Topics on this page
Supported features by platform
The following tables list the security features available for each platform of Deep Security Agent 20.0.
Older agents are compatible with other platforms, although they do not support new functionality. For more information, see the list of agents compatible with Workload Security, the Workload Security release strategy and life cycle policy, and the following lists of supported features on each platform:
- Deep Security Agent 12 supported features
- Deep Security Agent 11 supported features
- Deep Security Agent 10 supported features
- Deep Security Agent 9.6 supported features
AIX
The following table lists the Deep Security Agent 20.0 features available on AIX.
For a list of supported AIX versions, see Agent platforms.
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | FileScans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
AIX 6.1 TL 9 or later | ✔ 11 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
AIX 7.1 TL 3 or later | ✔ 10 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
AIX 7.2 TL 0 or later | ✔ 10 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
AIX 7.3 TL 0 or later | ✔ 19 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
AlmaLinux
The following table lists the Deep Security Agent 20.0 features available on AlmaLinux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
AlmaLinux 8 (64-bit) 13 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | |||||
AlmaLinux 9 (64-bit) 24 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Amazon Linux
The following table lists the Deep Security Agent 20.0 features available on Amazon Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Amazon Linux (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Amazon Linux 2 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Amazon Linux 2 (AWS Arm-based Graviton2) 10 and Amazon Linux 2 (AWS Arm-based Graviton3) 18 |
✔ 11 | ✔ 11 | ✔ 12 | ✔ 11 | ✔ 10 | ✔ 12 | ✔ 10 | ✔ 10 | ✔ 10 | ✔ 12 | ✔ 12 | ✔ 12 | ✔ 12 | ✔ 11 | ✔ 12 | ✔ 15 | ✔ 11 | ✔ 12 | ✔ 12 | |||||
Amazon Linux 2023 (64-bit)26 | ✔8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Amazon Linux 2023 (AWS Arm-based Graviton2)26 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
CentOS Linux
The following table lists the Deep Security Agent 20.0 features available on CentOS Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time scan | On-demand scan | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
CentOS 6 (32-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
CentOS 6 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
CentOS 7 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
CentOS 8 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ |
CloudLinux
The following table lists the Deep Security Agent 20.0 features available on CloudLinux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
CloudLinux 7 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
CloudLinux 8 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ |
Debian Linux
The following table lists the Deep Security Agent 20.0 features available on Debian Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Debian Linux 8 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Debian Linux 9 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Debian Linux 10 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Debian Linux 11 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Debian Linux 12 (64-bit)30 | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ |
Miracle Linux
The following table lists the Deep Security Agent 20.0 features available on Miracle Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Miracle Linux 8 (64-bit)29 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||
Miracle Linux 9 (64-bit)31 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Oracle Linux
The following table lists the Deep Security Agent 20.0 features available on Oracle Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Oracle Linux 6 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
Oracle Linux 6 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Oracle Linux 7 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ 21 | ✔ | |||
Oracle Linux 8 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Oracle Linux 9 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 26 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Red Hat Enterprise Linux
The following table lists the Deep Security Agent 20.0 features available on Red Hat Enterprise Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Red Hat Enterprise Linux 6 (32-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
Red Hat Enterprise Linux 6 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | ||||
Red Hat Enterprise Linux 7 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | |||
Red Hat Enterprise Linux 8 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | |||
Red Hat Enterprise Linux 8 (AWS Arm-based Graviton2) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Red Hat Enterprise Linux 8.6 (PowerPC little-endian) 34 | ✔ | ✔ | ✔ | ✔ | ✔ 28 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Red Hat Enterprise Linux 9 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 26 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔32 | ✔ | |||
Red Hat Enterprise Linux Workstation 7 (64-bit) 24 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Red Hat Enterprise Linux 9 (PowerPC little-endian) | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 38 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 39 | ✔ 38 | ✔ 39 | ✔ 38 |
Rocky Linux
The following table lists the Deep Security Agent 20.0 features available on Rocky Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Rocky Linux 8 (64-bit) 14 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Rocky Linux 9 (64-bit) 23 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
SUSE Linux
The following table lists the Deep Security Agent 20.0 features available on SUSE Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
SUSE Linux Enterprise Server 12 SP1, SP2, SP3, SP4, SP5 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | |||
SUSE Linux Enterprise Server 12 SP5 (PowerPC little-endian) | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 34 | ✔ 34 | ✔ 34 | ✔ 34 | ✔ 33 | ✔ 34 | ✔ 34 | ✔ 33 | ✔ 33 | ✔ 33 | ||||
SUSE Linux Enterprise Server 15 SP1, SP2, SP3, SP4 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | |||
