Supported features by platform

Available Deep Security features vary by operating systems and platforms and which version of the Deep Security Agent (if any) is installed.

For previous versions of Deep Security, see Supported Features by Platform documentation for previous versions of Deep Security.

For information on what agent versions the Deep Security Manager supports for each operating system, see Deep Security Manager - Agent compatibility by platform.

Platforms

Windows (11.1 agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-endation Scan Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows 7 32
Windows 7 64
Windows Server 2008 32
Windows Server 2008 64
Windows Server 2008 R2 64
Windows 8 32
Windows 8 64
Windows 8.1 32
Windows 8.1 64
Windows 10 32 **
Windows 10 64 **
Windows Server 2012 64
Windows Server 2012 R2 64
Windows Server Core 2012 64
Windows Server Core 2012 R2 64
Windows Server 2016 64
Windows Server 2016 RS3 64

Red Hat Enterprise Linux (11.1 agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Red Hat Enterprise Linux 6 32
Red Hat Enterprise Linux 6 64 *
Red Hat Enterprise Linux 7 64 *

CentOS (11.1 agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
CentOS 6 32
CentOS 6 64 *
CentOS 7 64 *

Oracle Linux (11.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Oracle Linux 6 32
Oracle Linux 6 64 *
Oracle Linux 7 64 *

SUSE Linux (11.1 Agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
SUSE Linux Enterprise Server 11 32
SUSE Linux Enterprise Server 11 64
SUSE Linux Enterprise Server 12 64 *

Ubuntu (11.1 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Ubuntu 16 64 *

Debian (11.1 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Debian 7 64            
Debian 8 64     *  
Debian 9 64     *  

Cloud Linux (11.1 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Cloud Linux 7. 64 *
Cloud Linux 7.1 64 *

Amazon Linux (11.1 agents)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Amazon Linux 64 *
Amazon Linux 2 64 *

Deep Security Virtual Appliance (NSX) (with embedded 11.1 agent)

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recomm-
endation Scan
Relay
  Real-time On-demand Real-time On-demand
Feature set 1 Feature set 2 Feature set 1 Feature set 2 Unencrypted Traffic SSL Encrypted Traffic File and Directory Scans Scans of Running Services, Processes, Listening Ports File Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows 7 32                    
Windows 7 64                    
Windows Server 2008 32                    
Windows Server 2008 64                    
Windows Server 2008 R2 64                    
Windows 8 32                    
Windows 8 64                    
Windows 8.1 32                    
Windows 8.1 64                    
Windows Server 2012 64                    
Windows Server 2012 R2 64                    
Windows 10 32 **                    
Windows 10 64 **                    
Windows 2016 64 (with NSX 6.3.3)                
Red Hat Enterprise Linux 6 32                            
Red Hat Enterprise Linux 6 64                            
Red Hat Enterprise Linux 7 64                            
CentOS 6 32                            
CentOS 6 64                            
CentOS 7 64                            
Oracle Linux 6 32                            
Oracle Linux 6 64                            
Oracle Linux 7 64                            
SUSE Linux Enterprise Server 11 32                            
SUSE Linux Enterprise Server 11 64                            
SUSE Linux Enterprise Server 12 64                            
Ubuntu 16 LTS 64                            
Debian 8 64                            
Debian 9 64                            

Feature set 1 includes signature-based file scanning, spyware scanning, and document exploit protection.

Feature set 2 includes behavior monitoring, process memory scanning, and registry scanning.

* This platform supports enhanced real-time integrity monitoring. It uses the application control driver to provide file monitoring and captures information about who made changes to a monitored file.

(**) Microsoft releases regular, semi-annual releases for Microsoft Windows 10. For details about which specific releases are supported, see Deep Security support for Windows 10.

Supported Features by Platform documentation for previous versions of Deep Security