Deep Security 9.5 Supported Features by Platform

Similar documents
Deep Security 9.5 Supported Features by Platform

Deep Security 9.5 SP1 Supported Features by Platform

Deep Security 9.6 Supported Features by Platform

Deep Security 9.6 SP1 Supported Features by Platform

Deep Security 9.6 SP1. Supported Features by Platform

Deep Security 9 SP1 p1 Supported Linux Kernels

Deep Security 9 Supported Linux Kernels







Trend Micro deep security 9.6

Deep Security 9 vcenter Operations Manager Integration


CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Security in a Virtualized Environment with TrendMicro

Securing the Modern Data Center with Trend Micro Deep Security

Network Security Protection Alternatives for the Cloud

Carbonite Availability 8.2, Carbonite Migrate 8.2 and Carbonite Cloud Migration Supported Platforms Chart

AS Stallion. Security for Virtual Server Environments. Urmas Püss

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

White Paper. Securing the virtual infrastructure without impacting performance


Backup License Comparison OVERVIEW

Securing Your Virtual World Harri Kaikkonen Channel Manager


Kaspersky Security for Virtualization Frequently Asked Questions

Networking and Security Services Compatibility Guide Last Updated: February 14, 2018 For more information go to vmware.com.


McAfee Endpoint Security Threat Prevention Installation Guide - Linux

Acronis Backup 12.5 License Comparison incl. cloud deployment functionality

INTEROPERABILITY MATRIX FOR ALL ZERTO VIRTUAL REPLICATION VERSIONS


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.


McAfee Public Cloud Server Security Suite

Seqrite Endpoint Security

Dynamic Datacenter Security Solidex, November 2009


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Acronis Backup & Recovery 11.5

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

OfficeScanTM 10 For Enterprise and Medium Business

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

NGFW Security Management Center

Trend Micro Core Protection Module 10.6 SP1 System Requirements

Symantec and VMWare why 1+1 makes 3


T E C H N I C A L S A L E S S E R V I C E S

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Acronis Backup Advanced Version 11.5 Update 6

Commercial Product Matrix

All-in one security for large and medium-sized businesses.

Backup Edition Comparison OVERVIEW

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Next Generation Firewall

Using CSC-SSM 6.2 with Trend Micro Damage Cleanup Services. Setup Guide


NGFW Security Management Center

Annexure E Technical Bid Format

MOVE AntiVirus page-level reference

Sophos for Virtual Environments. startup guide -- Sophos Central edition

Stonesoft Next Generation Firewall. Release Notes Revision C

Copyright 2012 Trend Micro Incorporated. All rights reserved. Protected by U.S. Patent No. 7,516,130 and U.S. Patent No. 7,747,642.

NGFW Security Management Center

McAfee Network Security Platform 8.3


GravityZone INSTALLATION GUIDE

Acronis Backup 12.5 USER GUIDE

Red Hat Enterprise Linux Troubleshooting Guide

Manual Ftp Windows Server 2008 Firewall Settings Greyed Out

Manual Ftp Windows Server 2008 R2 Enterprise Virtual Edition

Manual Ftp Windows Server 2008 R2 Firewall Login Failed

Configure Ftp In Windows 7 64 Bit Microsoft. Antivirus >>>CLICK HERE<<<

NGFW Security Management Center

OfficeScan 10 Cloud Client File Reputation Technology

Protecting Your Digital World

McAfee Endpoint Security Customer POC Guide

McAfee Network Security Platform 8.3


Symantec Endpoint Protection

Stonesoft Management Center. Release Notes Revision A

Security Gateway Virtual Edition

Disclaimer CONFIDENTIAL 2

Uninstalling And Manually Install Vmware Tools Ubuntu Guest

Manually Change Default Gateway Centos 5.5

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

OfficeScanTM 10 For Enterprise and Medium Business

IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security

McAfee Network Security Platform 9.1

Question: 1 An engineer is using the policy trace tool to troubleshoot a WSA. Which behavior is used?

TREND MICRO. InterScan VirusWall 6. FTP and POP3 Configuration Guide. Integrated virus and spam protection for your Internet gateway.


