The following tables list the security features available for each platform of Deep Security Agent 20.0.
Older agents are compatible with other platforms, although they do not support new functionality. For more information, see the list of agents compatible with Workload Security, the Workload Security release strategy and life cycle policy, and the following lists of supported features on each platform:

AIX

The following table lists the Deep Security Agent 20.0 features available on AIX.
For a list of supported AIX versions, see Agent platforms.
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
   
Real-time
On-demand
 
Software Rulesets
Trust Entities
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
AIX 6.1 TL 9 or later
11
AIX 7.1 TL 3 or later
10
AIX 7.2 TL 0 or later
10
AIX 7.3 TL 0 or later
19

AlmaLinux

The following table lists the Deep Security Agent 20.0 features available on AlmaLinux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
AlmaLinux 8 (64-bit) 13
8
16
7
15
38
AlmaLinux 9 (64-bit) 24
8
7

Amazon Linux

The following table lists the Deep Security Agent 20.0 features available on Amazon Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Amazon Linux (64-bit)
8
10
12
7
15
Amazon Linux 2 (64-bit)
8
10
12
16
7
15
38
Amazon Linux 2 (AWS Arm-based Graviton2) 10andAmazon Linux 2 (AWS Arm-based Graviton3) 18
11
11
12
11
10
12
10
10
10
12
12
12
12
11
12
15
11
38
12
12
Amazon Linux 2023 (64-bit)26
8
7
Amazon Linux 2023 (AWS Arm-based Graviton2)26

CentOS Linux

The following table lists the Deep Security Agent 20.0 features available on CentOS Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
CentOS 6 (32-bit)
8
10
12
CentOS 6 (64-bit)
8
10
12
7
15
CentOS 7 (64-bit)
8
10
12
16
7
15
38
CentOS 8 (64-bit)
8
10
12
16
7
15
38

CloudLinux

The following table lists the Deep Security Agent 20.0 features available on CloudLinux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
CloudLinux 7 (64-bit)
8
10
12
16
7
15
38
CloudLinux 8 (64-bit)
8
10
12
16
7
15
38

Debian Linux

The following table lists the Deep Security Agent 20.0 features available on Debian Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Debian Linux 8 (64-bit)
8
10
12
7
15
Debian Linux 9 (64-bit)
8
10
12
16
7
15
Debian Linux 10 (64-bit)
8
10
12
16
7
15
Debian Linux 11 (64-bit)
8
10
12
7
15
38
Debian Linux 12 (64-bit)30
8
10
12
7
15
38

Miracle Linux

The following table lists the Deep Security Agent 20.0 features available on Miracle Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Miracle Linux 8 (64-bit)29
7
Miracle Linux 9 (64-bit)31
7

Oracle Linux

The following table lists the Deep Security Agent 20.0 features available on Oracle Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Oracle Linux 6 (32-bit)
Oracle Linux 6 (64-bit)
8
10
12
7
15
Oracle Linux 7 (64-bit)
8
10
12
16
7
15
38
21
Oracle Linux 8 (64-bit)
8
10
12
16
7
15
38
Oracle Linux 9 (64-bit)
26
7
38

Red Hat Enterprise Linux

The following table lists the Deep Security Agent 20.0 features available on Red Hat Enterprise Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Red Hat Enterprise Linux 6 (32-bit)
8
10
12
Red Hat Enterprise Linux 6 (64-bit)
8
10
12
7
15
Red Hat Enterprise Linux 7 (64-bit)
8
10
12
16
7
15
38
Red Hat Enterprise Linux 8 (64-bit)
8
10
12
16
7
15
38
Red Hat Enterprise Linux 8 (AWS Arm-based Graviton2)
8
10
12
7
15
38
Red Hat Enterprise Linux 8.6 (PowerPC little-endian) 34
28
38
Red Hat Enterprise Linux 9 (64-bit)
8
10
12
26
7
15
38
32
Red Hat Enterprise Linux Workstation 7 (64-bit) 24
8
7
38
Red Hat Enterprise Linux 9 (PowerPC little-endian)
38
38
38
38
38
38
38
38
38
38
39
39
39
39
39
39
39
39
39
39
38
39
38

Rocky Linux

The following table lists the Deep Security Agent 20.0 features available on Rocky Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
 
     
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Rocky Linux 8 (64-bit) 14
8
16
7
15
38
Rocky Linux 9 (64-bit) 23
8
16
7
38

