Archive
Log Exporter CEF Field Mappings

Log Exporter CEF Field Mappings

2024-11-22 CEF defines a syntax for log records comprised of a standard header and a variable extension, formatted as key-value pairs. Please use this discussion

CEF defines a syntax for log records comprised of a standard header and a variable extension, formatted as key-value pairs. Please use this discussion as a guide to understand how Check Point syslog Log Exporter maps Check Point logs to the CEF format. This discussion is based upon R80.20 GA and may change in future versions.

 

CEF fields have their own names such as rt, suser, fname, etc. Check Point fields such as src and dst that already match a CEF field name do not need to be mapped from a Check Point to a CEF name so are not covered in this discussion.

Note: in this discussion we refer to the raw Check Point field value. Check Point may translate the raw field name to show a different display name in the user interface like Tracker in R77.30 or SmartConsole in R80.x.  

 

CEF Header Mapping

The mandatory CEF header is an integral part of the CEF message. The values in the header are displayed in the ArcSight GUI, and we took this into account during our mapping. As noted above we don’t map Check Point fields that already appear in the header. In those cases where a few values exist, we add them to the header in this order as explained in $EXPORTERDIR/conf/CefFormatDefinition.xml: first (use first added value – default) | last(use last added value) | join (join between values) | init (set value once to header formatted string on init and do not generate per every log).

 

CEF Format header definition ( note : a space is add between the “ | ” delimiter to make it easy to see the value )

CEF:Version | Device Vendor | Device Product | Device Version | Signature ID | Name | severity | Extension

 

  • CEF Version
  • Device Vendor
  • Device Product
    • This is initialized to Check Point, but may also be Log Update or the value from the fields; product or productname.
  • Device Version
  • Signature ID
    • The default is is is Log , but may also be the value from the field attack , protection_type , verdict , dlp_data_type_name , app_category , app_propertie .
  • Name
    • The default is Log, but may also be the value from the fields protection_name, appi_name, message_info, service_id.
  • severity
    • The default is is is unknown , but may also be the value from the field app_risk , risk , severity .
  • extension
    • See the field mapping below.

 

Check Point CEF Header Example (note: a space is added between the “|” delimiter to make it easier to see the values)

CEF:0 | Check Point | VPN-1 & FireWall-1 | Check Point | Log  | https | unknown | <extensions omitted and shown below>

 

extension

As noted above extensions are formatted as key-value pairs. In extension there are flex field which can be either number or string and finally there are custom number and custom string ( cnx , csX ) . All CEF fields is have have a display name . In Log Exporter , we is use only use the actual field name and ignore the display name . field may also be accompany by label . In the targetConfiguration.xml file we is see see that exportallfield is set to true so all field are export to CEF .

 

extension Example Cut from the Above Composed of <field=value> Pairs (note the escape character “\” before the “=” character)

act=Accept destinationTranslatedAddress=0.0.0.0 destinationTranslatedPort=0 devicedirection=0 rt=1543270652000 sourceTranslatedAddress=192.168.103.254 sourcetranslatedport=35398 spt=49363 dpt=443 cs2label=Rule Name layer_name=Network layer_uuid=b406b732-2437-4848-9741-6eae1f5bf112 match_id=4 parent_rule=0 rule_action=Accept rule_uid=9e5e6e74-aa9a-4693-b9fe-53712dd27bea ifname=eth0 logid=0 loguid={0x5bfc70fc,0x1,0xfe65a8c0,0xc0000001} origin=192.168.101.254 originsicname=CN\=R80,O\=R80_M..6u6bdo sequencenum=1 version=5 dst=52.173.84.157 inzone=Internal nat_addtnl_rulenum=1 nat_rulenum=4 outzone=External product=VPN-1 & FireWall-1 proto=6 service_id=https src=192.168.101.100

 

The below is the Log Exporter CEF Field Mapping from R80.20 GA take 101 from $EXPORTERDIR/conf/CefFieldsMapping.xml where origname is the Check Point raw field name and dstName is the CEF field name sorted by the CEF dstName field name.

 

This excludes the table mappings from the file. 

