Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Highlighted

threat emulation step by step

Jump to solution

I want to config TE device can you expert's help me to manage it properly. 

0 Kudos
1 Solution

Accepted Solutions
Highlighted
Admin
Admin
As a starting point, I can refer you to the documentation: https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_ThreatPrevention_AdminGuide/...
If you can provide some more details about the proposed environment, versions of code in use, what the specific goals are, etc, we can provide more specific advice.

View solution in original post

0 Kudos
1 Reply
Highlighted
Admin
Admin
As a starting point, I can refer you to the documentation: https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_ThreatPrevention_AdminGuide/...
If you can provide some more details about the proposed environment, versions of code in use, what the specific goals are, etc, we can provide more specific advice.

View solution in original post

0 Kudos