SUSE Linux

The following table lists the Deep Security Agent 20.0 features available on SUSE Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
SUSE Linux Enterprise Server 12 SP1, SP2, SP3, SP4, SP5 (64-bit)
8
10
12
16
7
15
38
SUSE Linux Enterprise Server 12 SP5 (PowerPC little-endian)
33
33
33
33
33
33
33
33
33
33
34
34
34
34
33
34
34
33
38
33
33
SUSE Linux Enterprise Server 15 SP1, SP2, SP3, SP4 (64-bit)
8
10
12
16
7
15
38
SUSE Linux Enterprise Server 15 SP2, SP3, SP4, SP5 (PowerPC little-endian)
33
33
33
33
33
33
33
33
33
33
34
34
34
34
33
34
34
33
38
33
33
SUSE Linux Enterprise Server 15 SP5 (AWS Arm-based Graviton2) 35
38
SUSE Linux Enterprise Server 15 SP6 (AWS Arm-based Graviton2) 37
38

Ubuntu Linux

The following table lists the Deep Security Agent 20.0 features available on Ubuntu Linux:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Ubuntu 16.04 (64-bit)
8
10
12
7
15
38
Ubuntu 18.04 (64-bit)
8
10
12
16
7
15
38
Ubuntu 18.04 (AWS Arm-based Graviton2) 13
8
7
15
38
Ubuntu 20.04 (64-bit)
8
10
12
16
7
15
38
Ubuntu 20.04 (AWS Arm-based Graviton2) 14
8
7
15
38
Ubuntu 22.04 (64-bit)
8
10
12
26
7
15
38
Ubuntu 22.04 (AWS Arm-based Graviton2) 19
8
7
15
38
Ubuntu 24.04 (64-bit) 37
8
26
7
15
38

Red Hat OpenShift

The following table lists the Deep Security Agent 20.0 features available on Red Hat OpenShift:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
OpenShift supported versions
36
10
12

Solaris

The following table lists the Deep Security Agent 20.0 features available on Solaris.
For information on how protection works between Solaris zones, see Agent protection of Solaris zone traffic flows. For a list of supported Solaris versions, see Agent platforms.
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Solaris
6

macOS

The following table lists the Deep Security Agent 20.0 features available on macOS:
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall25
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Device Control17
Real-time
On-demand
     
Real-time
On-demand
 
Software Rulesets
Trust Entities
           
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
macOS 11.0+ (Big Sur)
macOS 12.0+ (Monterey)
macOS 13.0.1+ (Ventura)
macOS 14.0+ (Sonoma)
macOS 15.0+ (Sequoia)

Windows

The following table lists the Deep Security Agent 20.0 features available on Windows.
For details on supported Windows 10 update releases, see Deep Security Support for Windows 10 and Deep Security Support for Windows Server Core.
For details on supported Windows 11 update releases, see Trend Cloud One - Endpoint & Workload Security and Deep Security Support for Windows 11.
Note that for Windows Server 2012 and later, both Desktop Experience and Server Core installations are supported, with several exceptions listed in the following table. For Windows Server 2008 and 2008 R2, only Desktop installations are supported.
 
Anti-malware
Web Reputation Service
Activity Monitoring 9
Firewall
Intrusion Prevention System
Integrity Monitoring
Log Inspection
Application Control
Recommendation Scan
Enhanced Recommendation Scan
Relay
Scanner
Trend Vision One extended detection and response (XDR)
Device Control
FIPS mode
Real-time
On-demand
 
Browser Extension
   
Real-time
On-demand
 
Software Rulesets
Trust Entities
         
Feature Set1
Process Memory Scan, Registry Scan
Behavior Monitoring
Predictive Machine Learning
Feature Set1
Chrome
Edge
Unencrypted Traffic
SSL Encrypted Traffic
Advanced TLS Traffic Inspection
FileScans
Directory Scans
Scans of Running Processes, Listening Ports
File and Directory Scans
Registry Scans
Scans of Running Processes, Listening Ports
Windows 7 (32-bit)
20
20
38
Windows 7 (64-bit)
20
20
38
Windows 7 Embedded (32-bit) 4
38
Windows Server 2008 (32-bit)
Windows Server 2008 (64-bit)
Windows Server 2008 R2 (64-bit)
7
7
15
Windows 8 (32-bit)
20
20
Windows 8 (64-bit)
20
20
Windows 8.1 (32-bit)
20
20
Windows 8.1 (64-bit)
20
20
Windows 8.1 Embedded (32-bit) 4
Windows 10 (32-bit)
20
20
38
Windows 10 (64-bit)
22
28
22
20
20
38
Windows 10 IoT Enterprise 2019 LTSC (32- and 64-bit) 4
Windows 10 IoT Enterprise 2021 LTSC (64-bit) 4
Windows 11 (64-bit)
22
28
22
20
20
38
Windows Server 2012 (64-bit)
7, 5
7, 5
5
5, 15
Windows Server 2012 R2 (64-bit)
16
7
7
15
5
Windows Server 2016(LTSC, version 1607) (64-bit)
22
28
16
7
7
15
38
Windows Server Core (SAC, version 1709) (64-bit)
7
7
15
38
Windows Server 2019 (LTSC, version 1809) (64-bit)
22
28
16
7
7
15
38
Windows Server 2022 (LTSC, version 21H2) (64-bit)
27
28
7
7
15
38
Windows Server 2025 (LTSC, version 24H2) (64‑bit)
27
28
7
7
15
40