SUSE Linux Enterprise Server 15 SP2, SP3, SP4, SP5 (PowerPC little-endian) | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 33 | ✔ 34 | ✔ 34 | ✔ 34 | ✔ 34 | ✔ 33 | ✔ 34 | ✔ 34 | ✔ 33 | ✔ 33 | ✔ 33 | ||||
SUSE Linux Enterprise Server 15 SP5 (AWS Arm-based Graviton2) 35 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
SUSE Linux Enterprise Server 15 SP6 (AWS Arm-based Graviton2) 37 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Ubuntu Linux
The following table lists the Deep Security Agent 20.0 features available on Ubuntu Linux:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Ubuntu 16.04 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Ubuntu 18.04 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Ubuntu 18.04 (AWS Arm-based Graviton2) 13 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Ubuntu 20.04 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Ubuntu 20.04 (AWS Arm-based Graviton2) 14 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Ubuntu 22.04 (64-bit) | ✔ 8 | ✔ 10 | ✔ 12 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 26 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ||||
Ubuntu 22.04 (AWS Arm-based Graviton2) 19 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | |||||
Ubuntu 24.04 (64-bit) 37 | ✔ 8 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 26 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ |
Red Hat OpenShift
The following table lists the Deep Security Agent 20.0 features available on Red Hat OpenShift:
Anti-Malware | Web Reputation Service | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control | Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
OpenShift supported versions | ✔ 36 | ✔ 10 | ✔ 12 |
Solaris
The following table lists the Deep Security Agent 20.0 features available on Solaris.
For information on how protection works between Solaris zones, see Agent protection of Solaris zone traffic flows. For a list of supported Solaris versions, see Agent platforms.
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning 2 | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Solaris | ✔ 6 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
macOS
The following table lists the Deep Security Agent 20.0 features available on macOS:
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall 25 | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | Device Control 17 | |||||||||||||
Real-time 3 | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | ||||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | FileScans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||||
macOS 11.0+ (Big Sur) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||||
macOS 12.0+ (Monterey) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||||
macOS 13.0.1+ (Ventura) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||||
macOS 14.0+ (Sonoma) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||||
macOS 15.0+ (Sequoia) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Microsoft Windows
The following table lists the Deep Security Agent 20.0 features available on Windows.
For details on supported Windows 10 update releases, see Deep Security Support for Windows 10 and Deep Security Support for Windows Server Core.
For details on supported Windows 11 update releases, see Trend Cloud One - Endpoint & Workload Security and Deep Security Support for Windows 11.
Note that for Windows Server 2012 and later, both Desktop Experience and Server Core installations are supported, with several exceptions listed in the following table. For Windows Server 2008 and 2008 R2, only Desktop installations are supported.
Anti-Malware | Web Reputation Service | Activity Monitoring 9 | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Vision One extended detection and response (XDR) | Device Control 17 | |||||||||||||||
Real-time scan | On-demand scan | Browser Extension | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||||
Feature Set 1 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 1 | Chrome | Edge | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||||||
Windows 7 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | |||||||
Windows 7 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | |||||
Windows 7 Embedded (32-bit) 4 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||
Windows Server 2008 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
Windows Server 2008 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||
Windows Server 2008 R2 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | ✔ | |||
Windows 8 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | |||||
Windows 8 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | ✔ | ||||
Windows 8.1 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | |||||
Windows 8.1 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | ✔ | ||||
Windows 8.1 Embedded (32-bit) 4 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows 10 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | |||||
Windows 10 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 22 | ✔ 28 | ✔ | ✔ | ✔ | ✔ | ✔ 22 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | ✔ | |
Windows 10 IoT Enterprise 2019 LTSC (32- and 64-bit) 4 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Windows 10 IoT Enterprise 2021 LTSC (64-bit) 4 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Windows 11 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 22 | ✔ 28 | ✔ | ✔ | ✔ | ✔ | ✔ 22 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 20 | ✔ 20 | ✔ | ✔ | ✔ | ✔ | |
Windows Server 2012 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7, 5 | ✔ 7, 5 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 5 | ✔ 5, 15 | ✔ | ✔ | ✔ | ✔ | ||||
Windows Server 2012 R2 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ 5 | ✔ | ✔ | ||
Windows Server 2016 (LTSC, version 1607) (64-bit) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 22 | ✔ 28 | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | ✔ |
Windows Server Core (SAC, version 1709) (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | ||||
Windows Server 2019 (LTSC, version 1809) (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 22 | ✔ 28 | ✔ | ✔ | ✔ | ✔ | ✔ 16 | ✔ 7 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ | ✔ |
Windows Server 2022 (LTSC, version 21H2) (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 27 | ✔ 28 | ✔ | ✔ | ✔ | ✔ | ✔ 7 | ✔ 7 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ 15 | ✔ | ✔ | ✔ | ✔ |
Footnotes:
-
Feature Set 1 includes signature-based file scanning, spyware scanning, and document exploit protection.