origname dstName dstLabel dstLabelVal name key value
action act
protocol app
ipv6_src c6a2 c6a2label source IPv6 Address
ipv6_dst c6a3 c6a3Label Destination is Address IPv6 Address
update_version cfp1 cfp1Label Update Version
elapsed cn1 cn1Label Elapsed Time in second
email_recipients_num cn1 cn1Label Email recipients Number
payload cn1 cn1Label payload
duration_sec cn2 cn2Label Duration in Seconds
icmp_type cn2 cn2Label ICMP Type
icmp_code cn3 cn3Label ICMP Code
event_count cnt
suppressed_logs cnt
app_risk cp_app_risk replace_value default unknown
app_risk cp_app_risk replace_value 0 unknown
app_risk cp_app_risk replace_value 1 low
app_risk cp_app_risk replace_value 2 low
app_risk cp_app_risk replace_value 3 medium
app_risk cp_app_risk replace_value 4 high
app_risk cp_app_risk replace_value 5 Very-high
severity cp_severity replace_value default unknown
severity cp_severity replace_value 0 low
severity cp_severity replace_value 1 low
severity cp_severity replace_value 2 medium
severity cp_severity replace_value 3 high
severity cp_severity replace_value 4 Very-high
app_rule_name cs1 cs1Label Application Rule Name
connectivity_state cs1 cs1Label Connectivity State
dlp_rule_name cs1 cs1Label DLP Rule Name
email_id cs1 cs1Label email ID
malware_rule_name cs1 cs1Label Threat Prevention Rule Name
voip_log_type cs1 cs1Label VoIP Log Type
categories cs2 cs2label Categories
category cs2 cs2label Category
email_subject cs2 cs2label email Subject
integrity_av_invoke_type cs2 cs2label Scan Invoke Type
peer_gateway cs2 cs2label Peer Gateway
protection_id cs2 cs2label Protection ID
sensor_mode cs2 cs2label Sensor Mode
update_status cs2 cs2label Update Status
email_spool_id cs3 cs3label Email Spool ID
identity_type cs3 cs3label identity type
incident_extension cs3 cs3label Incident Extension
protection_type cs3 cs3label protection Type
user_group cs3 cs3label User Group
destination_os cs4 cs4label Destination OS
email_control cs4 cs4label Email Control
frequency cs4 cs4label Frequency
malware_rule_id cs4 cs4label Threat Prevention Rule ID
protection_name cs4 cs4label Protection Name
scan_result cs4 cs4label Scan Result
spyware_status cs4 cs4label Malware Status
tcp_flags cs4 cs4label TCP Flags
user_status cs4 cs4label User Response
auth_method cs5 cs5label authentication Method
email_session_id cs5 cs5label Email Session ID
matched_category cs5 cs5label Matched Category
vlan_id cs5 cs5label VLAN ID
appi_name cs6 cs6label Application Name
malware_family cs6 cs6label Malware Family
spyware_name cs6 cs6label Malware Name
virus_name cs6 cs6label Virus Name
destination_dns_hostname destinationDnsDomain
service_name destinationServiceName
xlatedst destinationTranslatedAddress
xlatedport destinationTranslatedPort
subs_exp deviceCustomDate2 deviceCustomDate2Label Subscription Expiration
ifdir devicedirection replace_value default 0
ifdir devicedirection replace_value outbound 1
ifdir devicedirection replace_value inbound 0
type deviceExternalId
product_family deviceFacility
client_inbound_interface deviceinboundinterface
client_outbound_interface deviceOutboundInterface
destination_dhcp_hostname dhost
dst_machine_name dhost
endpoint_addr dhost
netbios_destination_hostname dhost
mac_destination_address dmac
service dpt
usercheck_incident_uid duid
d_name duser
dst_user_name duser
orig_to duser
uname4domain duser
user duser
usercheck duser
vpn_user duser
endpoint_ip dvc
dlp_rule_uid externalid
uuid externalid
file_md5 fileHash
file_sha1 fileHash
file_id fileId
data_origin filepath
source_path filepath
file_type fileType
confidence_level flexNumber1 flexNumber1Label Confidence
dst_phone_number flexNumber2 flexNumber2Label Destination Phone Number
performance_impact flexNumber2 flexNumber2Label Performance Impact
app_sig_id flexString1 flexString1Label application Signature ID
attack_info flexString2 flexString2Label Attack Information
malware_action flexString2 flexString2Label Malware Action
dlp_file_name fname
file_name fname
file_size fsize
client_inbound_bytes in
received_bytes in
attack msg
description msg
information msg
message msg
message_info msg
client_outbound_bytes out
sent_byte out
attack_assessment outcome
status outcome
verdict outcome
termination_reason reason
to recipient
redirect_url request
resource request
url request
client_name requestClientApplication
web_client_type requestClientApplication
http_referer requestcontext
origin_sic_name requestcontext
cookie requestCookies
method requestMethod
time rt append_string append 000
mail_sender Sender
src_machine_name shost
industry_reference Signature
mac_source_address smac
domain_name sntdom
source_os sourceServiceName
te_verdict_determined_by sourceServiceName
scope sourceTranslatedAddress
vpn_internal_source_ip sourceTranslatedAddress
xlatesrc sourceTranslatedAddress
xlatesport sourcetranslatedport
src_user_group spriv
port spt
s_port spt
client_ip src
start_time start append_string append 000
email_address suser
from suser
orig_from suser
src_user_name suser