Skip to main content
Skip table of contents

Check Point Firewall

Overview

Check Point Firewall monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. Integration with Check Point covers major actions on firewalls such as add access rule, add threat rule, run script, etc.
D3 Security's integration with the Check Point Firewall API v1.8 covers major firewall rule management operations, such as adding access/threat rule, running script, etc. Furthermore, D3's integration also provides Event Intake operation to query firewall logs.

D3 SOAR is providing REST operations to function with Check Point Firewall.

Check Point Firewall is available for use in:

D3 SOAR

V12.7.83+

Category

Network Security

Deployment Options

Option I, Option III

Known Limitations

  1. Starting from release R81 (September 2020), the login request is limited to three per minute. For more information, refer to Heads-up: Management API Remote calls frequency limit on Check Point CheckMates.

  2. The API server is active on management servers with 4 GB RAM (or more) and stand-alone servers with 8 GB RAM (or more) by default. D3 recommends a minimum hardware configuration of 4 CPU cores and 12 GB of RAM for on-premise Check Point Firewall instances. If the hardware is insufficient, the FetchEvent API command may not execute successfully.

  3. All sessions are private. Changes made by administrators are not visible to others until published. To maintain privacy, objects are locked when being modified, with the administrator's name displayed to help with coordinating work on shared resources. Other administrators can only see that the object is locked and cannot make modifications.
    If an API call returns an "object locked" message, you can either take over or disconnect the locking session in Check Point SmartConsole, or wait until no session locks the object before executing it.

Connection

To connect to Check Point Firewall from D3 SOAR, please follow this part to collect the required information below:

Parameter

Description

Example

Server URL

The URL of the Check Point server.

https://192.168.85.32

User Name

The username to authenticate the connection.

Admin

Password

The password to authenticate the connection.

YourPassword

Permission Requirements

Each endpoint in the Check Point Firewall API requires a certain permission scope. The following are required scopes for the commands in this integration:

Command

Required Permission

Add Threat Exception

Threat Prevention:

Policy > Policy Layers: Write; Policy Exceptions: Write

Permissions > Profiles: Write; Protections: Write; Settings: Write

Add Threat Rule

Threat Prevention:

Policy > Policy Layers: Write; Policy Exceptions: Write

Permissions > Profiles: Write; Protections: Write; Settings: Write

Block Domains

System: Read Write All

Block IP Addresses

System: Read Write All

Block URLs

System: Read Write All

Delete Access Rules

System: Read Write All

Discard unpublished changes created by Web API

System: Read Write All

Fetch Event

System: Read Only All

Get Access Rule Base

Access Control:

Policy > Show Policy (no sub permission need to b e checked)

General > Access Control Objects and Settings: Read

Get Task Status

Management: Management API Login

Install Policy

System: Read Write All

Run Script

System: Super User

Enable/Disable Access Rule

Access Control:

Policy > Show Policy (no sub permission need to be checked)

General > Access Control Objects and Settings: Read

Set Threat Exception

Threat Prevention:

Policy > Policy Layers: Write; Policy Exceptions: Write

Permissions > Profiles: Write; Protections: Write; Settings: Write

Set Threat Protection

Threat Prevention:

Policy > Policy Layers: Write; Policy Exceptions: Write

Permissions > Profiles: Write; Protections: Write; Settings: Write

Set Threat Rule

Threat Prevention:

Policy > Policy Layers: Write; Policy Exceptions: Write

Permissions > Profiles: Write; Protections: Write; Settings: Write

Show Access layers

Access Control:

Policy > Show Policy (no sub permission need to be checked)

General > Access Control Objects and Settings: Read

Show Application Site Categories

Management: Management API Login

Show Published Changes between a period of time or two sessions

System: Read Only All

Show Exception Group

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Show Exception Groups

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Show Logs

System: Read Only All

Show Policy Packages

System: Read Only All

Show Session Objects

Management: Management API Login

Show Threat Exception

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Show Threat Layers

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Show Threat Profiles

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Show Threat Protection

Management: Management API Login

Show Threat Protections

Management: Management API Login

Show Threat Rule

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Show Threat Rule Base

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Show Threat Rule Exception Rule Base

Threat Prevention:

Policy > Policy Layers: Read; Policy Exceptions: Read

Permissions > Profiles: Read; Protections: Read; Settings: Read

Test Connection

Management: Management API Login

As Check Point Firewall is using role-based access control (RBAC), the D3 connector will be generated based on a specific user account and the application. Therefore, the command permissions are inherited from the user account's role. Users need to configure their user profile from the Check Point Firewall console for each command in this integration.

Reader Note

  • Check Point Firewall's default permission profiles (sorted from the most permissions to the least) are as follows:

    • Super User: Full Read/Write Permissions including managing administrators and sessions.

    • Read Write All: Full Read/Write Permissions.

    • Read Only All: Full Read Permissions, no Write Permissions.

  • In the permissions table above, the three default permission profiles are represented by "System: Super User", etc. When a command requires one of the three default profiles, you can assign the default profile or create a customized role with the same permissions as the system profiles.

Configuring Check Point Firewall to Work with D3 SOAR

Creating Customized Roles

  1. Log into Check Point SmartConsole.

  2. On the left sidebar, navigate to Manage & Settings > Permissions & Administrators > Permission Profiles.

  3. Above the Permission Profiles table, click the star icon to create a new role.

  4. Name the role, then configure the different access permissions as needed. Click OK.

  5. To save the changes, navigate to Sessions > View Sessions in the left sidebar and locate the Current Session. Right click the session and select Publish.

Creating a New User and Assigning Customized Roles

  1. On the left sidebar, navigate to Manage & Settings > Permissions & Administrators > Administrators.

  2. Above the Administrators table, click the star icon to create a new user.

  3. Fill in the required fields for the user details. Ensure to select Check Point Password as the Authentication Method in the drop down menu. The Permission Profile dropdown menu defines the role and the user's permissions. Select the role you have created for the user and click OK to create the user.

  4. To save the changes, navigate to Sessions > View Sessions in the left sidebar and locate the Current Session. Right click the session and select Publish.

Configuring D3 SOAR to Work with Check Point Firewall

  1. Log in to D3 SOAR.

  2. Find the Check Point Firewall integration.

    1. Navigate to Configuration on the top header menu.

    2. Click on the Integration icon on the left sidebar.

    3. Type Check Point Firewall in the search box to find the integration, then click it to select it.

    4. Click + Connection, on the right side of the Connections section. A new connection window will appear.

  3. Configure the following fields to create a connection to Check Point Firewall.

    1. Connection Name: The desired name for the connection.

    2. Site: Specifies the site to use the integration connection. Use the drop-down menu to select the site. The Share to Internal Sites option enables all sites defined as internal sites to use the connection. Selecting a specific site will only enable that site to use the connection.

    3. Recipient site for events from connections Shared to Internal Sites: This field appears if you selected Share to Internal Sites for Site to let you select the internal site to deploy the integration connection.

    4. Agent Name (Optional): Specifies the proxy agent required to build the connection. Use the dropdown menu to select the proxy agent from a list of previously configured proxy agents.

    5. Description (Optional): Add your desired description for the connection.

    6. Configure User Permissions: Defines which users have access to the connection.

    7. Active: Check the tick box to ensure the connection is available for use.

    8. System: This section contains the parameters defined specifically for the integration. These parameters must be configured to create the integration connection.
      1. Input the domain level Server URL of your Check Point Firewall instance.
      2. Input your Check Point Firewall account User Name. The default user name is admin. You can remove the default username and replace it with another username.
      3. Input your Check Point Firewall account Password.

    9. Connection Health Check: Updates the connection status you have created. A connection health check is done by scheduling the Test Connection command of this integration. This can only be done when the connection is active.
      To set up a connection health check, check the Connection Health Check tickbox. You can customize the interval (minutes) for scheduling the health check. An email notification can be set up after a specified number of failed connection attempts.

    10. Enable Password Vault: An optional feature that allows users to take the stored credentials from their own password vault. Please refer to the password vault connection guide if needed.

  4. Test the connection.

    1. Click Test Connection to verify the account credentials and network connection. If the Test Connection Passed alert window appears, the test connection is successful. You will see Passed with a green checkmark appear beside the Test Connection button. If the test connection fails, please check your connection parameters and try again.

    2. Click OK to close the alert window.

    3. Click + Add to create and add the configured connection.

Commands

Check Point Firewall includes the following executable commands for users to set up schedules or create playbook workflows. With the Test Command, you can execute these commands independently for playbook troubleshooting.

Integration API Note

For more information about the Check Point Firewall API, please refer to the Check Point Firewall API reference.

Reader Note

Certain permissions are required for each command. Please refer to the Permission Requirements and Configuring Check Point Firewall to Work with D3 SOAR for details.

Note for Time-related parameters

The input format of time-related parameters may vary based on your account settings. As a result, the sample data provided in our commands is different from what you see. To set your preferred time format, follow these steps:

  1. Navigate to Configuration > Application Settings. Select Date/Time Format.

  2. Choose your desired date and time format.

After that, you will be able to view your preferred time format when configuring the DateTime input parameters for commands.

Add Threat Exception

Creates a threat exception.

Reader Note

"Layer Name Or UID", "Parent Rule Name Or Number Or UID" and "Exception Group Name Or UID" are optional parameters to run this command.

  • If the threat exception is under a rule, Layer Name Or UID is a required parameter.

    • Run the Show Threat Layers command to obtain Layer Name and UIDs. Layer Names can be found in the returned raw data at the path $.threat-layers[*].name; UIDs can be found at the path $.threat-layers[*].uid.

  • If the threat exception is under an exception group, the Layer Name Or UID parameter must not be defined. Any input value will be omitted.

  • Run the Show Threat Rule Base command to obtain Parent Rule Names, Numbers and UIDs. Rule UIDs can be found in the returned raw data at the path $.rulebase[*].uid; Rule numbers can be found in the returned raw data at the path $.rulebase[*].rule-number. Rule Names can be found in the returned raw data at the path $.rulebase[*].name.

  • Run the Show Exception Groups command to obtain Exception Group Names and UIDs. Exception Group Names can be found in the returned raw data at the path $.objects[*].name; Exception Group UID can be found in the returned raw data at the path $.objects[*].uid.

Alert

  • To add a threat exception, you must define at least one of the Parent Rule Name Or Number Or UID or the Exception Group Name Or UID parameters, but not both.

  • If you are adding a threat exception to a rule, the Parent Rule Name Or Number Or UID parameter is required to run this command.

    • Ensure that the values entered for Layer Name Or UID and Parent Rule Name Or Number Or UID match. It is suggested to run the Show Threat Layers command to obtain the desired layer, then use that layer to run the Show Threat Rule Base command and select the desired threat rule. Failure to match the values may result in errors.

  • If you are adding the exception to an Exception Group, the Exception Group Name Or UID parameter is required to run this command. Do not fill "Layer Name Or UID" parameter, value will be omitted in this case.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Optional

The name or UID of the layer that the rule belongs to. Layer UIDs can be obtained using the Show Threat Layers command. If the Parent Rule Name Or Number Or UID parameter is defined, then this parameter is required and the specified rule must match the layer. Otherwise, if the Exception Group Name Or UID parameter is defined, this parameter must not be defined. Any entered value will be omitted.

Standard Threat Prevention

Position

Required

The position (i.e. Top or Bottom) in the rulebase.

Bottom

Parent Rule Name Or Number Or UID

Optional

The name, number or UID of the parent rule. Rule numbers and UIDs can be obtained using the Show Threat Rule Base command. Note: (1) Only one of the Parent Rule Name Or Number OR UID or Exception Group Name Or UID parameters can be defined per execution of the command, but at least one must be defined. (2) If this parameter is defined, you must define the matching Layer Name Or UID parameter. Entering a rule and layer that do not match will result in an error.

1

Exception Group Name Or UID

Optional

The name or UID of the exception group. Exception Group names and UIDs can be obtained using the Show Exception Groups command. Note: (1) Only one of the Exception Group Name Or UID or Parent Rule Name Or Number OR UID parameters can be defined per execution of the command, but at least one must be defined. (2) If this parameter is defined, you cannot define the Layer Name Or UID parameter. The value entered for the layer will be omitted.

TestExceptionGroup0917001

Exception Name

Required

The name of the exception.

exception091700cc

Comment

Optional

A comment for the exception.

create exception091700cc

Track

Optional

The tracking method for protection.

log

Protected Scope

Optional

The names or UIDs of network objects defining the protected scope.

All_Internet

Install On

Optional

The name or UID of the gateways to install the policy on.

Policy Targets

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "exception091700cc",
    "type": "threat-exception",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "owner": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "protection-or-site": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Detect",
        "type": "CpmiAntimalwareAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T11:58-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T11:58-0800"
        },
        "creator": "admin"
    },
    "comments": "create exception091700cc",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "exception091700cc",
    "type": "threat-exception",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "owner": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "protection-or-site": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Detect",
        "type": "CpmiAntimalwareAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T11:58-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T11:58-0800"
        },
        "creator": "admin"
    },
    "comments": "create exception091700cc",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ExceptionUID": "\"***-***-***-***-***\"",
    "ExceptionName": "\"exception\"",
    "Type": "\"threat-exception\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

exception

type

threat-exception

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

owner

***-***-***-***-***

source

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

source-negate

False

destination

  • {'uid': ‘***-***-***-***-***’, 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

destination-negate

False

service

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

service-negate

False

protected-scope

  • {'uid': '***-***-***-***-***', 'name': 'All_Internet', 'type': 'address-range', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'ipv4-address-first': '0.0.0.0', 'ipv4-address-last': '255.255.255.255'}

protected-scope-negate

False

protection-or-site

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

track

{'uid': '***-***-***-***-***', 'name': 'Log', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

action

{'uid': '***-***-***-***-***', 'name': 'Detect', 'type': 'CpmiAntimalwareAction', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

meta-info

{'lock': 'locked by current session', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-***': '2021-12-10T11:58-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-***': '2021-12-10T11:58-0800'}, 'creator': 'admin'}

comments

create exception091700cc

enabled

True

install-on

  • {'uid': '***-***-***-***-***', 'name': 'Policy Targets', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Add Threat Exception failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Missing parameter: [position].

Error Sample Data

Add Threat Exception failed.

Status Code: 400.

Message: Missing parameter: [position].

Add Threat Rule

Creates a threat rule.

Reader Note

Layer Name Or UID is a required parameter to run this command.

  • Run the Show Threat Layers command to obtain Layer Name and UIDs. Layer Name can be found in the returned raw data at the path $.threat-layers[*].name; UID can be found at the path $.threat-layers[*].uid.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Required

The name or UID of the layer that the threat rule belongs to. Layer names and UIDs can be obtained using the Show Threat Layers command.

Standard Threat Prevention

Position

Required

The position (i.e. Top or Bottom) in the rulebase.

Bottom

Name

Required

The name of the threat rule.

Test Rule

Comment

Optional

A comment for the threat rule.

EddieTestComment

Track

Optional

The tracking method for protection.

Alert

Action

Optional

The action of the threat rule.

Basic

Protected Scope

Optional

The names or UIDs of network objects defining the protected scope.

All_Internet

Install On

Optional

The name or UID of the gateways to install the policy on.

Policy Targets

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "Eddie_Testrule-a3000",
    "type": "threat-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Alert",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "track-settings": {
        "packet-capture": true
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T14:54-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T14:54-0800"
        },
        "creator": "admin"
    },
    "comments": "EddieTestComment",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "Eddie_Testrule-a3000",
    "type": "threat-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Alert",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "track-settings": {
        "packet-capture": true
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T14:54-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T14:54-0800"
        },
        "creator": "admin"
    },
    "comments": "EddieTestComment",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUID": "\"***-***-***-***-***\"",
    "RuleName": "\"Eddie_Testrule-a3000\"",
    "Type": "\"threat-rule\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

Eddie_Testrule-a3000

type

threat-rule

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

layer

***-***-***-***-***

source

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

source-negate

False

destination

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

destination-negate

False

service

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

service-negate

False

protected-scope

  • {'uid': '***-***-***-***-***', 'name': 'All_Internet', 'type': 'address-range', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'ipv4-address-first': '0.0.0.0', 'ipv4-address-last': '255.255.255.255'}

protected-scope-negate

False

track

{'uid': '***-***-***-***-***', 'name': 'Alert', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

track-settings

{'packet-capture': True}

action

{'uid': '***-***-***-***-***', 'name': 'Basic', 'type': 'threat-profile', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

meta-info

{'lock': 'locked by current session', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-***': '2021-12-09T14:54-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-***': '2021-12-09T14:54-0800'}, 'creator': 'admin'}

comments

EddieTestComment

enabled

True

install-on

  • {'uid': '***-***-***-***-***', 'name': 'Policy Targets', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Add Threat Rule failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [xxx] not found.

Error Sample Data

Add Threat Rule failed.

Status Code: 404.

Message: Requested object [xxx] not found.

Block Domains

Adds a policy access rule to block domains.

Reader Note

  • Layer Name Or UID is a required parameter to run this command.

    • Run the Show Access Layers command to obtain Layer Name Or UID. Layer Names can be found from the returned raw data at the path $.access-layers[*].name; UIDs can be found from the returned raw data at the path $.access-layers[*].uid.

  • Please note that the input layer must be included in the firewall blade.

    • Error for "layer3" as an example: "Validate the ACCESS_LAYER 'layer3' failed, this layer hasn't included the 'Firewall' blade."

    • To know if the layer you select includes the firewall blade, set the Show Details parameter to True when running the Show Access Layers command. In the returned raw data, check path $.access-layers[*].firewall for your selected layer. If the value is False, then the layer is not included; if it is True, then it is included.

    • It can also be enabled from within the UI.

  • Domains can be unblocked by removing the rule name (delete the input rule name or delete the auto generated rule name in the returned raw data of the block domains command at the path $.name) using the Delete Access Rules command.

  • To check your created blocked domain rules, locate which policy the input layer is under. Then navigate to that policy page to view applied rules.

    • Click the + on the top of the policy page, then Manage policies and layers.

    • Navigate to Layers > Access Control, select a layer, then check Used in policies. In this example, layer3 is under policy_1.

    • Navigate to policy_1 to check the created rules.

Input

Input Parameter

Required/Optional

Description

Example

Domains

Required

The domain strings to block.

[

"google.com",

"facebook.com"

]

Is Root Domain

Optional

The option to specify whether the domains are DNS root domain or sub DNS domain. The type will apply to all the domains provided in the first parameter Domains. Set to True for DNS root domain, and False for sub DNS domain. The default value is False.

True

Direction

Optional

The blocking direction of the rule. The available values are From, To, or Both.

to

Rule Name

Optional

The rule name to save the block domain operation under the specified layer. If this parameter is not defined, D3 will create a new rule with the naming rule of domain_bock_datetime, e.g.: domain_block_to_rule_20230321095001.

domain_block_to_rule_***

Layer Name Or UID

Required

The name or UID of the policy layer from the Access Control policy for the new block domains rule to attach to. The layer name or UID can be obtained using the Show Access Layers command.

***-***-***-***-***

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "domain_block_to_rule_***",
    "type": "access-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "track": {
        "type": {
            "uid": "***-***-***-***-***",
            "name": "None",
            "type": "Track",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsNone",
            "color": "none"
        },
        "per-session": false,
        "per-connection": false,
        "accounting": false,
        "enable-firewall-session": false,
        "alert": "none"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": ".msn.com",
            "type": "dns-domain",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "icon": "Objects/domain",
            "color": "black"
        },
        {
            "uid": "***-***-***-***-***",
            "name": ".sohu.com",
            "type": "dns-domain",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "icon": "Objects/domain",
            "color": "black"
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "service-negate": false,
    "service-resource": "",
    "vpn": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Drop",
        "type": "RulebaseAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        },
        "icon": "Actions/actionsDrop",
        "color": "none"
    },
    "action-settings": {},
    "content": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "content-negate": false,
    "content-direction": "any",
    "time": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "custom-fields": {
        "field-1": "",
        "field-2": "",
        "field-3": ""
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2023-03-21T21:36-0700"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2023-03-21T21:36-0700"
        },
        "creator": "admin"
    },
    "comments": "",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "none"
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUID": "\"***-***-***-***-***\"",
    "RuleName": "\"block_domain_to_***\""
}
Return Data

Indicates one of the possible command execution states: Successful, Partially Successful, or Failed.

