Check Point Harmony Email & Collaboration
Version | 0.6.0 beta:[] (View all) |
Compatible Kibana version(s) | 8.15.0 or higher 9.0.0 or higher |
Supported Serverless project types What's this? |
Security Observability |
Subscription level What's this? |
Basic |
Level of support What's this? |
Elastic |
Check Point's Harmony Email & Collaboration monitors traffic across email platforms (Office 365, Gmail), file sharing services (OneDrive, SharePoint, Google Drive, Dropbox, Box, and Citrix ShareFile), and messaging applications (Teams and Slack). It scans emails, files, and messages for malware, DLP, and phishing indicators, and intercepts & quarantines potentially malicious emails before they are delivered.
The Check Point Harmony Email & Collaboration integration collects security event logs using REST API.
This integration collects the following logs:
- Event - Get security event logs.
Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions.
- In the Infinity Portal, go to Account Settings and click API Keys.
- Click New > New Account API key.
- In the Create a New API Key window, select Email & Collaboration as the service.
- (Optional) In the Expiration field, select an expiration date and time for the API key. By default, the expiration date is three months after the creation date.
- (Optional) In the Description field, enter a description for the API key.
- Click Create.
- Copy the Client ID and Secret Key.
- Note: You can always obtain the Client ID from the API Keys table, but you cannot retrieve the Secret Key after the Create a New API Key window is closed.
- Click Close.
For more details, see Documentation.
- In Kibana navigate to Management > Integrations.
- In the search bar, type Check Point Harmony Email & Collaboration.
- Select the Check Point Harmony Email & Collaboration integration and add it.
- Add all the required configuration parameters, including the URL, Client ID, Client Secret, Interval, and Initial Interval, to enable data collection.
- Save the integration.
The default URL is https://cloudinfra-gw.portal.checkpoint.com
, but this may vary depending on your region. Please refer to the Documentation to find the correct URL for your region.
This is the event
dataset.
Example
{
"@timestamp": "2024-10-14T07:02:11.229Z",
"agent": {
"ephemeral_id": "d813d5b1-cfe7-4ac4-aaa0-e7650b900f93",
"id": "827f87b2-02ca-4b27-832d-71d5d68dca7b",
"name": "elastic-agent-99857",
"type": "filebeat",
"version": "8.15.0"
},
"checkpoint_email": {
"event": {
"confidence_indicator": "detected",
"created": "2024-10-14T07:02:11.229Z",
"customer_id": "exampletest",
"data": "#{\"entity_id\": \"a6d8674a04c30123456789e4d3ebd98\", \"entity_type\": \"google_mail_email\", \"label\": \"Shadow IT\"} - #{\"entity_id\": \"113012345678906535444\", \"entity_type\": \"google_user\", \"label\": \"[email protected]\"} is using #{\"entity_id\": \"google.com\", \"entity_type\": \"av_dns_info\", \"label\": \"google.com (Search Engine)\"}",
"description": "Shadow IT - [email protected] is using google.com (Search Engine)",
"entity_id": "25e0c50123456789e351b0dafa6aafa6",
"entity_link": "https://in.portal.checkpoint.com/dashboard/email&collaboration/CGS1?route=cHJvZmlsZS9nsfhvbksdvnjhvdfVBsdbdfFbdbdBDBBdbrtHyujYJNtnhtnhtnOTIxZTM1MWIwZGFmYTZhYWZhNg==",
"id": "a6d8674a04c30123456789e4d3ebd98",
"saas": "google_mail",
"sender_address": "[email protected]",
"severity": 3,
"severity_enum": "Medium",
"state": "pending",
"type": "shadow_it"
}
},
"data_stream": {
"dataset": "checkpoint_email.event",
"namespace": "17695",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "827f87b2-02ca-4b27-832d-71d5d68dca7b",
"snapshot": false,
"version": "8.15.0"
},
"email": {
"sender": {
"address": "[email protected]"
}
},
"event": {
"agent_id_status": "verified",
"category": [
"email",
"threat"
],
"created": "2024-10-14T07:02:11.229Z",
"dataset": "checkpoint_email.event",
"id": "a6d8674a04c30123456789e4d3ebd98",
"ingested": "2024-10-28T10:57:08Z",
"kind": "alert",
