Deep Security Manager 10 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
Supported features by platform
The tables below list the features available for each OS platform of Deep Security Agent 10.0:
- Microsoft Windows (10.0 Agents)
- Red Hat Enterprise Linux (10.0 Agents)
- CentOS Linux (10.0 Agents)
- Oracle Linux (10.0 Agents)
- SUSE Linux (10.0 Agents)
- Ubuntu Linux (10.0 Agents)
- Debian Linux (10.0 Agents)
- Cloud Linux (10.0 Agents)
- Solaris (10.0 Agents)
- HP-UX (9.0 Agent)
- AIX (9.0 Agents)
- Amazon Linux (10.0 Agents)
- Hyper-V (10.0 Agents)
- Agentless (NSX) (10.0 Agents)
Older agents are compatible with other platforms (although they don't support new features on Deep Security Manager 10.0). See their Deep Security Agent platforms, Deep Security Agent release notes, and supported features lists:
Microsoft Windows (10.0 Agents)
Deep Security Agent is supported with both Full/Desktop Experience and Server Core installations of Windows Server 2012 and later (any exceptions for particular features are noted in the table below). For Windows Server 2008 and 2008 R2, only Full installations are supported.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring | Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Windows XP 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Windows XP 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Windows Server 2003 R2 SP2 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Windows Server 2003 R2 SP2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows 7 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Windows 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows Server 2008 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Windows Server 2008 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows Server 2008 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||
Windows 8 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Windows 8 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows 8.1 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Windows 8.1 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows 10 32 (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Windows 10 64 (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows Server 2012 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows Server 2012 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (8) | ||
Windows Server 2016 (LTSC, version 1607) 64 (3) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows Server 2019 (LTSC, version 1809) 64 (6) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Red Hat Enterprise Linux (10.0 Agents)
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Red Hat Enterprise Linux 5 32 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Red Hat Enterprise Linux 5 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Red Hat Enterprise Linux 6 32 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Red Hat Enterprise Linux 6 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Red Hat Enterprise Linux 7 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
CentOS 5 32 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
CentOS 5 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
CentOS 6 32 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
CentOS 6 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
CentOS 7 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Oracle Linux 5 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
Oracle Linux 5 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Oracle Linux 6 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
Oracle Linux 6 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Oracle Linux 7 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
SUSE Linux Enterprise Server 11 32 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
SUSE Linux Enterprise Server 11 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
SUSE Linux Enterprise Server 12 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Ubuntu 14 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Ubuntu 16 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Debian 7 x64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Debian 8 x64 (2) | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Debian 9 x64 (5) | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Cloud Linux 6 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
Cloud Linux 6 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Cloud Linux 7 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Solaris 10 1/13 Sparc | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Solaris 10 1/13 x86 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Solaris 11.2/ 11.3 Sparc | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Solaris 11.2/ 11.3 x86 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
HP-UX 11.31 | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
AIX 5.3 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||
AIX 6.1 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||
AIX 7.1 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||
