Check Point log analyzer
EventLog Analyzer provides predefined reports and alerts for Check Point devices. Check Point Next Generation Firewalls aggregate several security technologies within a single appliance, namely those of a firewall, IDS, IPS, and antivirus solution. Being able to sort through the information pertaining to each of these functions gives you a clear picture of what's happening on your network. You can use this information to bolster your security policies and gain an edge in the fight against evolving threats.
With built-in support for the Check Point log format, EventLog Analyzer helps you manage these devices with features such as automatic, central log collection; in-depth forensics; and secure archival. EventLog Analyzer also offers predefined reports on various device functionalities and alerts you via email or SMS when it detects suspicious activity.
Check Point firewall traffic reports
Analyze Check Point traffic logs and sort through reports for allowed and denied traffic to learn where your network traffic is coming from. Sort reports by source, destination, port, and protocol as needed.
Check Point logon reports
Monitor successful and failed Check Point logons. Identify the most used devices, as well as the users who access your Check Point devices the most. Monitoring access helps you keep device usage and activity in check.
Check Point IDS/IPS reports
Guard against network attacks with security reports based on Check Point IDS/IPS logs. View a list of positively identified attacks, as well as potential threats on your network that need further investigation. Sort these Check Point security reports by source, destination, and severity.
Check Point account management reports
Stay on top of every user account on your Check Point devices and ensure only trusted accounts exist. Use the account management reports to view lists of users and user groups that were added or deleted.
Check Point configuration and system reports
Monitor things like Check Point configuration changes, executed commands, interface availability, and more. View a list of device shutdowns and clock updates to ensure your devices are functioning properly. Sort through all events categorized by their severity level (such as emergency or critical).