Topics on this page
Supported features by platform
The tables below list the features available for each OS platform of Deep Security Agent 20.
Support for older agents
Older agents are compatible with other platforms (although they don't support new features). See the list of agents compatible with Workload Security, the Workload Security release strategy and life cycle policy, and supported features lists:
- Deep Security Agent 12 supported features
- Deep Security Agent 11 supported features
- Deep Security Agent 10 supported features
- Deep Security Agent 9.6 supported features
Microsoft Windows
For Windows Server 2012 and later, both Full/Desktop Experience and Server Core installations are supported (exceptions are noted in the table below). For Windows Server 2008 and 2008 R2, only Full installations are supported.
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | Device Control (15) | ||||||||||||||
Real-time scan | On-demand scan | Browser Extension | Real-time | On-demand | Software Rulesets | Trust Entities | ||||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | |||||||||||||
Windows 7 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | |||||
Windows 7 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ✔ | |||
Windows 7 Embedded (32-bit) (3) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||
Windows Server 2008 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Windows Server 2008 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||
Windows Server 2008 R2 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | ✔ | ||
Windows 8 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ||||
Windows 8 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ✔ | |||
Windows 8.1 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ||||
Windows 8.1 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ✔ | |||
Windows 8.1 Embedded (32-bit) (3) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Windows 10 (32-bit) (2) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ||||
Windows 10 (64-bit) (2) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (22) | ✔ | ✔ | ✔ | ✔ | ✔ (22) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ✔ | |
Windows 10 IoT Enterprise 2019 LTSC (32- and 64-bit) (3) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Windows 10 IoT Enterprise 2021 LTSC (64-bit) (3) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||
Windows 11 (64-bit) (5) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (22) | ✔ | ✔ | ✔ | ✔ | ✔ (22) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (20) | ✔ (20) | ✔ | ✔ | ✔ | ✔ | |
Windows Server 2012 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1)(6) | ✔ (1)(6) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (6) | ✔ (6) (13) | ✔ | ✔ | ✔ | ✔ | |||
Windows Server 2012 R2 (64-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ (6) | ✔ | ✔ | |
Windows Server 2016 (LTSC, version 1607) (64-bit) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (22) | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | ✔ |
Windows Server Core (SAC, version 1709) (64-bit)(2) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | |||
Windows Server 2019 (LTSC, version 1809) (64-bit) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (22) | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | ✔ |
Windows Server 2022 (LTSC, version 21H2) (64-bit) |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ |
Red Hat Enterprise Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Red Hat Enterprise Linux 6 (32-bit) | ✔ (4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
Red Hat Enterprise Linux 6 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | ||||
Red Hat Enterprise Linux 7 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | |||
Red Hat Enterprise Linux 8 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | |||
Red Hat Enterprise Linux 8 (AWS ARM-Based Graviton 2) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Red Hat Enterprise Linux 9 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ |
CentOS Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time scan | On-demand scan | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
CentOS 6 (32-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||
CentOS 6 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
CentOS 7 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
CentOS 8 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ |
OpenShift
Anti-Malware | Web Reputation Service | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control | Recommen- dation Scan |
Relay | Scanner | Vision One (XDR) | FIPS mode | ||||||||||||
Real-time | On-demand | Real-time | On-demand | ||||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||
OpenShift 4.9-4.11 | ✔ (4) | ✔ (7) | ✔ (9) |
Rocky Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Rocky Linux 8 (64-bit) (12) | ✔(4) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
Rocky Linux 9 (64-bit) (24) | ✔(4) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Oracle Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Oracle Linux 6 (32-bit) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
Oracle Linux 6 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Oracle Linux 7 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ (21) | ✔ | |||
Oracle Linux 8 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ |
SUSE Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
SUSE Linux Enterprise Server 12 SP1, SP2, SP3, SP4, SP5 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ | |||
SUSE Linux Enterprise Server 15 SP1, SP2, SP3 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ✔ |
Ubuntu Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Ubuntu 16.04 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Ubuntu 18.04 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
Ubuntu 18.04 (AWS ARM-Based Graviton 2) (11) | ✔(4) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Ubuntu 20.04 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
Ubuntu 20.04 (AWS ARM-Based Graviton 2) (12) | ✔(4) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Ubuntu 22.04 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Ubuntu 22.04 (AWS ARM-Based Graviton 2) (19) | ✔(4) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ |
Debian Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Debian 8 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Debian 9 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
Debian Linux 10 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
Debian Linux 11 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ |
CloudLinux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
CloudLinux 7 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
CloudLinux 8 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ |
Amazon Linux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Amazon Linux (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | |||||
Amazon Linux 2 (64-bit) | ✔(4) | ✔ (7) | ✔(9) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ | ✔ | ||||
Amazon Linux 2 (AWS ARM-Based Graviton 2) (7) and Amazon Linux 2 (AWS ARM-Based Graviton 3) (18) |
✔(8) | ✔(8) | ✔(9) | ✔(8) | ✔(7) | ✔(9) | ✔(7) | ✔(7) | ✔(7) | ✔(9) | ✔(9) | ✔(9) | ✔(9) | ✔(8) | ✔(9) | ✔ (13) | ✔(8) | ✔(9) | ✔(9) |
AlmaLinux
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
AlmaLinux 8 (64-bit) (11) | ✔(4) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ (1) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ (13) | ✔ | ✔ |
Solaris
See Agent protection of Solaris zone traffic flows for more on how protection works between Solaris zones. For a list of supported Solaris versions, see Agent platforms.
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
Solaris | ✔ (10) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
AIX
For a list of supported AIX versions, see Agent platforms.
