Forum Discussion
Hi Max,
Thanks for reaching out.
Few comments on that:
- The general answer depends on the log format that each of these tools exports. While I'm not familiar with the format exported by "Log Exporter", MCAS do support formats exported from CPLOGTOSYSLOG.
- If possible, please share the format provided by the "Log Exporter", to see whether are also supported out of the box or by MCAS custom log parser.
- Can you elaborate some more on the meaning of "Checkpoint side Log Exporter tool is their preferred method going forward"?
Thanks,
Danny.
- David CaddickNov 25, 2019Iron Contributor
Hi Danny Kadyshevitch just wondering how this might play out?
From what we can see this was raised some time ago as well?
We can see that just using the Snapshot tool we can take a "Smart Tracker" formatted download from the Checkpoint Firewall and then upload it into MCAS and it has plenty of detail, and yet looking thru the details here: https://docs.microsoft.com/en-us/cloud-app-security/set-up-cloud-discovery it appears that by using the AutoCollector method all we are going to see is Target and Origin IP Address only? How come there is such a disparity of the detail in the two different approaches?
It looks like we can get a Graduate to maually do this process as a daily task and then end up getting a decent amount of worthwhile data ingested into MCAS, but if we automate it then the level of detail falls off considerably - it could be that we've misunderstood this - but this doesn't seem to make sense? Is there possibly another way of semi-automating the upload of the Samrt Tracker logs into MCAS for ingestation? It would not be ideal as it would keep having to reference the specific snapshot....
Regards,
Dave C- Danny KadyshevitchNov 25, 2019Microsoft
Hi David Caddick,
I recently worked with CP team, to learn about their new flow for exporting traffic data over syslog.
These will be reflected by new formats which will be supported by MCAS and that will include more details than the ones included in current supported formats.
This is something so be pushed during Q1CY20.
Thanks,
Danny.
- David CaddickNov 25, 2019Iron Contributor
Thanks Danny Kadyshevitch, but as we are working with some Govt. Customers that are still on R80.10 and R80.20, etc... I'm not sure how relevant that might be to some of our Customers?
While we have a possible opportunity to create a Customer case study with MS cause this customer is running with Office ATP, Azure ATP, Defender ATP, AAD ID P2, Azure MFA, Azure Sentinel - and yet for MCAS it looks like there is very little rationale to go to the effort of adding the Automated Collector for a CheckPoint Firewall if all it's going to be able to do is add Target/Origin IP address...Sorry, just telling it like it is, and it's a real shame... Is there no other way of getting the Tracker info ingested somehow?