We have moved our Checkpoint input method from Opsec to CEF. After we made this change, it seems there are many times when a single IPS event in the Checkpoint Log Viewer results in multiple Splunk events. In some cases, it appears like I can tie them together with | transaction loguid, but this isn't always a reliable field. I was wondering if anyone found a reliable way to correlate IPS events in CEF format with Splunk?
Hi @_smp_ ,
Did you find a solution to this problem?
It's been so long since I thought about this I can't recall how it came out. I think the issue I had with the loguid field is that I was seeing the same value from different hosts. I took a look at my dashboards and my transaction command has both the host and loguid fields.
But the answer for me is |transaction. Unfortunately, our firewall index is so large that the performance of these searches is really poor.