LevelBlue Completes Acquisition of Cybereason. Learn More
Get access to immediate incident response assistance.
When rotating the log file for a Check Point firewall, below are the proper steps to follow.
lastrecord.txt
<Installation Directory>\LeaCache\x_x_x_x.dat
[where x_x_x_x is the internal IP for the firewall]
x_x_x_x
During the configuration of the LEA Service or when configuring the profile that utilizes this service the log file location can be configured to use a location other than the default location above. If this option was used, remove the lastrecord.txt files from the location specified in the custom configuration.
Note: There will always be a lastrecord.txt file, and there may be a second file with a name beginning with "lastrecord" if the log files are being logged.
This article was previously published as: NETIQKB1619
To contact Trustwave about this article or to request support: