The following tables list security features available in Deep Security Agent 20 for
each operating system:
![]() |
NoteEarlier versions of agents are compatible with other operating systems. These agents
do
not support new features. For details, see Agent platform
compatibility.
To access information about features in earlier agent
versions:
|
Topics on this page:
AIX
For a list of supported AIX versions, see Deep Security Agent platforms.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
AIX 6.1 TL 9 or later
|
✔ 7
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||||||||||
AIX 7.1 TL 3 or later
|
✔ 6
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||||||||||
AIX 7.2 TL 0 or later
|
✔ 6
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||||||||||
AIX 7.3 TL 0 or later
|
✔ 13
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
AlmaLinux
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
AlmaLinux 8 (64-bit) 10
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
AlmaLinux 8 (64-bit) 10
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
AlmaLinux 9 (64-bit) 18
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Amazon Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Amazon Linux (64‑bit)
|
✔
|
✔ 6
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
Amazon Linux 2 (64‑bit)
|
✔
|
✔ 6
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 9
|
||||
✔ 7
|
✔ 7
|
✔
|
✔ 7
|
✔ 6
|
✔ 6
|
✔ 6
|
✔ 6
|
✔ 8
|
✔ 8
|
✔ 8
|
✔ 8
|
✔ 7
|
✔ 8
|
✔ 7
|
✔ 8
|
✔ 8
|
|||||||
Amazon Linux 2023 (64‑bit)20
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||
Amazon Linux 2023 (AWS Arm-based Graviton2) 20
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
CentOS Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
CentOS 6 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||||||
CentOS 6 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
CentOS 7 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||
CentOS 8 (64-bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
CloudLinux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
CloudLinux 7 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||||
CloudLinux 8 (64-bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Debian Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Debian Linux 8 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
Debian Linux 9 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||||
Debian Linux 10 (64-bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||
Debian Linux 11 (64-bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||
Debian Linux 12 (64-bit) 24
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Miracle Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Miracle Linux 8 (64‑bit) 23
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||
Miracle Linux 9 (64 bit) 25
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Oracle Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Oracle Linux 6 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||||||||||
Oracle Linux 6 (64‑bit)
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
Oracle Linux 7 (64‑bit)
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 13
|
✔
|
||||
Oracle Linux 8 (64-bit)
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 14
|
||||
Oracle Linux 9 (64-bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 20
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
![]() |
NoteInspecting TLS traffic when Oracle Linux 8 is in FIPS mode requires using Advanced TLS traffic inspection to support the ciphers applied by its predefined cryptographic policy.
|
Red Hat Enterprise Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Red Hat Enterprise Linux 6 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||||||
Red Hat Enterprise Linux 6 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||||
Red Hat Enterprise Linux 7 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||
Red Hat Enterprise Linux 8 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 9
|
|||
Red Hat Enterprise Linux 8 (AWS Arm-based Graviton2)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
Red Hat Enterprise Linux 8.6 (PowerPC little-endian) 28
|
✔
|
✔
|
✔
|
✔ 22
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||
Red Hat Enterprise Linux 9 (PowerPC little-endian)
|
✔ 33
|
✔ 33
|
✔ 33
|
✔ 33
|
✔ 33
|
✔ 33
|
✔ 33
|
✔ 33
|
✔ 34
|
✔ 34
|
✔ 34
|
✔ 34
|
✔ 34
|
✔ 34
|
✔ 34
|
✔ 34
|
✔ 34
|
✔ 33
|
✔ 34
|
✔ 33
|
|||
Red Hat Enterprise Linux 9 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 20
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 26
|
✔
|
✔
|
|||
Red Hat Enterprise Linux Workstation 7 (64‑bit) 18
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Red Hat OpenShift
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
OpenShift supported versions 41
|
✔
|
✔
|
✔
|
Rocky Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Rocky Linux 8 (64-bit) 10
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||||
Rocky Linux 9 (64-bit) 16
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Solaris
For a list of supported Solaris versions, see Deep Security Agent platforms. For more information, see How does agent protection work for Solaris zones?
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand 4 |
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Solaris
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
SUSE Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
SUSE Linux Enterprise Server 12 SP1, SP2, SP3, SP4, SP5 (64‑bit) 27
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 13
|
|||
SUSE Linux Enterprise Server 12 SP5 (PowerPC little-endian)
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 28
|
✔ 28
|
✔ 28
|
✔ 28
|
✔ 27
|
✔ 28
|
✔ 27
|
✔ 27
|
✔ 27
|
|||||
SUSE Linux Enterprise Server 15 SP1, SP2, SP3, SP4 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 13
|
|||
SUSE Linux Enterprise Server 15 SP2, SP3, SP4, SP5 (PowerPC little-endian)
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 27
|
✔ 28
|
✔ 28
|
✔ 28
|
✔ 28
|
✔ 27
|
✔ 28
|
✔ 27
|
✔ 27
|
✔ 27
|
|||||
SUSE Linux Enterprise Server 15 SP5 (AWS Arm-based Graviton2) 29
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
SUSE Linux Enterprise Server 15 SP6 (AWS Arm-based Graviton2) 32
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Ubuntu Linux
Real-time Anti-Malware requires a compatible file system. See Linux file
system compatibility.
Anti-Malware
|
Web Reputation Service
|
Firewall
|
Intrusion Prevention System
|
Integrity Monitoring
|
Log Inspection
|
Application Control
|
Recommen- dation Scan
|
Relay
|
Scanner
|
Vision One (XDR)
|
FIPS mode
|
||||||||||||
Real-time
|
On-demand
|
Real-time
|
On-demand
|
||||||||||||||||||||
Feature Set 1
|
Process memory scan, Registry scan
|
Behavior monitoring
|
Predictive Machine Learning 8
|
Feature Set 1
|
Unencrypted Traffic
|
SSL Encrypted Traffic
|
Advanced TLS Traffic Inspection
|
File Scans
|
Directory Scans
|
Scans of Running Processes, Listening Ports
|
File and Directory Scans
|
Registry Scans
|
Scans of Running Processes, Listening Ports
|
||||||||||
Ubuntu 16.04 (64‑bit)
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
Ubuntu 18.04 (64‑bit)
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||
Ubuntu 18.04 (AWS Arm-based Graviton2) 10
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
Ubuntu 20.04 (64‑bit)
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||
Ubuntu 20.04 (AWS Arm-based Graviton2) 10
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
||||||
Ubuntu 22.04 (64‑bit)
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 20
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||||
Ubuntu 22.04 (AWS Arm-based Graviton2) 13
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||||||
Ubuntu 24.04 (64‑bit) 32
|
✔
|
✔ 6
|
✔ 8
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 20
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
Microsoft Windows
For details on supported Windows 10 update releases, see Deep Security Support for Windows 10 and Deep Security Support for Windows Server Core.
For details on supported Windows 11 update releases, see Trend Cloud One - Endpoint & Workload Security and Deep Security Support for Windows
11.
![]() |
NoteFor Windows 2012 and later, both Desktop Experience and Server Core installations
are supported (any exceptions are mentioned in the table). For Windows Server 2008
and 2008 R2, only Full Installations are supported.
