Watchguard Firewall

Overview

WatchGuard Firewall ingests and normalizes logs from WatchGuard firewall devices in LogPoint. Once ingested, you can explore and analyze the data using LogPoint's search capabilities and available analytics for this integration, including dashboards, reports, and alerts. This gives you clear visibility into threat content, malicious devices or files, content types, denied and allowed connections, ports, user authentication, and firewall actions, enabling faster detection, compliance, and response.

The integration includes:

  • Syslog Collector to retrieve raw logs from WatchGuard Firewall devices and ingest them into LogPoint for processing.

  • Syslog Parser to extract key fields from raw WatchGuard logs.

  • WatchguardCompiledNormalizer to convert the parsed logs into a standardized format for consistent analysis across LogPoint.

  • Dashboard package (LP_WatchGuard Firewall) which provides a graphical and interactive overview of WatchGuard activities, highlighting patterns including denied and allowed connections, threat detections, IPS events, user authentication, content filtering, bandwidth usage, and firewall actions. It allows you to quickly spot unusual behavior, monitor compliance, and track operational changes over time.

  • Normalization packages (LP_Watchguard Firewall v11_9, LP_Watchguard Firewall v11_10, LP_Watchguard Firewall, LP_Watchguard WifiCloud) that provide version-specific and feature-specific normalization for WatchGuard devices.

  • Label package (LP_Watchguard Firewall) that contains event classification labels based on message IDs for enhanced event categorization and analysis.

When WatchGuard Firewall detects threats, intrusions, or events with potential risk to your environment, it triggers security alerts based on predetermined alert rules, enabling early detection and corrective action.

Supported Events

  • WatchGuard versions:

    • WatchGuard v11.x (including v11.9 and v11.10)

    • WatchGuard WiFi Cloud

    • WatchGuard Manage

  • WatchGuard log types:

    • Traffic Events: Allow/deny actions, connection attempts, session tracking, traffic flows, ports activity

    • Security Events: Threat detection, malicious IP blocking, IPS signatures, hostile traffic

    • Attack Events: Port scans, flood attacks (SYN, UDP, ICMP, IPSec, IKE), DDoS detection, IP spoofing, ARP spoofing

    • IPS Events: Intrusion Prevention Service detections, signature-based attacks, exploit attempts

    • Content Filtering Events: HTTP proxy denials, content type blocking, category filtering, URL filtering

    • User Authentication Events: Successful/failed logins, user logoff, VPN authentication, RADIUS authentication

    • VPN Events: IPSec tunnels, VPN establishment, tunnel status, mobile VPN, gateway events

    • Virus/Malware Events: Virus detection, APT threats, scan errors, file submissions

    • DLP Events: Data leak detection, violation alerts, file scanning

    • Application Control Events: Application matching, protocol detection, service reputation

    • Wireless Events: WiFi Cloud events, access point management, client authentication, EAP events

    • System Events: Configuration changes, feature updates, license management, cluster events

    • Administrative Events: Admin login/logout, configuration updates, policy changes, device management

    • Email Security (SMTP Proxy): Spam detection, virus scanning, email content filtering

    • FTP Proxy Events: File transfers, upload/download monitoring, command filtering

    • DNS Proxy Events: Query monitoring, DNS request filtering, timeout events

    • Bandwidth Events: Data transfer tracking, sent/received data, connection bandwidth usage

    • High Availability Events: Cluster status, failover events, master/backup role changes, synchronization

Last updated

Was this helpful?