The Partially Successful state only occurs when a command’s input accepts an array of items (e.g. an array of IP addresses) and one or more items within the array return an error from the API request.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

domain_block_to_rule_***

type

access-rule

layer

***-***-***-***-***

destination

  • {'uid': '***-***-***-***-***', 'name': '.msn.com', 'type': 'dns-domain', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'icon': 'Objects/domain', 'color': 'black'}

  • {'uid': '***-***-***-***-***', 'name': '.sohu.com', 'type': 'dns-domain', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'icon': 'Objects/domain', 'color': 'black'}

action

{'uid': '***-***-***-***-***', 'name': 'Drop', 'type': 'RulebaseAction', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'Actions/actionsDrop', 'color': 'none'}

Error Handling

If the Return Data is Partially Successful or Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Block Domains failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: generic_err_object_not_found.

Error Sample Data

Block Domains failed.

Status Code: 404.

Message: generic_err_object_not_found.

Block IP Addresses

Creates a new firewall access rule to block specified IP addresses.

Reader Note

  • IP Addresses can be unblocked by removing the Rule Name Prefix using the Delete Access Rules command.

  • Please note that the input layer must be included in the firewall blade.

    • E.g. Error for "layer3": "Validate the ACCESS_LAYER 'layer3' failed, this layer hasn't included the 'Firewall' blade."

    • To know if the selected layer includes the firewall blade, set the Show Details parameter to True when running the Show Access Layers command. In the returned raw data, check path $.access-layers[*].firewall for the selected layer. If the value is False, then the layer is not included; if it is True, then it is included.

    • It can also be enabled from within the UI.

  • Rule name prefix-to-ip + Rule name prefix-from-ip depending on the chosen direction. If both are chosen, 2 will be returned.

  • To review the created blocked IP rules, it's necessary to identify the policy located within the input layer. Subsequently, navigate to the respective policy page to access and view the rules.

    • Click the + on the top of the policy page, then Manage policies and layers.

    • Navigate to Layers > Access Control, select a layer, then check Used in policies. In this example, layer3 is under policy_1.

    • Navigate to policy_1 to check the created rules.

Input

Input Parameter

Required/Optional

Description

Example

IP Addresses

Required

The list of IP addresses to block.

[

"1.1.1.1",

"2.2.2.2"

]

Direction

Optional

The blocking direction (i.e. From, To, or Both) of the rule. The default direction is both.

Both

Rule Name Prefix

Required

Defines the rule name prefix of the access rule for each IP Address. When the block action is executed, Check Point Firewall enhances this prefix by appending specific details. The resulting format is: [Chosen Rule Name Prefix]-[Block Direction]- [Blocked Entity]. If no block direction has been defined, two rules will be created for each direction.

BlockIPs2

Layer Name or UID

Required

The name or UID of the layer that the rule belongs to. The layer name or UID can be obtained using the Show Access Layers command.

Network

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
[
    {
        "uid": "***-***-***-***-***",
        "name": "BlockIP6",
        "type": "access-rule",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "track": {
            "type": {
                "uid": "***-***-***-***-***",
                "name": "None",
                "type": "Track",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsNone",
                "color": "none"
            },
            "per-session": false,
            "per-connection": false,
            "accounting": false,
            "enable-firewall-session": false,
            "alert": "none"
        },
        "layer": "***-***-***-***-***",
        "source": [
            {
                "uid": "***-***-***-***-***",
                "name": "IP_1.1.1.1",
                "type": "host",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "SMC User",
                    "domain-type": "domain"
                },
                "ipv4-address": "1.1.1.1",
                "icon": "Objects/host",
                "color": "black"
            }
        ],
        "source-negate": false,
        "destination": [
            {
                "uid": "***-***-***-***-***",
                "name": "All_Internet",
                "type": "address-range",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "SMC User",
                    "domain-type": "domain"
                },
                "ipv4-address-first": "0.0.0.0",
                "ipv4-address-last": "255.255.255.255",
                "icon": "Objects/ip",
                "color": "sienna"
            }
        ],
        "destination-negate": false,
        "service": [
            {
                "uid": "***-***-***-***-***",
                "name": "smtp",
                "type": "service-tcp",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "port": "25",
                "icon": "Protocols/MailProtocolEnvelope",
                "color": "magenta"
            },
            {
                "uid": "***-***-***-***-***",
                "name": "AOL",
                "type": "service-tcp",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "port": "***",
                "icon": "Services/TCPService",
                "color": "red"
            }
        ],
        "service-negate": false,
        "service-resource": "",
        "vpn": [
            {
                "uid": "***-***-***-***-***",
                "name": "Any",
                "type": "CpmiAnyObject",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "black"
            }
        ],
        "action": {
            "uid": "***-***-***-***-***",
            "name": "Drop",
            "type": "RulebaseAction",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "Actions/actionsDrop",
            "color": "none"
        },
        "action-settings": {},
        "content": [
            {
                "uid": "***-***-***-***-***",
                "name": "Any",
                "type": "CpmiAnyObject",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "black"
            }
        ],
        "content-negate": false,
        "content-direction": "any",
        "time": [
            {
                "uid": "***-***-***-***-***",
                "name": "Any",
                "type": "CpmiAnyObject",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "black"
            }
        ],
        "custom-fields": {
            "field-1": "",
            "field-2": "",
            "field-3": ""
        },
        "meta-info": {
            "lock": "locked by current session",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2022-03-30T12:46-0700"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2022-03-30T12:46-0700"
            },
            "creator": "admin"
        },
        "comments": "",
        "enabled": true,
        "install-on": [
            {
                "uid": "***-***-***-***-***",
                "name": "Policy Targets",
                "type": "Global",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "none"
            }
        ]
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "IPs": "\"[\\r\\n\\\"1.1.1.1\\\",\\r\\n\\\"2.2.2.2\\\"\\r\\n]\""
}
Return Data

Indicates one of the possible command execution states: Successful, Partially Successful, or Failed.

The Partially Successful state only occurs when a command's input accepts an array of items (e.g. an array of IP addresses) and one or more items within the array return an error from the API request.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

TRACK

LAYER

SOURCE

SOURCE-NEGATE

DESTINATION

DESTINATION-NEGATE

SERVICE

SERVICE-NEGATE

SERVICE-RESOURCE

VPN

ACTION

ACTION-SETTINGS

CONTENT

CONTENT-NEGATE

CONTENT-DIRECTION

TIME

CUSTOM-FIELDS

META-INFO

COMMENTS

ENABLED

INSTALL-ON

***-***-***-***-***

BlockIP6

access-rule

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

{'type': {'uid': ***-***-***-***-***', 'name': 'None', 'type': 'Track', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'General/globalsNone', 'color': 'none'}, 'per-session': False, 'per-connection': False, 'accounting': False, 'enable-firewall-session': False, 'alert': 'none'}

***-***-***-***-***

[{'uid': '***-***-***-***-***', 'name': 'IP_1.1.1.1', 'type': 'host', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'ipv4-address': '1.1.1.1', 'icon': 'Objects/host', 'color': 'black'}]

False

[{'uid': '***-***-***-***-***', 'name': 'All_Internet', 'type': 'address-range', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'ipv4-address-first': '0.0.0.0', 'ipv4-address-last': '255.255.255.255', 'icon': 'Objects/ip', 'color': 'sienna'}]

False

[{'uid': '***-***-***-***-***', 'name': 'smtp', 'type': 'service-tcp', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'port': '25', 'icon': 'Protocols/MailProtocolEnvelope', 'color': 'magenta'}, {'uid': '***-***-***-***-***', 'name': 'AOL', 'type': 'service-tcp', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'port': '***', 'icon': 'Services/TCPService', 'color': 'red'}]

False

[{'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'General/globalsAny', 'color': 'black'}]

{'uid': '6***-***-***-***-***', 'name': 'Drop', 'type': 'RulebaseAction', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'Actions/actionsDrop', 'color': 'none'}

{}

[{'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'General/globalsAny', 'color': 'black'}]

False

any

[{'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'General/globalsAny', 'color': 'black'}]

{'field-1': '', 'field-2': '', 'field-3': ''}

{'lock': 'locked by current session', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-***': '2022-03-30T12:46-0700'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-***': '2022-03-30T12:46-0700'}, 'creator': 'admin'}

True

[{'uid': '***-***-***-***-***', 'name': 'Policy Targets', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'General/globalsAny', 'color': 'none'}]

Error Handling

If the Return Data is Partially Successful or Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Block IP Addresses failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: More than one object named 'xxx' exists.

Error Sample Data

Block IP Addresses failed.

Status Code: 400.

Message: More than one object named 'xxx' exists.

Block URLs

Blocks URLs by adding a new policy rule to the specified "Applications & URL Filtering" policy layer.

Reader Note

  • Category Name and "Layer Name Or UID" are required parameters to run this command.

    • Run the Show Application Site Categories command to obtain the Category Name. Category Names can be found in the returned raw data at the path $.objects[*].name.

    • Run the Show Access Layers command to obtain Layer Name or UID. Layer Names can be found in the returned raw data at the path $.access-layers[*].name; UIDs can be found in the returned raw data at the path $.access-layers[*].uid.

  • URLs can be unblocked by removing the rule name (delete the input rule name or delete the auto generated rule name in the returned raw data of the block domains command at the path $.name) using the Delete Access Rules command.

  • Please note that the input layer must be included in the Applications & URL Filtering blade.

    • Error for "layer3" as an example: "Validate the ACCESS_LAYER 'layer3' failed, this layer hasn't included the 'Applications & URL Filtering' blade."

    • To know if the selected layer includes the Applications & URL Filtering blade, set the Show Details parameter to True when running the Show Access Layers command. In the returned raw data, check under the path $.access-layers[*].applications-and-url-filtering for the selected layer. If the value is False, then the layer is not included; if it is True, then it is included.

    • It can also be enabled from within the UI.

  • If no rule name has been defined, D3 will create a new rule with the naming rule of url_block_datetime, e.g.: url_block_20230321095001.

  • To review created blocked url rules, it is necessary to determine which policy is the input layer under. Subsequently, navigate to that policy page to view its rules.

    • Click the + on the top of the policy page, then Manage policies and layers.

    • Navigate to Layers > Access Control, select a layer, then check Used in policies. In this example, layer3 is under policy_1.

    • Navigate to policy_1 to check the created rules.

Input

Input Parameter

Required/Optional

Description

Example

URL(s)

Required

The URL(s) to block.

[

"malware.com",

"virus.com"

]

Category Name

Required

The primary application or site category of the URLs based on their most defining aspect. The application category layer name can be obtained from the Show Application Site Categories command.

Art / Culture

URL(s) Defined as Regex Expressions

Optional

The expression that states if the designated URL is defined as a Regular Expression or not.

True

Rule Name

Optional

The rule name to save the block domain operation under the specified layer. If this parameter is not defined, D3 will create a new rule with the naming rule of url_block_datetime, e.g.: url_block_20230321095001.

url_block_***

Layer Name Or UID

Required

The name or UID of the policy layer from the Access Control policy for the new block urls rule to attach to. The layer name or UID can be obtained using the Show Access Layers command.

***-***-***-***-***

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "***",
    "type": "access-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "track": {
        "type": {
            "uid": "***-***-***-***-***",
            "name": "None",
            "type": "Track",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsNone",
            "color": "none"
        },
        "per-session": false,
        "per-connection": false,
        "accounting": false,
        "enable-firewall-session": false,
        "alert": "none"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "custom_app_site_urls_***",
            "type": "application-site",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "icon": "Objects/application",
            "color": "black"
        }
    ],
    "service-negate": false,
    "service-resource": "",
    "vpn": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Drop",
        "type": "RulebaseAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        },
        "icon": "Actions/actionsDrop",
        "color": "none"
    },
    "action-settings": {},
    "content": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "content-negate": false,
    "content-direction": "any",
    "time": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        }
    ],
    "custom-fields": {
        "field-1": "",
        "field-2": "",
        "field-3": ""
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2023-03-21T23:12-0700"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2023-03-21T23:12-0700"
        },
        "creator": "admin"
    },
    "comments": "",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "none"
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUID": "\"***-***-***-***-***\"",
    "RuleName": "\"url_block_rule_***\""
}
Return Data

Indicates one of the possible command execution states: Successful, Partially Successful, or Failed.

The Partially Successful state only occurs when a command's input accepts an array of items (e.g. an array of IP addresses) and one or more items within the array return an error from the API request.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

url_block_rule_***

type

access-rule

layer

***-***-***-***-***

service

  • {'uid': '***-***-***-***-***', 'name': 'custom_app_site_urls_***', 'type': 'application-site', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'icon': 'Objects/application', 'color': 'black'}

action

{'uid': '***-***-***-***-***', 'name': 'Drop', 'type': 'RulebaseAction', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}, 'icon': 'Actions/actionsDrop', 'color': 'none'}

Error Handling

If the Return Data is Partially Successful or Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Block URLs failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: generic_err_object_not_found.

Error Sample Data

Block URLs failed.

Status Code: 404.

Message: generic_err_object_not_found.

Delete Access Rules

Deletes the specified firewall access rules.

Reader Note

"UIDs Or Names Or Rule Numbers" and "Layer Name or UID" are required parameters to run this command.

  • Run the Get Access Rule Base command to obtain UIDs. UID can be found from the returned raw data at the path $.rulebase[*].uid; names can be found from the returned raw data at the path $.rulebase[*].name.

  • Run the Show Access Layers command to obtain access layers. Access layer UIDs can be found in the returned raw data at the path $.access-layers[*].uid; Access layer name can be found in the returned raw data at the path $.access-layers[*].name.

  • Please note that the value for "UIDs or Names or Rule Numbers" and Layer parameters must match in order to pass the command. It is suggested to run the Show Access Layers command first to obtain the desired layer UID/name, then use the layer UID/name to run the Get Access Rule Base command and obtain the desired rule UIDs/Names/Rule Numbers to delete.

  • Please note some access rules cannot be deleted. For example the Cleanup rule.

Input

Input Parameter

Required/Optional

Description

Example

UIDs Or Names Or Rule Numbers

Required

The list of access rules to delete. Rules can be specified by UID, name, or rule number. However, all input values in the list must be in the same format. These values can be obtained using the Get Access Rule Base command.

[

"***-***-***-***-***",

"***-***-***-***-***"

]

Source

Required

The source type (i.e. UID, Name or Rule-number) used for the input for the UIDs or Names or Rule-numbers parameter.

UID

Layer Name or UID

Required

The name or UID of the layer that the rule belongs to. This parameter is required when the defined Source is Name or UID. Layer names and UIDs can be obtained using the Show Access Layers command.

Network

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
No Sample Data
Return Data

Indicates one of the possible command execution states: Successful, Partially Successful, or Failed.

The Partially Successful state only occurs when a command's input accepts an array of items (e.g. an array of IP addresses) and one or more items within the array return an error from the API request.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

CODE
Result
Successfully delete the access rule for uid: ***-***-***-***-***
Successfully delete the access rule for uid: ***-***-***-***-***

Error Handling

If the Return Data is Partially Successful or Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Delete Access Rules failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Delete Access Rules failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Discard unpublished changes created by Web API

Discards unpublished changes made by the Web API session and removes them from the database.

Reader Note

Session UID is an optional parameter to run this command.

  • Run the Show Session Objects command to obtain the Session UID. Session UIDs can be found in the returned raw data at the path $.objects[*].uid.

  • Once the session is discarded, the session cannot be used again. Running this command using the UID of a session that was already discarded will return "not found".

  • The Session UID is optional to input, if you leave the parameter empty, no discard will be operated.

Input

Input Parameter

Required/Optional

Description

Example

Session UID

Optional

The UID of the session to discard. The session to discard must be a different session than the one you are currently using. Session UIDs can be obtained using the Show Session Objects command. Only changes made by the Web API type sessions can be discarded.

***-***-***-***-***

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "number-of-discarded-changes": 0,
    "message": "OK"
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
No Sample Data
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

number-of-discarded-changes

0

message

OK

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Discard unpublished changes created by Web API failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Invalid parameter for [uid]. The invalid value: [xxx].

Error Sample Data

Discard unpublished changes created by Web API failed.

Status Code: 400.

Message: Invalid parameter for [uid]. The invalid value: [xxx].

Fetch Event

Returns firewall logs based on specified criteria.

Reader Note

Query ID is an optional parameter to run this command.

  • Query IDs can be obtained by running this command with the Query ID parameter empty. The Query IDs can be found at the path $.query-id.

Input

Input Parameter

Required/Optional

Description

Example

Start Time

Optional

The start time of the time range to fetch logs in UTC time. Note: If the Start Time and End Time parameters are not defined, the query will return logs from the past 24 hours.

2022-03-01 00:00

End Time

Optional

The end time of the time range to fetch logs in UTC time format. Note: If the Start Time and End Time parameters are not defined, the query will return logs from the past 24 hours.

2022-03-22 00:00

Filter

Optional

The filter expression for the query. The syntax is Field1:Value1 {AND|OR|NOT} Field2:Value2. If the value contains any spaces, it must be enclosed in double quotation marks. For example, subject:"Object Manipulation".

severity:Informational AND comment like "%update to%"

Number of Event(s) Fetched

Optional

The maximum number of results to return, starting from the defined offset index value. The default limit is set to 20, and the maximum limit that can be set is 100.

20

Type

Optional

The log type to filter results. The available options are Logs and Audit. If this parameter is not defined, all log types will be returned.

Logs

Log Server IPs

Optional

The list of IP addresses of log servers to filter results.

[ "1.1.1.1" ]

Query ID

Optional

The ID of the query to retrieve the next page of results from the previous run query, using the specified limit. If this parameter is defined, all other parameters will be ignored. The query ID can be obtained from the raw data of the command at the JSON path $.query-id.

admin_***-***-***-***-***

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "logs": [
        {
            "product": "Firewall",
            "sequencenum": "1",
            "i_f_dir": "inbound",
            "id_generated_by_indexer": "false",
            "type": "Alert",
            "__interface": "daemon",
            "orig_log_server_attr": [
                {
                    "isCHKPObject": "true",
                    "uuid": "***-***-***-***-***",
                    "resolved": "gw-***"
                }
            ],
            "log_sys_message": "Minimum disk space exceeded in directory /opt/CPsuite-R81.10/fw1/log/ .",
            "orig_log_server": "1.1.1.1",
            "orig": "gw-b755cb",
            "marker": "@***@1",
            "calc_desc": "Traffic",
            "id": "***-***-***-***-***",
            "time": "2022-03-25T20:24:45Z",
            "i_f_name": "daemon",
            "first": "true"
        },
        {
            "product": "Firewall",
            "sequencenum": "1",
            "i_f_dir": "inbound",
            "id_generated_by_indexer": "false",
            "type": "Control",
            "__interface": "daemon",
            "orig_log_server_attr": [
                {
                    "isCHKPObject": "true",
                    "uuid": "***-***-***-***-***",
                    "resolved": "gw-***"
                }
            ],
            "log_sys_message": "Log file has been switched to: 2022-03-25_132425.log",
            "orig_log_server": "1.1.1.1",
            "orig": "gw-***",
            "marker": "@A@@***@0",
            "calc_desc": "Log file has been switched to: 2022-03-25_132425.log",
            "id": "***-***-***-***-***",
            "time": "2022-03-25T20:24:25Z",
            "i_f_name": "daemon",
            "first": "true"
        }
    ],
    "logs-count": 2,
    "query-id": "***-***-***-***-***"
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "IDs": "\"[\\r\\n\\\"***-***-***-***-***\\\",\\r\\n\\\"***-***-***-***-***\\\"\\r\\n]\"",
    "Severities": "\"[ \\\"Informational\\\" ]\"",
    "SeverIPs": "\"[ \\\"1.1.1.1\\\" ]\"",
    "QueryID": "\"admin_***-***-***-***-***\"",
    "Types": "\"[ \\\"Alert\\\", \\\"Control\\\" ]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

PRODUCT

SEQUENCENUM

I_F_DIR

ID_GENERATED_BY_INDEXER

TYPE

__INTERFACE

ORIG_LOG_SERVER_ATTR

LOG_SYS_MESSAGE

ORIG_LOG_SERVER

ORIG

MARKER

CALC_DESC

ID

TIME

I_F_NAME

FIRST

Firewall

1

inbound

false

Alert

daemon

[{'isCHKPObject': 'true', 'uuid': '***-***-***-***-***', 'resolved': 'gw-b755cb'}]

Minimum disk space exceeded in directory /opt/CPsuite-R81.10/fw1/log/ .

