Deep Security 9.5 SP1 Supported Features by Platform

Similar documents
Deep Security 9.6 Supported Features by Platform

Deep Security 9.6 SP1 Supported Features by Platform

Deep Security 9.5 Supported Features by Platform

Deep Security 9.5 Supported Features by Platform

Deep Security 9.6 SP1. Supported Features by Platform

Deep Security 9 SP1 p1 Supported Linux Kernels

Deep Security 9 Supported Linux Kernels



Trend Micro deep security 9.6





InstallAnywhere: Requirements

Deep Security 9 vcenter Operations Manager Integration

Carbonite Availability 8.2, Carbonite Migrate 8.2 and Carbonite Cloud Migration Supported Platforms Chart

Supported Platforms. HP Vertica Analytic Database. Software Version: 7.0.x


Oct 02, 2017 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy October 2017

White Paper. Securing the virtual infrastructure without impacting performance

Securing Your Virtual World Harri Kaikkonen Channel Manager

Data Protector 10.x Express Support Matrix

Trend Micro Core Protection Module 10.6 SP1 System Requirements

vrealize Automation Support Matrix vrealize Automation 6.2.x and 7.x 12 April 2018

Sonic Supported Platforms


vrealize Automation Support Matrix vrealize Automation 6.2.x and 7.x 6 September 2017


Aster Database Platform/OS Support Matrix, version 5.0.2

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4

Brother-Thoroughbred for DB2 LUW Version

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Manual Ftp Windows Server 2008 R2 Enterprise Virtual Edition

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

ArcExplorer -- Java Edition 9.0 System Requirements


vrealize Hyperic Supported Configurations and System Requirements

Client Automation v8.10 Enterprise, Standard, Starter*

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List

IM B36 Why You Should be Using NetBackup Bare Metal Restore (BMR) in Your DR Solution

AS Stallion. Security for Virtual Server Environments. Urmas Püss

Rapid Recovery Installation and Upgrade Guide

Digitizer operating system support

January 8, 2018 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy January 2018

Manual Ftp Windows Server 2008 Firewall Settings Greyed Out

Backup License Comparison OVERVIEW

NetVault : Backup Supported Platforms


Supported Platforms and Servers for Performance Management 4.4

Microsoft Windows Apple Mac OS X

GRID SOFTWARE FOR MICROSOFT WINDOWS SERVER VERSION /370.12

FlexNet Manager Suite 2015 R2 SP5 FlexNet Manager Suite 2015 Release 2 Service Pack 5

Networking and Security Services Compatibility Guide Last Updated: February 14, 2018 For more information go to vmware.com.

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

Axway Products. 24 January Supported Platforms

Manual Ftp Windows Server 2008 R2 Enterprise Virtual

Acronis Backup 12.5 License Comparison incl. cloud deployment functionality

HP Data Protector 7.0 Virtualization Support Matrix

INTEROPERABILITY MATRIX FOR ALL ZERTO VIRTUAL REPLICATION VERSIONS

SNOW LICENSE MANAGER (7.X)... 3

Centrify Infrastructure Services

Oracle FS1-2 Flash Storage System. Customer Release Notes 6.1. Part Number E Oracle FS1-2 System release July

HP Data Protector 8.00 Platform and Integration Support Matrix

Security in a Virtualized Environment with TrendMicro

Manual Ftp Windows Server 2008 R2 Firewall Login Failed

Support for NetBackup 7.7.x and 8.x in virtual environments

Dynamic Datacenter Security Solidex, November 2009

HPE Data Protector 8.10 Platform and Integration Support Matrix

Centrify Server Suite, Standard Edition

Veritas InfoScale TM Operations Manager 7.3 Hardware and Software Compatibility List

IBM Tivoli Application Dependency Discovery Manager Version Sensors and supported target systems

