1. Check Point R81.10 Security Management Administration Guide, Chapter: "The Access Control Policy", Section: "Configuring the Track Setting for a Rule", Page 371.
The guide states: "For some rules, you can select Extended Log. This gives a more detailed log entry. For example, for a Firewall rule, an Extended Log includes the rule number. For an Application Control rule, an Extended Log includes the full URL."
2. Check Point R81.1 Certified Security Administrator (CCSA) Study Guide, Chapter 6: "Monitoring Security Gateways", Section: "Tracking and Logging", Page 161.
This official courseware lists "Extended Log" as a tracking option and explains it "Generates a log with a more detailed description than the Log option," confirming its purpose for enhanced logging detail.