Supported features by platform

The tables below list the features available for each OS platform of Deep Security Agent 10.0:

Older agents are compatible with other platforms (although they don't support new features on Deep Security Manager 10.0). See their Platform compatibility, Deep Security Agent release notes, and supported features lists:

Microsoft Windows (10.0 Agents)

Deep Security Agent is supported with both Full/Desktop Experience and Server Core installations of Windows Server 2012 and later (any exceptions for particular features are noted in the table below). For Windows Server 2008 and 2008 R2, only Full installations are supported.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows XP 32  
Windows XP 64  
Windows Server 2003 R2 SP2 32  
Windows Server 2003 R2 SP2 64  
Windows 7 32  
Windows 7 64  
Windows Server 2008 32  
Windows Server 2008 64  
Windows Server 2008 R2 64
Windows 8 32  
Windows 8 64  
Windows 8.1 32  
Windows 8.1 64  
Windows 10 32 (1)  
Windows 10 64 (1)  
Windows Server 2012 64  
Windows Server 2012 R2 64 (8)
Windows Server 2016 (LTSC, version 1607) 64 (3)  
Windows Server 2019 (LTSC, version 1809) 64 (6)  

Red Hat Enterprise Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Red Hat Enterprise Linux 5 32 (7) (7)  
Red Hat Enterprise Linux 5 64 (7) (7)  
Red Hat Enterprise Linux 6 32 (7) (7)  
Red Hat Enterprise Linux 6 64 (7) (7)
Red Hat Enterprise Linux 7 64 (7) (7)

CentOS Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
CentOS 5 32 (7) (7)  
CentOS 5 64 (7) (7)  
CentOS 6 32 (7) (7)  
CentOS 6 64 (7) (7)  
CentOS 7 64 (7) (7)    

Oracle Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Oracle Linux 5 32  
Oracle Linux 5 64  
Oracle Linux 6 32  
Oracle Linux 6 64 (7) (7)  
Oracle Linux 7 64 (7) (7)  

SUSE Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
SUSE Linux Enterprise Server 11 32 (7) (7)  
SUSE Linux Enterprise Server 11 64 (7) (7)
SUSE Linux Enterprise Server 12 64 (7) (7)

Ubuntu Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Ubuntu 14 64 (7) (7)  
Ubuntu 16 64 (7) (7)  

Debian Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Debian 7 x64  
Debian 8 x64 (2) (7) (7)            
Debian 9 x64 (5) (7) (7)            

Cloud Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Cloud Linux 6 32  
Cloud Linux 6 64  
Cloud Linux 7 64 (7) (7)  

Solaris (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Solaris 10 1/13 Sparc  
Solaris 10 1/13 x86 64    
Solaris 11.2/ 11.3 Sparc  
Solaris 11.2/ 11.3 x86 64    

HP-UX (9.0 Agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
HP-UX 11.31  

AIX (9.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
AIX 5.3  
AIX 6.1  
AIX 7.1  

Amazon Linux (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Amazon Linux 64 (7) (7)  
Amazon Linux 2 64 (4) (7) (7)          

Hyper-V (10.0 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows Server 2008 R2 64  
Windows Server Core 2012 64  
Windows Server Core 2012 R2 64  
Windows 8.1 32  
Windows 7 32  
CentOS 6 32 (7) (7)  
Red Hat Enterprise Linux 6 64 (7) (7)  
SUSE Linux Enterprise Server 11 SP3 32 (7) (7)  

Agentless (NSX) (10.0 Agents)

The list of supported features varies not only by platform, as shown in the table below, but also by NSX license type. For details on which features are supported by your NSX license, see VMware deployments with the virtual appliance and NSX 6.2.4.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows XP SP3 32                      
Windows XP SP3 64                      
Windows Server 2003 SP2 32                      
Windows Server 2003 SP2 64                      
Windows 7 32                      
Windows 7 64                      
Windows Server 2008 32                      
Windows Server 2008 64                      
Windows Server 2008 R2 64                      
Windows 8 32                      
Windows 8 64                      
Windows 8.1 32                      
Windows 8.1 64                      
Windows Server 2012 64                      
Windows Server 2012 R2 64                      
Windows 10 32 (1)                      
Windows 10 64 (1)                      
Windows Server 2016 64
(3)
                     
Windows Server 2019 Version 1809 64
(6)
                     
Red Hat Enterprise Linux 5 32                                  
Red Hat Enterprise Linux 5 64                                  
Red Hat Enterprise Linux 6 32                                  
Red Hat Enterprise Linux 6 64                                  
Red Hat Enterprise Linux 7 64                                  
CentOS 5 32                                  
CentOS 5 64                                  
CentOS 6 32                                  
CentOS 6 64                                  
CentOS 7 64                                  
Oracle Linux 5 32                                  
Oracle Linux 5 64                                  
Oracle Linux 6 32                                  
Oracle Linux 6 64                                  
Oracle Linux 7 64                                  
SUSE Linux Enterprise Server 11 32                                  
SUSE Linux Enterprise Server 11 64                                  
SUSE Linux Enterprise Server 12 64                                  
Ubuntu 14 LTS 64                                  
Ubuntu 16 LTS 64                                  

(1) Microsoft releases regular, semi-annual releases for Microsoft Windows 10. For details about which specific releases are supported, see Deep Security Support for Windows 10.

(2) Requires Deep Security Agent and Manager 10.0 Update 1 or greater

(3) See Platform compatibility for detailed version support.

(4) Requires Deep Security Agent and Manager 10.0 Update 8 or greater

(5) Requires Deep Security Agent and Manager 10.0 Update 14 or greater

(6) Requires Deep Security Agent and Manager 10.0 Update 16 or greater

 

(7) Real-time Anti-Malware support on Linux: Real-time Anti-Malware scanning is highly dependent on the file system hooking implementation, so file system incompatibility can cause issues with this feature. The following table shows which file systems are compatible with the feature:

File system type Deep Security Agent version
10.0 9.6
Disk file systems ext2
ext3
ext4
XFS
Btrfs
VFAT
Optical discs ISO 9660
Special file systems tmpfs
aufs  
OverlayFS
Network file systems
(see Note, below)
NFSv3
NFSv4
SMB
CIFS
FTP

To protect network file systems, you must select Enable network directory scan in the malware scan configuration. For information, see Network Directory Scan.

(8) This feature is available only with Full/Desktop Experience installations. It is not supported with Server Core installations.