Deep Security 11.2 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
Each part of a Deep Security deployment has its own system requirements.
Requirements vary by version. For older versions of
If you plan to operate Deep Security in FIPS mode, see FIPS 140-2 support for additional requirements.
For a list of agent versions that are compatible with this version of the manager, see Deep Security Manager - Agent compatibility by platform.
|Minimum memory (RAM)||
Minimum RAM requirements depend on the number of agents that are being managed. See Deep Security Manager sizing.
On Linux, reserved system memory is separate from process memory. Therefore, although the installer's estimate might be similar, it will detect less RAM than the computer actually has. To verify the computer's actual total RAM, log in with a superuser account and enter:
|Minimum disk space||1.5 GB (200 GB recommended)|
Disk space required varies by the size of the deployment, data retention, and frequency of logging.
Minimum free disk space = (2 x database size) + transaction log
For example, if your database plus transaction log is 40 GB, you must have 80 GB (40 x 2) of free disk space for database schema upgrades. To free disk space, delete any unnecessary event log data and transaction logs.
Requirements vary by OS version and the features that you enable. See Deep Security Agent and Relay sizing.
For a list of all operating systems and agent versions that are compatible with Deep Security Manager 11.2, see Deep Security Manager - Agent compatibility by platform.