-
Does not support any actions, such as Quarantine, Delete, Pass.
-
Supports continuous real-time scanning. Deep Security Agent for macOS (version 20.0.158+) does not support the Schedule option for real-time scans (Anti-Malware > General > Real-Time Scan).
-
Because embedded operating systems usually run on custom hardware (for example, on point-of-sale terminals), you should thoroughly test your specific hardware platform prior to deployment in a production environment. Trend Micro tests Windows Embedded platforms in a virtualized environment. If you need to raise a case with Trend Micro Support, try to reproduce the problem in a virtualized environment. If the issue cannot be reproduced in a virtualized environment, and is specific to your custom hardware, Trend Micro Support might require you to provide remote access to it for diagnostics.
Note that Windows 10 IoT was formerly named Windows 10 Embedded, and is therefore considered a Windows Embedded platform.
-
Requires a Desktop Experience installation. Server Core is not supported.
-
Anti-Malware on-demand scans are supported on all Solaris file systems.
-
Supports enhanced real-time integrity monitoring, which uses the application control driver to get information about who changed a monitored file.
-
Real-time Anti-Malware requires a compatible Linux file system.
-
Requires Deep Security Agent 20.0.0-1681 (20 LTS Update 2021-01-04) or later.
-
Requires Deep Security Agent 20.0.0-1822 (20 LTS Update 2021-01-18) or later.
-
Requires Deep Security Agent 20.0.0-2204 (20 LTS Update 2021-04-12) or later.
-
Requires Deep Security Agent 20.0.0-2395 (20 LTS Update 2021-05-24) or later.
-
Requires Deep Security Agent 20.0.0-3165 (20 LTS Update 2021-10-08) or later.
-
Requires Deep Security Agent 20.0.0-3288 (20 LTS Update 2021-10-28) or later.
-
Requires Deep Security Agent 20.0.0-2740 (20 LTS Update 2021-07-29) or later.
-
Requires Deep Security Agent 20.0.0-4185 (20 LTS Update 2022-04-06) or later.
-
Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2021-07-04) or later for Windows.
-
Requires Deep Security Agent 20.0.0-5137 (20 LTS Update 2022-07-26) or later.
-
Requires Deep Security Agent 20.0.0-5394 (20 LTS Update 2022-08-29) or later.
-
Requires Deep Security Agent 20.0.0-5512 (20 LTS Update 2022-09-22) or later.
-
Requires Deep Security Agent 20.0.0-5761 (20 LTS Update 2022-10-21) or later.
-
Requires Deep Security Agent 20.0.0-5995 (20 LTS Update 2022-11-28) or later.
-
Requires Deep Security Agent 20.0.0-6313 (20 LTS Update 2023-01-31) or later.
-
Requires Deep Security Agent 20.0.0-6912 (20 LTS Update 2023-05-02) or later.
-
Requires Deep Security Agent for macOS 20.0.0-208 (20 LTS Update 2023-04-25) or later.
-
Requires Deep Security Agent 20.0.0-7303 (20 LTS Update 2023-06-28) or later.
-
Requires Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later.
-
Requires Deep Security Agent 20.0.0-7943 (20 LTS Update 2023-09-26) or later.
-
Miracle Linux 8 is supported by Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later for Red Hat Enterprise Linux 8.
-
Requires Deep Security Agent 20.0.0-8438 (20 LTS Update 2023-12-12) or later.
-
Miracle Linux 9 is supported by Deep Security Agent 20.0.0-8137 (20 LTS Update 2023-10-26) or later for Red Hat Enterprise Linux 9.
-
Requires Deep Security Agent 20.0.1-4540 (20 LTS Update 2024-03-20) or later.
-
Requires Deep Security Agent 20.0.1-7380 (20 LTS Update 2024-04-24) or later.
-
Requires Deep Security Agent 20.0.1-12510 (20 LTS Update 2024-06-26) or later.
-
Requires Deep Security Agent 20.0.1-14610 (20 LTS Update 2024-07-20) or later.
-
Requires Deep Security Agent 20.0.1-19250 (20 LTS Update 2024-09-18) or later.
-
Requires Deep Security Agent 20.0.1-21510 (20 LTS Update 2024-10-16) or later.
-
Requires Deep Security Agent 20.0.1-23340 (20 LTS Update 2024-11-13) or later.