Deep Security 9.5 Supported Features by Platform



Similar documents
Deep Security 9.6 SP1 Supported Features by Platform

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.


Reference Testing Guide for Deep Security





How To Install And Use Trend Micro Software On A Computer Or Network With A Network Security Agent (For A Powerpoint) For Free




Trend Micro deep security 9.6

Comprehensive security platform for physical, virtual, and cloud servers

Devising a Server Protection Strategy with Trend Micro

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Trend Micro. Advanced Security Built for the Cloud

Devising a Server Protection Strategy with Trend Micro

Virtualization Journey Stages

How To Protect Your Cloud From Attack

PCI DSS 3.0 Compliance

x86 Servers and Operating Systems - Information applicable for PRIMEQUEST (PQ) and PRIMERGY (PY) Servers PY RX300 S8 PY RX200 S8 PY CX272 S1

x86 Servers and Operating Systems - Information applicable for PRIMEQUEST (PQ) and PRIMERGY (PY) Servers PY RX300 S8 PY RX200 S8 PY CX272 S1

OfficeScanTM 10 For Enterprise and Medium Business

Cloud and Data Center Security

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

TREND MICRO DEEP SECURITY

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

About the VM-Series Firewall

vcloud Automation Center Support Matrix vcloud Automation Center 5.2

Total Cloud Protection

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Core Protection for Virtual Machines 1

Parallels Virtuozzo Containers 4.7 for Linux Readme

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

Netzwerkvirtualisierung? Aber mit Sicherheit!

ontune SPA - Server Performance Monitor and Analysis Tool

GRAVITYZONE UNIFIED SECURITY MANAGEMENT

Shipping Products Chart. Contents

The Virtualization Practice


Meeting the Challenges of Virtualization Security

Acronis Backup & Recovery 11.5

Shipping Products Chart. Contents


Intrusion Defense Firewall 1.1 for OfficeScan Client/Server Edition. Administrator's Guide

Symantec Endpoint Protection Datasheet

PARALLELS SERVER BARE METAL 5.0 README

McAfee MOVE AntiVirus (Agentless) 3.6.0

BITDEFENDER GRAVITYZONE

vcloud Automation Center Support Matrix vcloud Automation Center 5.1

Bitdefender GravityZone Sales Presentation

in Cloud and Data Center Security for a Reason

NAS Storage needs to be purchased; Will not be offered IAAS - Utility SMTP Per SMTP account Per server

OVERVIEW. Enterprise Security Solutions

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Information Security Recommendation Report


Symantec Endpoint Protection MP1a and MP1 Release Notes

Windows Server 2003 End of Support. What does it mean? What are my options?

BITDEFENDER GRAVITYZONE

The Clock is Ticking on Windows Server 2003 Support


I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

vrealize Automation Support Matrix

Shipping Products Chart. Contents

Shipping Products Chart. Contents

VMware vcenter Update Manager Administration Guide

Parallels Virtualization SDK ReadMe CONTENTS:

Virtualization & Cloud Computing (2W-VnCC)

Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center

Uila SaaS Installation Guide

Microsoft Windows Apple Mac OS X

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide

SapphireIMS 4.0 Asset Management Feature Specification

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

ENTERPRISE HYPERVISOR COMPARISON

Effective End-to-End Cloud Security

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Shipping Products Chart. Contents

Deep Security Vulnerability Protection Summary

Comparing Free Virtualization Products

Deep Security For Service Providers

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

VMware vcenter Update Manager Administration Guide


TREND MICRO. InterScan VirusWall 6. Getting Started Guide. Integrated virus and spam protection for your Internet gateway.

Endpoint protection for physical and virtual desktops

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Automated Protection on UCS with Trend Micro Deep Security

CISCO CLOUD SERVICES PRICING GUIDE AUSTRALIA

Patch Management Integration

Solution Paper. Virtualization security solutions provide a competitive advantage to service providers IaaS, PaaS and SaaS

NetVault Bare Metal Recovery (VaultDR) Supported Platforms

Endpoint protection for physical and virtual desktops

Transcription:

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro site at: http://www.trendmicro.com/download Trend Micro, the Trend Micro t-ball logo, Deep Security, Control Server Plug-in, Damage Cleanup Services, eserver Plug-in, Inter, Network VirusWall, Mail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Document version: 1.9 Document number: APEM96201/131029 Release date: Nov 21, 2014