1.1.1.1

gw-***

@A***@C@1

Traffic

***-***-***-***-***

2022-03-25T20:24:45Z

daemon

true

Firewall

1

inbound

false

Control

daemon

[{'isCHKPObject': 'true', 'uuid': '***-***-***-***-***', 'resolved': 'gw-***'}]

Log file has been switched to: 2022-03-25_132425.log

1.1.1.1

gw-***

@***C@0

Log file has been switched to: 2022-03-25_132425.log

***-***-***-***-***

2022-03-25T20:24:25Z

daemon

true

Fetch Event Field Mapping

Please note that Fetch Event commands require event field mapping. Field mapping plays a key role in the data normalization process part of the event pipeline. Field mapping converts the original data fields from the different providers to the D3 fields which are standardized by the D3 Model. Please refer to Event and Incident Intake Field Mapping for details.

If you require a custom field mapping, click + Add Field to add a custom field mapping. You may also remove built-in field mappings by clicking x. Please note that two underscore characters will automatically prefix the defined Field Name as the System Name for a custom field mapping. Additionally, if an input Field Name contains any spaces, they will automatically be replaced with underscores for the corresponding System Name.

As a system integration, the Check Point Firewall integration has some pre-configured field mappings for default field mapping.

  • Default Event Source
    The Default Event Source is the default set of field mappings that are applied when this fetch event command is executed. For out-of-the-box integrations, you will find a set of field mapping provided by the system. Default event source provides field mappings for common fields from fetched events . The default event source has a ‘Main Event JSON Path' (i.e., $.logs) that is used to extract a batch of events from the response raw data. Click Edit Event Source to view the 'Main Event JSON Path’.

    • Main Event JSON Path: $.logs
      The Main Event JSON Path determines the root path where the system starts parsing raw response data into D3 event data. The JSON path begins with $, representing the root element. The path is formed by appending a sequence of child elements to $, each separated by a dot (.). Square brackets with nested quotation marks (['...']) should be used to separate child elements in JSON arrays.
      For example, the root node of a JSON Path is logs. The child node denoting the Unique Event Key field would be id. Putting it together, the JSON Path expression to extract the Unique Event Key is $.logs.id.

The pre-configured field mappings are detailed below:

Field Name

Source Field

Unique Event Key

.id

Event Type

.type

Event name

.subject

Start Time

.time

Severity

.severity

Description

.calc_desc

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Fetch Event failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Fetch Event failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Get Access Rule Base

Retrieves the entire access rule layer of the specified object.

Reader Note

Name is a required parameter to run this command.

  • The Name parameter is referring to the Access Layers. You can run the Show Access Layers command to obtain your desired values. Layer Names can be found from the returned raw data at the path $.access-layers[*].name; UIDs can be found from the returned raw data at the path $.access-layers[*].uid.

Input

Input Parameter

Required/Optional

Description

Example

Name

Required

The name or UID of the access rule to retrieve rulebase details for.

Network

Limit

Optional

The maximum number (up to 100) of rulebase records to return. If the input value is negative or not specified, the default value of 20 will be used.

2

Offset

Optional

The number of matching records to omit initially. The default value is 0.

0

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "Network",
    "rulebase": [
        {
            "uid": "***-***-***-***-***",
            "name": "testRule39",
            "type": "access-rule",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "rule-number": 1,
            "track": {
                "type": "***-***-***-***-***",
                "per-session": false,
                "per-connection": false,
                "accounting": false,
                "enable-firewall-session": false,
                "alert": "none"
            },
            "source": [
                "***-***-***-***-***"
            ],
            "source-negate": false,
            "destination": [
                "***-***-***-***-***"
            ],
            "destination-negate": false,
            "service": [
                "***-***-***-***-***",
                "***-***-***-***-***"
            ],
            "service-negate": false,
            "service-resource": "",
            "vpn": [
                "***-***-***-***-***"
            ],
            "action": "***-***-***-***-***",
            "action-settings": {},
            "content": [
                "***-***-***-***-***"
            ],
            "content-negate": false,
            "content-direction": "any",
            "time": [
                "***-***-***-***-***"
            ],
            "custom-fields": {
                "field-1": "",
                "field-2": "",
                "field-3": ""
            },
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2022-03-30T13:51-0700"
                },
                "last-modifier": "admin",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2022-03-30T13:51-0700"
                },
                "creator": "admin"
            },
            "comments": "",
            "enabled": true,
            "install-on": [
                "***-***-***-***-***"
            ]
        }
    ],
    "objects-dictionary": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255",
            "icon": "Objects/ip",
            "color": "sienna"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "black"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "AOL",
            "type": "service-tcp",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "port": "***",
            "icon": "Services/TCPService",
            "color": "red"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Drop",
            "type": "RulebaseAction",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "Actions/actionsDrop",
            "color": "none"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "IP_1.1.1.1",
            "type": "host",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address": "1.1.1.1",
            "icon": "Objects/host",
            "color": "black"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "None",
            "type": "Track",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsNone",
            "color": "none"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "General/globalsAny",
            "color": "none"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "smtp",
            "type": "service-tcp",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "port": "**",
            "icon": "Protocols/MailProtocolEnvelope",
            "color": "magenta"
        }
    ],
    "from": 1,
    "to": 1,
    "total": 4
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUIDs": "\"[\\r\\n\\\"***-***-***-***-***\\\",\\r\\n\\\"***-***-***-***-***\\\"\\r\\n]\"",
    "RuleNames": "\"[\\r\\n\\\"testRule39\\\"\\r\\n]\"",
    "RuleNumbers": "\"[\\r\\n1\\r\\n]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

RULE-NUMBER

TRACK

SOURCE

SOURCE-NEGATE

DESTINATION

DESTINATION-NEGATE

SERVICE

SERVICE-NEGATE

SERVICE-RESOURCE

VPN

ACTION

ACTION-SETTINGS

CONTENT

CONTENT-NEGATE

CONTENT-DIRECTION

TIME

CUSTOM-FIELDS

META-INFO

COMMENTS

ENABLED

INSTALL-ON

***-***-***-***-***

testRule39

access-rule

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

1

{'type': '***-***-***-***-***', 'per-session': False, 'per-connection': False, 'accounting': False, 'enable-firewall-session': False, 'alert': 'none'}

['***-***-***-***-***']

False

['***-***-***-***-***']

False

['***-***-***-***-***', '***-***-***-***-***']

False

['***-***-***-***-***']

***-***-***-***-***

{}

['***-***-***-***-***']

False

any

['***-***-***-***-***']

{'field-1': '', 'field-2': '', 'field-3': ''}

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-***': '2022-03-30T13:51-***'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-***': '2022-03-30T13:51-0700'}, 'creator': 'admin'}

True

['***-***-***-***-***']

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Get Access Rule Base failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [Standard Threat Prevention] not found.

Error Sample Data

Get Access Rule Base failed.

Status Code: 404.

Message: Requested object [Standard Threat Prevention] not found.

Get Task Status

Retrieves the progress and details of the specified task.

Reader Note

Task ID is an optional parameter to run this command.

  • You should already have your desired task IDs on hand to run this command. If you don't know what the task ID is, you can use the Run Script command. The task IDs can be found in the raw data at the path $.[*].task-id. Store the task ID in a secure location, you may need it to run this command in the future.

Since all parameters are optional to input when running this command, if all parameters are left blank then 50 tasks will be returned.

Input

Input Parameter

Required/Optional

Description

Example

Task ID

Optional

The ID of the task to return the status of. Task IDs can be obtained using the Run Script command. If this parameter is defined, the other parameters will be omitted.

***-***-***-***-***

From Time

Optional

The start time of the time range to filter tasks, by the tasks' last update time.

2022-03-01 00:00

To Time

Optional

The end time of the time range to filter tasks, by the tasks' last update time.

2022-03-22 00:00

Status

Optional

The status to filter tasks. The available options are All, Successful, Failed and In Progress. The default option is All.

All

Limit

Optional

The maximum number (up to 500) of records to return. If the input value is negative or not defined, the default value of 50 will be used.

2

Offset

Optional

The number of matching records to omit initially. The default value is 0.

0

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "tasks": [
        {
            "task-id": "***-***-***-***-***",
            "task-name": "Publish operation",
            "status": "succeeded",
            "progress-percentage": 100,
            "suppressed": false,
            "task-details": [
                {
                    "publishResponse": {
                        "numberOfPublishedChanges": 0,
                        "mode": "async"
                    },
                    "revision": "***-***-***-***-***"
                }
            ]
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "TaskIDs": "\"***-***-***-***-***\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

TASK-ID

TASK-NAME

STATUS

PROGRESS-PERCENTAGE

SUPPRESSED

TASK-DETAILS

***-***-***-***-***

Publish operation

succeeded

100

False

[{'publishResponse': {'numberOfPublishedChanges': 0, 'mode': 'async'}, 'revision': '***-***-***-***-***'}]

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Get Task Status failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: 'Invalid parameter for [task-id].

Error Sample Data

Get Task Status failed.

Status Code: 400.

Message: 'Invalid parameter for [task-id].

Install Policy

Applies all published changes from the database to a given target policy package. Installation of incorrect changes or onto the wrong target may cause Check Point to work improperly. Ensure to check changes and Policy Package Names by running the Show Published Changes between a period of time or two sessions and Show Policy Packages commands or check them within Check Point SmartConsole before executing this command.

Reader Note

Policy Package Name is a required parameter to run this command.

  • Run the Show Policy Packages command to obtain the Policy Package Name. Policy Package Names can be obtained in the returned raw data at the path $.packages[*].name.

Input

Input Parameter

Required/Optional

Description

Example

Policy Package Name

Required

The name of the Policy Package to be installed. Policy Package Name can be obtained using the Show Policy Packages command.

New_policy

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "type": "task",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "task-id": "***-***-***-***-***",
    "task-name": "Policy installation - new2",
    "status": "succeeded",
    "progress-percentage": 100,
    "start-time": {
        "posix": ***,
        "iso-8601": "2023-04-04T18:34-0700"
    },
    "last-update-time": {
        "posix": ***,
        "iso-8601": "2023-04-04T18:34-0700"
    },
    "suppressed": false,
    "task-details": [
        {
            "uid": "***-***-***-***-***",
            "name": null,
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "color": "black",
            "statusCode": "succeeded",
            "statusDescription": "Succeeded",
            "taskNotification": "***-***-***-***-***",
            "gatewayId": "***-***-***-***-***e",
            "policyId": "***-***-***-***-***",
            "fastInstallStatus": {
                "worksessionId": "***-***-***-***-***",
                "gatewayId": "***-***-***-***-***",
                "policyId": "***-***-***-***-***",
                "status": "eligible",
                "detailedReason": []
            },
            "runningStages": [],
            "waitingStages": [],
            "stagesInfo": [
                {
                    "type": "info",
                    "stage": "modern verification",
                    "messages": []
                }
            ],
            "cluster": false,
            "meta-info": {
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2023-04-04T18:34-0700"
                },
                "last-modifier": "System",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2023-04-04T18:34-0700"
                },
                "creator": "System"
            },
            "tags": [],
            "icon": "General/globalsNa",
            "comments": "",
            "display-name": "",
            "customFields": null,
            "gatewayName": "checkp87-131",
            "revision": "***-***-***-***-***"
        }
    ],
    "comments": "Installation succeeded on checkp87-***",
    "color": "black",
    "icon": "General/globalsNa",
    "tags": [],
    "meta-info": {
        "lock": "unlocked",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2023-04-04T18:34-0700"
        },
        "last-modifier": "System",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2023-04-04T18:34-0700"
        },
        "creator": "System"
    },
    "read-only": false
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "TaskStatus": "\"succeeded\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

task-id

***-***-***-***-***

task-name

Policy installation - new2

status

succeeded

progress-percentage

100

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Install Policy failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [xxx] not found.

Error Sample Data

Get Task Status failed.

Status Code: 404.

Message: Requested object [xxx] not found.

Run Script

Executes a script on the specified targets.

Reader Note

Ensure the specified targets are present in the system. Targets can be viewed from Check Point SmartConsole, under GATEWAYS & SERVERS. Right-click on an object to copy its target name to your clipboard.

Input

Input Parameter

Required/Optional

Description

Example

Script Name

Required

The name of the script to execute.

List All VPN Tunnel

Script

Required

The contents of the script.

vpn tu tlist

Targets

Required

The names of the targets to run the script on.

[ "gw-***"]

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
[
    {
        "uid": "***-***-***-***-***",
        "name": "gw-*** - List All VPN Tunnel",
        "type": "CdmTaskNotification",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "task-id": "***-***-***-***-***",
        "task-name": "gw-***- List All VPN Tunnel",
        "status": "succeeded",
        "progress-percentage": 100,
        "start-time": {
            "posix": ***,
            "iso-8601": "2021-07-07T14:25-0700"
        },
        "last-update-time": {
            "posix": ***,
            "iso-8601": "2021-07-07T14:25-0700"
        },
        "suppressed": false,
        "task-details": [
            {
                "uid": "***-***-***-***-***",
                "name": null,
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "SMC User",
                    "domain-type": "domain"
                },
                "color": "black",
                "statusCode": "succeeded",
                "statusDescription": "+-----------------------------------------+-----------------------+---------------------+, | Peer: 192.168.85.1 - Peer-PaloAlto | MSA: ffffc9006015b220 | i: 3 ref: 2 |, | Method...",
                "taskNotification": "***-***-***-***-***",
                "gatewayId": "***-***-***-***-***",
                "gatewayName": "",
                "transactionId": **,
                "responseMessage": "***=",
                "responseError": "",
                "meta-info": {
                    "validation-state": "ok",
                    "last-modify-time": {
                        "posix": ***,
                        "iso-8601": "2021-07-07T14:25-0700"
                    },
                    "last-modifier": "admin",
                    "creation-time": {
                        "posix": ***,
                        "iso-8601": "2021-07-07T14:25-0700"
                    },
                    "creator": "admin"
                },
                "tags": [],
                "icon": "General/globalsNa",
                "comments": "",
                "display-name": "",
                "customFields": null,
                "DecodedResponsedMessage": "+-----------------------------------------+-----------------------+---------------------+\n| Peer: 192.168.85.1 - Peer-PaloAlto      | MSA: ffffc9006015b220 | i: 3  ref:     2    |\n| Methods: ESP Tunnel 3DES SHA256         |                       | i: 4  ref:     1    |\n| My TS:   10.0.85.0/24                   |                       |                     |\n| Peer TS: 192.168.88.0/24                |                       |                     |\n| MSPI:\t  1800002 (i:  3, p:  0)          | Out SPI: 807d803b     |                     |\n| Tunnel created:      Jul 20 18:14:41    |                       |                     |\n| Tunnel expiration:   Jul 20 19:14:41    |                       |                     |\n+-----------------------------------------+-----------------------+---------------------+\n| Peer: 192.168.87.1 - Peer-PaloAlto2     | MSA: ffffc9006015b221 | i: 3  ref:     2    |\n| Methods: ESP Tunnel 3DES SHA256         |                       | i: 4  ref:     1    |\n| My TS:   10.0.85.0/24                   |                       |                     |\n| Peer TS: 192.168.88.0/24                |                       |                     |\n| MSPI:\t  1800002 (i:  3, p:  0)          | No outbound SA        |                     |\n+-----------------------------------------+-----------------------+---------------------+\n(1) Site-to-Site tunnels are up:\nIPSEC           1\nNAT-T           0\n\n\n(0) Clients Are Connected:\nNAT-T           0\nVisitor Mode    0\nSSL             0\nL2TP            0\n",
                "ParesedResponsedMessage": [
                    {
                        "Peer": "1.1.1.1",
                        "Methods": "ESP Tunnel 3DES SHA256",
                        "My_TS": "10.0.9.0/1",
                        "Peer_TS": "1.1.1.0/24",
                        "Out_SPI": "***",
                        "Tunnel_expiration": "Jul 20 19:14:41",
                        "No_outbound_SA": "False"
                    },
                    {
                        "Peer": "1.1.1.1",
                        "Methods": "ESP Tunnel 3DES SHA256",
                        "My_TS": "10.0.0.0/24",
                        "Peer_TS": "1.1.1.0/24",
                        "No_outbound_SA": "True",
                        "Tunnel_expiration": null,
                        "Out_SPI": null
                    }
                ]
            }
        ],
        "comments": "Completed",
        "color": "black",
        "icon": "General/globalsNa",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2021-07-07T14:25-0700"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2021-07-07T14:25-0700"
            },
            "creator": "admin"
        },
        "read-only": false
    }
]
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "uid": "***-***-***-***-***",
        "name": "gw-*** - List All VPN Tunnel",
        "type": "CdmTaskNotification",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "task-id": "***-***-***-***-***",
        "task-name": "gw-***- List All VPN Tunnel",
        "status": "succeeded",
        "progress-percentage": 100,
        "start-time": {
            "posix": ***,
            "iso-8601": "2021-07-07T14:25-0700"
        },
        "last-update-time": {
            "posix": ***,
            "iso-8601": "2021-07-07T14:25-0700"
        },
        "suppressed": false,
        "task-details": [
            {
                "uid": "***-***-***-***-***",
                "name": null,
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "SMC User",
                    "domain-type": "domain"
                },
                "color": "black",
                "statusCode": "succeeded",
                "statusDescription": "+-----------------------------------------+-----------------------+---------------------+, | Peer: 192.168.85.1 - Peer-PaloAlto | MSA: ffffc9006015b220 | i: 3 ref: 2 |, | Method...",
                "taskNotification": "***-***-***-***-***",
                "gatewayId": "***-***-***-***-***",
                "gatewayName": "",
                "transactionId": **,
                "responseMessage": "***=",
                "responseError": "",
                "meta-info": {
                    "validation-state": "ok",
                    "last-modify-time": {
                        "posix": ***,
                        "iso-8601": "2021-07-07T14:25-0700"
                    },
                    "last-modifier": "admin",
                    "creation-time": {
                        "posix": ***,
                        "iso-8601": "2021-07-07T14:25-0700"
                    },
                    "creator": "admin"
                },
                "tags": [],
                "icon": "General/globalsNa",
                "comments": "",
                "display-name": "",
                "customFields": null,
                "DecodedResponsedMessage": "+-----------------------------------------+-----------------------+---------------------+\n| Peer: 192.168.85.1 - Peer-PaloAlto      | MSA: ffffc9006015b220 | i: 3  ref:     2    |\n| Methods: ESP Tunnel 3DES SHA256         |                       | i: 4  ref:     1    |\n| My TS:   10.0.85.0/24                   |                       |                     |\n| Peer TS: 192.168.88.0/24                |                       |                     |\n| MSPI:\t  1800002 (i:  3, p:  0)          | Out SPI: 807d803b     |                     |\n| Tunnel created:      Jul 20 18:14:41    |                       |                     |\n| Tunnel expiration:   Jul 20 19:14:41    |                       |                     |\n+-----------------------------------------+-----------------------+---------------------+\n| Peer: 192.168.87.1 - Peer-PaloAlto2     | MSA: ffffc9006015b221 | i: 3  ref:     2    |\n| Methods: ESP Tunnel 3DES SHA256         |                       | i: 4  ref:     1    |\n| My TS:   10.0.85.0/24                   |                       |                     |\n| Peer TS: 192.168.88.0/24                |                       |                     |\n| MSPI:\t  1800002 (i:  3, p:  0)          | No outbound SA        |                     |\n+-----------------------------------------+-----------------------+---------------------+\n(1) Site-to-Site tunnels are up:\nIPSEC           1\nNAT-T           0\n\n\n(0) Clients Are Connected:\nNAT-T           0\nVisitor Mode    0\nSSL             0\nL2TP            0\n",
                "ParesedResponsedMessage": [
                    {
                        "Peer": "1.1.1.1",
                        "Methods": "ESP Tunnel 3DES SHA256",
                        "My_TS": "10.0.9.0/1",
                        "Peer_TS": "1.1.1.0/24",
                        "Out_SPI": "***",
                        "Tunnel_expiration": "Jul 20 19:14:41",
                        "No_outbound_SA": "False"
                    },
                    {
                        "Peer": "1.1.1.1",
                        "Methods": "ESP Tunnel 3DES SHA256",
                        "My_TS": "10.0.0.0/24",
                        "Peer_TS": "1.1.1.0/24",
                        "No_outbound_SA": "True",
                        "Tunnel_expiration": null,
                        "Out_SPI": null
                    }
                ]
            }
        ],
        "comments": "Completed",
        "color": "black",
        "icon": "General/globalsNa",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2021-07-07T14:25-0700"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2021-07-07T14:25-0700"
            },
            "creator": "admin"
        },
        "read-only": false
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "TaskIDs": "\"[\\\"***-***-***-***-***\\\"]\"",
    "TaskNames": "\"[\\\"gw-*** - List All VPN Tunnel\\\"]\"",
    "Statuses": "\"[\\\"succeeded\\\"]\"",
    "ProgressPercentages": "\"[100]\"",
    "StartTimes": "\"[\\\"2021-07-07T14:25-0700\\\"]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

