Hello Kazim and Ricardo,
We regret the delay. We have been reviewing the Checkpoint decoders cited and there are indeed things to fix.
The first decoder did not work on certain occasions, because in the pre-decoding phase, it was forced to read a blank space before reading the date. This blank space was not always present at the event. For example:
Feb 17 00:01:02 HostWazuh Checkpoint: 3Apr2008 ...
This event had two blank spaces, one of them was suppressed in the pre-decoding phase and the decoder acted without any problem.
Feb 17 00:01:02 HostWazuh Checkpoint: 23Apr2008 ...
In this case, we only have a blank space, suppressed in the pre-decoding phase, causing the decoder to have no effect.
In the case of the second decoder, we read a series of blank spaces that do not appear in your log.
The resulting decoders are:
Now, the Syslog format that our decoders are prepared to receive does not match yours:
Our:
Apr 10 20:43:34 ngman Checkpoint:
Yours:
If you could modify Checkpoint's output or use a template for Syslog to get our format, we would have the following event:
Apr 10 20:43:34 ngman Checkpoint: 10Apr2018 20:43:33 monitor 10.10.1.12 <bond0 Protection Name:Header Rejection;Severity:4;Confidence Level:4;protection_id:HttpHeaderRejection;SmartDefense Profile:SU2_Protection;Performance Impact:2;Industry Reference:CVE-2002-0032, CAN-2003-0237, CAN-2002-0254, CVE-2002-0155, CAN-2003-0397, CAN-2002-0314;Protection Type:protection;Signature Info:^User-Agent[^I ]*:[^I ]*.*esb|ESB;Update Version:634182243;rule:26;rule_uid:{405CB782-3274-4D7F-8AAA-4FB24CE726A0};resource:http://dnl-02.geo.kaspersky.com/bases/av/kdb/i386/kdb-i386-1211g.xml.klz;reject_id:5accf7c4-10053-c00080a-c0000003;web_client_type:Other: *BcfBAAAAgCCAAEFBAAwQfKXVzrzGvyfPESboPxow0mHhxRLAXAQAAIAAKAA=;Attack Info:WSE0100001 header rejection pattern found in request;attack:Header Rejection;src:10.36.52.125;dst:94.75.236.122;proto:6;proxy_src_ip:10.36.52.125;product:SmartDefense;service:80;s_port:51642;FollowUp:Not Followed;product_family:Network
**Phase 1: Completed pre-decoding.
full event: 'Apr 10 20:43:34 ngman Checkpoint: 10Apr2018 20:43:33 monitor 10.10.1.12 <bond0 Protection Name:Header Rejection;Severity:4;Confidence Level:4;protection_id:HttpHeaderRejection;SmartDefense Profile:SU2_Protection;Performance Impact:2;Industry Reference:CVE-2002-0032, CAN-2003-0237, CAN-2002-0254, CVE-2002-0155, CAN-2003-0397, CAN-2002-0314;Protection Type:protection;Signature Info:^User-Agent[^I ]*:[^I ]*.*esb|ESB;Update Version:634182243;rule:26;rule_uid:{405CB782-3274-4D7F-8AAA-4FB24CE726A0};resource:http://dnl-02.geo.kaspersky.com/bases/av/kdb/i386/kdb-i386-1211g.xml.klz;reject_id:5accf7c4-10053-c00080a-c0000003;web_client_type:Other: *BcfBAAAAgCCAAEFBAAwQfKXVzrzGvyfPESboPxow0mHhxRLAXAQAAIAAKAA=;Attack Info:WSE0100001 header rejection pattern found in request;attack:Header Rejection;src:10.36.52.125;dst:94.75.236.122;proto:6;proxy_src_ip:10.36.52.125;product:SmartDefense;service:80;s_port:51642;FollowUp:Not Followed;product_family:Network'
timestamp: 'Apr 10 20:43:34'
hostname: 'ngman'
program_name: 'Checkpoint'
log: '10Apr2018 20:43:33 monitor 10.10.1.12 <bond0 Protection Name:Header Rejection;Severity:4;Confidence Level:4;protection_id:HttpHeaderRejection;SmartDefense Profile:SU2_Protection;Performance Impact:2;Industry Reference:CVE-2002-0032, CAN-2003-0237, CAN-2002-0254, CVE-2002-0155, CAN-2003-0397, CAN-2002-0314;Protection Type:protection;Signature Info:^User-Agent[^I ]*:[^I ]*.*esb|ESB;Update Version:634182243;rule:26;rule_uid:{405CB782-3274-4D7F-8AAA-4FB24CE726A0};resource:http://dnl-02.geo.kaspersky.com/bases/av/kdb/i386/kdb-i386-1211g.xml.klz;reject_id:5accf7c4-10053-c00080a-c0000003;web_client_type:Other: *BcfBAAAAgCCAAEFBAAwQfKXVzrzGvyfPESboPxow0mHhxRLAXAQAAIAAKAA=;Attack Info:WSE0100001 header rejection pattern found in request;attack:Header Rejection;src:10.36.52.125;dst:94.75.236.122;proto:6;proxy_src_ip:10.36.52.125;product:SmartDefense;service:80;s_port:51642;FollowUp:Not Followed;product_family:Network'
**Phase 2: Completed decoding.
decoder: 'checkpoint-syslog'
extra_data: 'Header Rejection'
srcip: '10.36.52.125'
dstip: '94.75.236.122'
protocol: '6'
**Phase 3: Completed filtering (rules).
Rule id: '20101'
Level: '6'
Description: 'IDS event.'
**Alert to be generated.
If it is not possible to change the Syslog format, you can change the first decoder for the next one:
<decoder name="checkpoint-syslog">
<prematch>\S+ Checkpoint: \s*\S+ \d\d:\d\d:\d\d </prematch>
</decoder>