is the ideal solution to protect your computer network. Nevertheless, to make the most out of it, the computers used to access, install, configure and deploy the protection must meet a series of hardware and software requirements.
Check the minimum requirements to install and on Windows systems
Check the minimum requirements to install on Linux systems
Check the minimum requirements to install and on OS X systems
To access the servers and be able to download updates, at least one of the computers on the subnet must have access to a series of Web pages.
Click here to see the list of external URLs to access.