<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk Add-on for Check Point OPSEC LEA - Any idea which input contains HTTPS Inspection? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Add-on-for-Check-Point-OPSEC-LEA-Any-idea-which-input/m-p/371084#M67393</link>
    <description>&lt;P&gt;We recently on boarded checkpoint logs into splunk using the opsec addon.  We are looking at filtering out the https inspection "product" or blade.  We thought maybe it was lumped in with the firewall logs but we recently disabled that and are still seing https inspection logs.  Any idea which input to disable?&lt;/P&gt;</description>
    <pubDate>Wed, 21 Mar 2018 20:01:46 GMT</pubDate>
    <dc:creator>bbraun</dc:creator>
    <dc:date>2018-03-21T20:01:46Z</dc:date>
    <item>
      <title>Splunk Add-on for Check Point OPSEC LEA - Any idea which input contains HTTPS Inspection?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Add-on-for-Check-Point-OPSEC-LEA-Any-idea-which-input/m-p/371084#M67393</link>
      <description>&lt;P&gt;We recently on boarded checkpoint logs into splunk using the opsec addon.  We are looking at filtering out the https inspection "product" or blade.  We thought maybe it was lumped in with the firewall logs but we recently disabled that and are still seing https inspection logs.  Any idea which input to disable?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Mar 2018 20:01:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Add-on-for-Check-Point-OPSEC-LEA-Any-idea-which-input/m-p/371084#M67393</guid>
      <dc:creator>bbraun</dc:creator>
      <dc:date>2018-03-21T20:01:46Z</dc:date>
    </item>
  </channel>
</rss>

