Requirements
Threat Extraction Requirements for Web-downloaded documents
-
A minimum of 2.3GB free RAM must be available, regardless of the number of cores or connection used by the Security Gateway.
-
Supported with 5000 and higher appliances series.
Threat Emulation Requirements
The Threat Emulation requirements are different based on the emulation location:
-
ThreatCloud - Gaia operating system (64 or 32-bit)
-
Local or Remote emulation - Threat Emulation Private Cloud Appliance on the Gaia operating system (64-bit only)
Logging Requirements
Logs can be stored on:
-
A Security Management Server that collects logs from the Security Gateways. This is the default.
-
A Log Server on a dedicated machine. This is recommended for organizations that generate many logs.
A dedicated Log Server has greater capacity and performance than a Security Management Server with an activated logging service. On dedicated Log Servers, the Log Server must be the same version as the Management Server.
SmartEvent Requirements
You can enable the SmartEvent Blade on a Security Management Server, or install a dedicated SmartEvent Server. SmartEvent R80.30 can connect to a different version of Log Server - R77.xx or lower.
SmartEvent and a SmartEvent Correlation Unit are usually installed on the same server. You can also install them on separate servers, for example, to balance the load in large logging environments. The SmartEvent Correlation Unit must be the same version as SmartEvent Server.
To deploy SmartEvent and to generate reports, a valid license or contract is required.
SmartConsole Requirements
Hardware Requirements
This table shows the minimum hardware requirements for SmartConsole applications:
Component |
Minimal Requirement |
---|---|
CPU |
Intel Pentium Processor E2140, or 2 GHz equivalent processor |
Memory |
4 GB |
Available Disk Space |
2 GB |
Video Adapter |
Minimum resolution: 1024 x 768 |
Software Requirements
SmartConsole is supported on:
-
Windows 10 (all editions), Windows 8.1 (Pro), and Windows 7 (SP1, Ultimate, Professional, and Enterprise)
-
Windows Server 2016, 2012, 2008 (SP2), and 2008 R2 (SP1)
Gaia Portal Requirements
The Gaia Portal supports these web browsers:
Browser |
Supported Versions |
---|---|
Google Chrome |
14 and higher |
Microsoft Internet Explorer |
8 and higher |
Microsoft Edge |
Any |
Mozilla Firefox |
6 and higher |
Apple Safari |
5 and higher |
Mobile Access Requirements
Endpoint OS Compatibility | Windows | Linux | Mac | iOS | Android |
---|---|---|---|---|---|
Mobile Access Portal |
ü |
ü |
ü |
ü |
ü |
Clientless access to web applications (Link Translation) |
ü |
ü |
ü |
ü |
ü |
Compliance Scanner |
ü |
ü |
ü |
||
Secure Workspace |
ü |
||||
SSL Network Extender - Network Mode |
ü |
ü |
ü |
||
SSL Network Extender - Application Mode |
ü |
||||
Downloaded from Mobile Access applications |
ü |
ü |
ü |
||
Citrix |
ü |
ü |
ü |
||
File Shares - Web-based file viewer (HTML) |
ü |
ü |
ü |
ü |
ü |
Web mail |
ü |
ü |
ü |
ü |
ü |
Endpoint Browser Compatibility |
Microsoft |
Microsoft |
Google |
Mozilla |
Apple |
Opera for |
---|---|---|---|---|---|---|
Mobile Access Portal |
ü |
ü |
ü |
ü |
ü |
ü |
Clientless access to web applications (Link Translation) |
ü |
ü |
ü |
ü |
ü |
|
Compliance Scanner |
ü |
ü |
ü |
ü |
ü |
|
Secure Workspace (2) (3) |
ü |
ü |
ü |
ü |
||
SSL Network Extender - Network Mode |
ü |
ü |
ü |
ü |
||
SSL Network Extender - Application Mode (2) |
ü |
ü |
ü |
ü |
||
Downloaded from Mobile Access applications |
ü |
ü |
ü |
ü |
||
Citrix |
ü |
ü |
ü |
|||
File Shares - Web-based file viewer (HTML) |
ü |
ü |
ü |
ü |
ü |
Limited |
Web mail |
ü |
ü |
ü |
ü |
ü |
Notes:
-
For a list of the prerequisites required for using Mobile Access Portal on-demand clients such as SSL Network Extender Network mode, SSL Network Extender Application Mode, Secure Workspace and Compliance Scanner refer to sk113410.
-
Secure Workspace and SSL Network Extender Application Mode are available for Windows platforms only.
-
Microsoft Internet Explorer is only browser supported inside Secure Workspace.
Identity Awareness Requirements
Identity Agents
See Clients and Agents Support by Windows Platform and Clients and Agents Support by Mac Platform for:
-
Identity Agent (Light and Full)
-
Identity Agent for Terminal Servers
-
Identity Collector
AD Query and Identity Collector
Supported Active Directory versions: Microsoft Windows Server 2008 R2, 2012, 2012 R2, 2016 and 2019.
Endpoint Security Requirements
Endpoint Security Server Hardware Requirements
These are the minimum requirements to enable Endpoint Security management on a Security Management Server:
Component |
All Supported Operating Systems |
---|---|
Number of cores |
4 |
Memory |
16 GB |
Disk Space |
845 GB |
The requirements for External Endpoint Policy Servers are similar.
Resource consumption is based on the size of your environment. For larger environments, more disk space, memory, and CPU are required.
Endpoint Security Software Requirements
-
Endpoint Security Management Servers are supported on Management-only appliances or open servers. Endpoint Security Management Servers do not support Standalone (Security Gateway + Management Server) and Multi-Domain Security Management deployments.
-
Endpoint Security Management Servers is not supported on Red Hat Enterprise Linux releases.
-
R80.30 Endpoint Security Management Server can manage:
-
E80.64 and higher versions of Endpoint Security Clients for Windows
-
E80.64 and higher Client for macOS
-
Anti-Malware signature updates:
- To allow Endpoint Security clients to get Anti-Malware signatures updates from a cleanly installed R80.30 Primary Endpoint Security Management Server follow the instructions in the R80.30 Endpoint Security Server Administration Guide when selecting the Anti-Malware component.
- For cleanly installed R80.30 Endpoint Policy Server, you must follow sk127074. No additional steps are required, if you upgrade the Primary Endpoint Security Management Server to R80.30.
- Endpoint Security Clients can still acquire their Anti-Malware signature updates directly from an external Check Point signature server or other external Anti-Malware signature resources, if your organization's Endpoint Anti-Malware policy allows it.
For more information, see the R80.30 Endpoint Security Server Administration Guide.