icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Enosys Add-on for Check Point OPSEC LEA
SHA256 checksum (enosys-add-on-for-check-point-opsec-lea_131.tgz) b242f6eff94c124b20043a86d71d632cc809dfc3083f4e35e78f03faa12ac99d SHA256 checksum (enosys-add-on-for-check-point-opsec-lea_13.tgz) 7a15090046687a61fd9b5af3d2e468e135e60f0752239492f8ced8cf1c570dfc SHA256 checksum (enosys-add-on-for-check-point-opsec-lea_12.tgz) 7b74ddca5b7010fa72e3c8dc3fb93fc36ab284dfd802751d234f55148f827c40 SHA256 checksum (enosys-add-on-for-check-point-opsec-lea_11.tgz) f4a3e2395bf9564ed060b99adcb1acc6b10bc74b447e527b15a18e7565128cb8
To install your download
To install apps and add-ons from within Splunk Enterprise
  1. Log into Splunk Enterprise.
  2. On the Apps menu, click Manage Apps.
  3. Click Install app from file.
  4. In the Upload app window, click Choose File.
  5. Locate the .tar.gz file you just downloaded, and then click Open or Choose.
  6. Click Upload.
  7. Click Restart Splunk, and then confirm that you want to restart.
To install apps and add-ons directly into Splunk Enterprise
  1. Put the downloaded file in the $SPLUNK_HOME/etc/apps directory.
  2. Untar and ungzip your app or add-on, using a tool like tar -xvf (on *nix) or WinZip (on Windows).
  3. Restart Splunk.
After you install a Splunk app, you will find it on Splunk Home. If you have questions or need more information, see Manage app and add-on objects.

Flag As Inappropriate

splunk

Enosys Add-on for Check Point OPSEC LEA

Splunk Cloud
Overview
About Us:
- Enosys Solutions is a technology security specialist with a highly skilled professional services team and 24x7 on-shore security operations centre (SOC) servicing corporate and public sector organisations across Australia, specialising in Security Operations services leveraging Splunk.

Description:
- Enosys created this Technical Add-On to enable CIM-compliant ingestion of logging data from a forwarded Check Point logs.

Features:
- This is intended to support field extraction for Splunk Cloud and Enterprise deployments.
- As this is intended for use on Search Heads no binaries are included.
- Efforts to ensure CIM compliance are met.
- The Enosys Add-on for Check Point OPSEC LEA works with expected Check Point type logs opsec,opsec:smartdefense(ips),opsec:vpn,opsec:audit,opsec:threat_emulation,opsec:anti_malware(anti_bot) and opsec:anti_virus

Attribution:
- Full credit to the Splunk team for their work and maintenance of the foundation and componente 'https://splunkbase.splunk.com/app/3197/'

** Please contribute here https://github.com/enosysau/Splunk_TA_checkpoint-opseclea_Enosys **

Release Notes

Version 1.3.1
Jan. 23, 2020

Requirements:
- This Add-on requires additional 'Splunk Add-on for Check Point OPSEC LEA' version 4.3.1 (https://splunkbase.splunk.com/app/3197/) installed on a Heavy Forwarder to retrieve the logs from OPSEC LEA Server.

Installation:
- The Add-on Enosys Add-on for Check Point OPSEC LEA should be installed on Search Heads and Indexers.
- Splunk Add-on for Check Point OPSEC LEA version 4.3.1 (https://splunkbase.splunk.com/app/3197/) installed on a Heavy Forwarder

Known issues:
- (none)

Addressed Issues:
- Additional 'opsec' vendor action with CIM expected action values
- Re-mapped 'eventtypes' linked to tags authentication, network and malware

Version 1.3
Aug. 1, 2019

Enosys Add-on for Check Point OPSEC LEA version 1.3

This Application is published and maintained by Enosys and all the transformation codes

The Enosys Add-on for Check Point OPSEC LEA works only when Check Point logs are forwarded to Splunk Enterprise or Splunk Cloud via Splunk Heavy Forwarder with an installed Splunk Add-on for Check Point OPSEC LEA version 4.3.1.

Version 1.3 of the Enosys Add-on for Check Point OPSEC LEA is compatible with:

Splunk Enterprise versions 7.2, 7.1, 7.0, 6.6
CIM 4.10, 4.11, 4.12
Platforms Platform independent
Vendor Products CheckPoint
The new Add-on version 1.3 addresses the following issues detected on Splunk Add-on for Check Point OPSEC LEA version 4.3.1
  • Contemplates CheckPoint products logs
  • New field alias applied and adjustments made for compliance(CIM)
  • New tag Authentication and logs with expected CIM fields
  • Lookups updated
The new Add-on version 1.3 addresses the following
Version 1.2
Feb. 24, 2019

Removed application components, purely a field extraction TA now to allow for easier certification.
Designed for use on Search Heads only with the 'official' version with LEA binary to be used locally for connectivity to Checkpoint servers.

Version 1.1
Jan. 16, 2019

Altered the formal version number (to show that this is a fork) however preserved the original base version in the name to allow people to see at what point we started modifying the project.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.