|
Anti-Malware | Web Reputation Service | Firewall | IntrusionPreventionSystem | IntegrityMonitoring | Log Inspection | Application Control | Recommen-dation Scan | Relay | Scanner | Vision One (XDR) | FIPS mode | Device Control | ||||||||||||||
Real-time scan | On-demand scan | Browser Extension | Real-time | On-demand | ||||||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Chrome | Edge | Unencrypted Traffic | SSL Encrypted Traffic | Advanced TLS Traffic Inspection | File Scans | Directory Scans | Scans of Running Services, Processes, Listening Ports 37 | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | |||||||||||
Windows 7 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔ 8
|
||||||
Windows 7 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔
|
✔ 8
|
|||||
Windows 7 Embedded (32‑bit) 2
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 8
|
|||||||||||
Windows 8 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔ 8
|
||||||
Windows 8 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔
|
✔ 8
|
|||||
Windows 8.1 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔ 8
|
||||||
Windows 8.1 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔
|
✔ 8
|
|||||
Windows 8.1 Embedded (32‑bit) 2
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 8
|
||||||||||
Windows 10 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔ 8
|
||||||
Windows 10 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
✔ 22
|
✔
|
✔
|
✔
|
✔ 15
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔
|
✔ 8
|
||
Windows 10 IoT Enterprise 2019 LTSC (32- and 64-bit) 2
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 8
|
||||||
Windows 10 IoT Enterprise 2021 LTSC (64-bit) 2
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 8
|
||||||
Windows 10 Enterprise multi-session (64-bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔
|
✔ 8
|
|||||
Windows 11 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
✔ 22
|
✔
|
✔
|
✔
|
✔ 15
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 34
|
✔
|
✔
|
✔
|
|||
Windows Server 2008 (32‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
||||||||
Windows Server 2008 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
||||||
Windows Server 2008 R2 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
||||
Windows Server 2012 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 3
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
||||||
Windows Server 2012 R2 (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 3
|
✔
|
✔
|
✔ 17
|
||
Windows Server 2016 (LTSC, version 1607) (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
✔ 22
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
Windows Server Core (SAC, version 1709) (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 5
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
|||||
Windows Server 2019 (LTSC, version 1809) (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
✔ 22
|
✔
|
✔
|
✔
|
✔ 11
|
✔ 5
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
Windows Server 2022 (LTSC, version 21H2) (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 21
|
✔ 22
|
✔
|
✔
|
✔
|
✔ 5
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 17
|
||
Windows Server 2025 (LTSC, version 24H2) (64‑bit)
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 21
|
✔ 22
|
✔
|
✔
|
✔
|
✔ 5
|
✔ 5
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔ 36
|
✔ 17
|
![]() |
NoteFIPS mode for Windows Desktop platforms might work, but is not officially supported.
|
Deep Security Virtual Appliance 20 (NSX) supported guest operating systems
Deep Security Virtual Appliance can protect guest VMs that run any OS shown below,
if VMware supports it. For the list of operating systems that VMware supports, see
the VMware Compatibility search tool. When using the tool, make sure that:
Anti-Malware | Web Reputation Service | Firewall | IntrusionPreventionSystem | IntegrityMonitoring | Log Inspection | Application Control | Recommen-dation Scan | Relay | Scanner | Vision One (XDR) | FIPS mode | |||||||||||
Real-time | On-demand | Real-time | On-demand | |||||||||||||||||||
Feature Set 1 1 | Process memory scan, Registry scan | Behavior monitoring | Predictive Machine Learning | Feature Set 1 1 | Unencrypted Traffic | SSL Encrypted Traffic | File Scans | Directory Scans | Scans of Running Services, Processes, Listening Ports | File and Directory Scans | Registry Scans | Scans of Running Services, Processes, Listening Ports | ||||||||||
OS vendors supported by the appliance on NSX Data Center for vSphere (NSX-V)
|
||||||||||||||||||||||
Microsoft Windows
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
N/A
|
|||||||||||||
Red Hat Enterprise Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
CentOS Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
Oracle Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
SUSE Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
Ubuntu Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
Debian Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
OS vendors supported by the appliance on NSX-T Data Center 3.x (NSX-T 3.x)
|
||||||||||||||||||||||
Microsoft Windows
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
✔
|
N/A
|
|||||||||||||
Red Hat Enterprise Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
CentOS Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
Oracle Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
SUSE Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
Ubuntu Linux
|
✔
|
✔
|
✔
|
N/A
|
||||||||||||||||||
Debian Linux
|
✔
|
✔
|
✔
|
N/A
|
Footnotes:
Footnotes:
-
Feature Set 1 includes signature-based file scanning, spyware scanning, and document exploit protection.
-
Because embedded operating systems usually run on custom hardware (for example, on point-of-sale terminals), you should thoroughly test your specific hardware platform prior to deployment in a production environment. Trend Micro tests Windows Embedded platforms in a virtualized environment. If you need to raise a case with Trend Micro Support, try to reproduce the problem in a virtualized environment. If the issue cannot be reproduced in a virtualized environment, and is specific to your custom hardware, Trend Micro Support might require you to provide remote access to it for diagnostics.Note that Windows 10 IoT was formerly named Windows 10 Embedded, and is therefore considered a Windows Embedded platform.