Footnotes:

  1. Feature Set 1 includes signature-based file scanning, spyware scanning, and document exploit protection.
  2. Does not support any actions, such as Quarantine, Delete, Pass.
  3. Supports continuous real-time scanning. Deep Security Agent for macOS (version 20.0.158+) does not support the Schedule option for real-time scans (Anti-Malware > General > Real-Time Scan).
  4. Because embedded operating systems usually run on custom hardware (for example, on point-of-sale terminals), you should thoroughly test your specific hardware platform prior to deployment in a production environment. Trend Micro tests Windows Embedded platforms in a virtualized environment. If you need to raise a case with Trend Micro Support, try to reproduce the problem in a virtualized environment. If the issue cannot be reproduced in a virtualized environment, and is specific to your custom hardware, Trend Micro Support might require you to provide remote access to it for diagnostics.
    Note that Windows 10 IoT was formerly named Windows 10 Embedded, and is therefore considered a Windows Embedded platform.
  5. Requires a Desktop Experience installation. Server Core is not supported.
  6. Anti-Malware on-demand scans are supported on all Solaris file systems.
  7. Supports enhanced real-time integrity monitoring, which uses the application control driver to get information about who changed a monitored file.
  8. Real-time Anti-Malware requires a compatible Linux file system.
  9. Requires Deep Security Agent 20.0.0-1681 (20 LTS Update 2021-01-04) or later.
  10. Requires Deep Security Agent 20.0.0-1822 (20 LTS Update 2021-01-18) or later.
  11. Requires Deep Security Agent 20.0.0-2204 (20 LTS Update 2021-04-12) or later.
  12. Requires Deep Security Agent 20.0.0-2395 (20 LTS Update 2021-05-24) or later.
  13. Requires Deep Security Agent 20.0.0-3165 (20 LTS Update 2021-10-08) or later.
  14. Requires Deep Security Agent 20.0.0-3288 (20 LTS Update 2021-10-28) or later.
  15. Requires Deep Security Agent 20.0.0-2740 (20 LTS Update 2021-07-29) or later.
  16. Requires Deep Security Agent 20.0.0-4185 (20 LTS Update 2022-04-06) or later.
  17. Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2021-07-04) or later for Windows.
  18. Requires Deep Security Agent 20.0.0-5137 (20 LTS Update 2022-07-26) or later.
  19. Requires Deep Security Agent 20.0.0-5394 (20 LTS Update 2022-08-29) or later.
  20. Requires Deep Security Agent 20.0.0-5512 (20 LTS Update 2022-09-22) or later.
  21. Requires Deep Security Agent 20.0.0-5761 (20 LTS Update 2022-10-21) or later.
  22. Requires Deep Security Agent 20.0.0-5995 (20 LTS Update 2022-11-28) or later.
  23. Requires Deep Security Agent 20.0.0-6313 (20 LTS Update 2023-01-31) or later.
  24. Requires Deep Security Agent 20.0.0-6912 (20 LTS Update 2023-05-02) or later.
  25. Requires Deep Security Agent 20.0.0-208 (20 LTS Update 2023-04-25) or later for macOS.
  26. Requires Deep Security Agent 20.0.0-7303 (20 LTS Update 2023-06-28) or later.
  27. Requires Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later.
  28. Requires Deep Security Agent 20.0.0-7943 (20 LTS Update 2023-09-26) or later.
  29. Miracle Linux 8 is supported by Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later for Red Hat Enterprise Linux 8.
  30. Requires Deep Security Agent 20.0.0-8438 (20 LTS Update 2023-12-12) or later.
  31. Miracle Linux 9 is supported by Deep Security Agent 20.0.0-8137 (20 LTS Update 2023-10-26) or later for Red Hat Enterprise Linux 9.
  32. Requires Deep Security Agent 20.0.1-4540 (20 LTS Update 2024-03-20) or later.
  33. Requires Deep Security Agent 20.0.1-7380 (20 LTS Update 2024-04-24) or later.
  34. Requires Deep Security Agent 20.0.1-12510 (20 LTS Update 2024-06-26) or later.
  35. Requires Deep Security Agent 20.0.1-14610 (20 LTS Update 2024-07-20) or later.
  36. Requires Deep Security Agent 20.0.1-19250 (20 LTS Update 2024-09-18) or later.
  37. Requires Deep Security Agent 20.0.1-21510 (20 LTS Update 2024-10-16) or later.
  38. Requires Deep Security Agent 20.0.1-23340 (20 LTS Update 2024-11-13) or later.
  39. Requires Deep Security Agent 20.0.2-1390 (20 LTS Update 2025-01-15) or later.