Data Protector 10.0x Platform and Integration Support Matrix

SYMANTEC DATA CENTER SECURITY

Aster Database Platform/OS Support Matrix, version 6.00

Data Protector 10.x Platform and Integration Support Matrix

Data Protector 10.x Platform and Integration Support Matrix

Veritas NetBackup Enterprise Server and Server x OS Software Compatibility List

HP Discovery and Dependency Mapping Inventory

Cisco Prime Service Catalog Compatibility Matrix

SanDisk DAS Cache Compatibility Matrix

Acronis Backup 12.5 USER GUIDE

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

Symantec NetBackup PureDisk Compatibility Matrix Created August 26, 2010

RTI CORBA Compatibility Kit. Release Notes

Manual Ftp Windows Server 2008 R2 Enterprise Keygen Do

vcloud Automation Center Support Matrix

Hitachi Storage Adapter for SAP NetWeaver Landscape Virtualization Management v Release Notes

ASG-Software Compatibility Guide

OfficeScanTM 10 For Enterprise and Medium Business

NGFW Security Management Center

All rights reserved. All trademarks are the property of their respective owners.

Manually Change Default Gateway Centos 5.5

Enterprise Compatibility Matrix

McAfee Network Security Platform 9.1

Integrated System Operations & Management Software for IoT Era

Contents Server Platform Support Matrix... 2

RSA NetWitness Logs. Bind DNS. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

Transcription:

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro site at: http://www.trendmicro.com/download Trend Micro, the Trend Micro t-ball logo, Deep Security, Control Server Plug-in, Damage Cleanup eserver Plug-in, Inter, Network VirusWall, Mail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Document version: 1.3 Document number: APEM96795/141124 Release date: April 8, 2015 Last updated: July 14, 2017

Table of Contents Introduction... 4 Windows Agent 9.5 SP1... 5 Linux Agent 9.5 SP1... 6 Solaris Agent 9.0... 8 HP-UX Agent 9.0... 9 AIX Agent 9.0... 10 Amazon Linux Agent 9.5 SP1... 11 Virtual Appliance 9.5 SP1 (Windows guests)... 12 Virtual Appliance 9.5 SP1 (Linux guests)... 13

Introduction Introduction This document contains tables showing which Deep Security features are supported on which operating systems and platforms. The tables list the Agent-based protection provided by Deep Security Agents and the Agentless protection provided in virtualized environements by the Deep Security Virtual Appliance. Legend Supported: Not Supported: For a list of specific Linux kernels supported for each platform, see the document titled Deep Security 9.5 Supported Linux Kernels. 4

Windows Agent 9.5 SP1 Windows Agent 9.5 SP1 Relay and s Registry s On-Demand s of Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand Real- Time and s Real-Time s of Windows Windows XP 32 Windows XP 64 Windows XP Embedded Windows Server 2003 32 Windows Server 2003 64 Windows Server 2003 R2 32 Windows Server 2003 R2 64 Windows Vista 32 Windows Vista 64 Windows 7 32 Windows 7 64 Windows Server 2008 32 Windows Server 2008 64 Windows Server 2008 R2 64 Windows 8 32 Windows 8 64 Windows 8.1 32 Windows 8.1 64 Windows Server 2012 64 Windows Server 2012 R2 64 5

Linux Agent 9.5 SP1 Linux Agent 9.5 SP1 and s Registry s Demand s of Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand On- Real- Time and s Real-Time s of Relay Red Hat Enterprise Linux Red Hat Enterprise Linux 5 32 Red Hat Enterprise Linux 5 64 Red Hat Enterprise Linux 6 32 Red Hat Enterprise Linux 6 64 Red Hat Enterprise Linux 7 64 CentOS CentOS 5 32 CentOS 5 64 CentOS 6 32 CentOS 6 64 CentOS 7 64 Oracle Linux Oracle Linux 5 32 Oracle Linux 5 64 Oracle Linux 6 32 Oracle Linux 6 64 SuSE SUSE 10 32 SUSE 10 64 SUSE 11 32 SUSE 11 64 Ubuntu Ubuntu 10.04 LTS 64 Ubuntu 12.04 LTS 64 Ubuntu 14.04 LTS 64 Cloud Linux Cloud Linux 5 32 Cloud Linux 5 64 6