TASK-ID

TASK-NAME

STATUS

PROGRESS-PERCENTAGE

START-TIME

LAST-UPDATE-TIME

SUPPRESSED

TASK-DETAILS

COMMENTS

COLOR

ICON

TAGS

META-INFO

READ-ONLY

***-***-***-***-***

gw-***- pb test run script without parsed output

CdmTaskNotification

{
";uid";: ";***-***-***-***-***";,
";name";: ";SMC User";,
";domain-type";: ";domain";
}

***-***-***-***-***

gw-***- pb test run script without parsed output

succeeded

100

{
";posix";: ***,
";iso-***";: ";2021-07-22T17:09-0700";
}

{
";posix";: ***,
";iso-***";: ";2021-07-22T17:09-0700";
}

False

[
{
";uid";: ";***-***-***-***-***";,
";name";: null,
";domain";: {
";uid";: ";***-***-***-***-***";,
";name";: ";SMC User";,
";domain-type";: ";domain";
},
";color";: ";black";,
";statusCode";: ";succeeded";,
";statusDescription";: ";+-----------------------------------------+-----------------------+---------------------+, | Peer: 1.1.1.1 - Peer-PaloAlto | MSA: ***| i: 3 ref: 2 |, | Method...";,
";taskNotification";: ";***-***-***-***-***";,
";gatewayId";: ";***-***-***-***-***";,
";gatewayName";: ";";,
";transactionId";: ***,
";responseMessage";: ";K***AoK";,
";responseError";: ";";,
";meta-info";: {
";validation-state";: ";ok";,
";last-modify-time";: {
";posix";: ***,
";iso-***";: ";2021-07-22T17:09-0700";
},
";last-modifier";: ";admin";,
";creation-time";: {
";posix";: ***,
";iso-***";: ";2021-07-22T17:09-0700";
},
";creator";: ";admin";
},
";tags";: [],
";icon";: ";General/globalsNa";,
";comments";: ";";,
";display-name";: ";";,
";customFields";: null,
";DecodedResponsedMessage";: ";+-----------------------------------------+-----------------------+---------------------+\n| Peer: ***- Peer-PaloAlto | MSA: ***| i: 3 ref: 2 |\n| Methods: ESP Tunnel 3DES SHA256 | | |\n| My TS: ***/24 | | |\n| Peer TS: ***/24 | | |\n| MSPI:\t ***(i: 3, p: 0) | Out SPI: ***| |\n| Tunnel created: Jul 22 16:42:29 | | |\n| Tunnel expiration: Jul 22 17:42:29 | | |\n+-----------------------------------------+-----------------------+---------------------+\n\n(1) Site-to-Site tunnels are up:\nIPSEC 1\nNAT-T 0\n\n(0) Clients Are Connected:\nNAT-T 0\nVisitor Mode 0\nSSL 0\nL2TP 0\n\n";,
";ParesedResponsedMessage";: [
{
";Peer";: ";***";,
";Methods";: ";ESP Tunnel 3DES SHA256";,
";My_TS";: ";***/24";,
";Peer_TS";: ";***/24";,
";Out_SPI";: ";b2d3ecba";,
";Tunnel_expiration";: ";Jul 22 17:42:***";,
";No_outbound_SA";: ";False";
}
]
}
]

Completed

black

General/globalsNa

[]

{
";lock";: ";unlocked";,
";validation-state";: ";ok";,
";last-modify-time";: {
";posix";: ***,
";iso-***";: ";2021-07-22T17:09-0700";
},
";last-modifier";: ";admin";,
";creation-time";: {
";posix";: ***,
";iso-8601";: ";2021-07-22T17:09-0700";
},
";creator";: ";admin";
}

False

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Run Script failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [xxx] not found.

Error Sample Data

Run Script failed.

Status Code: 404.

Message: Requested object [xxx] not found.

Enable/Disable Access Rule

Enables or disables the specified access rule(s).

Reader Note

"UIDs Or Names Or Rule Numbers" and "Layer Name or UID" are required parameters to run this command.

  • Run the Get Access Rule Base command to obtain UIDs. UID can be found from the returned raw data at the path $.rulebase[*].uid; names can be found from the returned raw data at the path $.rulebase[*].name.

  • Run the Show Access Layers command to obtain access layers. Access layer UIDs can be found in the returned raw data at the path $.access-layers[*].uid; Access layer name can be found in the returned raw data at the path $.access-layers[*].name.

  • Please note that the value for "UIDs Or Names Or Rule Numbers" and Layer parameters must match in order to pass the command. It is suggested to run the Show Access Layers command first to obtain the desired layer UID/name, then use the layer UID/name to run the Get Access Rule Base command to obtain the desired rule UIDs/Names/Rule Numbers to enable/disable.

Input

Input Parameter

Required/Optional

Description

Example

UIDs Or Names Or Rule Numbers

Required

The list of access rules to enable or disable. Rules can be specified by UID, name, or rule number. However, all input values in the list must be in the same format. These values can be obtained using the Get Access Rule Base command.

["***-***-***-***-***"

]

Source

Required

The source type (i.e. UID, Name or Rule-number) used for the input for the UIDs or Names or Rule-numbers parameter.

UID

Layer Name or UID

Required

The name or UID of the layer that the rule belongs to. Layer names and UIDs can be obtained using the Show Access Layers command.

Network

Enabled

Optional

The option to enable or disable the specified access rules. Selecting True will enable the rules, and selecting False will disable them. Default value is True.

True

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
[
    {
        "uid": "***-***-***-***-***",
        "name": "testRule39",
        "type": "access-rule",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "track": {
            "type": {
                "uid": "***-***-***-***-***",
                "name": "None",
                "type": "Track",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsNone",
                "color": "none"
            },
            "per-session": false,
            "per-connection": false,
            "accounting": false,
            "enable-firewall-session": false,
            "alert": "none"
        },
        "layer": "***-***-***-***-***",
        "source": [
            {
                "uid": "***-***-***-***-***",
                "name": "IP_1.1.1.1",
                "type": "host",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "SMC User",
                    "domain-type": "domain"
                },
                "ipv4-address": "1.1.1.1",
                "icon": "Objects/host",
                "color": "black"
            }
        ],
        "source-negate": false,
        "destination": [
            {
                "uid": "***-***-***-***-***",
                "name": "All_Internet",
                "type": "address-range",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "SMC User",
                    "domain-type": "domain"
                },
                "ipv4-address-first": "0.0.0.0",
                "ipv4-address-last": "255.255.255.255",
                "icon": "Objects/ip",
                "color": "sienna"
            }
        ],
        "destination-negate": false,
        "service": [
            {
                "uid": "***-***-***-***-***",
                "name": "smtp",
                "type": "service-tcp",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "port": "25",
                "icon": "Protocols/MailProtocolEnvelope",
                "color": "magenta"
            },
            {
                "uid": "***-***-***-***-***",
                "name": "AOL",
                "type": "service-tcp",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "port": "***",
                "icon": "Services/TCPService",
                "color": "red"
            }
        ],
        "service-negate": false,
        "service-resource": "",
        "vpn": [
            {
                "uid": "***-***-***-***-***",
                "name": "Any",
                "type": "CpmiAnyObject",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "black"
            }
        ],
        "action": {
            "uid": "***-***-***-***-***",
            "name": "Drop",
            "type": "RulebaseAction",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "icon": "Actions/actionsDrop",
            "color": "none"
        },
        "action-settings": {},
        "content": [
            {
                "uid": "***-***-***-***-***",
                "name": "Any",
                "type": "CpmiAnyObject",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "black"
            }
        ],
        "content-negate": false,
        "content-direction": "any",
        "time": [
            {
                "uid": "***-***-***-***-***",
                "name": "Any",
                "type": "CpmiAnyObject",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "black"
            }
        ],
        "custom-fields": {
            "field-1": "",
            "field-2": "",
            "field-3": ""
        },
        "meta-info": {
            "lock": "locked by current session",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2022-03-30T13:51-0700"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2022-03-30T13:51-0700"
            },
            "creator": "admin"
        },
        "comments": "",
        "enabled": true,
        "install-on": [
            {
                "uid": "***-***-***-***-***",
                "name": "Policy Targets",
                "type": "Global",
                "domain": {
                    "uid": "***-***-***-***-***",
                    "name": "Check Point Data",
                    "domain-type": "data domain"
                },
                "icon": "General/globalsAny",
                "color": "none"
            }
        ]
    },
    {
        "code": "generic_err_object_not_found",
        "message": "Requested object [testRule390] not found"
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUIDs": "\"[\\r\\n\\\"***-***-***-***-***\\\"\\r\\n]\"",
    "RuleNames": "\"[\\r\\n\\\"testRule39\\\"\\r\\n]\"",
    "LayerUIDs": "\"[\\r\\n\\\"***-***-***-***-***\\\"\\r\\n]\""
}
Return Data

Indicates one of the possible command execution states: Successful, Partially Successful, or Failed.

The Partially Successful state only occurs when a command’s input accepts an array of items (e.g. an array of IP addresses) and one or more items within the array return an error from the API request.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

CODE
No Sample Data

Error Handling

If the Return Data is Partially Successful or Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Enable/Disable Access Rule failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [Entities can not be found] not found.

Error Sample Data

Enable/Disable Access Rule failed.

Status Code: 404.

Message: Requested object [Entities can not be found] not found.

Set Threat Exception

Sets the specified threat exception.

Reader Note

Exception Name Or UID is a required parameter to run this command.

  • For exception under a rule: Run the Show Threat Rule Exception Rule Base command to obtain Exception Name Or UID. Exception Names can be found in the returned raw data at the path $.rulebase[*].name; Exception UID can be found in the returned raw data at the path $.rulebase[*].uid.

  • For exceptions under an exception group: These can only be found from within Check Point SmartConsole. Navigate to Security Policies > Exceptions, then click Exception Group Name and select Exceptions.

"Layer Name Or UID", "Parent Rule Name Or Number Or UID" and "Exception Group Name Or UID" are optional parameters to run this command.

  • If the threat exception is under a rule, Layer Name Or UID is a required parameter.

    • Run the Show Threat Layers command to obtain Layer Name and UIDs. Layer Names can be found in the returned raw data at the path $.threat-layers[*].name; UIDs can be found at the path $.threat-layers[*].uid.

  • If the threat exception is under an exception group, the Layer Name Or UID parameter must not be defined. Any input value will be omitted.

  • Run the Show Threat Rule Base command to obtain Parent Rule Names, Numbers and UIDs. Rule UIDs can be found in the returned raw data at the path $.rulebase[*].uid; Rule numbers can be found in the returned raw data at the path $.rulebase[*].rule-number. Rule Names can be found in the returned raw data at the path $.rulebase[*].name.

  • Run the Show Exception Groups command to obtain Exception Group Names and UIDs. Exception Group Names can be found in the returned raw data at the path $.objects[*].name; Exception Group UID can be found in the returned raw data at the path $.objects[*].uid.

Alert

  • To set threat exceptions, you must define at least one of the Parent Rule Name Or Number Or UID or the Exception Group Name Or UID parameters, but not both.

  • If your desired threat exception is under a rule, the Layer Name Or UID, Parent Rule Name Or Number Or UID and Exception Name Or UID parameters are required to run this command.

    • Ensure that the values entered for the Layer Name Or UID, Parent Rule Name Or Number Or UID and Exception Name Or UID match. It is suggested to run the Show Threat Layers command to identify the correct layer, and then use that layer to run the Show Threat Rule Base command and select the desired threat rule. Then use your selected threat layer and threat rule to run the Show Threat Rule Exception Rule Base command. If your selected threat layer and threat rule has exceptions (some may not), select your desired exception. Use the threat layer, threat rule and exception as a pair to run this command. Failure to match the values may result in errors.

  • If your desired threat exception is under an exception group instead of a rule, the Exception Group Name Or UID and Exception Name Or UID parameters are required to run this command.

    • For threat exceptions under an exception group, the Layer Name Or UID parameter must not be defined. Any input value will be omitted.

    • Ensure the input threat exception group value matches the threat exception. You can use the threat group you choose to check Check Point SmartConsole. Navigate to Security Policies > Exceptions to view threat exceptions under their corresponding Exception Groups.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Optional

The name or UID of the layer that the rule belongs to. Layer names and UIDs can be obtained using the Show Threat Layers command. If the Parent Rule Name Or Number Or UID parameter is defined, then this parameter is required and the specified rule must match the layer. Otherwise, if the Exception Group Name Or UID parameter is defined, this parameter must not be defined. Any entered value will be omitted.

Standard Threat Prevention

Exception Name Or UID

Required

The name or UID of the exception. If the exception is under a rule, then it can be obtained using the Show Threat Rule Exception Rule Base command; if the exception is under an exception group, then it can only be found from within Check Point SmartConsole.

exception091700b

Parent Rule Name Or Number Or UID

Optional

The name, number or UID of the parent rule. Rule number and UIDs can be obtained using the Show Threat Rule Base command. Note: (1) Only one of the Parent Rule Name Or Number OR UID or Exception Group Name Or UID parameters can be defined per execution of the command, but at least one must be defined. (2) If this parameter is defined, you must define the Layer Name Or UID parameter. Entering a rule and layer that do not match will result in an error.

1

Exception Group Name Or UID

Optional

The name or UID of the exception group. Exception Group names and UIDs can be obtained using the Show Exception Groups command. Note: (1) Only one of the Exception Group Name Or UID or Rule Name Or Number OR UID parameters can be defined per execution of the command, but at least one must be defined. (2) If this parameter is defined, you cannot define the Layer Name Or UID parameter. The value entered for the layer will be omitted.

TestExceptionGroup0917001

New Exception Name

Optional

The new name of the exception.

New Test Exception

Comment

Optional

The comment for the exception.

Test Comment

Track

Optional

The tracking method for protection.

log

Protected Scope

Optional

The name of UIDs or network objects defining the protected scope.

All_Internet

Install On

Optional

The name or UID of the gateways to install the policy on.

Policy Targets

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "ThreatException1210a New Name",
    "type": "threat-exception",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "owner": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "protection-or-site": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Detect",
        "type": "CpmiAntimalwareAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T13:47-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T13:26-0800"
        },
        "creator": "admin"
    },
    "comments": "ThreatException1210aa Change Nam",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "ThreatException1210a New Name",
    "type": "threat-exception",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "owner": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "protection-or-site": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Detect",
        "type": "CpmiAntimalwareAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T13:47-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T13:26-0800"
        },
        "creator": "admin"
    },
    "comments": "ThreatException1210aa Change Nam",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ExceptionUID": "\"***-***-***-***-***\"",
    "ExceptionName": "\"ThreatException1210a New Name\"",
    "Type": "\"threat-exception\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

ThreatException1210a New Name

type

threat-exception

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

owner

***-***-***-***-***

source

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

source-negate

False

destination

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

destination-negate

False

service

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

service-negate

False

protected-scope

  • {'uid': '***-***-***-***-***', 'name': 'All_Internet', 'type': 'address-range', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'ipv4-address-first': '0.0.0.0', 'ipv4-address-last': '255.255.255.255'}

protected-scope-negate

False

protection-or-site

  • {'uid': ***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

track

{'uid': '***-***-***-***-***', 'name': 'Log', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

action

{'uid': '***-***-***-***-***', 'name': 'Detect', 'type': 'CpmiAntimalwareAction', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

meta-info

{'lock': 'locked by current session', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2021-12-10T13:47-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2021-12-10T13:26-0800'}, 'creator': 'admin'}

comments

ThreatException1210aa Change Nam

enabled

True

install-on

  • {'uid': '***-***-***-***-***', 'name': 'Policy Targets', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Set Threat Exception failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: layer can't be used with exception-group-name or exception-group-uid.

Error Sample Data

Set Threat Exception failed.

Status Code: 400.

Message: layer can't be used with exception-group-name or exception-group-uid.

Set Threat Protection

Edits the specified threat protection.

Reader Note

Threat Protection Name Or UID is a required parameter to run this command.

  • Run the Show Threat Protections command to obtain Threat Protection Name Or UID. Threat Protection Name can be found in the returned raw data at the path $.protections[*].name; Threat Protection UID can be found in the returned raw data at the path $.protections[*].uid.

Input

Input Parameter

Required/Optional

Description

Example

Threat Protection Name Or UID

Required

The name or UID of the threat protection. Threat Protection Names and UIDs can be obtained using the Show Threat Protections command.

***-***-***-***-***

Comment

Required

The comment for the threat protection.

Test Comment

Follow Up

Optional

The option to mark the protection with a predefined follow-up flag. The available input options are True or False. Default option is False.

False

Profile

Required

The name of the profile.

Basic

Action

Required

The protection action of the threat protection. The valid actions are Threat Cloud: Inactive, Detect, Prevent Core: Drop, Inactive, Accept.

Inactive

Track

Optional

The tracking method for the threat protection.

Alert

Capture Packets

Optional

The option to capture packets when set to True. The available input options are True or False. Default option is False.