"original": "{\"actions\":[],\"additionalData\":null,\"availableEventActions\":null,\"confidenceIndicator\":\"detected\",\"customerId\":\"exampletest\",\"data\":\"#{\\\"entity_id\\\": \\\"a6d8674a04c30123456789e4d3ebd98\\\", \\\"entity_type\\\": \\\"google_mail_email\\\", \\\"label\\\": \\\"Shadow IT\\\"} - #{\\\"entity_id\\\": \\\"113012345678906535444\\\", \\\"entity_type\\\": \\\"google_user\\\", \\\"label\\\": \\\"[email protected]\\\"} is using #{\\\"entity_id\\\": \\\"google.com\\\", \\\"entity_type\\\": \\\"av_dns_info\\\", \\\"label\\\": \\\"google.com (Search Engine)\\\"}\",\"description\":\"Shadow IT - [email protected] is using google.com (Search Engine)\",\"entityId\":\"25e0c50123456789e351b0dafa6aafa6\",\"entityLink\":\"https://in.portal.checkpoint.com/dashboard/email\\u0026collaboration/CGS1?route=cHJvZmlsZS9nsfhvbksdvnjhvdfVBsdbdfFbdbdBDBBdbrtHyujYJNtnhtnhtnOTIxZTM1MWIwZGFmYTZhYWZhNg==\",\"eventCreated\":\"2024-10-14T07:02:11.229935+00:00\",\"eventId\":\"a6d8674a04c30123456789e4d3ebd98\",\"saas\":\"google_mail\",\"senderAddress\":\"[email protected]\",\"severity\":\"3\",\"state\":\"pending\",\"type\":\"shadow_it\"}",
"severity": 3,
"type": [
"info",
"indicator"
],
"url": "https://in.portal.checkpoint.com/dashboard/email&collaboration/CGS1?route=cHJvZmlsZS9nsfhvbksdvnjhvdfVBsdbdfFbdbdBDBBdbrtHyujYJNtnhtnhtnOTIxZTM1MWIwZGFmYTZhYWZhNg=="
},
"input": {
"type": "cel"
},
"message": "Shadow IT - [email protected] is using google.com (Search Engine)",
"observer": {
"product": "Harmony Email & Collaboration",
"vendor": "Check Point"
},
"organization": {
"name": "exampletest"
},
"related": {
"user": [
"[email protected]"
]
},
"source": {
"user": {
"email": "[email protected]"
}
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"checkpoint_email-event"
]
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
checkpoint_email.event.actions.action_type | Name of performed action. | keyword |
checkpoint_email.event.actions.create_time | Date when the action was performed. | date |
checkpoint_email.event.actions.related_entity_id | Unique ID of the relevant SaaS entity. | keyword |
checkpoint_email.event.available_event_actions.action_name | Name of available action. | keyword |
checkpoint_email.event.available_event_actions.action_parameter.eventId | keyword | |
checkpoint_email.event.available_event_actions.action_parameter.newSeverity | keyword | |
checkpoint_email.event.confidence_indicator | Confidence Indicator. | keyword |
checkpoint_email.event.created | Time the security event was created. | date |
checkpoint_email.event.customer_id | Harmony Email & Collaboration customer ID. | keyword |
checkpoint_email.event.data | Description in not resolved form. | keyword |
checkpoint_email.event.description | Short explanation of the event. | keyword |
checkpoint_email.event.entity_id | Unique ID of the relevant SaaS entity. | keyword |
checkpoint_email.event.entity_link | keyword | |
checkpoint_email.event.id | A unique ID used for scrolling. | keyword |
checkpoint_email.event.saas | Name of the relevant SaaS. | keyword |
checkpoint_email.event.sender_address | keyword | |
checkpoint_email.event.severity | long | |
checkpoint_email.event.severity_enum | Lowest, Low, Medium, High, Critical. | keyword |
checkpoint_email.event.state | Current state of the security event. | keyword |
checkpoint_email.event.type | Security event type. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of filebeat input. | keyword |
log.offset | Log offset. | long |
Changelog
Version | Details | Kibana version(s) |
---|---|---|
0.6.0 | Enhancement (View pull request) Remove redundant installation instructions. |
— |
0.5.1 | Bug fix (View pull request) Fix default request trace enabled behavior. |
— |
0.5.0 | Enhancement (View pull request) Update Kibana constraint to support 9.0.0. |
— |
0.4.1 | Bug fix (View pull request) Updated SSL description in package manifest.yml to be uniform and to include links to documentation. |
— |
0.4.0 | Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind manually set to "pipeline_error". |
— |
0.3.0 | Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error". |
— |
0.2.0 | Enhancement (View pull request) Add support for deleting request trace files. |
— |
0.1.0 | Enhancement (View pull request) Initial release. |
— |