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | |||||||||||||
Real-time | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | |||||||||||||||||||
Feature Set 1 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 1 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | FileScans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | |||||||||||
AIX 6.1 TL 9 or later | ✔ (8) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
AIX 7.1 TL 3 or later | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
AIX 7.2 TL 0 or later | ✔ (7) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||||||||
AIX 7.3 TL 0 or later | ✔ (19) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
macOS
Anti-Malware | Web Reputation Service | Activity Monitoring (23) | Firewall | Intrusion Prevention System |
Integrity Monitoring |
Log Inspection | Application Control |
Recommen- dation Scan |
Relay | Scanner | Trend Micro Vision One (XDR) | Device Control (15) | |||||||||||||
Real-time (16) | On-demand | Real-time | On-demand | Software Rulesets | Trust Entities | ||||||||||||||||||||
Feature Set 2 | Process Memory Scan, Registry Scan | Behavior Monitoring | Predictive Machine Learning | Feature Set 2 | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | FileScans | Directory Scans | Scans of Running Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Processes, Listening Ports | ||||||||||||
macOS Catalina (10.15) | ✔ | ✔ (17) | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||||||||
macOS Big Sur (11.0 or later) | ✔ | ✔ (17) | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||||||||
macOS Monterey (12.0 or later) | ✔ | ✔ (17) | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||||||||||||
macOS Ventura (13.0.1 or later) | ✔ | ✔ (17) | ✔ | ✔ | ✔ | ✔ | ✔ |
Feature Set 1 includes signature-based file scanning, spyware scanning, and document exploit protection
Feature Set 2 includes signature-based file scanning and spyware scanning (but not document exploit protection)
(1) This platform supports enhanced real-time integrity monitoring. It uses the application control driver to provide file monitoring and captures information about who made changes to a monitored file.
(2): Microsoft releases regular, semi-annual releases for Microsoft Windows 10 and Windows Server Core. For details about which specific releases are supported, see Deep Security Support for Windows 10 and Deep Security Support for Windows Server Core.
(3) All Trend Micro testing on Windows Embedded platforms is performed in a virtualized environment. Because these operating systems are typically run on custom hardware (for example, on point-of-sale terminals), customers must plan to thoroughly test on their target hardware platform prior to deployment in a production environment. In addition, before raising support cases, customers should attempt to reproduce problems in a virtualized environment because this is the environment the Trend Micro support team has available. If the issue is specific to deployments on custom hardware, Trend Micro may require the customer to provide us with remote access to a suitable environment before we can fully respond to support cases. Note that Windows 10 IoT was formerly named Windows 10 Embedded, and is therefore included in the list of Windows Embedded platforms.
(4) Real-time Anti-Malware support on Linux: Real-time Anti-Malware scanning is highly dependent on the file system hooking implementation, so file system incompatibility can cause issues with this feature. The following table shows which file systems are compatible with the feature:
(5): Microsoft releases regular, semi-annual releases for Microsoft Windows 11. For details about which specific releases are supported, see Trend Micro Cloud One - Workload Security and Deep Security Support for Windows 11.
File system type | Agent version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
20 | 12 FR | 12.0 | 11.3 | 11.2 | 11.1 | 11.0 | 10.3 | 10.2 | 10.1 | 10.0 | 9.6 | ||
Disk file systems | ext2 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
ext3 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
ext4 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
XFS | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Btrfs | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
VFAT | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Optical discs | ISO 9660 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Special file systems | tmpfs | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
aufs | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||
OverlayFS | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Network file systems (see Note, below) |
NFSv3 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
NFSv4 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
SMB | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
CIFS | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
FTP | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
To protect network file systems, you must select Enable network directory scan in the malware scan configuration. For information, see Scan a network directory (real-time scan only)
(6) Requires a Full/Desktop Experience installation. Server Core installations are not supported.
(7) Requires Deep Security Agent 20.0.0-1822 (20 LTS Update 2021-01-18) or newer.
(8) Requires Deep Security Agent 20.0.0-2204 (20 LTS Update 2021-04-12) or newer.
(9) Requires Deep Security Agent 20.0.0-2395 (20 LTS Update 2021-05-24) or newer.
(10) On-demand Anti-Malware scans are supported on all Solaris file systems.
(11) Requires Deep Security Agent 20.0.0-3165 (20 LTS Update 2021-10-08) or newer.
(12) Requires Deep Security Agent 20.0.0-3288 (20 LTS Update 2021-10-28) or newer.
(13) Requires Deep Security Agent 20.0.0-2740 (20 LTS Update 2021-07-29) or newer.
(14) Requires Deep Security Agent 20.0.0-4185 (20 LTS Update 2022-04-06) or newer.
(15) Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2022-07-04) or newer for Windows, and 20.0.0-158 (20 LTS Update 2022-07-11) or newer for macOS.
(16) Deep Security Agent for macOS (version 20.0.158+) does not support the Schedule option for real-time scans (Anti-Malware > General > Real-Time Scan). Continuous real-time scanning is supported.
(17) Deep Security Agent for macOS only supports the Quarantine action.
(18) Requires Deep Security Agent 20.0.0-5137 (20 LTS Update 2022-07-26) or newer.
(19) Requires Deep Security Agent 20.0.0-5394 (20 LTS Update 2022-08-29) or newer.
(20) Requires Deep Security Agent 20.0.0-5512 (20 LTS Update 2022-09-22) or newer.
(21) Requires Deep Security Agent 20.0.0-5761 (20 LTS Update 2022-10-21) or newer.
(22) Requires Deep Security Agent 20.0.0-5995 (20 LTS Update 2022-11-28) or newer.
(23) Requires Deep Security Agent 20.0.0-1681 (20 LTS Update 2021-01-04) or newer.
(24) Requires Deep Security Agent 20.0.0-6313 (20 LTS Update 2023-01-31) or newer.