Skip to content

Commit d3cbbb6

Browse files
authored
CRTX-50308-CheckpointFW-update (demisto#40074)
* Updatded ModelingRules * Updated ReleaseNotes * Updated ReleaseNotes
1 parent e53189c commit d3cbbb6

File tree

3 files changed

+44
-27
lines changed

3 files changed

+44
-27
lines changed

Packs/CheckpointFirewall/ModelingRules/CheckpointFirewall_1_3/CheckpointFirewall_1_3.xif

Lines changed: 37 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ alter
99
duration_format = if(to_integer(duration) != null, multiply(to_integer(duration), 1000), null),
1010
ICMP_type = to_integer(if(cn2Label = "ICMP Type", cn2, null)),
1111
ICMP_code = to_integer(if(cn3Label = "ICMP Code", cn3, null)),
12-
protection_Type = if(cs3Label = "Protection Type", cs3, null)
12+
protection_Type = if(cs3Label = "Protection Type", cs3, null),
13+
proto = to_string(proto)
1314
| alter
1415
ipv6src = if(src != null and ipv4src = null, src, null),
1516
ipv6dest = if(dst != null and ipv4dest = null, dst, null),
@@ -51,12 +52,15 @@ alter
5152
xdm.target.sent_packets = to_integer(server_outbound_packets);
5253

5354
[MODEL: dataset ="check_point_url_filtering_raw"]
54-
alter application = if(app = null or app="Unknown Protocol", service_id, app)
55-
| alter ruleName = if(cs2Label = "Rule Name", cs2, null)
56-
| alter ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null)
57-
| alter ipv6src = if(src != null and ipv4src = null, src, null)
58-
| alter ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null)
59-
| alter ipv6dest = if(dst != null and ipv4dest = null, dst, null)
55+
alter
56+
application = if(app = null or app="Unknown Protocol", service_id, app),
57+
ruleName = if(cs2Label = "Rule Name", cs2, null),
58+
ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null),
59+
ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null),
60+
proto = to_string(proto)
61+
| alter
62+
ipv6src = if(src != null and ipv4src = null, src, null),
63+
ipv6dest = if(dst != null and ipv4dest = null, dst, null)
6064
// Fields Modeling
6165
| alter
6266
xdm.event.id = loguid,
@@ -80,14 +84,16 @@ alter application = if(app = null or app="Unknown Protocol", service_id, app)
8084

8185
[MODEL: dataset ="check_point_smartdefense_raw"]
8286
// Fields Parsing
83-
alter Threat_Prevention_Rule_Name = if(cs1Label = "Threat Prevention Rule Name", cs1, null)
84-
| alter protectionName = if(cs4Label = "Protection Name", cs4, null)
85-
| alter Attack_Information = if(flexString2Label = "Attack Information", flexString2, null)
86-
| alter ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null)
87-
| alter ipv6src = if(src != null and ipv4src = null, src, null)
88-
| alter ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null)
89-
| alter ipv6dest = if(dst != null and ipv4dest = null, dst, null)
90-
| alter proto = to_string(proto)
87+
alter
88+
Threat_Prevention_Rule_Name = if(cs1Label = "Threat Prevention Rule Name", cs1, null),
89+
protectionName = if(cs4Label = "Protection Name", cs4, null),
90+
Attack_Information = if(flexString2Label = "Attack Information", flexString2, null),
91+
ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null),
92+
ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null),
93+
proto = to_string(proto)
94+
| alter
95+
ipv6src = if(src != null and ipv4src = null, src, null),
96+
ipv6dest = if(dst != null and ipv4dest = null, dst, null)
9197
// Fields Modeling
9298
| alter
9399
xdm.event.id = loguid,
@@ -112,12 +118,15 @@ alter Threat_Prevention_Rule_Name = if(cs1Label = "Threat Prevention Rule Name",
112118

113119
[MODEL: dataset ="check_point_application_control_raw"]
114120
// Fields Parsing
115-
alter application = if(app = null or app="Unknown Protocol", service_id, app)
116-
| alter ruleName = if(cs2Label = "Rule Name", cs2, null)
117-
| alter ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null)
118-
| alter ipv6src = if(src != null and ipv4src = null, src, null)
119-
| alter ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null)
120-
| alter ipv6dest = if(dst != null and ipv4dest = null, dst, null)
121+
alter
122+
application = if(app = null or app="Unknown Protocol", service_id, app),
123+
ruleName = if(cs2Label = "Rule Name", cs2, null),
124+
ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null),
125+
ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null),
126+
proto = to_string(proto)
127+
| alter
128+
ipv6src = if(src != null and ipv4src = null, src, null),
129+
ipv6dest = if(dst != null and ipv4dest = null, dst, null)
121130
// Fields Modeling
122131
| alter
123132
xdm.event.id = loguid,
@@ -142,11 +151,13 @@ alter application = if(app = null or app="Unknown Protocol", service_id, app)
142151

143152
[MODEL: dataset ="check_point_identity_awareness_raw"]
144153
// Fields Parsing
145-
alter ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null)
146-
| alter ipv6src = if(src != null and ipv4src = null, src, null)
147-
| alter ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null)
148-
| alter ipv6dest = if(dst != null and ipv4dest = null, dst, null)
149-
| alter auth_status_temp = if(auth_status = null, act, auth_status)
154+
alter
155+
ipv4src = if(src ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", src, null),
156+
ipv4dest = if(dst ~= "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}", dst, null)
157+
| alter
158+
ipv6src = if(src != null and ipv4src = null, src, null),
159+
ipv6dest = if(dst != null and ipv4dest = null, dst, null),
160+
auth_status_temp = if(auth_status = null, act, auth_status)
150161
// Fields Modeling
151162
| alter
152163
xdm.event.id = loguid,
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Modeling Rules
3+
4+
##### CheckPoint Firewall Collection
5+
6+
Updated the CheckPoint Firewall Modeling Rule, adding String casting for the **proto** field to prevent data types misalignment.

Packs/CheckpointFirewall/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Check Point Firewall",
33
"description": "Manage Check Point firewall via API",
44
"support": "xsoar",
5-
"currentVersion": "2.3.30",
5+
"currentVersion": "2.3.31",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

0 commit comments

Comments
 (0)