword |
checkpoint_harmony_endpoint.urlfiltering.client.version | Build version of Harmony Endpoint client installed on the computer | version |
checkpoint_harmony_endpoint.urlfiltering.confidence_level | Can be Low/Medim/High/N-A | keyword |
checkpoint_harmony_endpoint.urlfiltering.description | Details of the event | text |
checkpoint_harmony_endpoint.urlfiltering.dst | Destination IP address | ip |
checkpoint_harmony_endpoint.urlfiltering.event_type | Name of the event | keyword |
checkpoint_harmony_endpoint.urlfiltering.installed_products | List of installed Endpoint Software Blades | keyword |
checkpoint_harmony_endpoint.urlfiltering.matched_category | Matched category | keyword |
checkpoint_harmony_endpoint.urlfiltering.orig | ip | |
checkpoint_harmony_endpoint.urlfiltering.packet_capture | Link to the PCAP traffic capture file with the recorded malicious connection. | keyword |
checkpoint_harmony_endpoint.urlfiltering.policy.date | Date of policy | date |
checkpoint_harmony_endpoint.urlfiltering.policy.name | Name of policy | keyword |
checkpoint_harmony_endpoint.urlfiltering.policy.number | Version number of policy | integer |
checkpoint_harmony_endpoint.urlfiltering.process_exe_path | Path to Process's executable | keyword |
checkpoint_harmony_endpoint.urlfiltering.product.family | The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile) | keyword |
checkpoint_harmony_endpoint.urlfiltering.product.name | Product Name | keyword |
checkpoint_harmony_endpoint.urlfiltering.protection_type | Type of detection | keyword |
checkpoint_harmony_endpoint.urlfiltering.resource | Resource from the HTTP request | keyword |
checkpoint_harmony_endpoint.urlfiltering.sequencenum | Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs) | integer |
checkpoint_harmony_endpoint.urlfiltering.severity | Event severity | keyword |
checkpoint_harmony_endpoint.urlfiltering.src | Client source IP address | ip |
checkpoint_harmony_endpoint.urlfiltering.tenant_id | Tenant ID | keyword |
checkpoint_harmony_endpoint.urlfiltering.type | Log type | keyword |
checkpoint_harmony_endpoint.urlfiltering.usercheck_incident_uid | Internal ID of user confirmation | keyword |
checkpoint_harmony_endpoint.urlfiltering.web_client_type | When relevant, name of the browser (Chrome, Edge, …) | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
input.type | Input type | keyword |
A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)
Zero-phishing
This is Zero-Phishing
dataset.
An example event for zerophishing
looks as following:
{
"@timestamp": "2024-09-02T08:51:08.000Z",
"agent": {
"ephemeral_id": "9fc6c363-e390-492c-bfdf-684e4d20aff8",
"id": "64f03e47-f005-4ecd-8d91-e63af37617a3",
"name": "elastic-agent-34074",
"type": "filebeat",
"version": "8.15.1"
},
"checkpoint_harmony_endpoint": {
"zerophishing": {
"advanced_info": "\"exclusions\":[{\"exclusion_engine_type\":\"Threat Emulation, Extraction and Zero Phishing Exclusions\",\"exclusion_type\":\"Domain\",\"exclusion_value\":{\"default_value\":\"main.sbm-demo.xyz\",\"md5\":\"\",\"original_name\":\"\",\"signer\":\"\",\"process\":\"\",\"protection\":\"\",\"comment\":\"\"}}]",
"client": {
"name": "Check Point Endpoint Security Client",
"version": "88.50.0213"
},
"confidence_level": "High",
"description": "Deceptive site (https://main.sbm-demo.xyz/zero-phishing) was detected.",
"event_type": "Phishing Event",
"extension_version": "Check Point Endpoint Security Client",
"installed_products": "Full Disk Encryption; Media Encryption & Port Protection; Firewall; Compliance; Application Control; Anti-Malware; VPN; Anti-Bot; Forensics; Threat Emulation",
"malware": {},
"policy": {
"date": "2024-08-29T13:12:50.0000000Z",
"name": "Default Threat Extraction, Emulation and Anti-Exploit settings for the entire organization",
"number": 3
},
"product": {
"family": "Endpoint",
"name": "Zero Phishing"
},
"protection_type": "Phishing",
"sequencenum": 16777215,
"severity": "High",
"src": "10.35.38.102",
"tenant_id": "3e15ed24-89ff-4986-a204-c425cee4ba48",
"type": "Log",
