Supported features by platform
The following tables list security features available in Deep Security Agent 20
Earlier versions of agents are compatible with other operating systems. These agents do not support new features. For details, see Agent platform compatibility.
- Deep Security Agent 10.0 and later - select the Deep Security version from the list at the top of this page.
- Deep Security Agent 9.6 Service Pack 1
Topics on this page:
- AIX
- AlmaLinux
- Amazon Linux
- CentOS Linux
- CloudLinux
- Debian Linux
- Oracle Linux
- Red Hat Enterprise Linux
- Miracle Linux
- Red Hat OpenShift
- Rocky Linux
- Solaris
- SUSE Linux
- Ubuntu Linux
- Microsoft Windows
- Deep Security Virtual Appliance 20 (NSX) supported guest operating systems
AIX
For a list of supported AIX versions, see Agent platform compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | FileScans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
AIX 6.1 TL 9 or later | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||||
AIX 7.1 TL 3 or later |
✔ 6 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||||
AIX 7.2 TL 0 or later | ✔ 6 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||||
AIX 7.3 TL 0 or later | ✔ 13 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
AlmaLinux
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection 11 | File Scans 5 | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
AlmaLinux 8 (64-bit) 10 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
AlmaLinux 8 (64-bit) 10 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
AlmaLinux 9 (64-bit) 18 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Amazon Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Amazon Linux (64‑bit) | ✔ | ✔ 6 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Amazon Linux 2 (64‑bit) | ✔ | ✔ 6 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 9 | ||||
Amazon Linux 2 (AWS Arm-based Graviton2) 6 and Amazon Linux 2 (AWS ARM-Based Graviton 3) 12 |
✔ 7 | ✔ 7 | ✔ | ✔ 7 | ✔ 6 | ✔ 6 | ✔ 6 | ✔ 6 | ✔ 8 | ✔ 8 | ✔ 8 | ✔ 8 | ✔ 7 | ✔ 8 | ✔ 7 | ✔ 8 | ✔ 8 | ||||||
Amazon Linux 2023 (64‑bit)20 |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Amazon Linux 2023 (AWS Arm-based Graviton2) 20 |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
CentOS Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring 6 | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
CentOS 6 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
CentOS 6 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
CentOS 7 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
CentOS 8 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
CloudLinux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring 6 | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection 11 | File Scans 5 | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
CloudLinux 7 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
CloudLinux 8 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Debian Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring 6 | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans 5 | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Debian Linux 8 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Debian Linux 9 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Debian Linux 10 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Debian Linux 11 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Debian Linux 12 (64-bit) 24 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Miracle Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring 6 | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection 11 | File Scans 5 | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Miracle Linux 8 (64‑bit) 23 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Miracle Linux 9 (64 bit) 25 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Oracle Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Oracle Linux 6 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||||
Oracle Linux 6 (64‑bit) | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Oracle Linux 7 (64‑bit) | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 14 | ✔ | ||||
Oracle Linux 8 (64-bit) | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ||||
Oracle Linux 9 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Red Hat Enterprise Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring 6 | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Red Hat Enterprise Linux 6 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
Red Hat Enterprise Linux 6 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Red Hat Enterprise Linux 7 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Red Hat Enterprise Linux 8 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 9 | |||
Red Hat Enterprise Linux 8 (AWS Arm-based Graviton2) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Red Hat Enterprise Linux 8.6 (PowerPC little-endian) 28 | ✔ | ✔ | ✔ | ✔ 22 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Red Hat Enterprise Linux 9 (PowerPC little-endian) | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 35 | ✔ 35 | ✔ 35 | ✔ 35 | ✔ 35 | ✔ 35 | ✔ 35 | ✔ 35 | ✔ 35 | ✔ 33 | ✔ 35 | ✔ 33 | |||
Red Hat Enterprise Linux 9 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 26 | ✔ | ✔ | |||
Red Hat Enterprise Linux Workstation 7 (64‑bit) 18 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Red Hat OpenShift
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring 6 | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
OpenShift supported versions 31 | ✔ | ✔ | ✔ |
Rocky Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection 11 | File Scans 5 | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Rocky Linux 8 (64-bit) 10 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Rocky Linux 9 (64-bit) 17 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Solaris
For a list of supported Solaris versions, see Agent platform compatibility. For more information, see How does agent protection work for Solaris zones?
