This is a local, offline copy of the help, and may be out of date. To view the newest documentation, go online to https://help.deepsecurity.trendmicro.com/.
Supported features by platform
Available Deep Security 10.0 features vary by operating systems and platforms and which version of the Deep Security Agent (if any) is installed.
For previous versions of Deep Security, see Supported Features by Platform documentation for previous versions of Deep Security.
Platforms
- Windows (10.0 Agents)
- Red Hat Enterprise Linux (10.0 Agents)
- CentOS (10.0 Agents)
- Oracle Linux (10.0 Agents)
- SUSE Linux (10.0 Agents)
- Ubuntu (10.0 Agents)
- Debian (10.0 Agents)
- Cloud Linux (10.0 Agents)
- Solaris (10.0 Agents)
- HP-UX (9.0 Agent)
- AIX (9.0 Agents)
- Amazon Linux (10.0 Agents)
- Hyper-V (10.0 Agents)
- Agent-less (NSX) (10.0 Agents)
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Windows XP 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows XP 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows Server 2003 R2 SP2 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows Server 2003 R2 SP2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows 7 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows Server 2008 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows Server 2008 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows Server 2008 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||
| Windows 8 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows 8 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows 8.1 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows 8.1 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows 10 32 (*) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows 10 64 (*) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows Server 2012 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows Server 2012 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||
| Windows Server Core 2012 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows Server Core 2012 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows server 2016 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Red Hat Enterprise Linux (10.0 Agents)
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Red Hat Enterprise Linux 5 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| Red Hat Enterprise Linux 5 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Red Hat Enterprise Linux 6 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| Red Hat Enterprise Linux 6 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Red Hat Enterprise Linux 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| CentOS 5 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| CentOS 5 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| CentOS 6 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| CentOS 6 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
| CentOS 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Oracle Linux 5 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
| Oracle Linux 5 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| Oracle Linux 6 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
| Oracle Linux 6 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Oracle Linux 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| SUSE Linux Enterprise Server 11 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| SUSE Linux Enterprise Server 11 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
| SUSE Linux Enterprise Server 12 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Ubuntu 14 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Ubuntu 16 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Debian 7 x64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| Debian 8 x64 (requires Deep Security 10.0 Update 1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Debian 9 x64 (requires Deep Security 10.0 Update 14) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Cloud Linux 6 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
| Cloud Linux 6 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
| Cloud Linux 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Solaris 10 1/13 Sparc | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
| Solaris 10 1/13 x86 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
| Solaris 11.2/ 11.3 Sparc | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
| Solaris 11.2/ 11.3 x86 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| HP-UX 11.31 | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| AIX 5.3 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||
| AIX 6.1 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||
| AIX 7.1 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Amazon Linux 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
| Amazon Linux 2 64 (*) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
(*) Requires Deep Security Agent and Manager 10.0 Update 8 or greater
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Windows Server 2008 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows Server Core 2012 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows Server Core 2012 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
| Windows 8.1 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| Windows 7 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
| CentOS 6 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
| Red Hat Enterprise Linux 6 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
| SUSE Linux Enterprise Server 11 SP3 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||
Agent-less (NSX) (10.0 Agents)
| Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
| Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
| Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior monitoring and Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
| Windows XP SP3 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows XP SP3 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows Server 2003 SP2 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows Server 2003 SP2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 7 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows Server 2008 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows Server 2008 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows Server 2008 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 8 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 8 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 8.1 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 8.1 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows Server 2012 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows Server 2012 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 10 32 (*) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows 10 64 (*) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Windows server 2016 64 (requires Deep Security Agent 10 Update 4) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
| Red Hat Enterprise Linux 5 32 | ✔ | ✔ | ✔ | |||||||||||||||||
| Red Hat Enterprise Linux 5 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| Red Hat Enterprise Linux 6 32 | ✔ | ✔ | ✔ | |||||||||||||||||
| Red Hat Enterprise Linux 6 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| Red Hat Enterprise Linux 7 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| CentOS 5 32 | ✔ | ✔ | ✔ | |||||||||||||||||
| CentOS 5 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| CentOS 6 32 | ✔ | ✔ | ✔ | |||||||||||||||||
| CentOS 6 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| CentOS 7 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| Oracle Linux 5 32 | ✔ | ✔ | ✔ | |||||||||||||||||
| Oracle Linux 5 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| Oracle Linux 6 32 | ✔ | ✔ | ✔ | |||||||||||||||||
| Oracle Linux 6 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| Oracle Linux 7 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| SUSE Linux Enterprise Server 11 32 | ✔ | ✔ | ✔ | |||||||||||||||||
| SUSE Linux Enterprise Server 11 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| SUSE Linux Enterprise Server 12 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| Ubuntu 14 LTS 64 | ✔ | ✔ | ✔ | |||||||||||||||||
| Ubuntu 16 LTS 64 | ✔ | ✔ | ✔ | |||||||||||||||||
(*) Microsoft releases regular, semi-annual releases for Microsoft Windows 10. For details about which specific releases are supported, see Deep Security Support for Windows 10.