True

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "3Com Network Supervisor Directory Traversal",
    "type": "threat-protection",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "severity": "High",
    "confidence-level": "Medium",
    "performance-impact": "Low",
    "release-date": "20091124",
    "update-date": "20091124",
    "profiles": [
        {
            "name": "Strict",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Prevent",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Prevent",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Basic",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Optimized",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Strict (D3Cyber)",
            "uid": "***-***-***-***-***",
            "default": {
                "track": "log",
                "capture-packets": false
            },
            "override": {
                "action": "Detect",
                "track": "none",
                "capture-packets": true
            },
            "final": {
                "action": "Detect",
                "track": "none",
                "capture-packets": true
            }
        }
    ],
    "comments": "Test comment0918",
    "protection-type": "Threat Cloud",
    "follow-up": true,
    "ipsAdditionalProperties": [
        {
            "name": "Threat Year",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "2005",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Product",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Network Supervisor",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Threat Prevalence",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Obsolete",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Vendor",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "3Com",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Protection Type",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Vulnerability",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Protected Asset",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "SERVER",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Product Prevalence",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Common",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Protection Tuning",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Non-Configurable",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Vulnerability Effect",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Directory Traversal",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "CVSS",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "5.0",
                    "uid": "***-***-***-***-***"
                }
            ]
        }
    ],
    "industry-reference": [
        "CVE-***"
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "3Com Network Supervisor Directory Traversal",
    "type": "threat-protection",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "severity": "High",
    "confidence-level": "Medium",
    "performance-impact": "Low",
    "release-date": "20091124",
    "update-date": "20091124",
    "profiles": [
        {
            "name": "Strict",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Prevent",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Prevent",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Basic",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Optimized",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Strict (D3Cyber)",
            "uid": "***-***-***-***-***",
            "default": {
                "track": "log",
                "capture-packets": false
            },
            "override": {
                "action": "Detect",
                "track": "none",
                "capture-packets": true
            },
            "final": {
                "action": "Detect",
                "track": "none",
                "capture-packets": true
            }
        }
    ],
    "comments": "Test comment0918",
    "protection-type": "Threat Cloud",
    "follow-up": true,
    "ipsAdditionalProperties": [
        {
            "name": "Threat Year",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "2005",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Product",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Network Supervisor",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Threat Prevalence",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Obsolete",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Vendor",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "3Com",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Protection Type",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Vulnerability",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Protected Asset",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "SERVER",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Product Prevalence",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Common",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Protection Tuning",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Non-Configurable",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "Vulnerability Effect",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "Directory Traversal",
                    "uid": "***-***-***-***-***"
                }
            ]
        },
        {
            "name": "CVSS",
            "uid": "***-***-***-***-***",
            "values": [
                {
                    "name": "5.0",
                    "uid": "***-***-***-***-***"
                }
            ]
        }
    ],
    "industry-reference": [
        "CVE-***"
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ThreatProtectionUID": "\"***-***-***-***-***\"",
    "ThreatProtectionName": "\"3Com Network Supervisor Directory Traversal\"",
    "Type": "\"threat-protection\"",
    "Severity": "\"High\"",
    "ConfidenceLevel": "\"Medium\"",
    "PerformanceImpact": "\"Low\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

3Com Network Supervisor Directory Traversal

type

threat-protection

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

severity

High

confidence-level

Medium

performance-impact

Low

release-date

20091124

update-date

20091124

profiles

  • {'name': 'Strict', 'uid': '***-***-***-***-***', 'default': {'action': 'Prevent', 'track': 'log', 'capture-packets': False}, 'final': {'action': 'Prevent', 'track': 'log', 'capture-packets': False}}

  • {'name': 'Basic', 'uid': '***-***-***-***-***', 'default': {'action': 'Inactive', 'track': 'log', 'capture-packets': False}, 'final': {'action': 'Inactive', 'track': 'log', 'capture-packets': False}}

  • {'name': 'Optimized', 'uid': '***-***-***-***-***', 'default': {'action': 'Inactive', 'track': 'log', 'capture-packets': False}, 'final': {'action': 'Inactive', 'track': 'log', 'capture-packets': False}}

  • {'name': 'Strict (D3Cyber)', 'uid': '***-***-***-***-***', 'default': {'track': 'log', 'capture-packets': False}, 'override': {'action': 'Detect', 'track': 'none', 'capture-packets': True}, 'final': {'action': 'Detect', 'track': 'none', 'capture-packets': True}}

comments

Test comment0918

protection-type

Threat Cloud

follow-up

True

ipsAdditionalProperties

  • {'name': 'Threat Year', 'uid': '***-***-***-***-***', 'values': [{'name': '2005', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Product', 'uid': '***-***-***-***-***', 'values': [{'name': 'Network Supervisor', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Threat Prevalence', 'uid': '***-***-***-***-***', 'values': [{'name': 'Obsolete', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Vendor', 'uid': '***-***-***-***-***', 'values': [{'name': '3Com', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Protection Type', 'uid': '***-***-***-***-***', 'values': [{'name': 'Vulnerability', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Protected Asset', 'uid': '***-***-***-***-***', 'values': [{'name': 'SERVER', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Product Prevalence', 'uid': '***-***-***-***-***', 'values': [{'name': 'Common', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Protection Tuning', 'uid': '***-***-***-***-***', 'values': [{'name': 'Non-Configurable', 'uid': '***-***-***-***-***'}]}

  • {'name': 'Vulnerability Effect', 'uid': '***-***-***-***-***', 'values': [{'name': 'Directory Traversal', 'uid': '***-***-***-***-***'}]}

  • {'name': 'CVSS', 'uid': '***-***-***-***-***', 'values': [{'name': '5.0', 'uid': '***-***-***-***-***'}]}

industry-reference

  • CVE-***

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Set Threat Protection failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Set Threat Protection failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Set Threat Rule

Edits the specified threat rule.

Reader Note

"Layer Name Or UID" and "Rule Name Or Number Or UID" are required parameters to run this command.

  • Run the Show Threat Layers command to obtain Layer Names and UIDs. Layer Names can be found in the returned raw data at the path $.threat-layers[*].name; UIDs can be found at the path $.threat-layers[*].uid.

  • Run the Show Threat Rule Base command to obtain Rule Names, Numbers and UIDs. Rule UIDs can be found in the returned raw data at the path $.rulebase[*].uid; Rule numbers can be found in the returned raw data at the path $.rulebase[*].rule-number. Rule Names can be found in the returned raw data at the path $.rulebase[*].name.

Alert

Ensure that the values entered for the Layer Name Or UID and Rule Name Or Number Or UID match. It is suggested to run the Show Threat Layers command to choose the desired layer, and then use that layer to run the Show Threat Rule Base command and select the desired threat rule. Use those pairs to run this command. Failure to match the values may result in errors.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Required

The name or UID of the layer that the threat rules belongs to. Layer names and UIDs can be obtained using the Show Threat Layers command.

Standard Threat Prevention

Rule Name Or Number Or UID

Required

The name, number or UID of the rule. Rule numbers and UIDs can be obtained using the Show Threat Rule Base command.

1

New Rule Name

Optional

The new name for the threat rule.

admin_Testrule21

Comment

Optional

The comment for the rule.

AdminTestComment20

Track

Optional

The tracking method for protection.

None

Action

Optional

The protection action of the threat rule.

Basic

Protected Scope

Optional

The names or UIDs defining the protected scope.

All_Internet

Install On

Optional

The name or UID of the gateways to install the policy on.

Policy Targets

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "admin_Testrule21",
    "type": "threat-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "track": {
        "uid": "***-***-***-***-***",
        "name": "None",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "track-settings": {
        "packet-capture": true
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T09:43-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "creator": "System"
    },
    "comments": "AdminTestComment20",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "admin_Testrule21",
    "type": "threat-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***f",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "track": {
        "uid": "***-***-***-***-***",
        "name": "None",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "track-settings": {
        "packet-capture": true
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "locked by current session",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-10T09:43-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "creator": "System"
    },
    "comments": "AdminTestComment20",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUID": "\"***-***-***-***-***\"",
    "RuleName": "\"admin_Testrule21\"",
    "Type": "\"threat-rule\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

admin_Testrule21

type

threat-rule

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

layer

***-***-***-***-***

source

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

source-negate

False

destination

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

destination-negate

False

service

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

service-negate

False

protected-scope

  • {'uid': '***-***-***-***-***', 'name': 'All_Internet', 'type': 'address-range', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'ipv4-address-first': '0.0.0.0', 'ipv4-address-last': '255.255.255.255'}

protected-scope-negate

False

track

{'uid': '***-***-***-***-***', 'name': 'None', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

track-settings

{'packet-capture': True}

action

{'uid': '***-***-***-***-***', 'name': 'Basic', 'type': 'threat-profile', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

meta-info

{'lock': 'locked by current session', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2021-12-10T09:43-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'creator': 'System'}

comments

AdminTestComment20

enabled

True

install-on

  • {'uid': '***-***-***-***-***', 'name': 'Policy Targets', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Set Threat Rule failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [xxx] not found.

Error Sample Data

Set Threat Rule failed.

Status Code: 404.

Message: Requested object [xxx] not found.

Show Access Layers

Retrieves access layers based on the specified criteria.

Reader Note

If the defined value for the Filter parameter does not match a full or partial layer name, the command will run successfully with no results.

Input

Input Parameter

Required/Optional

Description

Example

Filter

Optional

The partial or full layer name for a free text search to filter access layers.

work

Limit

Optional

The maximum number (up to 100) of rulebase records to return. If the input value is negative or not defined, the default value of 20 will be used.

2

Offset

Optional

The number of matching records to omit initially. The default value is 0.

0

Show Details

Optional

The option to return detailed information when set to True. Selecting False will only return the standard level of information. The default value is False.

False

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "access-layers": [
        {
            "uid": "***-***-***-***-***",
            "name": "Network",
            "type": "access-layer",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "icon": "ApplicationFirewall/rulebase",
            "color": "black"
        }
    ],
    "from": 1,
    "to": 1,
    "total": 1
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "AccessLayerUIDs": "\"[\\r\\n\\\"***-***-***-***-***\\\"\\r\\n]\"",
    "AccessLayerNames": "\"[\\r\\n\\\"Network\\\"\\r\\n]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

ICON

COLOR

***-***-***-***-***

Network

access-layer

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

ApplicationFirewall/rulebase

black

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Access Layers failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Show Access Layers failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Show Application Site Categories

Retrieves the primary categories of applications and sites.

Reader Note

If the defined value for the Filter parameter does not match a category, the command will run successfully with no results.

Input

Input Parameter

Required/Optional

Description

Example

Filter

Optional

The search expression to filter objects by. The provided text should be exactly the same as it would be given in Check Point SmartConsole. The logical operators in the expression ('AND', 'OR') should be provided in capital letters.

Entertainment

Limit

Optional

The maximum number (up to 500) of application primary categories records to return. The default value is 500.

500

Offset

Optional

The number of matching records to omit initially. The default value is 0.

0

Show Details

Optional

The option to return detailed information when set to True. Selecting False will only return the standard level of information. The default value is False.

False

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "objects": [
        {
            "uid": "***-***-***-***-***",
            "name": "Alcohol & Tobacco",
            "type": "application-site-category",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "APPI Data",
                "domain-type": "data domain"
            },
            "icon": "Objects/category",
            "color": "black"
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Anonymizer",
            "type": "application-site-category",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "APPI Data",
                "domain-type": "data domain"
            },
            "icon": "Objects/category",
            "color": "black"
        }
    ],
    "from": 1,
    "to": 2,
    "total": 2
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "CategoryNames": "\"[\\\"Entertainment\\\", \\\"Facebook Entertainment\\\"]\"",
    "CategoryUIDs": "\"[\\\"***-***-***-***-***\\\", \\\"***-***-***-***-***\\\"]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

CODE
No Sample Data

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Application Site Categories failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Show Application Site Categories failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Show Published Changes between a period of time or two sessions

Shows published changes from all user sessions in the database. It is highly recommended to run this command with the Details Level parameter set to Full before running the Install Policy command, in order to check whether all desired changes are already published, or if any incorrect changes have been mistakenly published. The results are ordered from past to recent.

Reader Note

From Session parameter must be a published session. Otherwise, errors will return.

Input

Input Parameter

Required/Optional

Description

Example

Start Time

Optional

The start time from which tracking changes is to be performed. If the time parameters are used, the session parameters will be omitted.

2023-04-03 08:20

End Time

Optional

The end time until which tracking changes is to be performed. If the time parameters are used, the session parameters will be omitted.

2023-04-04 08:20

From Session

Optional

The session UID from which tracking changes is to be performed. The default used is the session before To Session. If the time parameters are used, the session parameters will be omitted.

***-***-***-***-***

To Session

Optional

The session UID until which tracking changes is to be performed. The default used is the last published session. If the time parameters are used, the session parameters will be omitted.

***-***-***-***-***

Details Level

Optional

The level of detail to include for some of the fields in the response. The available options are Standard, UID and Full. The default option is Standard.

Standard

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "tasks": [
        {
            "task-id": "***-***-***-***-***",
            "task-name": "Show Changes",
            "status": "succeeded",
            "progress-percentage": 100,
            "progress-description": "Operation Complete",
            "suppressed": false,
            "task-details": [
                {
                    "limit": 10,
                    "offset": 0,
                    "from": 1,
                    "to": 1,
                    "total": 1,
                    "changes": [
                        {
                            "session": {
                                "session-uid": "***-***-***-***-***",
                                "session-name": "test@2023-04-04",
                                "session-description": "",
                                "user-name": "admin",
                                "published": true,
                                "publish-time": {
                                    "posix": ***,
                                    "iso-8601": "2023-04-04T13:44-0700"
                                },
                                "domain-info": {
                                    "uid": "***-***-***-***-***",
                                    "name": "SMC User",
                                    "domain-type": "domain"
                                }
                            },
                            "operations": {
                                "added-objects": [
                                    {
                                        "uid": "***-***-***-***-***",
                                        "type": "access-rule",
                                        "domain": {
                                            "uid": "***-***-***-***-***",
                                            "name": "SMC User",
                                            "domain-type": "domain"
                                        },
                                        "icon": "Objects/accessRule",
                                        "color": "black"
                                    }
                                ],
                                "modified-objects": [],
                                "deleted-objects": []
                            }
                        }
                    ]
                }
            ]
        }
    ]
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

SESSION

OPERATIONS

{'session-uid': '***-***-***-***-***', 'session-name': 'test@2023-04-04', 'session-description': '', 'user-name': 'admin', 'published': True, 'publish-time': {'posix': ***, 'iso-8601': '2023-04-04T13:44-0700'}, 'domain-info': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}}

{'added-objects': [{'uid': '***-***-***-***-***', 'type': 'access-rule', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'icon': 'Objects/accessRule', 'color': 'black'}], 'modified-objects': [], 'deleted-objects': []}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Published Changes between a period of time or two sessions failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Management server failed to execute command.

Error Sample Data

Show Published Changes between a period of time or two sessions failed.

Status Code: 400.

Message: Management server failed to execute command

Show Exception Group

Retrieves the details of a specified exception group.

Reader Note

  • Exception Group Name Or UID is a required parameter to run this command.

    • Run the Show Exception Groups command to obtain Exception Group Names and UIDs. Exception Group Names can be found in the returned raw data at the path $.objects[*].name; Exception Group UIDs can be found in the returned raw data at the path $.objects[*].uid.

  • For clarification, Show Exception Groups returns all exception groups, while Show Exception Group can only search for one specific exception group.

Input

Input Parameter

Required/Optional

Description

Example

Exception Group Name Or UID

Required

The name or UID of the exception group. Exception Group names and UIDs can be obtained using the Show Exception Groups command.

TestExceptionGroup0917003

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "Global Exceptions",
    "type": "exception-group",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "apply-on": "all-threat-rules",
    "comments": "Out of the box global exception group for threat prevention",
    "color": "black",
    "icon": "ThreatPrevention/Exception_Group_Objects",
    "tags": [],
    "meta-info": {
        "lock": "unlocked",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "last-modifier": "System",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "creator": "System"
    },
    "read-only": false
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "Global Exceptions",
    "type": "exception-group",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "apply-on": "all-threat-rules",
    "comments": "Out of the box global exception group for threat prevention",
    "color": "black",
    "icon": "ThreatPrevention/Exception_Group_Objects",
    "tags": [],
    "meta-info": {
        "lock": "unlocked",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "last-modifier": "System",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "creator": "System"
    },
    "read-only": false
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ExceptionGroupUID": "\"***-***-***-***-***\"",
    "ExceptionGroupName": "\"Global Exceptions\"",
    "Type": "\"exception-group\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

Global Exceptions

type

exception-group

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

apply-on

all-threat-rules

comments

Out of the box global exception group for threat prevention

color

black

icon

ThreatPrevention/Exception_Group_Objects

tags

[]

meta-info

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'last-modifier': 'System', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'creator': 'System'}

read-only

False

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Exception Group failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [xxx] not found.

Error Sample Data

Show Exception Group failed.

Status Code: 404.

Message: Requested object [xxx] not found.

Show Exception Groups

Retrieves a list of all exception groups.

Reader Note

For clarification, Show Exception Groups returns all exception groups, while Show Exception Group can only search for one specific exception group.

Input

N/A

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "objects": [
        {
            "uid": "***-***-***-***-***",
            "name": "Global Exceptions",
            "type": "exception-group",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "apply-on": "all-threat-rules",
            "comments": "Out of the box global exception group for threat prevention",
            "color": "black",
            "icon": "ThreatPrevention/Exception_Group_Objects",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-20T09:43-0800"
                },
                "last-modifier": "System",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-20T09:43-0800"
                },
                "creator": "System"
            },
            "read-only": false
        },
        {
            "uid": "***-***-***-***-***",
            "name": "TestExceptionGroup",
            "type": "exception-group",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "apply-on": "manually-select-threat-rules",
            "color": "black",
            "icon": "ThreatPrevention/Exception_Group_Objects",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2021-12-09T16:14-0800"
                },
                "last-modifier": "admin",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2021-12-09T16:14-0800"
                },
                "creator": "admin"
            },
            "read-only": false
        },
        {
            "uid": "***-***-***-***-***",
            "name": "TestExceptionGroup1210",
            "type": "exception-group",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "apply-on": "manually-select-threat-rules",
            "color": "black",
            "icon": "ThreatPrevention/Exception_Group_Objects",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2021-12-10T12:29-0800"
                },
                "last-modifier": "admin",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2021-12-10T12:29-0800"
                },
                "creator": "admin"
            },
            "read-only": false
        }
    ],
    "from": 1,
    "to": 3,
    "total": 3
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

D3 customizes the Context Data by extracting the data from path $.objects in API returned JSON.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "uid": "***-***-***-***-***",
        "name": "Global Exceptions",
        "type": "exception-group",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "apply-on": "all-threat-rules",
        "comments": "Out of the box global exception group for threat prevention",
        "color": "black",
        "icon": "ThreatPrevention/Exception_Group_Objects",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2020-01-20T09:43-0800"
            },
            "last-modifier": "System",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2020-01-20T09:43-0800"
            },
            "creator": "System"
        },
        "read-only": false
    },
    {
        "uid": "***-***-***-***-***",
        "name": "TestExceptionGroup",
        "type": "exception-group",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "apply-on": "manually-select-threat-rules",
        "color": "black",
        "icon": "ThreatPrevention/Exception_Group_Objects",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2021-12-09T16:14-0800"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2021-12-09T16:14-0800"
            },
            "creator": "admin"
        },
        "read-only": false
    },
    {
        "uid": "***-***-***-***-***",
        "name": "TestExceptionGroup1210",
        "type": "exception-group",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "apply-on": "manually-select-threat-rules",
        "color": "black",
        "icon": "ThreatPrevention/Exception_Group_Objects",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2021-12-10T12:29-0800"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2021-12-10T12:29-0800"
            },
            "creator": "admin"
        },
        "read-only": false
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ExceptionGroupUIDs": "\"[\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\"]\"",
    "ExceptionGroupNames": "\"[\\\"Global Exceptions\\\",\\\"TestExceptionGroup\\\",\\\"TestExceptionGroup1210\\\"]\"",
    "Types": "\"[\\\"exception-group\\\",\\\"exception-group\\\",\\\"exception-group\\\"]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

APPLY-ON

COMMENTS

COLOR

ICON

TAGS

META-INFO

READ-ONLY

***-***-***-***-***

Global Exceptions

exception-group

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

all-threat-rules

Out of the box global exception group for threat prevention

black

ThreatPrevention/Exception_Group_Objects

[]

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'last-modifier': 'System', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'creator': 'System'}

False

***-***-***-***-***

TestExceptionGroup

exception-group

{'uid': '***', 'name': 'SMC User', 'domain-type': 'domain'}

manually-select-threat-rules

black

ThreatPrevention/Exception_Group_Objects

[]

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2021-12-09T16:14-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2021-12-09T16:14-0800'}, 'creator': 'admin'}

False

***-***-***-***-***

TestExceptionGroup1210

exception-group

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

manually-select-threat-rules

black

ThreatPrevention/Exception_Group_Objects

[]

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2021-12-10T12:29-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2021-12-10T12:29-0800'}, 'creator': 'admin'}

False

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Error Sample Data

Show Exception Groups failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Show Logs

Retrieves log information matching the specified criteria. Note: This command is available for Check Point's Management API version 1.6.1 or above.

Input

Input Parameter

Required/Optional

Description

Example

Start Time

Required

The start time of the time range to query logs in UTC time.

2023-02-01 00:00

End Time

Required

The end time of the time range to query logs in UTC time.

2023-02-02 00:00

Limit

Optional

The maximum number (between 1 and 100) of logs to return. The default value is 100.

10

Log Servers

Optional

The IPs of the log servers to query. If this parameter is not defined, all log servers will be returned.

[ "1.1.1.1" ]

Log Type

Optional

The type of logs (i.e. Logs or Audit Logs) to return. The default option is Logs.