-
Requires a Desktop Experience installation. Server Core is not supported.
-
Anti-Malware on-demand scans are supported on all Solaris file systems.
-
Supports enhanced real-time integrity monitoring, which uses the application control driver to get information about who changed a monitored file.
-
Requires Deep Security Agent 20.0.0-1822 (20 LTS Update 2021-01-18) or later.
-
Requires Deep Security Agent 20.0.0-2204 (20 LTS Update 2021-04-12) or later.
-
Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2021-07-04) or later for Windows.
-
Requires Deep Security Agent 20.0.0-2921 (20 LTS Update 2021-08-30) or later.
-
Requires Deep Security Agent 20.0.0-3288 (20 LTS Update 2021-10-28) or later.
-
Requires Deep Security Agent 20.0.0-4185 (20 LTS Update 2022-04-06) or later.
-
Requires Deep Security Agent 20.0.0-5137 (20 LTS Update 2022-07-26) or later.
-
Requires Deep Security Agent 20.0.0-5394 (20 LTS Update 2022-08-29) or later.
-
Requires Deep Security Agent 20.0.0-5761 (20 LTS Update 2022-10-21) or later.
-
Requires Deep Security Agent 20.0.0-5953 (20 LTS Update 2022-11-22) or later.
-
Requires Deep Security Agent 20.0.0-5995 (20 LTS Update 2022-11-28) or later.
-
Requires Deep Security Agent 20.0.0-6313 (20 LTS Update 2023-01-31) or later.
-
Requires Deep Security Agent 20.0.0-6912 (20 LTS Update 2023-05-02) or later.
-
For Windows 11 systems, the Mobile (MTP/PTP) read-only protocol for Device Control requires Deep Security Agent 20.0.0-5810 (20 LTS Update 2022-10-27) or later.
-
Requires Deep Security Agent 20.0.0-7303 (20 LTS Update 2023-06-28) or later.
-
Requires Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later.
-
Requires Deep Security Agent 20.0.0-7943 (20 LTS Update 2023-09-26) or later.
-
Miracle Linux 8 is supported by Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later for Red Hat Enterprise Linux 8.
-
Requires Deep Security Agent 20.0.0-8438 (20 LTS Update 2023-12-12) or later.
-
Miracle Linux 9 is supported by Deep Security Agent 20.0.0-8137 (20 LTS Update 2023-10-26) or later for Red Hat Enterprise Linux 9.
-
Requires Deep Security Agent 20.0.1-4540 (20 LTS Update 2024-03-20) or later.
-
Requires Deep Security Agent 20.0.1-7380 (20 LTS Update 2024-04-24) or later.
-
Requires Deep Security Agent 20.0.1-12510 (20 LTS Update 2024-06-26) or later.
-
Requires Deep Security Agent 20.0.1-14610 (20 LTS Update 2024-07-20) or later.
-
Requires Deep Security Agent 20.0.0-8268 (20 LTS Update 2023-11-21) or later.
-
Requires Deep Security Agent 20.0.1-19250 (20 LTS Update 2024-09-18) or later.
-
Requires Deep Security Agent 20.0.1-21510 (20 LTS Update 2024-10-16) or later.
-
Requires Deep Security Agent 20.0.0-5512 (20 LTS Update 2022-09-22) or later.
-
Requires Deep Security Agent 20.0.1-23340 (20 LTS Update 2024-11-13) or later.
-
Requires Deep Security Agent 20.0.2-1390 (20 LTS Update 2025-01-15) or later.
-
There are two types of real-time support in Integrity Monitoring:
- True real-time, when a real-time event is triggered by the driver event detection.
- Pseudo real-time (caused by a lack of driver support), when a seemingly real-time event is triggered by a periodic execution of the scan thread, which consumes more CPU and memory. The user and process information is not reported.