Transcription:

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro site at: http://www.trendmicro.com/download Trend Micro, the Trend Micro t-ball logo, Deep Security, Control Server Plug-in, Damage Cleanup Services, eserver Plug-in, Inter, Network VirusWall, Mail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Document version: 1.92 Document number: APEM96201/131029 Release date: Nov 21, 2014 Last updated: July 14, 2017

Table of Contents Introduction... 4 Windows Agent 9.5... 5 Linux Agent 9.5... 6 Amazon Linux Agent 9.5... 7 Virtual Appliance (Windows guests)... 8 Virtual Appliance (Linux guests)... 9

Introduction Introduction This document contains tables showing which Deep Security features are supported on which operating systems and platforms. The tables list the Agent-based protection provided by Deep Security Agents and the Agentless protection provided in virtualized environements by the Deep Security Virtual Appliance. Legend Supported: Not Supported: For a list of specific Linux kernels supported for each platform, see the document titled Deep Security 9.5 Supported Linux Kernels. 4

Windows Agent 9.5 Windows Agent 9.5 Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation Relay File Protection File and s Registry s On-Demand s of Running Services, Listening Ports Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand Real- Time File and s Real-Time s of Running Services, Listening Ports Windows Windows XP 32 Windows XP 64 Windows 2003 32 Windows 2003 64 Windows Vista 32 Windows Vista 64 Windows 7 32 Windows 7 64 Windows Server 2008 32 Windows Server 2008 64 Windows 8 32 Windows 8 64 Windows 8.1 32 Windows 8.1 64 Windows Server 2012 64 Windows Server 2012 R2 64 5

Linux Agent 9.5 Linux Agent 9.5 Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation Relay File Protection File and s Registry s On-Demand s of Running Services, Listening Ports Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand Real- Time File and s Real-Time s of Running Services, Listening Ports Red Hat Redhat 5 32 Redhat 5 64 Redhat 6 32 Redhat 6 64 CentOS CentOS 5 32 CentOS 5 64 CentOS 6 32 CentOS 6 64 Oracle Linux Oracle Linux 5 32 Oracle Linux 5 64 Oracle Linux 6 32 Oracle Linux 6 64 SuSE SUSE 10 32 SUSE 10 64 SUSE 11 32 SUSE 11 64 Ubuntu Ubuntu 10 64 Ubuntu 12 64 Ubuntu 14 64 Cloud Linux Cloud Linux 5 32 Cloud Linux 5 64 Cloud Linux 6 32 Cloud Linux 6 64 6

Amazon Linux Agent 9.5 Amazon Linux Agent 9.5 Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation Relay File Protection File and s Registry s On-Demand s of Running Services, Listening Ports Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand Real- Time File and s Real-Time s of Running Services, Listening Ports Amazon Linux Redhat 6 EC2 32 Redhat 6 EC2 64 AMI Linux 32 AMI Linux 64 SUSE 11 EC2 32 SUSE 11 EC2 64 Ubuntu 12 64 7

Virtual Appliance 9.5 (Windows Guests) Virtual Appliance 9.5 (Windows Guests) Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation File Intrusion Prevention Application Traffic Application Support Protection SSL Demand of Running Services, Registry Listening s On-Demand s Ports Registry Memory Smart Realtime On- Demand File and s On- Real- Time File and s Real-Time s of Running Services, Listening Port NSX w/ EPSec ESXi 5.5 NSX w/o EPSec ESXi 5.5 VShield w/ EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 vshield w/o EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 8

Virtual Appliance 9.5 (Linux Guests) Virtual Appliance 9.5 (Linux Guests) Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation File Registry Memory Smart Intrusion Prevention Application Traffic Application Protection SSL Support On-Demand File and s od od other registry Real-Time File and s Realtime Real- Time Registry rt registry NSX w/ EPSec ESXi 5.5 NSX w/o EPSec ESXi 5.5 VShield w/ EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 vshield w/o EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 9

Notes Notes Microsoft Hyper-V Agent-based protection will function normally in a Microsoft Hyper-V environment. However, if you install an Agent on the Hyper-V host as well as the guest VMs, be sure to bypass VM guest traffic on the host (in both incoming and outgoing directions) so that you are not filtering the same traffic twice on the host and on the guest. Allow Spyware The Allow Spyware/Greyware setting in Anti-Malware Configurations only applies to Windows Deep Security Agents. This feature is not supported on Linux Agents or by the Deep Security Virtual Appliance. Process Image File Exclusion The ability to exclude process image files from Real-time Anti-Malware scans is not supported on Linux Agents. 10