<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Emulation sizing in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29713#M13833</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;But if I working for a customer that is not able to calculate the amount of mails I'm looking for a documentation that help to calculate in base of statistical data how to dimension a device.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;Is it possible to find a document that help to understand eventually traffic for email o http in base on a number of user?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Jun 2018 06:50:30 GMT</pubDate>
    <dc:creator>Giancarlo_Cotta</dc:creator>
    <dc:date>2018-06-11T06:50:30Z</dc:date>
    <item>
      <title>Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29711#M13831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm evaluating the Threat Emulation and I have to do the sizing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possibile to find a document that indicates how many files to consider every day for web and email traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2018 08:53:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29711#M13831</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-10T08:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29712#M13832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That depends on the amount of mails your organization sends and receives and the web activity of the users and servers.&lt;/P&gt;&lt;P&gt;In addition it depends on you, if you want all supported files to be emulated and how many exceptions you want to configure, for instance for Windows updates.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2018 21:51:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29712#M13832</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-10T21:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29713#M13833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;But if I working for a customer that is not able to calculate the amount of mails I'm looking for a documentation that help to calculate in base of statistical data how to dimension a device.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;Is it possible to find a document that help to understand eventually traffic for email o http in base on a number of user?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2018 06:50:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29713#M13833</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-11T06:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29714#M13834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Never saw such a docu before, maybe other mates do.&lt;BR /&gt;Maybe another way would be implementing a PoC in a VM and enabling sizing mode as per sk93598&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2018 06:58:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29714#M13834</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-11T06:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29715#M13835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem is that each organization is different in terms of number of files emulated, etc.&lt;/P&gt;&lt;P&gt;Best approach is to sample from your real environment, which this SK discusses how to do.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2018 17:48:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29715#M13835</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-06-11T17:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29716#M13836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk93598 will help you but every topology has different traffic and file characteristic.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2018 20:52:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29716#M13836</guid>
      <dc:creator>Huseyin_Rencber</dc:creator>
      <dc:date>2018-06-15T20:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29717#M13837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Giancarlo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as a very rough estimation you could calculate 2 unique files per user per day for mail traffic and 5&lt;SPAN&gt;&amp;nbsp;unique files per user per day for web traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is a very rough estimation and as Dameon already mentioned live production traffic could vary.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The best I found is to ask the customer for statistics on their existing mail gateways/servers and web proxies.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Even better for sizing would be to get the different file type distribution within those traffics.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards Thomas&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2018 12:02:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29717#M13837</guid>
      <dc:creator>Thomas_Werner</dc:creator>
      <dc:date>2018-06-18T12:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation sizing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29718#M13838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank for answer, now is clear!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Giancarlo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2018 19:15:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-sizing/m-p/29718#M13838</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-18T19:15:29Z</dc:date>
    </item>
  </channel>
</rss>