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand 4 | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Solaris | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
SUSE Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring 6 | Predictive Machine Learning 8 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection 11 | File Scans 5 | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
SUSE Linux Enterprise Server 12 SP1, SP2, SP3, SP4, SP5 (64‑bit) 27 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 14 | |||
SUSE Linux Enterprise Server 12 SP5 (PowerPC little-endian) | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 28 | ✔ 28 | ✔ 28 | ✔ 28 | ✔ 27 | ✔ 28 | ✔ 27 | ✔ 27 | ✔ 27 | |||||
SUSE Linux Enterprise Server 15 SP1, SP2, SP3, SP4 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 14 | |||
SUSE Linux Enterprise Server 15 SP2, SP3, SP4, SP5 (PowerPC little-endian) | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 27 | ✔ 28 | ✔ 28 | ✔ 28 | ✔ 28 | ✔ 27 | ✔ 28 | ✔ 27 | ✔ 27 | ✔ 27 | |||||
SUSE Linux Enterprise Server 15 SP5 (AWS Arm-based Graviton2) 29 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
SUSE Linux Enterprise Server 15 SP6 (AWS Arm-based Graviton2) 32 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Ubuntu Linux
Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans 5 | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
Ubuntu 16.04 (64‑bit) | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Ubuntu 18.04 (64‑bit) | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Ubuntu 18.04 (AWS Arm-based Graviton2) 10 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Ubuntu 20.04 (64‑bit) | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Ubuntu 20.04 (AWS Arm-based Graviton2) 10 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Ubuntu 22.04 (64‑bit) | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Ubuntu 22.04 (AWS Arm-based Graviton2) 13 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||
Ubuntu 24.04 (64‑bit) 32 | ✔ | ✔ 6 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Microsoft Windows
For details on supported Windows 10 update releases, see Deep Security Support for Windows 10 and Deep Security Support for Windows Server Core.
For details on supported Windows 11 update releases, see Trend Cloud One - Endpoint & Workload Security and Deep Security Support for Windows 11.
For Windows 2012 and later, both Desktop Experience and Server Core installations are supported (any exceptions are mentioned in the table). For Windows Server 2008 and 2008 R2, only Full Installations are supported.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | Device Control | ||||||||||||||
Real-time scan | On-demand scan | Browser Extension | Real-time | On-demand | ||||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Chrome | Edge | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | |||||||||||
Windows 7 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ 8 | ||||||
Windows 7 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ | ✔ 8 | |||||
Windows 7 Embedded (32‑bit) 2 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 8 | |||||||||||
Windows 8 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ 8 | ||||||
Windows 8 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ | ✔ 8 | |||||
Windows 8.1 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ 8 | ||||||
Windows 8.1 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ | ✔ 8 | |||||
Windows 8.1 Embedded (32‑bit) 2 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 8 | ||||||||||
Windows 10 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ 8 | ||||||
Windows 10 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ✔ 22 | ✔ | ✔ | ✔ | ✔ 16 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ | ✔ 8 | ||
Windows 10 IoT Enterprise 2019 LTSC (32- and 64-bit) 2 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 8 | ||||||
Windows 10 IoT Enterprise 2021 LTSC (64-bit) 2 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 8 | ||||||
Windows 10 Enterprise multi-session (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ | ✔ 8 | |||||
Windows 11 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ✔ 22 | ✔ | ✔ | ✔ | ✔ 16 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 34 | ✔ | ✔ | ✔ | ✔ 8, 19 | ||
Windows Server 2008 (32‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ||||||||
Windows Server 2008 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ||||||
Windows Server 2008 R2 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ||||
Windows Server 2012 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 3, 5 | ✔ 3, 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 3 | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ||||
Windows Server 2012 R2 (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 3 | ✔ | ✔ | ✔ 17 | ||
Windows Server 2016 (LTSC, version 1607) (64‑bit) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ✔ 22 | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 |
Windows Server Core (SAC, version 1709) (64‑bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Windows Server 2019 (LTSC, version 1809) (64‑bit) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 | ✔ 22 | ✔ | ✔ | ✔ | ✔ 11 | ✔ 5 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 |
Windows Server 2022 (LTSC, version 21H2) (64‑bit) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 21 | ✔ 22 | ✔ | ✔ | ✔ | ✔ 5 | ✔ 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 17 |
FIPS mode for Windows Desktop platforms might work, but is not supported.
Deep Security Virtual Appliance 20 (NSX) supported guest operating systems
Deep Security Virtual Appliance can protect guest VMs that run any OS shown below, if VMware supports it. For the list of operating systems that VMware supports, see the VMware Compatibility search tool. When using the tool, make sure that:
- What are you looking for? is set to Guest OS.
- OS Vendor is set to an OS shown below.
If you are using combined mode, the agent must also support the OS of the guest VM.
Supported features also vary by NSX license type. For details, see VMware deployments with the virtual appliance and NSX.