AIX 7.2 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Amazon Linux 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Amazon Linux 2 64 (4) | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Windows Server 2008 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows Server Core 2012 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows Server Core 2012 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows 8.1 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Windows 7 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
CentOS 6 32 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Red Hat Enterprise Linux 6 64 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
SUSE Linux Enterprise Server 11 SP3 32 | ✔ (7) | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
The list of supported features varies not only by platform, as shown in the table below, but also by NSX license type. For details on which features are supported by your NSX license, see VMware deployments with the virtual appliance and NSX 6.2.4.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recomm-
endation Scan |
Relay | Scanner | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||
Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Signature-Based File Scan, Spyware | Document Exploit Protection | Behavior Monitoring, Process Memory Scanning, Registry Scan | Unencrypted Traffic | SSL Encrypted Traffic | File and Directory Scans | Scans of Running Services, Processes, Listening Ports | File Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||
Windows XP SP3 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows XP SP3 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2003 SP2 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2003 SP2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 7 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 7 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2008 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2008 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2008 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 8 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 8 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 8.1 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 8.1 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2012 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2012 R2 64 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 10 32 (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 10 64 (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2016 64 (3) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2019 Version 1809 64 (6) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Red Hat Enterprise Linux 5 32 | ✔ | ✔ | ✔ | |||||||||||||||||
Red Hat Enterprise Linux 5 64 | ✔ | ✔ | ✔ | |||||||||||||||||
Red Hat Enterprise Linux 6 32 | ✔ | ✔ | ✔ | |||||||||||||||||
Red Hat Enterprise Linux 6 64 | ✔ | ✔ | ✔ | |||||||||||||||||
Red Hat Enterprise Linux 7 64 | ✔ | ✔ | ✔ | |||||||||||||||||
CentOS 5 32 | ✔ | ✔ | ✔ | |||||||||||||||||
CentOS 5 64 | ✔ | ✔ | ✔ | |||||||||||||||||
CentOS 6 32 | ✔ | ✔ | ✔ | |||||||||||||||||
CentOS 6 64 | ✔ | ✔ | ✔ | |||||||||||||||||
CentOS 7 64 | ✔ | ✔ | ✔ | |||||||||||||||||
Oracle Linux 5 32 | ✔ | ✔ | ✔ | |||||||||||||||||
Oracle Linux 5 64 | ✔ | ✔ | ✔ | |||||||||||||||||
Oracle Linux 6 32 | ✔ | ✔ | ✔ | |||||||||||||||||
Oracle Linux 6 64 | ✔ | ✔ | ✔ | |||||||||||||||||
Oracle Linux 7 64 | ✔ | ✔ | ✔ | |||||||||||||||||
SUSE Linux Enterprise Server 11 32 | ✔ | ✔ | ✔ | |||||||||||||||||
SUSE Linux Enterprise Server 11 64 | ✔ | ✔ | ✔ | |||||||||||||||||
SUSE Linux Enterprise Server 12 64 | ✔ | ✔ | ✔ | |||||||||||||||||
Ubuntu 14 LTS 64 | ✔ | ✔ | ✔ | |||||||||||||||||
Ubuntu 16 LTS 64 | ✔ | ✔ | ✔ |
(1) Microsoft releases regular, semi-annual releases for Microsoft Windows 10. For details about which specific releases are supported, see Deep Security Support for Windows 10.
(2) Requires Deep Security Agent and Manager 10.0 Update 1 or greater
(3) See Deep Security Agent platforms for detailed version support.
(4) Requires Deep Security Agent and Manager 10.0 Update 8 or greater
(5) Requires Deep Security Agent and Manager 10.0 Update 14 or greater
(6) Requires Deep Security Agent and Manager 10.0 Update 16 or greater
(7) Real-time Anti-Malware support on Linux: Real-time Anti-Malware scanning is highly dependent on the file system hooking implementation, so file system incompatibility can cause issues with this feature. The following table shows which file systems are compatible with the feature:
File system type | Deep Security Agent version | ||
---|---|---|---|
10.0 | 9.6 | ||
Disk file systems | ext2 | ✔ | ✔ |
ext3 | ✔ | ✔ | |
ext4 | ✔ | ✔ | |
XFS | ✔ | ✔ | |
Btrfs | ✔ | ✔ | |
VFAT | ✔ | ✔ | |
Optical discs | ISO 9660 | ✔ | ✔ |
Special file systems | tmpfs | ✔ | ✔ |
aufs | ✔ | ||
OverlayFS | ✔ | ✔ | |
Network file systems (see Note, below) |
NFSv3 | ✔ | ✔ |
NFSv4 | ✔ | ✔ | |
SMB | ✔ | ✔ | |
CIFS | ✔ | ✔ | |
FTP | ✔ | ✔ |
To protect network file systems, you must select Enable network directory scan in the malware scan configuration. For information, see Network Directory Scan.
(8) This feature is available only with Full/Desktop Experience installations. It is not supported with Server Core installations.