This guide tells you how to configure Check Point collection protocol which collects events from a Check Point event source such as a firewall or Check Point Log Manager.
How Check Point Collection Works
The Log Collector service collects events from Check Point event sources using OPSEC LEA. OPSEC LEA is the Check Point Operations Security Log Export API that facilitates the extraction of logs.
The following figure illustrates how you deploy the Check Point Collection Protocol in Security Analytics.
Configure Check Point Collection Protocol in Security Analytics
You configure to the Log Collector to use Check Point collection for an event source in the event Source tab of the Log Collector parameter view. The following figure the basic workflow for configuring an event source for Check Point Collection in Security Analytics. Please refer to:
- Step 2. Configure Check Point Event Sources in Security Analyticsfor step-by-step instructions on how to configure events sources in Security Analytics tht use the Check Point Collection protocol.
- Check Point Collection: Configuration Parametersfor a detailed description of each Check Point Collection Protocol parameter.
Click the Event Sources tab.
Select Check Point as the collection protocol and select Config.
Click and select Check Point as the event source category.
The event source category is part of the content you downloaded from LIVE.
Configure Event Sources to Use Check Point Collection Protocol
You need to configure each event source that uses the Check Point Collection protocol to communicate with Security Analytics (see Step 1. Configure Check Point Event Sources to Send Events to Security Analytics).