"web_client_type": "Chrome"
}
},
"data_stream": {
"dataset": "checkpoint_harmony_endpoint.zerophishing",
"namespace": "39288",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "64f03e47-f005-4ecd-8d91-e63af37617a3",
"snapshot": false,
"version": "8.15.1"
},
"event": {
"action": "Detect",
"agent_id_status": "verified",
"category": [
"malware"
],
"dataset": "checkpoint_harmony_endpoint.zerophishing",
"id": "a4640108-91b1-0f19-66d5-7d6100000004",
"ingested": "2024-10-24T05:37:11Z",
"kind": "alert",
"module": "checkpoint_harmony_endpoint",
"type": [
"info"
]
},
"host": {
"hostname": "DESKTOP-E2P4OL0",
"ip": [
"10.35.38.102"
],
"name": "DESKTOP-E2P4OL0",
"os": {
"name": "Microsoft Windows 10 Pro",
"version": "10.0-19045-SP0.0-SMP"
},
"type": [
"Desktop"
]
},
"input": {
"type": "cel"
},
"related": {
"hosts": [
"DESKTOP-E2P4OL0"
],
"ip": [
"10.35.38.102"
],
"user": [
"admin"
]
},
"rule": {
"name": "gen.ba.phishing"
},
"tags": [
"forwarded"
],
"url": {
"domain": "main.sbm-demo.xyz",
"original": "https://main.sbm-demo.xyz/zero-phishing",
"path": "/zero-phishing",
"scheme": "https"
},
"user": {
"domain": "SMC User",
"id": "S-1-5-21-3766288932-3295778425-2939962592-1001",
"name": [
"admin"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_harmony_endpoint.zerophishing.advanced_info | Internal field used for configuring exclusions | text |
checkpoint_harmony_endpoint.zerophishing.client.name | Can be either Check Point Endpoint Security Client or Check Point Capsule Docs Client | keyword |
checkpoint_harmony_endpoint.zerophishing.client.version | Build version of Harmony Endpoint client installed on the computer | version |
checkpoint_harmony_endpoint.zerophishing.confidence_level | Can be Low/Medim/High/N-A | keyword |
checkpoint_harmony_endpoint.zerophishing.description | Details of the event | text |
checkpoint_harmony_endpoint.zerophishing.event_type | Name of the event | keyword |
checkpoint_harmony_endpoint.zerophishing.extension_version | Browser Extention version | keyword |
checkpoint_harmony_endpoint.zerophishing.installed_products | List of installed Endpoint Software Blades | keyword |
checkpoint_harmony_endpoint.zerophishing.malware.action | Additional information about detection, for example "User reused corporate credentials" | keyword |
checkpoint_harmony_endpoint.zerophishing.orig | ip | |
checkpoint_harmony_endpoint.zerophishing.policy.date | Date of policy | date |
checkpoint_harmony_endpoint.zerophishing.policy.name | Name of policy | keyword |
checkpoint_harmony_endpoint.zerophishing.policy.number | Version number of policy | integer |
checkpoint_harmony_endpoint.zerophishing.product.family | The product family the blade/product belongs to possible values (0 - Network, 1 - Endpoint, 2 - Access, 3 - Threat, 4 - Mobile) | keyword |
checkpoint_harmony_endpoint.zerophishing.product.name | Product Name | keyword |
checkpoint_harmony_endpoint.zerophishing.protection_type | Type of detection | keyword |
checkpoint_harmony_endpoint.zerophishing.resource | Resource from the HTTP request | keyword |
checkpoint_harmony_endpoint.zerophishing.sequencenum | Number added to order logs with the same Linux timestamp and origin (Security Gateway that generated these logs) | integer |
checkpoint_harmony_endpoint.zerophishing.severity | Event severity | keyword |
checkpoint_harmony_endpoint.zerophishing.src | Client source IP address | ip |
checkpoint_harmony_endpoint.zerophishing.tenant_id | Tenant ID | keyword |
checkpoint_harmony_endpoint.zerophishing.type | Log type | keyword |
checkpoint_harmony_endpoint.zerophishing.web_client_type | When relevant, name of the browser (Chrome, Edge, …) | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
input.type | Input type | keyword |
A range of ECS fields are also exported. They are described in the ECS documentation.(https://www.elastic.co/guide/en/ecs/current/ecs-field-reference.html)
Changelog
Version | Details | Kibana version(s) |
---|---|---|
0.1.1 | Bug fix View pull request | — |
0.1.0 | Enhancement View pull request | — |