Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
6dd15084-b97a-4
Contributor
Jump to solution

threat emulation step by step

I want to config TE device can you expert's help me to manage it properly. 

0 Kudos
1 Solution

Accepted Solutions
PhoneBoy
Admin
Admin
As a starting point, I can refer you to the documentation: https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_ThreatPrevention_AdminGuide/...
If you can provide some more details about the proposed environment, versions of code in use, what the specific goals are, etc, we can provide more specific advice.

View solution in original post

0 Kudos
1 Reply
PhoneBoy
Admin
Admin
As a starting point, I can refer you to the documentation: https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_ThreatPrevention_AdminGuide/...
If you can provide some more details about the proposed environment, versions of code in use, what the specific goals are, etc, we can provide more specific advice.
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events