~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Readme for Trend Micro (TM) Deep Security Agent 9.0 SP1 and Deep Security Relay 9.0 SP1 for Linux Deep Security Agent Platforms: Red Hat 5 (32-bit and 64-bit), Red Hat 6 (32-bit and 64-bit), CentOS 5 (32-bit and 64-bit), CentOS 6 (32-bit and 64-bit), Oracle Linux 5 (32-bit and 64-bit), Oracle Linux 6 (32-bit and 64-bit), SUSE 11, SUSE 11 SP1, SP2 (32-bit and 64-bit), SUSE 10 SP3, SP4 (32-bit and 64-bit), Amazon AMI (32-bit and 64-bit), Ubuntu Linux 10.04 (64-bit), Ubuntu Linux 12.04 (64-bit) Deep Security Relay Platforms: Red Hat 5 (64-bit), Red Hat 6 (64-bit), CentOS 5 (64-bit), CentOS 6 (64-bit) Kernel Support in this release: Please refer to the Deep Security 9.0 SP1 kernel support document. Agent-based Anti-Malware not supported on: Red Hat 5 (32-bit), Red Hat 6 (32-bit), CentOS 5 (32-bit), CentOS 6 (32-bit), Oracle Linux 5 (32-bit and 64-bit), Oracle Linux 6 (32-bit and 64-bit), SuSE 10 (32-bit), SuSE 11 (32-bit), Amazon Linux (32-bit) Ubuntu Linux 10.04 (64-bit), Ubuntu Linux 12.04 (64-bit) Date: May 21, 2013 Release: 9.0 SP1 Build Version: 9.0.0.2008, 9.0.0.2009 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This product is subject to the terms detailed in the click through license agreement and copied to the install directory. For more information about the Trend Micro suite of Deep Security products, visit our Web site at: http://us.trendmicro.com/us/solutions/enterprise/security-solutions/virtualization/deep-security/ Download the latest version of this readme from the "Software" page at the Trend Micro Download Center website: http://downloadcenter.trendmicro.com/ Trend Micro is always seeking to improve its documentation. If you have questions, comments, or suggestions about this or any other Trend Micro documents, please contact us at docs@trendmicro.com. Your feedback is always welcome. Contents =================================================================== 1. About Deep Security 9.0 SP1 1.1 Overview of This Release 1.2 Who Should Install This Release 1.3 Support Expiration Notice 2. What's New 2.1 Enhancements 2.2 Resolved Known Issues 3. Documentation Set 4. System Requirements 5. Installation/Un-installation 6. Known Incompatibilities 7. Known Issues 8. Release History 8.1 Prior Deep Security 9.0 Releases 9. Files Included in This Release 10. Contact Information 11. About Trend Micro 12. License Agreement 13. Third Party Software =================================================================== 1. About Deep Security 9.0 SP1 ======================================================================== 1.1 Overview of This Release ===================================================================== Deep Security 9.0 SP1 contains a number of bug fixes as well as some new feature enhancements. 1.2 Who Should Install This Release ===================================================================== You should install the 9.0 SP1 release if you are currently running Deep Security 7.0, 7.5, 8.0, or 9.0. 1.3 Support Expiration Notice ===================================================================== Please refer to Trend Micro Download Center or Support website for Information about product support expiration notice. Please visit the Trend Micro Download Center website to download the latest releases at: http://downloadcenter.trendmicro.com/ 2. What's New ======================================================================== For major changes in Deep Security 9.0 from previously released versions of Deep Security, please read the "What's New in Deep Security 9 SP1" section of the Deep Security Manager's on-line help, the Deep Security Administrator's Guide or Deep Security Installation Guide available for download from the Trend Micro Download Center. 2.1 Enhancements ===================================================================== - Added Support for Oracle Linux 2.2 Resolved Known Issues ===================================================================== Issue 1: [TT261356, FB17584, FB17861] DSA fails to generate a diagnostic package when it is in Agent Initiated communication while both IPv4 and IPv6 are available. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: The issue is fixed in the RPC code to use “all” addresses translated by Dual Stack instead of the first address. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Issue 2: [17496/17324/TT258369/TT252946/TT266606] The installation of the DS agent disables IP tables. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: Fixed to stop disabling iptables so that customer can support iptables firewall with DSA i.e. dual firewall configuration. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Issue 3: [17008/TT252018] In some situations, it has been reported that the Integrity Monitoring/Anti-Malware scanning would cause 100% CPU usage. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 3: A hidden global setting for CPU usage control has been added to DSM to allow high/medium/low control of CPU usage for IM/AM scanning. Such setting applies to the following platforms: - Linux(TM) Red Hat(TM) 5 64-bit - AIX(TM) 5.3 - Solaris(TM) 10 Sparc ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 3. Documentation Set ======================================================================== In addition to this readme.txt, the documentation set for this product includes the following: o Deep Security 9.0 SP1 Installation Guide (IG) -- Provides product overview, deployment plan, installation steps and basic information intended to help you deploy Deep Security smoothly. o Deep Security 9.0 SP1 Administrator's Guide (AG) -- Provides post-installation instructions on how to configure the settings to help you get Deep Security "up and running". Also includes instructions on performing other administrative tasks for the day-to-day maintenance of Deep Security. o Readme files -- version enhancements, known issues, and release history. There is one readme for each installable Deep Security component: Manager, Agent (including Relay and Notifier), Virtual Appliance, and ESXi Filter Driver. Electronic versions of the manuals are available from the Trend Micro Download Center at: http://downloadcenter.trendmicro.com/ o Online help -- Context-sensitive help screens that provide guidance for performing a task. o TrendEdge is a program for Trend Micro employees, partners, and other interested parties that provides information on unsupported, innovative techniques, tools, and best practices for Trend Micro products. The TrendEdge database contains numerous documents covering a wide range of topics. http://trendedge.trendmicro.com o Knowledge Base -- a searchable database of known product issues, including specific problem-solving and troubleshooting topics. http://esupport.trendmicro.com 4. System Requirements ======================================================================== For a complete list of the System requirements, please refer to the "Deep Security 9.0 SP1 Installation Guide". 5. Installation/Un-installation ======================================================================== See the "Deep Security 9.0 SP1 Installation Guide" document available for download from the Trend Micro Download Center. For CentOS 5 you can use the Red Hat 5 rpm; for CentOS 6 use the Red Hat 6 rpm. 6. Known Incompatibilities ======================================================================== None. 7. Known Issues in Deep Security Agent or Deep Security Relay 9.0 SP1 - Linux ============================================================================= - The WRS function is only supported on Windows platforms, there is no WRS on the Linux/Solaris/HP-UX/AIX Agent. Hence, when a user has both DSVA and Linux DSA installed as coordinated approach, if the DSA is in use, they will lose the WRS function because there is no WRS support on the Linux DSA. [FB 15428] - In a cloud provider environment if the "Enable regular synchronization with Cloud Provider" option is disabled, changing the DSA hostname will cause a problem with DSM/DSA communication. It is highly recommended to keep the "Enable regular synchronization with Cloud Provider" option ON. [FB 15608] - Intrusion Prevention (DPI) is not supported over SSL connections when using IPv6. - Because the Deep Security Relay server does not support a component rollback, if a rollback is performed on a Deep Security Relay, the components listed in the Deep Security Manager may not match the actual versions available on the Deep Security Relay Server. The next update of components will re-synch the component versions displayed in Deep Security Manager. [Deep Security 8.0 Tier 2-00180] - SYN Flood protection is only supported on versions 7.5 or earlier of the Windows Agents and on versions 7.5 or earlier of the Virtual Appliance. It is not supported on versions 7.5 SP1 or later of the Windows Agents or versions 7.5 SP1 or later of the Virtual Appliance. It is not supported on any versions of the Linux or Solaris Agents. - CentOS uses the Red Hat Agent installer package. Therefore, it shows up as Red Hat in the Deep Security Manager. - Log entries (Firewall and IPS Events) for OUTGOING traffic show zero-ed out MAC addresses. - When the network engine is working in TAP mode and the in-guest agent is offline, the DSVA status will be "Stand By". When this occurs, the DSVA is actually online and DPI/FW events will be logged when rules are triggered. [FB 10948] - Log Inspection events have a size limitation of 6000 characters. 8. Release History ======================================================================== See the following Web site for more information about updates to this product: http://www.trendmicro.com/download 9.0.0.2008 May 21, 2013 8.1 Prior Deep Security 9.0 Releases ===================================================================== 9.0.0.883 January 30, 2013 Enhancements in Deep Security 9.0.883 ===================================================================== None Resolved Known Issues in 9.0.883 ===================================================================== Issue 1: [Deep Security 8.0 Tier 2-00200, FB 14340] Unable to establish PPTP connection to a VPN server when the Agent is running. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: If you wish to use Point To Point Tunneling Protocol (PPTP) with Deep Security, you must modify some of the advanced settings. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 1: 1. Log in to Deep Security Manager and go to Computer Settings > Network Engine tab. 2. Make the following changes in the Advanced Network Engine Settings: Filter IPV4 Tunnels: Disable detection of IPV4 Tunnels Maximum Tunnel Depth: 4 Action if Maximum Tunnel Depth Exceeded: Bypass Then click Save. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Note: For a new installation of 9.0 SP1, the above settings described in the Procedure are set to default values already. Issue 2: [Deep Security 8.0 Tier 2-00230, FB 14377] When installing the agent on Ubuntu you may see the following messages: update-rc.d: warning: ds_filter start runlevel arguments (2 3 4 5) do not match LSB Default-Start values (3 5) update-rc.d: warning: ds_filter stop runlevel arguments (0 1 6) do not match LSB Default-Stop values (0 1 2 6) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: These messages can be safely ignored. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This release includes all resolved issues that were resolved in Deep Security 8.0 SP2 except those explicitly listed in the section 7 "Known Issues in Deep Security Agent or Deep Security Relay 9.0 - Linux". 9. Files Included in This Release ======================================================================== This release is a complete installation. Use one of the following files, depending on your installation platform: Agent-RedHat_EL5-9.0.0-2008.i386.rpm Agent-RedHat_EL5-9.0.0-2008.x86_64.rpm Relay-RedHat_EL5-9.0.0-2008.x86_64.rpm Agent-RedHat_EL6-9.0.0-2008.i686.rpm Agent-RedHat_EL6-9.0.0-2008.x86_64.rpm Relay-RedHat_EL6-9.0.0-2008.x86_64.rpm Agent-Oracle_OL5-9.0.0-2009.i386.rpm Agent-Oracle_OL5-9.0.0-2009.x86_64.rpm Agent-Oracle_OL6-9.0.0-2009.i686.rpm Agent-Oracle_OL6-9.0.0-2009.x86_64.rpm Agent-SuSE_10-9.0.0-2008.i586.rpm Agent-SuSE_10-9.0.0-2008.x86_64.rpm Agent-SuSE_11-9.0.0-2008.i586.rpm Agent-SuSE_11-9.0.0-2008.x86_64.rpm Agent-Ubuntu_10.04-9.0.0-2008.x86_64.deb Agent-Ubuntu_12.04-9.0.0-2008.x86_64.deb Agent-amzn1-9.0.0-2008.i686.rpm Agent-amzn1-9.0.0-2008.x86_64.rpm For CentOS 5 Agent or Relay, use the Red Hat 5 packages. For CentOS 6 Agent or Relay, use the Red Hat 6 packages. Please refer to the Supported Linux Kernels documents for a list supported kernels for all packages. 10. Contact Information ======================================================================== A license to the Trend Micro software usually includes the right to product updates,pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees. You can contact Trend Micro via fax, phone, and email, or visit us at: http://www.trendmicro.com Evaluation copies of Trend Micro products can be downloaded from our Web site. Global Mailing Address/Telephone Numbers: For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to: http://www.trendmicro.com/en/about/overview.htm The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen. Note: This information is subject to change without notice. 11. About Trend Micro ======================================================================== Trend Micro, Inc. provides virus protection, anti-spam, and content-filtering security products and services. Copyright 2013, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, Deep Security and "deep security solutions" are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 12. License Agreement ======================================================================== Information about your license agreement with Trend Micro can be viewed at: http://us.trendmicro.com/us/about/company/user_license_agreements/ 13. Third Party Software ======================================================================= The 3rd party software is subject to the licenses available in the following directory: [INSTALL DIRECTORY]\Licenses Where 3rd party licenses require open access to their source code, Trend Micro will provide the necessary materials upon written request. The Deep Security Agent has a kernel interface layer that is compiled specifically for each Linux kernel. Trend Micro install packages for Linux are provided with precompiled versions for the supported Linux distributions. Trend Micro distributes source code and build materials for the kernel interface layer by request made to: http://esupport.trendmicro.com/srf/srfmain.aspx with a Subject field of "Kernel Interface Layer Source Code". ======================================================================== (C) 2013 Trend Micro Inc. All rights reserved. Published in Canada.