Requirements

Threat Extraction Requirements for Web-downloaded documents

  • A minimum of 2.3GB free RAM must be available, regardless of the number of cores or connection used by the Security Gateway.

  • Supported with 5000 and higher appliances series.

Threat Emulation Requirements

The Threat Emulation requirements are different based on the emulation location:

  • ThreatCloud - Gaia operating system (64 or 32-bit)

  • Local or Remote emulation - Threat Emulation Private Cloud Appliance on the Gaia operating system (64-bit only)

Logging Requirements

Logs can be stored on:

  • A Security Management Server that collects logs from the Security Gateways. This is the default.

  • A Log Server on a dedicated machine. This is recommended for organizations that generate many logs.

A dedicated Log Server has greater capacity and performance than a Security Management Server with an activated logging service. On dedicated Log Servers, the Log Server must be the same version as the Management Server.

SmartEvent Requirements

You can enable the SmartEvent Blade on a Security Management Server, or install a dedicated SmartEvent Server. SmartEvent R80.30 can connect to a different version of Log Server - R77.xx or lower.

SmartEvent and a SmartEvent Correlation Unit are usually installed on the same server. You can also install them on separate servers, for example, to balance the load in large logging environments. The SmartEvent Correlation Unit must be the same version as SmartEvent Server.

To deploy SmartEvent and to generate reports, a valid license or contract is required.

SmartConsole Requirements

Hardware Requirements

This table shows the minimum hardware requirements for SmartConsole applications:

Component

Minimal Requirement

CPU

Intel Pentium Processor E2140, or 2 GHz equivalent processor

Memory

4 GB

Available Disk Space

2 GB

Video Adapter

Minimum resolution: 1024 x 768

Software Requirements

SmartConsole is supported on:

  • Windows 10 (all editions), Windows 8.1 (Pro), and Windows 7 (SP1, Ultimate, Professional, and Enterprise)

  • Windows Server 2016, 2012, 2008 (SP2), and 2008 R2 (SP1)

Gaia Portal Requirements

The Gaia Portal supports these web browsers:

Browser

Supported Versions

Google Chrome

14 and higher

Microsoft Internet Explorer

8 and higher
(If you use Internet Explorer 8, file uploads
through the Gaia Portal are limited to 2 GB)

Microsoft Edge

Any

Mozilla Firefox

6 and higher

Apple Safari

5 and higher

Mobile Access Requirements

OS Compatibility
Endpoint OS Compatibility Windows Linux Mac iOS Android

Mobile Access Portal

ü

ü

ü

ü

ü

Clientless access to web applications (Link Translation)

ü

ü

ü

ü

ü

Compliance Scanner

ü

ü

ü

Secure Workspace

ü

SSL Network Extender - Network Mode

ü

ü

ü

SSL Network Extender - Application Mode

ü

Downloaded from Mobile Access applications

ü

ü

ü

Citrix

ü

ü

ü

File Shares - Web-based file viewer (HTML)

ü

ü

ü

ü

ü

Web mail

ü

ü

ü

ü

ü

Browser Compatibility

Endpoint Browser Compatibility

Microsoft
Internet
Explorer

Microsoft
Edge

Google
Chrome

Mozilla
Firefox

Apple
Safari

Opera for
Windows

Mobile Access Portal

ü

ü

ü

ü

ü

ü

Clientless access to web applications (Link Translation)

ü

ü

ü

ü

ü

Compliance Scanner

ü

ü

ü

ü

ü

Secure Workspace (2) (3)

ü

ü

ü

ü

SSL Network Extender - Network Mode

ü

ü

ü

ü

SSL Network Extender - Application Mode (2)

ü

ü

ü

ü

Downloaded from Mobile Access applications

ü

ü

ü

ü

Citrix

ü

ü

ü

File Shares - Web-based file viewer (HTML)

ü

ü

ü

ü

ü

Limited

support

Web mail

ü

ü

ü

ü

ü

Notes:

  1. For a list of the prerequisites required for using Mobile Access Portal on-demand clients such as SSL Network Extender Network mode, SSL Network Extender Application Mode, Secure Workspace and Compliance Scanner refer to sk113410.

  2. Secure Workspace and SSL Network Extender Application Mode are available for Windows platforms only.

  3. Microsoft Internet Explorer is only browser supported inside Secure Workspace.

Identity Awareness Requirements

Identity Agents

See Clients and Agents Support by Windows Platform and Clients and Agents Support by Mac Platform for:

  • Identity Agent (Light and Full)

  • Identity Agent for Terminal Servers

  • Identity Collector

AD Query and Identity Collector

Supported Active Directory versions: Microsoft Windows Server 2008 R2, 2012, 2012 R2, 2016 and 2019.

Endpoint Security Requirements

Endpoint Security Server Hardware Requirements

These are the minimum requirements to enable Endpoint Security management on a Security Management Server:

Component

All Supported Operating Systems

Number of cores

4

Memory

16 GB

Disk Space

845 GB

The requirements for External Endpoint Policy Servers are similar.

Resource consumption is based on the size of your environment. For larger environments, more disk space, memory, and CPU are required.

Endpoint Security Software Requirements

  • Endpoint Security Management Servers are supported on Management-only appliances or open servers. Endpoint Security Management Servers do not support Standalone (Security Gateway + Management Server) and Multi-Domain Security Management deployments.

  • Endpoint Security Management Servers is not supported on Red Hat Enterprise Linux releases.

  • R80.30 Endpoint Security Management Server can manage:

    • E80.64 and higher versions of Endpoint Security Clients for Windows

    • E80.64 and higher Client for macOS

Anti-Malware signature updates:

  • To allow Endpoint Security clients to get Anti-Malware signatures updates from a cleanly installed R80.30 Primary Endpoint Security Management Server follow the instructions in the R80.30 Endpoint Security Server Administration Guide when selecting the Anti-Malware component.
  • For cleanly installed R80.30 Endpoint Policy Server, you must follow sk127074. No additional steps are required, if you upgrade the Primary Endpoint Security Management Server to R80.30.
  • Endpoint Security Clients can still acquire their Anti-Malware signature updates directly from an external Check Point signature server or other external Anti-Malware signature resources, if your organization's Endpoint Anti-Malware policy allows it.

For more information, see the R80.30 Endpoint Security Server Administration Guide.