Anti-Malware | Web Reputation Service | Firewall | Intrusion
Prevention System |
Integrity
Monitoring |
Log Inspection | Application Control | Recommen-
dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | File Scans | Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||||
OS vendors supported by the appliance on NSX Data Center for vSphere (NSX-V) | ||||||||||||||||||||||
Microsoft Windows | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | N/A | |||||||||||||
Red Hat Enterprise Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
CentOS Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
Oracle Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
SUSE Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
Ubuntu Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
Debian Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
OS vendors supported by the appliance on NSX-T Data Center 3.x (NSX-T 3.x) | ||||||||||||||||||||||
Microsoft Windows | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | N/A | |||||||||||||
Red Hat Enterprise Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
CentOS Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
Oracle Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
SUSE Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
Ubuntu Linux | ✔ | ✔ | ✔ | N/A | ||||||||||||||||||
Debian Linux | ✔ | ✔ | ✔ | N/A |
Footnotes:
1 |
Feature Set 1 includes signature-based file scanning, spyware scanning, and document exploit protection. |
3 |
Requires a Full/Desktop Experience installation. Server Core is not supported. |
4 |
Anti-Malware on-demand scans are supported on all Solaris file systems. |
5 |
Supports enhanced real-time integrity monitoring, which uses the application control driver to get information about who changed a monitored file. |
6 |
Requires Deep Security Agent 20.0.0-1822 (20 LTS Update 2021-01-18) or later. |
7 |
Requires Deep Security Agent 20.0.0-2204 (20 LTS Update 2021-04-12) or later. |
8 |
Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2022-07-04) or later. |
9 |
Requires Deep Security Agent 20.0.0-2921 (20 LTS Update 2021-08-30) or later. |
10 |
Requires Deep Security Agent 20.0.0-3288 (20 LTS Update 2021-10-28) or later. |
11 |
Requires Deep Security Agent 20.0.0-4185 (20 LTS Update 2022-04-06) or later. |
12 |
Requires Deep Security Agent 20.0.0-5137 (20 LTS Update 2022-07-26) or later. |
13 |
Requires Deep Security Agent 20.0.0-5394 (20 LTS Update 2022-08-29) or later. |
14 |
Requires Deep Security Agent 20.0.0-5761 (20 LTS Update 2022-10-21) or later. |
15 |
Requires Deep Security Agent 20.0.0-5953 (20 LTS Update 2022-11-22) or later. |
16 |
Requires Deep Security Agent 20.0.0-5995 (20 LTS Update 2022-11-28) or later. |
17 |
Requires Deep Security Agent 20.0.0-6313 (20 LTS Update 2023-01-31) or later. |
18 |
Requires Deep Security Agent 20.0.0-6912 (20 LTS Update 2023-05-02) or later. |
19 |
For Windows 11 systems, the Mobile (MTP/PTP) read-only protocol for Device Control requires Deep Security Agent 20.0.0-5810 (20 LTS Update 2022-10-27) or later. |
20 |
Requires Deep Security Agent 20.0.0-7303 (20 LTS Update 2023-06-28) or later. |
21 |
Requires Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later. |
22 |
Requires Deep Security Agent 20.0.0-7943 (20 LTS Update 2023-09-26) or later. |
23 |
Miracle Linux 8 is supported by Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later for Red Hat Enterprise Linux 8. |
24 |
Requires Deep Security Agent 20.0.0-8438 (20 LTS Update 2023-12-12) or later. |
25 |
Miracle Linux 9 is supported by Deep Security Agent 20.0.0-8137 (20 LTS Update 2023-10-26) or later for Red Hat Enterprise Linux 9. |
26 |
Requires Deep Security Agent 20.0.1-4540 (20 LTS Update 2024-03-20) or later. |
27 |
Requires Deep Security Agent 20.0.1-7380 (20 LTS Update 2024-04-24) or later. |
28 |
Requires Deep Security Agent 20.0.1-12510 (20 LTS Update 2024-06-26) or later. |
29 |
Requires Deep Security Agent 20.0.1-14610 (20 LTS Update 2024-07-20) or later. |
30 |
Requires Deep Security Agent 20.0.0-8268 (20 LTS Update 2023-11-21) or later. |
31 |
32 |
Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2022-07-04) or later. |
33 |
Requires Deep Security Agent 20.0.1-21510 (20 LTS Update 2024-10-16) or later. |
34 |
Requires Deep Security Agent 20.0.0-5512 (20 LTS Update 2022-09-22) or later. |
35 |
Requires Deep Security Agent 20.0.1-23340 (20 LTS Update 2024-11-13) or later. |