Windows (10.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows 7 32  
Windows 7 64  
Windows Server 2008 32  
Windows Server 2008 64  
Windows Server 2008 R2 64
Windows 8 32  
Windows 8 64  
Windows 8.1 32  
Windows 8.1 64  
Windows 10 32  
Windows 10 64  
Windows 10 32 TH2  
Windows 10 64 TH2  
Windows 10 RS2 32  
Windows 10 RS2 64  
Windows Server 2012 64  
Windows Server 2012 R2 64
Windows Server Core 2012 64  
Windows Server Core 2012 R2 64  
Windows server 2016 64  

Red Hat Enterprise Linux (10.1 Agents)

 

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Red Hat Enterprise Linux 6 32  
Red Hat Enterprise Linux 6 64
Red Hat Enterprise Linux 7 64

CentOS (10.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
CentOS 6 32  
CentOS 6 64  
CentOS 7 64  

Oracle Linux (10.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Oracle Linux 6 32  
Oracle Linux 6 64  
Oracle Linux 7 64  

SUSE Linux (10.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
SUSE Linux Enterprise Server 11 32  
SUSE Linux Enterprise Server 11 64
SUSE Linux Enterprise Server 12 64

Ubuntu (10.1 Agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Ubuntu 16 64  

Debian (10.1 Agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Debian 8 64              

Cloud Linux (10.1 Agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Cloud Linux 7 64  

Amazon (10.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows Server 2012 R2 64  
Windows server 2016 64  
Red Hat Enterprise Linux 6 32    
Red Hat Enterprise Linux 6 64  
Red Hat Enterprise Linux 7 64  
Amazon Linux 64  
SUSE Linux Enterprise Server 11 32  
SUSE Linux Enterprise Server 11 64  
SUSE Linux Enterprise Server 12 64  
Ubuntu 16 64  
Debian 8 64              

Azure (10.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows Server 2008 R2 64  
Windows Server 2012 R2 64  
Windows server 2016 64  
Windows 10 64  
Red Hat Enterprise Linux 6 64  
Red Hat Enterprise Linux 7 64  
CentOS 6 64  
CentOS 7 64  
Oracle Linux 6 64  
Oracle Linux 7 64  
SUSE Linux Enterprise Server 11 64  
SUSE Linux Enterprise Server 12 64  
Ubuntu 16 64  
Debian 8 64              

Agent-less (NSX) (10.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay Scanner
  Real-time On-demand Real-time On-demand
Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Signature-Based File Scan, Spyware Document Exploit Protection Behavior monitoring and Process Memory Scanning, Registry Scan Endpoint Correlation Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows 7 32                          
Windows 7 64                          
Windows Server 2008 32                          
Windows Server 2008 64                          
Windows Server 2008 R2 64                          
Windows 8 32                          
Windows 8 64                          
Windows 8.1 32                          
Windows 8.1 64                          
Windows Server 2012 64                          
Windows Server 2012 R2 64                          
Windows 10 32                          
Windows 10 64                          
Windows 10 RS2 32                    
Windows 10 RS2 64                    
Windows 2016 64                    
Red Hat Enterprise Linux 6 32                                      
Red Hat Enterprise Linux 6 64                                      
Red Hat Enterprise Linux 7 64                                      
CentOS 6 32                                      
CentOS 6 64                                      
CentOS 7 64                                      
Oracle Linux 6 32                                      
Oracle Linux 6 64                                      
Oracle Linux 7 64                                      
SUSE Linux Enterprise Server 11 32                                      
SUSE Linux Enterprise Server 11 64                                      
SUSE Linux Enterprise Server 12 64                                      
Ubuntu 16 LTS 64                                      
Debian 8 64                                      
Cloud Linux 7 64                                      

Supported Features by Platform documentation for previous versions of Deep Security