Logs

Filter

Optional

The SmartConsole and SmartView query to filter search results. See SmartConsole and SmartView Query Language for more information about the query syntax.

severity:Medium

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "logs": [
        {
            "product": "Firewall",
            "sequencenum": "1",
            "i_f_dir": "inbound",
            "id_generated_by_indexer": "false",
            "type": "Alert",
            "__interface": "daemon",
            "orig_log_server_attr": [
                {
                    "isCHKPObject": "true",
                    "uuid": "***-***-***-***-***",
                    "resolved": "gw-***"
                }
            ],
            "log_sys_message": "Low disk space in directory /opt/CPsuite-R81.10/fw1/log/: only 742.6 Mbytes left",
            "orig_log_server": "1.1.1.1",
            "orig": "gw-***",
            "marker": "@A***62",
            "calc_desc": "Traffic",
            "id": "***-***-***-***-***",
            "time": "2022-02-22T18:11:49Z",
            "i_f_name": "daemon",
            "first": "true"
        }
    ],
    "logs-count": 1,
    "query-id": "***-***-***-***-***"
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

D3 customizes the Context Data by extracting the data from path $.logs in API returned JSON.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "product": "Firewall",
        "sequencenum": "1",
        "i_f_dir": "inbound",
        "id_generated_by_indexer": "false",
        "type": "Alert",
        "__interface": "daemon",
        "orig_log_server_attr": [
            {
                "isCHKPObject": "true",
                "uuid": "***-***-***-***-***",
                "resolved": "gw-***"
            }
        ],
        "log_sys_message": "Low disk space in directory /opt/CPsuite-R81.10/fw1/log/: only 742.6 Mbytes left",
        "orig_log_server": "1.1.1.1",
        "orig": "gw-***",
        "marker": "@A***62",
        "calc_desc": "Traffic",
        "id": "***-***-***-***-***",
        "time": "2022-02-22T18:11:49Z",
        "i_f_name": "daemon",
        "first": "true"
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "IDs": "\"[ \\\"***-***-***-***-***\\\"]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

PRODUCT

SEQUENCENUM

I_F_DIR

ID_GENERATED_BY_INDEXER

TYPE

__INTERFACE

ORIG_LOG_SERVER_ATTR

LOG_SYS_MESSAGE

ORIG_LOG_SERVER

ORIG

MARKER

CALC_DESC

ID

TIME

I_F_NAME

FIRST

Firewall

1

inbound

false

Alert

daemon

[{'isCHKPObject': 'true', 'uuid': '***-***-***-***-***', 'resolved': 'gw-***'}]

Low disk space in directory /opt/CPsuite-R81.10/fw1/log/: only 742.6 Mbytes left

1.1.1.1

gw-***

@A@***@262

Traffic

***-***-***-***-***

2022-02-22T18:11:49Z

daemon

true

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Logs failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Invalid filter - missing open/close quote.

Error Sample Data

Show Logs failed.

Status Code: 400.

Message: Invalid filter - missing open/close quote.

Show Policy Packages

Retrieves all policy package objects.

Input

N/A

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "packages": [
        {
            "uid": "***-***-***-***-***",
            "name": "custom_policy_package",
            "type": "package",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "icon": "Blades/Access",
            "color": "black"
        }
    ],
    "from": 1,
    "to": 1,
    "total": 1
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "packageUIDs": "\"[\\n\\\"***-***-***-***-***\\\"\\n]\"",
    "packageNames": "\"[\\n\\\"custom_policy_package\\\"\\n]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

CODE
No Sample Data

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Policy Packages failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Show Policy Packages failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Show Session Objects

Retrieves session objects.

Input

Input Parameter

Required/Optional

Description

Example

Session UIDs

Optional

The session UIDs to check. When this parameter is defined, Application Type will be omitted.

[

"***-***-***-***-***"

]

Application Type

Optional

The application type which the sessions are generated from. When Session UIDs is defined, this parameter will be omitted.

Web API

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "objects": [
        {
            "uid": "***-***-***-***-***",
            "type": "session",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "state": "open",
            "user-name": "admin",
            "description": "",
            "last-login-time": {
                "posix": ***,
                "iso-8601": "2023-04-05T12:03-0700"
            },
            "expired-session": false,
            "application": "***",
            "changes": 0,
            "in-work": true,
            "ip-address": "1.1.1.1",
            "locks": 0,
            "connection-mode": "read write",
            "session-timeout": 600,
            "comments": "",
            "color": "black",
            "icon": "Objects/worksession",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2023-04-05T12:03-0700"
                },
                "last-modifier": "admin",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2023-04-05T12:03-0700"
                },
                "creator": "admin"
            },
            "read-only": false
        }
    ],
    "from": 1,
    "to": 1,
    "total": 1
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "Applications": "\"[\\\"***-***-***-***-***\\\"]\"",
    "SessioinUIDs": "\"[\\\"***\\\"]\"",
    "InWorkState": "\"[ true ]\"",
    "Expired": "\"[ false ]\"",
    "ReadOnly": "\"[ false ]\""
}
Return Data

Indicates one of the possible command execution states: Successful, Partially Successful, or Failed.

The Partially Successful state only occurs when a command’s input accepts an array of items (e.g. an array of IP addresses) and one or more items within the array return an error from the API request.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

STATE

USER-NAME

EXPIRED-SESSION

APPLICATION

CHANGES

IN-WORK

IP-ADDRESS

LOCKS

CONNECTION-MODE

SESSION-TIMEOUT

READ-ONLY

***-***-***-***-***

open

admin

False


0

True

1.1.1.1

0

read write

600

F

Error Handling

If the Return Data is Partially Successful or Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Session Objects failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Invalid parameter for [uid]. The invalid value.

Error Sample Data

Show Session Objects failed.

Status Code: 400.

Message: Invalid parameter for [uid]. The invalid value.

Show Threat Exception

Shows the details of the specified threat exception.

Reader Note

Exception Name Or UID is a required parameter to run this command.

  • For exceptions under a rule: Run the Show Threat Rule Exception Rule Base command to obtain Exception Name Or UID. Exception Names can be found in the returned raw data at the path $.rulebase[*].name; Exception UID can be found in the returned raw data at the path $.rulebase[*].uid.

  • For exceptions under an exception group: These can only be found from within Check Point SmartConsole. Navigate to Security Policies > Exceptions, then click Exception Group Name and select Exceptions.

"Layer Name Or UID", "Rule Name Or Number Or UID" and "Exception Group Name Or UID" are optional parameters to run this command.

  • If the threat exception is under a rule, Layer Name Or UID is a required parameter.

    • Run the Show Threat Layers command to obtain Layer Name and UIDs. Layer Names can be found in the returned raw data at the path $.threat-layers[*].name; UIDs can be found at the path $.threat-layers[*].uid.

  • If the threat exception is under an exception group, the Layer Name Or UID parameter must not be defined. Any input value will be omitted.

  • Run the Show Threat Rule Base command to obtain Rule Names, Numbers and UIDs. Rule UIDs can be found in the returned raw data at the path $.rulebase[*].uid; Rule numbers can be found in the returned raw data at the path $.rulebase[*].rule-number. Rule Names can be found in the returned raw data at the path $.rulebase[*].name.

  • Run the Show Exception Groups command to obtain Exception Group Names and UIDs. Exception Group Names can be found in the returned raw data at the path $.objects[*].name; Exception Group UID can be found in the returned raw data at the path $.objects[*].uid.

Alert

  • To show threat exceptions, you must define at least one of the Parent Rule Name Or Number Or UID or the Exception Group Name Or UID parameters, but not both.

  • If your desired threat exception is under a rule, the Layer Name Or UID, Parent Rule Name Or Number Or UID and Exception Name Or UID parameters are required to run this command.

    • Ensure that the values entered for the Layer Name Or UID, Parent Rule Name Or Number Or UID and Exception Name Or UID match. It is suggested to run the Show Threat Layers command to identify the correct layer, and then use that layer to run the Show Threat Rule Base command and select the desired threat rule. Then use your selected threat layer and threat rule to run the Show Threat Rule Exception Rule Base command. If your selected threat layer and threat rule has exceptions (some may not), select your desired exception. Use the threat layer, threat rule and exception as a pair to run this command. Failure to match the values may result in errors.

  • If your desired threat exception is under an exception group instead of a rule, the Exception Group Name Or UID and Exception Name Or UID parameters are required to run this command.

    • For threat exceptions under an exception group, the Layer Name Or UID parameter must not be defined. Any input value will be omitted.

    • Ensure the input exception group value matches the threat exception. You can use the threat group you choose to check Check Point SmartConsole. Navigate to Security Policies > Exceptions to view threat exceptions under their corresponding Exception Groups.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Optional

The name or UID of the layer that the rule belongs to. Layer names and UIDs can be obtained using the Show Threat Layers command. If the Parent Rule Name Or Number Or UID parameter is defined, then this parameter is required and the specified rule must match the layer. Otherwise, if the Exception Group Name Or UID parameter is defined, this parameter must not be defined. Any entered value will be omitted.

Standard Threat Prevention

Parent Rule Name Or Number Or UID

Optional

The name, number or UID of the rule. Rule numbers and UIDs can be obtained using the Show Threat Rule Base command. Note: (1) Only one of the Parent Rule Name Or Number OR UID or Exception Group Name Or UID parameters can be defined per execution of the command, but at least one must be defined. (2) If this parameter is defined, you must define the Layer Name Or UID parameter. Entering a rule and layer that do not match will result in an error.

***-***-***-***-***

Exception Group Name Or UID

Optional

The name or UID of the exception group. Exception Group names and UIDs can be obtained using the Show Exception Groups command. (1) Only one of the Exception Group Name Or UID or Parent Rule Name Or Number OR UID parameters can be defined per execution of the command, but at least one must be defined. (2) If this parameter is defined, you cannot define the Layer Name Or UID parameter. The value entered for the layer will be omitted.

TestExceptionGroup

Exception Name Or UID

Required

The name or UID of the exception. If the exception is under a rule, then it can be obtained using the Show Threat Rule Exception Rule Base command; if the exception is under an exception group, then it can only be found from within Check Point SmartConsole.

exception091700b

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "TestException002",
    "type": "threat-exception",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "owner": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "protection-or-site": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Detect",
        "type": "CpmiAntimalwareAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "unlocked",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T16:15-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T16:15-0800"
        },
        "creator": "admin"
    },
    "comments": "test0917001 ",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "TestException002",
    "type": "threat-exception",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "owner": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "All_Internet",
            "type": "address-range",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ipv4-address-first": "0.0.0.0",
            "ipv4-address-last": "255.255.255.255"
        }
    ],
    "protected-scope-negate": false,
    "protection-or-site": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Detect",
        "type": "CpmiAntimalwareAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "unlocked",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T16:15-0800"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2021-12-09T16:15-0800"
        },
        "creator": "admin"
    },
    "comments": "test0917001 ",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ExceptionUID": "\"***-***-***-***-***\"",
    "ExceptionName": "\"TestException002\"",
    "Type": "\"threat-exception\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

TestException002

type

threat-exception

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

owner

***-***-***-***-***

source

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

source-negate

False

destination

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

destination-negate

False

service

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

service-negate

False

protected-scope

  • {'uid': '***-***-***-***-***', 'name': 'All_Internet', 'type': 'address-range', 'domain': {'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}, 'ipv4-address-first': '0.0.0.0', 'ipv4-address-last': '255.255.255.255'}

protected-scope-negate

False

protection-or-site

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

track

{'uid': '***-***-***-***-***', 'name': 'Log', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

action

{'uid': '***-***-***-***-***', 'name': 'Detect', 'type': 'CpmiAntimalwareAction', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

meta-info

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2021-12-09T16:15-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2021-12-09T16:15-0800'}, 'creator': 'admin'}

comments

test0917001

enabled

True

install-on

  • {'uid': '***-***-***-***-***', 'name': 'Policy Targets', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Exception failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [test1doc] not found.

Error Sample Data

Show Threat Exception failed.

Status Code: 404.

Message: Requested object [test1doc] not found.

Show Threat Layers

Retrieves all threat layers.

Input

N/A

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "threat-layers": [
        {
            "uid": "***-***-***-***-***",
            "name": "IPS",
            "type": "threat-layer",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ips-layer": true,
            "comments": "",
            "color": "black",
            "icon": "ApplicationFirewall/sharedrulebase",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-20T09:43-0800"
                },
                "last-modifier": "System",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-20T09:43-0800"
                },
                "creator": "System"
            },
            "read-only": false
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Standard Threat Prevention",
            "type": "threat-layer",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "ips-layer": false,
            "comments": "",
            "color": "black",
            "icon": "ApplicationFirewall/rulebase",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-20T09:43-0800"
                },
                "last-modifier": "System",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-20T09:43-0800"
                },
                "creator": "System"
            },
            "read-only": false
        }
    ],
    "from": 1,
    "to": 2,
    "total": 2
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

D3 customizes the Context Data by extracting the data from path $.threat-layers in API returned JSON.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "uid": "***-***-***-***-***",
        "name": "IPS",
        "type": "threat-layer",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "ips-layer": true,
        "comments": "",
        "color": "black",
        "icon": "ApplicationFirewall/sharedrulebase",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2020-01-20T09:43-0800"
            },
            "last-modifier": "System",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2020-01-20T09:43-0800"
            },
            "creator": "System"
        },
        "read-only": false
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Standard Threat Prevention",
        "type": "threat-layer",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "ips-layer": false,
        "comments": "",
        "color": "black",
        "icon": "ApplicationFirewall/rulebase",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2020-01-20T09:43-0800"
            },
            "last-modifier": "System",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2020-01-20T09:43-0800"
            },
            "creator": "System"
        },
        "read-only": false
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ThreatLayerUIDs": "\"[\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\"]\"",
    "ThreatLayerNames": "\"[\\\"IPS\\\",\\\"Standard Threat Prevention\\\"]\"",
    "Types": "\"[\\\"threat-layer\\\",\\\"threat-layer\\\"]\"",
    "IPSLayers": "\"[true,false]\"",
    "ReadOnly": "\"[false,false]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

IPS-LAYER

COMMENTS

COLOR

ICON

TAGS

META-INFO

READ-ONLY

***-***-***-***-***

IPS

threat-layer

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

True

black

ApplicationFirewall/sharedrulebase

[]

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'last-modifier': 'System', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'creator': 'System'}

False

***-***-***-***-***

Standard Threat Prevention

threat-layer

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

False

black

ApplicationFirewall/rulebase

[]

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'last-modifier': 'System', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'creator': 'System'}

False

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Layers failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Show Threat Layers failed.

Status Code: 404.

Message: Please double check the Server URL, the Username and password.

Show Threat Profiles

Retrieves all threat profiles.

Input

N/A

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "profiles": [
        {
            "uid": "***-***-***-***-***",
            "name": "Basic",
            "type": "threat-profile",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "active-protections-performance-impact": "medium",
            "active-protections-severity": "High",
            "confidence-level-low": "Inactive",
            "confidence-level-medium": "Inactive",
            "confidence-level-high": "Prevent",
            "ips": true,
            "ips-settings": {
                "newly-updated-protections": "active",
                "exclude-protection-with-performance-impact": false,
                "exclude-protection-with-severity": false
            },
            "malicious-mail-policy-settings": {
                "email-action": "allow",
                "remove-attachments-and-links": true,
                "malicious-attachments-text": "Malicious email attachment '$filename$' removed by Check Point.",
                "failed-to-scan-attachments-text": "Email attachment '$filename$' failed to be scanned and removed by Check Point.",
                "malicious-links-text": "[Check Point] Malicious link: $neutralized_url$ [Check Point]",
                "add-x-header-to-email": false,
                "add-email-subject-prefix": false,
                "email-subject-prefix-text": "Attachment was found malicious. It is recommended not to open this mail.",
                "add-customized-text-to-email-body": false,
                "email-body-customized-text": "[Check Point]The following verdicts were determined by Check Point:$verdicts$[Check Point]",
                "send-copy": false
            },
            "scan-malicious-links": {
                "max-bytes": 5000000,
                "max-links": 50
            },
            "threat-emulation": false,
            "anti-virus": false,
            "anti-bot": false,
            "overrides": [],
            "use-extended-attributes": true,
            "extended-attributes-to-deactivate": [
                {
                    "name": "Protocol",
                    "uid": "***-***-***-***-***,
                    "values": [
                        {
                            "name": "HTTP",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                },
                {
                    "name": "Protection Tuning",
                    "uid": "***-***-***-***-***",
                    "values": [
                        {
                            "name": "Configurable",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                },
                {
                    "name": "Protected Asset",
                    "uid": "***-***-***-***-***",
                    "values": [
                        {
                            "name": "CLIENT",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                },
                {
                    "name": "Threat Prevalence",
                    "uid": "***-***-***-***-***",
                    "values": [
                        {
                            "name": "Obsolete",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                }
            ],
            "extended-attributes-to-activate": [
                {
                    "name": "Product Prevalence",
                    "uid": "***-***-***-***-***",
                    "values": [
                        {
                            "name": "Common",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                }
            ],
            "use-indicators": true,
            "indicator-overrides": [],
            "comments": "Provides reliable protection on a variety of non-HTTP protocols for servers, with minimal performance impact.",
            "color": "black",
            "icon": "Profiles/profile",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-19T23:39-0800"
                },
                "last-modifier": "System",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-19T23:39-0800"
                },
                "creator": "System"
            },
            "read-only": false
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Optimized",
            "type": "threat-profile",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            },
            "active-protections-performance-impact": "medium",
            "active-protections-severity": "Medium or above",
            "confidence-level-low": "Detect",
            "confidence-level-medium": "Prevent",
            "confidence-level-high": "Prevent",
            "ips": true,
            "ips-settings": {
                "newly-updated-protections": "active",
                "exclude-protection-with-performance-impact": false,
                "exclude-protection-with-severity": false
            },
            "malicious-mail-policy-settings": {
                "email-action": "allow",
                "remove-attachments-and-links": true,
                "malicious-attachments-text": "Malicious email attachment '$filename$' removed by Check Point.",
                "failed-to-scan-attachments-text": "Email attachment '$filename$' failed to be scanned and removed by Check Point.",
                "malicious-links-text": "[Check Point] Malicious link: $neutralized_url$ [Check Point]",
                "add-x-header-to-email": false,
                "add-email-subject-prefix": false,
                "email-subject-prefix-text": "Attachment was found malicious. It is recommended not to open this mail.",
                "add-customized-text-to-email-body": false,
                "email-body-customized-text": "[Check Point]The following verdicts were determined by Check Point:$verdicts$[Check Point]",
                "send-copy": false
            },
            "scan-malicious-links": {
                "max-bytes": 5000000,
                "max-links": 50
            },
            "threat-emulation": true,
            "anti-virus": true,
            "anti-bot": true,
            "overrides": [],
            "use-extended-attributes": true,
            "extended-attributes-to-deactivate": [
                {
                    "name": "Threat Prevalence",
                    "uid": "***-***-***-***-***",
                    "values": [
                        {
                            "name": "Rare",
                            "uid": "***-***-***-***-***"
                        },
                        {
                            "name": "Obsolete",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                }
            ],
            "extended-attributes-to-activate": [
                {
                    "name": "Product Prevalence",
                    "uid": "***-***-***-***-***",
                    "values": [
                        {
                            "name": "Common",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                }
            ],
            "use-indicators": true,
            "indicator-overrides": [],
            "comments": "Provides excellent protection for all common network products and protocols against recent or popular attacks.",
            "color": "black",
            "icon": "Profiles/profile",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-19T23:39-0800"
                },
                "last-modifier": "System",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-19T23:39-0800"
                },
                "creator": "System"
            },
            "read-only": false
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Strict (D3Cyber)",
            "type": "threat-profile",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "active-protections-performance-impact": "high",
            "active-protections-severity": "Low or above",
            "confidence-level-low": "Detect",
            "confidence-level-medium": "Detect",
            "confidence-level-high": "Detect",
            "ips": true,
            "ips-settings": {
                "newly-updated-protections": "active",
                "exclude-protection-with-performance-impact": false,
                "exclude-protection-with-severity": false
            },
            "malicious-mail-policy-settings": {
                "email-action": "allow",
                "remove-attachments-and-links": true,
                "malicious-attachments-text": "Malicious email attachment '$filename$' removed by Check Point.",
                "failed-to-scan-attachments-text": "Email attachment '$filename$' failed to be scanned and removed by Check Point.",
                "malicious-links-text": "[Check Point] Malicious link: $neutralized_url$ [Check Point]",
                "add-x-header-to-email": false,
                "add-email-subject-prefix": false,
                "email-subject-prefix-text": "Attachment was found malicious. It is recommended not to open this mail.",
                "add-customized-text-to-email-body": false,
                "email-body-customized-text": "[Check Point]The following verdicts were determined by Check Point:$verdicts$[Check Point]",
                "send-copy": false
            },
            "scan-malicious-links": {
                "max-bytes": 5000000,
                "max-links": 50
            },
            "threat-emulation": true,
            "anti-virus": true,
            "anti-bot": true,
            "overrides": [],
            "use-extended-attributes": true,
            "extended-attributes-to-deactivate": [],
            "extended-attributes-to-activate": [
                {
                    "name": "Any",
                    "uid": "***-***-***-***-***",
                    "values": [
                        {
                            "name": "Any",
                            "uid": "***-***-***-***-***"
                        }
                    ]
                }
            ],
            "use-indicators": true,
            "indicator-overrides": [],
            "comments": "Provide very wide coverage for all products and protocols, with noticeable performance impact.",
            "color": "black",
            "icon": "Profiles/profile",
            "tags": [],
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2020-03-26T13:28-0700"
                },
                "last-modifier": "admin",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2020-03-26T13:26-0700"
                },
                "creator": "admin"
            },
            "read-only": false
        }
    ],
    "from": 1,
    "to": 4,
    "total": 4
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