Linux Agent 9.5 SP1 and s Registry s Demand s of Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand On- Real- Time and s Real-Time s of Relay Cloud Linux 6 32 Cloud Linux 6 64 7

Solaris Agent 9.0 Solaris Agent 9.0 Solaris Solaris 9 Sparc and s Registry s Demand s of Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand On- Real- Time and s Real-Time s of Relay Solaris 10 Update 7/8/9/10/11 Sparc Solaris 10 Update 7/8/9/10/11 x86 64 Solaris 10 x86 64 Solaris 11 Sparc Solaris 11 x86 64 8

HP-UX Agent 9.0 HP-UX Agent 9.0 Relay Intrusion Prevention Application Traffic Application Support SSL On-Demand s of Registry Memory Smart Realtime On- Demand and s On- Demand Registry s Real- Time and s Real-Time s of HP-UX HP-UX 11.31 9

AIX Agent 9.0 AIX Agent 9.0 Relay Intrusion Prevention Application Traffic Application Support SSL On-Demand and s Registry Memory Smart Realtime On- Demand Registry s On-Demand s of Real-Time and s Real-Time s of AIX AIX 5.3 AIX 6.1 AIX 7.1 10

Amazon Linux Agent 9.5 SP1 Amazon Linux Agent 9.5 SP1 Relay and s Registry s On-Demand s of Registry Memory Smart Realtime Intrusion Application SSL On- On- Prevention Traffic Application Support Demand Demand Real- Time and s Real-Time s of Amazon Linux Redhat 6 EC2 32 Redhat 6 EC2 64 Redhat 7 EC2 64 AMI Linux 32 AMI Linux 64 SUSE 11 EC2 32 SUSE 11 EC2 64 Ubuntu 12.04 LTS 64 Ubuntu 14.04 LTS 64 11

Virtual Appliance 9.5 SP1 (Windows Guests) Virtual Appliance 9.5 SP1 (Windows Guests) Intrusion Prevention Application Traffic Application Support SSL Demand of Registry s On-Demand s Registry Memory Smart Realtime On- Demand and s On- Real- Time and s Real-Time s of Port NSX w/ EPSec ESXi 5.5 NSX w/o EPSec ESXi 5.5 VShield w/ EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 vshield w/o EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 12

Virtual Appliance 9.5 SP1 (Linux Guests) Virtual Appliance 9.5 SP1 (Linux Guests) Registry Memory Smart Intrusion Prevention Application Traffic Application SSL Support On-Demand and s od od other registry Real-Time and s Realtime Real- Time Registry rt registry NSX w/ EPSec ESXi 5.5 NSX w/o EPSec ESXi 5.5 VShield w/ EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 vshield w/o EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 13

Notes Notes Microsoft Hyper-V Agent-based protection will function normally in a Microsoft Hyper-V environment. However, if you install an Agent on the Hyper-V host as well as guest VMs, be sure to bind Trend Micro Light Weight Filter Driver only at virtual NIC. You should not bind it to Virtual Network Switch/physical NIC. Allow Spyware The Allow Spyware/Greyware setting in Configurations only applies to Windows Deep Security Agents. This feature is not supported on Linux Agents or by the Deep Security Virtual Appliance. Process Image Exclusion The ability to exclude process image files from Real-time scans is not supported on Linux Agents. Agent Self Agent Self- is a Windows only feature. Agent Self- is configured in the Computer Editor window on the Settings page. Stateful ACK Storm and FTP settings are only supported on version 8.0 and earlier Agents. They are not supported on version 9.0 or later Agents. 14