Supported features by platform

The tables below list the platforms and features available for Deep Security Agent 11.3.

Deep Security Manager 11.3 is also compatible with other platforms, using older agents, but the available features may differ. For a complete list of agents compatible with Deep Security Manager 11.3 , see Deep Security Agent platforms. For information on which features are supported with older agents, see Supported Features by Platform documentation for previous versions of Deep Security, which provides links to earlier versions of this article.

Platforms

Windows (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows 7 32          
Windows 7 64      
Windows 7 Embedded 32 ***              
Windows Server 2008 32          
Windows Server 2008 64      
Windows Server 2008 R2 64   *
Windows 8 32          
Windows 8 64      
Windows 8.1 32          
Windows 8.1 64        
Windows 8.1 Embedded 32 ***              
Windows 10 32 **          
Windows 10 64 **      
Windows 10 Embedded 64 ***        
Windows Server 2012 64      
Windows Server 2012 R2 64   *
Windows Server Core 2012 64   *  
Windows Server Core 2012 R2 64   *  
Windows Server 2016 64   *
Windows Server 2016 1709 (RS3) 64   *  
Windows Server 2016 1803 (RS4) 64   *  
Windows Server 2019 1809 64   *  

Red Hat Enterprise Linux (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Red Hat Enterprise Linux 6 32                  
Red Hat Enterprise Linux 6 64     *    
Red Hat Enterprise Linux 7 64     *  

CentOS (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
CentOS 6 32                  
CentOS 6 64     *      
CentOS 7 64     *    

Oracle Linux (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Oracle Linux 6 32                    
Oracle Linux 6 64     *      
Oracle Linux 7 64     *      

SUSE Linux (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
SUSE Linux Enterprise Server 11 32                  
SUSE Linux Enterprise Server 11 64            
SUSE Linux Enterprise Server 12 64     *    

Ubuntu (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Ubuntu 16.04.1 64     *      
Ubuntu 18.04 64     *      

Debian (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Debian 7 64                  
Debian 8 64     *      
Debian 9 64     *      

Cloud Linux (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Cloud Linux 7. 64     *      
Cloud Linux 7.1 64     *      

Amazon Linux (11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Amazon Linux 2 64     *      

Deep Security Virtual Appliance (NSX) (with embedded 11.3 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner FIPS mode
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows 7 32                       N/A
Windows 7 64                       N/A
Windows Server 2008 32                       N/A
Windows Server 2008 64                       N/A
Windows Server 2008 R2 64                       N/A
Windows 8 32                       N/A
Windows 8 64                       N/A
Windows 8.1 32                       N/A
Windows 8.1 64                       N/A
Windows Server 2012 64                       N/A
Windows Server 2012 R2 64                       N/A
Windows 10 32 **                       N/A
Windows 10 64 **                       N/A
Windows Server 2016 1709 (RS3) 64 (with NSX 6.3.3)                   N/A
Windows Server 2016 1803 (RS4) 64                       N/A
Windows Server 2019 1809 64                       N/A
Red Hat Enterprise Linux 5 32                               N/A
Red Hat Enterprise Linux 5 64                               N/A
Red Hat Enterprise Linux 6 32                               N/A
Red Hat Enterprise Linux 6 64                               N/A
Red Hat Enterprise Linux 7 64                               N/A
CentOS 5 32                               N/A
CentOS 5 64                               N/A
CentOS 6 32                               N/A
CentOS 6 64                               N/A
CentOS 7 64                               N/A
Oracle Linux 6 32                               N/A
Oracle Linux 6 64                               N/A
Oracle Linux 7 64                               N/A
SUSE Linux Enterprise Server 10 SP4 32                               N/A
SUSE Linux Enterprise Server 10 SP4 64                               N/A
SUSE Linux Enterprise Server 11 SP4 32                               N/A
SUSE Linux Enterprise Server 11 SP4 64                               N/A
SUSE Linux Enterprise Server 12 SP3 64                               N/A
Ubuntu 14.04 LTS 64                               N/A
Ubuntu 16.04 LTS 64                               N/A
Ubuntu 18.04 LTS 64                               N/A
Debian 8 64                               N/A
Debian 9 64                               N/A

Feature set 1 includes signature-based file scanning, spyware scanning, and document exploit protection.

Feature set 2 includes behavior monitoring, process memory scanning, and registry scanning.

* This platform supports enhanced real-time integrity monitoring. It uses the application control driver to provide file monitoring and captures information about who made changes to a monitored file.

(**) Microsoft releases regular, semi-annual releases for Microsoft Windows 10. For details about which specific releases are supported, see Deep Security Support for Windows 10.

(***) All Trend Micro testing on Windows Embedded platforms is performed in a virtualized environment. Because these operating systems are typically run on custom hardware (for example, on point-of-sale terminals), customers must plan to thoroughly test on their target hardware platform prior to deployment in a production environment. In addition, before raising support cases, customers should attempt to reproduce problems in a virtualized environment because this is the environment the Trend Micro support team has available. If the issue is specific to deployments on custom hardware, Trend Micro may require the customer to provide us with remote access to a suitable environment before we can fully respond to support cases.

Supported Features by Platform documentation for previous versions of Deep Security