D3 customizes the Context Data by extracting the data from path $.profiles in API returned JSON.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        },
        "active-protections-performance-impact": "medium",
        "active-protections-severity": "High",
        "confidence-level-low": "Inactive",
        "confidence-level-medium": "Inactive",
        "confidence-level-high": "Prevent",
        "ips": true,
        "ips-settings": {
            "newly-updated-protections": "active",
            "exclude-protection-with-performance-impact": false,
            "exclude-protection-with-severity": false
        },
        "malicious-mail-policy-settings": {
            "email-action": "allow",
            "remove-attachments-and-links": true,
            "malicious-attachments-text": "Malicious email attachment '$filename$' removed by Check Point.",
            "failed-to-scan-attachments-text": "Email attachment '$filename$' failed to be scanned and removed by Check Point.",
            "malicious-links-text": "[Check Point] Malicious link: $neutralized_url$ [Check Point]",
            "add-x-header-to-email": false,
            "add-email-subject-prefix": false,
            "email-subject-prefix-text": "Attachment was found malicious. It is recommended not to open this mail.",
            "add-customized-text-to-email-body": false,
            "email-body-customized-text": "[Check Point]The following verdicts were determined by Check Point:$verdicts$[Check Point]",
            "send-copy": false
        },
        "scan-malicious-links": {
            "max-bytes": 5000000,
            "max-links": 50
        },
        "threat-emulation": false,
        "anti-virus": false,
        "anti-bot": false,
        "overrides": [],
        "use-extended-attributes": true,
        "extended-attributes-to-deactivate": [
            {
                "name": "Protocol",
                "uid": "***-***-***-***-***,
                "values": [
                    {
                        "name": "HTTP",
                        "uid": "***-***-***-***-***"
                    }
                ]
            },
            {
                "name": "Protection Tuning",
                "uid": "***-***-***-***-***",
                "values": [
                    {
                        "name": "Configurable",
                        "uid": "***-***-***-***-***"
                    }
                ]
            },
            {
                "name": "Protected Asset",
                "uid": "***-***-***-***-***",
                "values": [
                    {
                        "name": "CLIENT",
                        "uid": "***-***-***-***-***"
                    }
                ]
            },
            {
                "name": "Threat Prevalence",
                "uid": "***-***-***-***-***",
                "values": [
                    {
                        "name": "Obsolete",
                        "uid": "***-***-***-***-***"
                    }
                ]
            }
        ],
        "extended-attributes-to-activate": [
            {
                "name": "Product Prevalence",
                "uid": "***-***-***-***-***",
                "values": [
                    {
                        "name": "Common",
                        "uid": "***-***-***-***-***"
                    }
                ]
            }
        ],
        "use-indicators": true,
        "indicator-overrides": [],
        "comments": "Provides reliable protection on a variety of non-HTTP protocols for servers, with minimal performance impact.",
        "color": "black",
        "icon": "Profiles/profile",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2020-01-19T23:39-0800"
            },
            "last-modifier": "System",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2020-01-19T23:39-0800"
            },
            "creator": "System"
        },
        "read-only": false
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Optimized",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        },
        "active-protections-performance-impact": "medium",
        "active-protections-severity": "Medium or above",
        "confidence-level-low": "Detect",
        "confidence-level-medium": "Prevent",
        "confidence-level-high": "Prevent",
        "ips": true,
        "ips-settings": {
            "newly-updated-protections": "active",
            "exclude-protection-with-performance-impact": false,
            "exclude-protection-with-severity": false
        },
        "malicious-mail-policy-settings": {
            "email-action": "allow",
            "remove-attachments-and-links": true,
            "malicious-attachments-text": "Malicious email attachment '$filename$' removed by Check Point.",
            "failed-to-scan-attachments-text": "Email attachment '$filename$' failed to be scanned and removed by Check Point.",
            "malicious-links-text": "[Check Point] Malicious link: $neutralized_url$ [Check Point]",
            "add-x-header-to-email": false,
            "add-email-subject-prefix": false,
            "email-subject-prefix-text": "Attachment was found malicious. It is recommended not to open this mail.",
            "add-customized-text-to-email-body": false,
            "email-body-customized-text": "[Check Point]The following verdicts were determined by Check Point:$verdicts$[Check Point]",
            "send-copy": false
        },
        "scan-malicious-links": {
            "max-bytes": 5000000,
            "max-links": 50
        },
        "threat-emulation": true,
        "anti-virus": true,
        "anti-bot": true,
        "overrides": [],
        "use-extended-attributes": true,
        "extended-attributes-to-deactivate": [
            {
                "name": "Threat Prevalence",
                "uid": "***-***-***-***-***",
                "values": [
                    {
                        "name": "Rare",
                        "uid": "***-***-***-***-***"
                    },
                    {
                        "name": "Obsolete",
                        "uid": "***-***-***-***-***"
                    }
                ]
            }
        ],
        "extended-attributes-to-activate": [
            {
                "name": "Product Prevalence",
                "uid": "***-***-***-***-***",
                "values": [
                    {
                        "name": "Common",
                        "uid": "***-***-***-***-***"
                    }
                ]
            }
        ],
        "use-indicators": true,
        "indicator-overrides": [],
        "comments": "Provides excellent protection for all common network products and protocols against recent or popular attacks.",
        "color": "black",
        "icon": "Profiles/profile",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2020-01-19T23:39-0800"
            },
            "last-modifier": "System",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2020-01-19T23:39-0800"
            },
            "creator": "System"
        },
        "read-only": false
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Strict (D3Cyber)",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "active-protections-performance-impact": "high",
        "active-protections-severity": "Low or above",
        "confidence-level-low": "Detect",
        "confidence-level-medium": "Detect",
        "confidence-level-high": "Detect",
        "ips": true,
        "ips-settings": {
            "newly-updated-protections": "active",
            "exclude-protection-with-performance-impact": false,
            "exclude-protection-with-severity": false
        },
        "malicious-mail-policy-settings": {
            "email-action": "allow",
            "remove-attachments-and-links": true,
            "malicious-attachments-text": "Malicious email attachment '$filename$' removed by Check Point.",
            "failed-to-scan-attachments-text": "Email attachment '$filename$' failed to be scanned and removed by Check Point.",
            "malicious-links-text": "[Check Point] Malicious link: $neutralized_url$ [Check Point]",
            "add-x-header-to-email": false,
            "add-email-subject-prefix": false,
            "email-subject-prefix-text": "Attachment was found malicious. It is recommended not to open this mail.",
            "add-customized-text-to-email-body": false,
            "email-body-customized-text": "[Check Point]The following verdicts were determined by Check Point:$verdicts$[Check Point]",
            "send-copy": false
        },
        "scan-malicious-links": {
            "max-bytes": 5000000,
            "max-links": 50
        },
        "threat-emulation": true,
        "anti-virus": true,
        "anti-bot": true,
        "overrides": [],
        "use-extended-attributes": true,
        "extended-attributes-to-deactivate": [],
        "extended-attributes-to-activate": [
            {
                "name": "Any",
                "uid": "***-***-***-***-***",
                "values": [
                    {
                        "name": "Any",
                        "uid": "***-***-***-***-***"
                    }
                ]
            }
        ],
        "use-indicators": true,
        "indicator-overrides": [],
        "comments": "Provide very wide coverage for all products and protocols, with noticeable performance impact.",
        "color": "black",
        "icon": "Profiles/profile",
        "tags": [],
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2020-03-26T13:28-0700"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2020-03-26T13:26-0700"
            },
            "creator": "admin"
        },
        "read-only": false
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ThreatProfileUIDs": "\"[\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\"]\"",
    "ThreatProfileNames": "\"[\\\"Basic\\\",\\\"Optimized\\\",\\\"Strict\\\",\\\"Strict (D3Cyber)\\\"]\"",
    "Types": "\"[\\\"threat-profile\\\",\\\"threat-profile\\\",\\\"threat-profile\\\",\\\"threat-profile\\\"]\"",
    "ActiveProtectionsPerformanceImpacts": "\"[\\\"medium\\\",\\\"medium\\\",\\\"high\\\",\\\"high\\\"]\"",
    "ActiveProtectionsSeverities": "\"[\\\"High\\\",\\\"Medium or above\\\",\\\"Low or above\\\",\\\"Low or above\\\"]\"",
    "ConfidenceLevelLows": "\"[\\\"Inactive\\\",\\\"Detect\\\",\\\"Detect\\\",\\\"Detect\\\"]\"",
    "ConfidenceLevelMediums": "\"[\\\"Inactive\\\",\\\"Prevent\\\",\\\"Prevent\\\",\\\"Detect\\\"]\"",
    "ConfidenceLevelHighs": "\"[\\\"Prevent\\\",\\\"Prevent\\\",\\\"Prevent\\\",\\\"Detect\\\"]\"",
    "IPS": "\"[true,true,true,true]\"",
    "AntiViruses": "\"[false,true,true,true]\"",
    "AntiBots": "\"[false,true,true,true]\"",
    "UseIndicators": "\"[true,true,true,true]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

ACTIVE-PROTECTIONS-PERFORMANCE-IMPACT

ACTIVE-PROTECTIONS-SEVERITY

CONFIDENCE-LEVEL-LOW

CONFIDENCE-LEVEL-MEDIUM

CONFIDENCE-LEVEL-HIGH

IPS

IPS-SETTINGS

MALICIOUS-MAIL-POLICY-SETTINGS

SCAN-MALICIOUS-LINKS

THREAT-EMULATION

ANTI-VIRUS

ANTI-BOT

OVERRIDES

USE-EXTENDED-ATTRIBUTES

EXTENDED-ATTRIBUTES-TO-DEACTIVATE

EXTENDED-ATTRIBUTES-TO-ACTIVATE

USE-INDICATORS

INDICATOR-OVERRIDES

COMMENTS

COLOR

ICON

TAGS

META-INFO

READ-ONLY

***-***-***-***-***

Basic

threat-profile

{'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}

medium

High

Inactive

Inactive

Prevent

True

{'newly-updated-protections': 'active', 'exclude-protection-with-performance-impact': False, 'exclude-protection-with-severity': False}

{'email-action': 'allow', 'remove-attachments-and-links': True, 'malicious-attachments-text': "Malicious email attachment '$filename$' removed by Check Point.", 'failed-to-scan-attachments-text': "Email attachment '$filename$' failed to be scanned and removed by Check Point.", 'malicious-links-text': '[Check Point] Malicious link: $neutralized_url$ [Check Point]', 'add-x-header-to-email': False, 'add-email-subject-prefix': False, 'email-subject-prefix-text': 'Attachment was found malicious. It is recommended not to open this mail.', 'add-customized-text-to-email-body': False, 'email-body-customized-text': '[Check Point]
The following verdicts were determined by Check Point:
$verdicts$
[Check Point]', 'send-copy': False}

{'max-bytes': 5000000, 'max-links': 50}

False

False

False

[]

True

[{'name': 'Protocol', 'uid': '***-***-***-***-***', 'values': [{'name': 'HTTP', 'uid': '***-***-***-***-***'}]}, {'name': 'Protection Tuning', 'uid': '***-***-***-***-***', 'values': [{'name': 'Configurable', 'uid': '***-***-***-***-***'}]}, {'name': 'Protected Asset', 'uid': '***-***-***-***-***', 'values': [{'name': 'CLIENT', 'uid': '***-***-***-***-***'}]}, {'name': 'Threat Prevalence', 'uid': '***-***-***-***-***', 'values': [{'name': 'Obsolete', 'uid': '***-***-***-***-***'}]}]

[{'name': 'Product Prevalence', 'uid': '***-***-***-***-***', 'values': [{'name': 'Common', 'uid': '***-***-***-***-***'}]}]

True

[]

Provides reliable protection on a variety of non-HTTP protocols for servers, with minimal performance impact.

black

Profiles/profile

[]

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2020-01-19T23:39-0800'}, 'last-modifier': 'System', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-19T23:39-0800'}, 'creator': 'System'}

False

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Profiles failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Show Threat Profiles failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Show Threat Protection

Returns the details of the specified threat protection.

Rreader Note

Threat Protection Name Or UID is a required parameter to run this command.

  • Run the Show Threat Protections command to obtain Threat Protection Name Or UID. Threat Protection name can be found in the returned raw data under path $.protections.name; Threat Protection UID can be found in the returned raw data under path $.protections.uid.

Input

Input Parameter

Required/Optional

Description

Example

Threat Protection Name Or UID

Required

The name or UID of the threat protection. Threat Protection names and UIDs can be obtained using the Show Threat Protections command.

ftp patterns

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "FTP Commands",
    "type": "threat-protection",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "severity": "Medium",
    "confidence-level": "High",
    "performance-impact": "Medium",
    "release-date": "0",
    "update-date": "0",
    "profiles": [
        {
            "name": "Strict (D3Cyber)",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Accept",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Accept",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Strict",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Basic",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Optimized",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            }
        }
    ],
    "comments": "",
    "protection-type": "Core",
    "follow-up": false,
    "ipsAdditionalProperties": [],
    "industry-reference": [
        "CAN-***",
        "CAN-***",
        "CAN-***",
        "CAN-***"
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "name": "FTP Commands",
    "type": "threat-protection",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "severity": "Medium",
    "confidence-level": "High",
    "performance-impact": "Medium",
    "release-date": "0",
    "update-date": "0",
    "profiles": [
        {
            "name": "Strict (D3Cyber)",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Accept",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Accept",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Strict",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Basic",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Inactive",
                "track": "log",
                "capture-packets": false
            }
        },
        {
            "name": "Optimized",
            "uid": "***-***-***-***-***",
            "default": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            },
            "final": {
                "action": "Drop",
                "track": "log",
                "capture-packets": false
            }
        }
    ],
    "comments": "",
    "protection-type": "Core",
    "follow-up": false,
    "ipsAdditionalProperties": [],
    "industry-reference": [
        "CAN-***",
        "CAN-***",
        "CAN-***",
        "CAN-***"
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ThreatProtectionUID": "\"***-***-***-***-***\"",
    "ThreatProtectionName": "\"FTP Commands\"",
    "Type": "\"threat-protection\"",
    "Severity": "\"Medium\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

name

FTP Commands

type

threat-protection

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

severity

Medium

confidence-level

High

performance-impact

Medium

release-date

0

update-date

0

profiles

  • {'name': 'Strict (D3Cyber)', 'uid': '***-***-***-***-***', 'default': {'action': 'Accept', 'track': 'log', 'capture-packets': False}, 'final': {'action': 'Accept', 'track': 'log', 'capture-packets': False}}

  • {'name': 'Strict', 'uid': '***-***-***-***-***', 'default': {'action': 'Drop', 'track': 'log', 'capture-packets': False}, 'final': {'action': 'Drop', 'track': 'log', 'capture-packets': False}}

  • {'name': 'Basic', 'uid': '***-***-***-***-***', 'default': {'action': 'Inactive', 'track': 'log', 'capture-packets': False}, 'final': {'action': 'Inactive', 'track': 'log', 'capture-packets': False}}

  • {'name': 'Optimized', 'uid': '***-***-***-***-***', 'default': {'action': 'Drop', 'track': 'log', 'capture-packets': False}, 'final': {'action': 'Drop', 'track': 'log', 'capture-packets': False}}

comments

protection-type

Core

follow-up

False

ipsAdditionalProperties

[]

industry-reference

  • CAN-***

  • CAN-***

  • CAN-***

  • CAN-***

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Protection failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [xxx] not found.

Error Sample Data

Show Threat Protection failed.

Status Code: 404.

Message: Requested object [xxx] not found.

Show Threat Protections

Retrieves all threat protections.

Input

Input Parameter

Required/Optional

Description

Example

Limit

Optional

The maximum number of threat protections to return. The default value is 50.

50

Offset

Optional

The number of matching records to omit initially.

0

Details Level

Optional

The level of detail to include for some of the fields in the response. The available options are Standard, UID and Full. The default option is Standard.

Standard

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "protections": [
        {
            "uid": "***-***-***-***-***",
            "name": "3Com Network Supervisor Directory Traversal",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3Com TFTP Server Transporting Mode Remote Buffer Overflow",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3CX Phone System VAD_Deploy.aspx Arbitrary File Upload",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3ivx MPEG-4 MP4 File Handling Stack Overflow",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***,
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3ivx MPEG-4 MP4 File Handling Stack Overflow - Specific",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3S Smart Software Solutions CoDeSys Gateway Server Denial Of Service",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3S Smart Software Solutions CoDeSys Gateway Server Directory Traversal",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3S Smart Software Solutions CoDeSys Gateway Server Heap Buffer Overflow",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3S Smart Software Solutions CoDeSys Gateway Server Memory Access Error",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "3S Smart Software Solutions CoDeSys Gateway Server Stack Buffer Overflow",
            "type": "threat-protection",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        }
    ],
    "from": 1,
    "to": 50,
    "total": 10810
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

D3 customizes the Context Data by extracting the data from path $[*].protections in API returned JSON.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "uid": "***-***-***-***-***",
        "name": "3Com Network Supervisor Directory Traversal",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3Com TFTP Server Transporting Mode Remote Buffer Overflow",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3CX Phone System VAD_Deploy.aspx Arbitrary File Upload",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3ivx MPEG-4 MP4 File Handling Stack Overflow",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***,
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3ivx MPEG-4 MP4 File Handling Stack Overflow - Specific",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3S Smart Software Solutions CoDeSys Gateway Server Denial Of Service",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3S Smart Software Solutions CoDeSys Gateway Server Directory Traversal",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3S Smart Software Solutions CoDeSys Gateway Server Heap Buffer Overflow",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3S Smart Software Solutions CoDeSys Gateway Server Memory Access Error",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "3S Smart Software Solutions CoDeSys Gateway Server Stack Buffer Overflow",
        "type": "threat-protection",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ThreatProtectionUIDs": "\"[\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\]"\"
    "ThreatProtectionNames": "\"[\\\"3Com Network Supervisor Directory Traversal\\\",\\\"3Com TFTP Server Transporting Mode Remote Buffer Overflow\\\",\\\"3CX Phone System VAD_Deploy.aspx Arbitrary File Upload\\\",\\\"3ivx MPEG-4 MP4 File Handling Stack Overflow\\\",\\\"3ivx MPEG-4 MP4 File Handling Stack Overflow - Specific\\\",\\\"3S Smart Software Solutions CoDeSys Gateway Server Denial Of Service\\\",\\\"3S Smart Software Solutions CoDeSys Gateway Server Directory Traversal\\\",\\\"3S Smart Software Solutions CoDeSys Gateway Server Heap Buffer Overflow\\\",\\\"3S Smart Software Solutions CoDeSys Gateway Server Memory Access Error\\\",\\\"3S Smart Software Solutions CoDeSys Gateway Server Stack Buffer Overflow\\\",\\\"7-Zip ARJ Archive Handling Buffer Overflow\\\",\\\"7-Zip RAR Solid Compression Remote Code Execution\\\",\\\"7T Interactive Graphical SCADA RMS Reports Buffer Overflow\\\",\\\"7T Interactive Graphical SCADA System (IGSS) Directory Traversal\\\",\\\"7T Interactive Graphical SCADA System Arbitrary File Execution\\\",\\\"7T Interactive Graphical SCADA System File Operations Buffer Overflows\\\",\\\"ABB IDAL HTTP Server Stack Buffer Overflow (CVE-2019-7232)\\\",\\\"ABB MicroSCADA Wserver Command Execution\\\",\\\"ABB MicroSCADA Wserver Multiple Buffer Overflows\\\",\\\"ABB Multiple Products RobNetScanHost.exe Stack Buffer Overflow\\\",\\\"ABB Panel Builder 800 Stack-based Buffer Overflow (CVE-2018-10616)\\\",\\\"ABB Test Signal Viewer CWGraph3D ActiveX Arbitrary File Creation\\\",\\\"ABBS Audio Media Player Buffer Overflow\\\",\\\"Accellion FTA getStatus verify_oauth_token Command Execution\\\",\\\"ACD Systems ACDSee Products XBM File Handling Buffer Overflow\\\",\\\"ACD Systems ACDSee Products XPM File Handling Buffer Overflow\\\",\\\"ACD Systems ACDSee Products XPM Values Section Buffer Overflow\\\",\\\"ACDSee FotoSlate PLP File id Parameter Overflow\\\",\\\"ACE Files\\\",\\\"ACGVclick function.inc.php path Parameter PHP Code Execution - Ver2\\\",\\\"ActFax LPD Server Buffer Overflow\\\",\\\"ActFax RAW Server Buffer Overflow\\\",\\\"ActiveBar ActiveX Method Arbitrary File Write - Ver2\\\",\\\"ActiveCampaign 1-2-All Broadcast Email sername Parameter SQL Injection - Ver2\\\",\\\"activeCollab Chat Module Arbitrary PHP Code Execution\\\",\\\"ActiveFax (ActFax) 4.3 Client Importer Buffer Overflow\\\",\\\"Activist Mobilization Platform base.php base_path Parameter PHP Code Execution - Ver2\\\",\\\"ActualScripts ActualAnalyzer Cookie Command Execution\\\",\\\"Acunetix Web Scanner\\\",\\\"AdaptWeb Web Application SCADA SQL Injection\\\",\\\"Adobe Acrobat AcroPDF.dll Code Execution - Ver2\\\",\\\"Adobe Acrobat and Adobe Reader Deflate Parameter Integer Overflow\\\",\\\"Adobe Acrobat and Adobe Reader Plugin Object Reloading Memory Corruption\\\",\\\"Adobe Acrobat and Reader API Calls Code Execution (APSB14-15)\\\",\\\"Adobe Acrobat and Reader API Calls Code Execution (APSB15-10: CVE-2015-3062)\\\",\\\"Adobe Acrobat and Reader API Calls Code Execution (APSB15-10: CVE-2015-3064)\\\",\\\"Adobe Acrobat and Reader API Calls Code Execution (APSB15-10: CVE-2015-3069)\\\",\\\"Adobe Acrobat and Reader API Calls Code Execution (APSB15-15: CVE-2015-4445)\\\",\\\"Adobe Acrobat and Reader Binary Planting (APSB19-55: CVE-2019-16444)\\\",\\\"Adobe Acrobat and Reader Buffer Access with Incorrect Length Value (APSB17-36: CVE-2017-16381)\\\"]\"",
    "Types": "\"[\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\",\\\"threat-protection\\\"]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

