This document provides configuration guidelines for conducting an apples-to-apples comparison of security vendors in a proof-of-concept environment. It recommends enabling advanced security profiles, full session logging, and disabling any shortcuts vendors may use to improve performance at the expense of security. Specific configuration steps are provided for Palo Alto Networks, Fortinet, and Cisco to expose and disable any shortcuts, such as verifying out-of-order packets are not bypassed in Palo Alto and disabling intelligent-mode scanning in Fortinet. The goal is to measure each vendor's true capabilities and performance under production-like settings.