DOMAIN

***-***-***-***-***

3Com Network Supervisor Directory Traversal

threat-protection

{'uid': '***-***-***-***-***e', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3Com TFTP Server Transporting Mode Remote Buffer Overflow

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3CX Phone System VAD_Deploy.aspx Arbitrary File Upload

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3ivx MPEG-4 MP4 File Handling Stack Overflow

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3ivx MPEG-4 MP4 File Handling Stack Overflow - Specific

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3S Smart Software Solutions CoDeSys Gateway Server Denial Of Service

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3S Smart Software Solutions CoDeSys Gateway Server Directory Traversal

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3S Smart Software Solutions CoDeSys Gateway Server Heap Buffer Overflow

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3S Smart Software Solutions CoDeSys Gateway Server Memory Access Error

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

3S Smart Software Solutions CoDeSys Gateway Server Stack Buffer Overflow

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

7-Zip ARJ Archive Handling Buffer Overflow

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

7-Zip RAR Solid Compression Remote Code Execution

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

7T Interactive Graphical SCADA RMS Reports Buffer Overflow

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

***-***-***-***-***

7T Interactive Graphical SCADA System (IGSS) Directory Traversal

threat-protection

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Protections failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Show Threat Protections failed.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

Show Threat Rule

Shows the details of the specified threat rule.

Reader Note

"Layer Name Or UID" and "Rule Name Or Number Or UID" are required parameters to run this command.

  • Run the Show Threat Layers command to obtain Layer Name Or UID. Either UID or Layer Name can be accepted. Layer Name can be found in the returned raw data at the path $.threat-layers[*].name; UID can be found at the path $.threat-layers[*].uid.

  • Run the Show Threat Rule Base command to obtain Rule Name Or Number Or UID. Rule name can be found in the returned raw data at the path $.rulebase[*].name; Rule number can be found in the returned raw data at the path $.rulebase[*].rule-number; Rule UID can be found in the returned raw data at the path $.rulebase[*].uid.

  • Please note the input values for "Layer Name Or UID" and "Rule Name Or Number Or UID" must match. It is suggested to run the Show Threat Layers command first in order to obtain the desired layer. You can then use that layer to run the Show Threat Rule Base command, and choose your desired threat rule. Use that pair of values to run this command. Otherwise, errors will be returned.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Required

The name or UID of the layer that the threat rule belongs to. Layer names and UIDs can be obtained using the Show Threat Layers command.

***-***-***-***-***

Rule Name Or Number Or UID

Required

The name, number or UID of the rule. Rule numbers and UIDs can be obtained using the Show Threat Rule Base command.

1

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "type": "threat-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "protected-scope-negate": false,
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "track-settings": {
        "packet-capture": true
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "unlocked",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2020-07-17T14:29-0700"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "creator": "System"
    },
    "comments": "",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
{
    "uid": "***-***-***-***-***",
    "type": "threat-rule",
    "domain": {
        "uid": "***-***-***-***-***",
        "name": "SMC User",
        "domain-type": "domain"
    },
    "layer": "***-***-***-***-***",
    "source": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "source-negate": false,
    "destination": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "destination-negate": false,
    "service": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "service-negate": false,
    "protected-scope": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "protected-scope-negate": false,
    "track": {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "track-settings": {
        "packet-capture": true
    },
    "action": {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    "meta-info": {
        "lock": "unlocked",
        "validation-state": "ok",
        "last-modify-time": {
            "posix": ***,
            "iso-8601": "2020-07-17T14:29-0700"
        },
        "last-modifier": "admin",
        "creation-time": {
            "posix": ***,
            "iso-8601": "2020-01-20T09:43-0800"
        },
        "creator": "System"
    },
    "comments": "",
    "enabled": true,
    "install-on": [
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ]
}
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUID": "\"***-***-***-***-***"",
    "Type": "\"threat-rule\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

uid

***-***-***-***-***

type

threat-rule

domain

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

layer

***-***-***-***-***

source

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

source-negate

False

destination

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

destination-negate

False

service

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

service-negate

False

protected-scope

  • {'uid': '***-***-***-***-***', 'name': 'Any', 'type': 'CpmiAnyObject', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

protected-scope-negate

False

track

{'uid': '***-***-***-***-***', 'name': 'Log', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

track-settings

{'packet-capture': True}

action

{'uid': '***-***-***-***-***', 'name': 'Basic', 'type': 'threat-profile', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

meta-info

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2020-07-17T14:29-0700'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'creator': 'System'}

comments

enabled

True

install-on

  • {'uid': '***-***-***-***-***', 'name': 'Policy Targets', 'type': 'Global', 'domain': {'uid': '***-***-***-***-***', 'name': 'Check Point Data', 'domain-type': 'data domain'}}

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Rule failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [Entities can not be found] not found.

Error Sample Data

Show Threat Rule failed.

Status Code: 404.

Message: Requested object [Entities can not be found] not found.

Show Threat Rule Base

Shows the threat prevention rules of the specified layer.

Reader Note

Layer Name Or UID is a required parameter to run this command.

  • Run the Show Threat Layers command to obtain Layer Name Or UID. Either UID or Layer Name can be accepted. Layer Name can be found in the returned raw data at the path $.threat-layers[*].name; UID can be found at the path $.threat-layers[*].uid.

  • Please note some Threat Layers may not have a threat rule base. If your input Threat layer does not have a threat rule base, it will return success with no result.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Required

The name or UID of the layer that the rule belongs to. Layer names and UIDs can be obtained using the Show Threat Layers command.

***-***-***-***-***

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "Standard Threat Prevention",
    "rulebase": [
        {
            "uid": "***-***-***-***-***",
            "type": "threat-rule",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "rule-number": 1,
            "source": [
                "***-***-***-***-***"
            ],
            "source-negate": false,
            "destination": [
                "***-***-***-***-***"
            ],
            "destination-negate": false,
            "service": [
                "***-***-***-***-***"
            ],
            "service-negate": false,
            "protected-scope": [
                "***-***-***-***-***"
            ],
            "protected-scope-negate": false,
            "track": "***-***-***-***-***",
            "track-settings": {
                "packet-capture": true
            },
            "action": "***-***-***-***-***",
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2020-07-17T14:29-0700"
                },
                "last-modifier": "admin",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2020-01-20T09:43-0800"
                },
                "creator": "System"
            },
            "comments": "",
            "enabled": true,
            "install-on": [
                "***-***-***-***-***"
            ]
        }
    ],
    "objects-dictionary": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Basic",
            "type": "threat-profile",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Log",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "ThreatStandardSubRulebase",
            "type": "ThreatExceptionRulebase",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            }
        }
    ],
    "from": 1,
    "to": 1,
    "total": 1
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

D3 customizes the Context Data by extracting the data from path $.rulebase in API returned JSON.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "uid": "***-***-***-***-***",
        "type": "threat-rule",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "rule-number": 1,
        "source": [
            "***-***-***-***-***"
        ],
        "source-negate": false,
        "destination": [
            "***-***-***-***-***"
        ],
        "destination-negate": false,
        "service": [
            "***-***-***-***-***"
        ],
        "service-negate": false,
        "protected-scope": [
            "***-***-***-***-***"
        ],
        "protected-scope-negate": false,
        "track": "***-***-***-***-***",
        "track-settings": {
            "packet-capture": true
        },
        "action": "***-***-***-***-***",
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2020-07-17T14:29-0700"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2020-01-20T09:43-0800"
            },
            "creator": "System"
        },
        "comments": "",
        "enabled": true,
        "install-on": [
            "***-***-***-***-***"
        ]
    }
],
"objects-dictionary": [
    {
        "uid": "***-***-***-***-***",
        "name": "Any",
        "type": "CpmiAnyObject",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Basic",
        "type": "threat-profile",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Policy Targets",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "ThreatStandardSubRulebase",
        "type": "ThreatExceptionRulebase",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        }
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "RuleUIDs": "\"[\\\"***-***-***-***-***\\\"]\"",
    "RuleRuleNumbers": "\"[1]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

TYPE

DOMAIN

RULE-NUMBER

SOURCE

SOURCE-NEGATE

DESTINATION

DESTINATION-NEGATE

SERVICE

SERVICE-NEGATE

PROTECTED-SCOPE

PROTECTED-SCOPE-NEGATE

TRACK

TRACK-SETTINGS

ACTION

META-INFO

COMMENTS

ENABLED

INSTALL-ON

***-***-***-***-***

threat-rule

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

1

['***-***-***-***-***']

False

['***-***-***-***-***']

False

['***-***-***-***-***']

False

['***-***-***-***-***']

False

***-***-***-***-***

{'packet-capture': True}

***-***-***-***-***

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2020-07-17T14:29-0700'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2020-01-20T09:43-0800'}, 'creator': 'System'}

True

['***-***-***-***-***']

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Rule Base failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [xxx] not found.

Error Sample Data

Show Threat Rule Base failed.

Status Code: 404.

Message: Requested object [xxx] not found.

Show Threat Rule Exception Rule Base

Shows the entire threat exceptions layer generated for a given threat rule.

Reader Note

"Layer Name Or UID" and "Rule Name Or Number Or UID" are required parameters to run this command.

  • Run the Show Threat Layers command to obtain Layer Name Or UID. Either UID or Layer Name can be accepted. Layer Name can be found in the returned raw data at the path $.threat-layers[*].name; UID can be found at the path $.threat-layers[*].uid.

  • Run the Show Threat Rule Base command to obtain Rule Name Or Number Or UID. Rule Name can be found in the returned raw data at the path $.rulebase[*].name; Rule Number can be found in the returned raw data at the path $.rulebase[*].rule-number; Rule UID can be found in the returned raw data at the path $.rulebase[*].uid.

  • Please note the input values for "Layer Name Or UID" and "Rule Name Or Number Or UID" must match. It is suggested to run the Show Threat Layers command first in order to obtain the desired layer. You can then use that layer to run the Show Threat Rule Base command, and choose your desired threat rule. Use that pair of values to run this command. Otherwise, errors will be returned.

If there is no exception based on your provided layer and rule, the returned raw data of this command will show "total": 0 at the bottom.

Input

Input Parameter

Required/Optional

Description

Example

Layer Name Or UID

Required

The name or UID of the layer that the rule belongs to. Layer names and UIDs can be obtained using the Show Threat Layers command.

Standard Threat Prevention

Rule Name Or Number Or UID

Required

The name, number or UID of the rule. Rule numbers and UIDs can be obtained using the Show Threat Rule Base command.

1

Output

Raw Data

The primary response data from the API request.

SAMPLE DATA

JSON
{
    "uid": "***-***-***-***-***",
    "name": "ThreatStandardSubRulebase",
    "rulebase": [
        {
            "uid": "***-***-***-***-***",
            "name": "Global Exceptions",
            "type": "threat-section",
            "rulebase": []
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Test Exception rule 1210",
            "type": "threat-exception",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "SMC User",
                "domain-type": "domain"
            },
            "exception-number": 1,
            "source": [
                "***-***-***-***-***"
            ],
            "source-negate": false,
            "destination": [
                "***-***-***-***-***"
            ],
            "destination-negate": false,
            "service": [
                "***-***-***-***-***"
            ],
            "service-negate": false,
            "protected-scope": [
                "***-***-***-***-***"
            ],
            "protected-scope-negate": false,
            "protection-or-site": [
                "***-***-***-***-***"
            ],
            "track": "***-***-***-***-***",
            "action": "***-***-***-***-***",
            "meta-info": {
                "lock": "unlocked",
                "validation-state": "ok",
                "last-modify-time": {
                    "posix": ***,
                    "iso-8601": "2021-12-10T10:27-0800"
                },
                "last-modifier": "admin",
                "creation-time": {
                    "posix": ***,
                    "iso-8601": "2021-12-10T10:26-0800"
                },
                "creator": "admin"
            },
            "comments": "",
            "enabled": true,
            "install-on": [
                "***-***-***-***-***"
            ]
        }
    ],
    "objects-dictionary": [
        {
            "uid": "***-***-***-***-***",
            "name": "Any",
            "type": "CpmiAnyObject",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Detect",
            "type": "CpmiAntimalwareAction",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Log",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        },
        {
            "uid": "***-***-***-***-***",
            "name": "Policy Targets",
            "type": "Global",
            "domain": {
                "uid": "***-***-***-***-***",
                "name": "Check Point Data",
                "domain-type": "data domain"
            }
        }
    ],
    "from": 1,
    "to": 1,
    "total": 1
}
Context Data

The data extracted from Raw Data converted into JSON format. Context Data may be identical to Raw Data in some cases.

D3 customizes the Context Data by extracting the data from path $.rulebase in API returned JSON.

It is recommended to refer to the Raw Data instead of Context Data, since it contains the complete API response data. D3 will deprecate Context Data in the future, and playbook tasks using Context Data will be replaced with Raw Data.

SAMPLE DATA

CODE
[
    {
        "uid": "***-***-***-***-***",
        "name": "Global Exceptions",
        "type": "threat-section",
        "rulebase": []
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Test Exception rule 1210",
        "type": "threat-exception",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "SMC User",
            "domain-type": "domain"
        },
        "exception-number": 1,
        "source": [
            "***-***-***-***-***"
        ],
        "source-negate": false,
        "destination": [
            "***-***-***-***-***"
        ],
        "destination-negate": false,
        "service": [
            "***-***-***-***-***"
        ],
        "service-negate": false,
        "protected-scope": [
            "***-***-***-***-***"
        ],
        "protected-scope-negate": false,
        "protection-or-site": [
            "***-***-***-***-***"
        ],
        "track": "***-***-***-***-***",
        "action": "***-***-***-***-***",
        "meta-info": {
            "lock": "unlocked",
            "validation-state": "ok",
            "last-modify-time": {
                "posix": ***,
                "iso-8601": "2021-12-10T10:27-0800"
            },
            "last-modifier": "admin",
            "creation-time": {
                "posix": ***,
                "iso-8601": "2021-12-10T10:26-0800"
            },
            "creator": "admin"
        },
        "comments": "",
        "enabled": true,
        "install-on": [
            "***-***-***-***-***"
        ]
    }
],
"objects-dictionary": [
    {
        "uid": "***-***-***-***-***",
        "name": "Any",
        "type": "CpmiAnyObject",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Detect",
        "type": "CpmiAntimalwareAction",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Log",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    },
    {
        "uid": "***-***-***-***-***",
        "name": "Policy Targets",
        "type": "Global",
        "domain": {
            "uid": "***-***-***-***-***",
            "name": "Check Point Data",
            "domain-type": "data domain"
        }
    }
]
Key Fields

Common cyber security indicators such as unique IDs, file hash values, CVE numbers, IP addresses, etc., will be extracted from Raw Data as Key Fields.
The system stores these key fields in the path $.[playbookTask].outputData. You can use these key-value pairs as data points for playbook task inputs.

SAMPLE DATA

CODE
{
    "ExceptionUIDs": "\"[\\\"***-***-***-***-***\\\",\\\"***-***-***-***-***\\\"]\"",
    "ExceptionNames": "\"[\\\"Global Exceptions\\\",\\\"Test Exception rule 1210\\\"]\"",
    "ExceptionNumbers": "\"[1]\"",
    "Types": "\"[\\\"threat-section\\\",\\\"threat-exception\\\"]\""
}
Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

Return Data can be passed down directly to a subsequent command or used to create conditional tasks in playbooks.

SAMPLE DATA

CODE
Successful
Result

Provides a brief summary of outputs in an HTML formatted table.

SAMPLE DATA

UID

NAME

TYPE

RULEBASE

DOMAIN

EXCEPTION-NUMBER

SOURCE

SOURCE-NEGATE

DESTINATION

DESTINATION-NEGATE

SERVICE

SERVICE-NEGATE

PROTECTED-SCOPE

PROTECTED-SCOPE-NEGATE

PROTECTION-OR-SITE

TRACK

ACTION

META-INFO

COMMENTS

ENABLED

INSTALL-ON

***-***-***-***-***

Global Exceptions

threat-section

[]

***-***-***-***-***

Test Exception rule 1210

threat-exception

{'uid': '***-***-***-***-***', 'name': 'SMC User', 'domain-type': 'domain'}

1

['***-***-***-***-***']

False

['***-***-***-***-***']

False

['***-***-***-***-***']

False

['***-***-***-***-***']

False

['***-***-***-***-***']

***-***-***-***-***

***-***-***-***-***

{'lock': 'unlocked', 'validation-state': 'ok', 'last-modify-time': {'posix': ***, 'iso-8601': '2021-12-10T10:27-0800'}, 'last-modifier': 'admin', 'creation-time': {'posix': ***, 'iso-8601': '2021-12-10T10:26-0800'}, 'creator': 'admin'}

True

['***-***-***-***-***']

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Show Threat Rule Exception Rule Base failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 404.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Requested object [Entities can not be found] not found.

Error Sample Data

Show Threat Rule Exception Rule Base failed.

Status Code: 404.

Message: Requested object [Entities can not be found] not found.

Test Connection

Allows you to perform a health check on an integration connection. You can schedule a periodic health check by selecting Connection Health Check when editing an integration connection.

Input

N/A

Output

Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

  • A connection issue with the integration

  • The API returned an error message

  • No response from the API

You can view more details about an error in the Error tab.

SAMPLE DATA

CODE
Successful

Error Handling

If the Return Data is Failed, an Error tab will appear in the Test Result window.

The error tab contains the responses from the third-party API calls including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Test Connection failed. Failed to check the connector.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Check Point Firewall portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Please double check the Server URL, the Username and password.

Error Sample Data

Test Connection failed. Failed to check the connector.

Status Code: 400.

Message: Please double check the Server URL, the Username and password.

FAQ

Q1: Why can't I see the changes I made?

Answer: If you made those changes with D3 commands, D3 will help you publish those sections automatically, so you won't see this issue. However, if you ran the command from other places (Postman, the Check Point Firewall UI, etc.), you must publish your changed session in order to see the changes.

For example, adding a threat exception to an exception group with Postman. If you cannot see the threat exception you just created, this is because you need to publish that session in which you made the changes. One way to publish the session is to go to: Manage & Settings > Sessions > View Sessions. Locate the corresponding session and right click it to publish it. The changes will then be published along with the session.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.