Table of Contents Introduction... 4 Windows Agent 9.5... 5 Linux Agent 9.5... 6 Amazon Linux Agent 9.5... 7 Virtual Appliance (Windows guests)... 8 Virtual Appliance (Linux guests)... 9

Introduction Introduction This document contains tables showing which Deep Security features are supported on which operating systems and platforms. The tables list the Agent-based protection provided by Deep Security Agents and the Agentless protection provided in virtualized environements by the Deep Security Virtual Appliance. Legend Supported: Not Supported: For a list of specific Linux kernels supported for each platform, see the document titled Deep Security 9.5 Supported Linux Kernels. 4

Windows Agent 9.5 Windows Agent 9.5 Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation Relay File Intrusion Prevention Application Control Protection SSL File and s Application Support Demand Demand Registry s Demand s of Running Services, Listening Ports Registry Memory Smart Realtime Real- Time File and s Real-Time s of Running Services, Listening Ports Windows Windows XP 32 Windows XP 64 Windows 2003 32 Windows 2003 64 Windows Vista 32 Windows Vista 64 Windows 7 32 Windows 7 64 Windows Server 2008 32 Windows Server 2008 64 Windows 8 32 Windows 8 64 Windows 8.1 32 Windows 8.1 64 Windows Server 2012 64 Windows Server 2012 R2 64 5

Linux Agent 9.5 Linux Agent 9.5 Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation Relay File Intrusion Prevention Application Control Protection SSL File and s Application Support Demand Demand Registry s Demand s of Running Services, Listening Ports Registry Memory Smart Realtime Real- Time File and s Real-Time s of Running Services, Listening Ports Red Hat Redhat 5 32 Redhat 5 64 Redhat 6 32 Redhat 6 64 CentOS CentOS 5 32 CentOS 5 64 CentOS 6 32 CentOS 6 64 Oracle Linux Oracle Linux 5 32 Oracle Linux 5 64 Oracle Linux 6 32 Oracle Linux 6 64 SuSE SUSE 10 32 SUSE 10 64 SUSE 11 32 SUSE 11 64 Ubuntu Ubuntu 10 64 Ubuntu 12 64 Ubuntu 14 64 Cloud Linux Cloud Linux 5 32 Cloud Linux 5 64 Cloud Linux 6 32 Cloud Linux 6 64 6

Amazon Linux Agent 9.5 Amazon Linux Agent 9.5 Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation Relay File Intrusion Prevention Application Control Protection SSL File and s Application Support Demand Demand Registry s Demand s of Running Services, Listening Ports Registry Memory Smart Realtime Real- Time File and s Real-Time s of Running Services, Listening Ports Amazon Linux Redhat 6 EC2 32 Redhat 6 EC2 64 AMI Linux 32 AMI Linux 64 SUSE 11 EC2 32 SUSE 11 EC2 64 Ubuntu 12 64 7

Virtual Appliance 9.5 (Windows Guests) Virtual Appliance 9.5 (Windows Guests) Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation File Intrusion Prevention Application Control Application Support Protection SSL Demand of Running Services, Registry Listening s Demand s Ports Registry Memory Smart Realtime Demand File and s Real- Time File and s Real-Time s of Running Services, Listening Port NSX w/ EPSec ESXi 5.5 NSX w/o EPSec ESXi 5.5 VShield w/ EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 vshield w/o EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 8

Virtual Appliance 9.5 (Linux Guests) Virtual Appliance 9.5 (Linux Guests) Anti-Malware Reputation Service Firewall Intrusion Prevention System Integrity Monitoring Log Inspection Recommendation File Registry Memory Smart Intrusion Prevention Application Control Application Protection SSL Support Demand File and s od od other registry Real-Time File and s Realtime Real- Time Registry rt registry NSX w/ EPSec ESXi 5.5 NSX w/o EPSec ESXi 5.5 VShield w/ EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 vshield w/o EPSec ESXi 5.0 ESXi 5.1 ESXi 5.5 9

Notes Notes Microsoft Hyper-V Agent-based protection will function normally in a Microsoft Hyper-V environment. However, if you install an Agent on the Hyper-V host as well as the guest VMs, be sure to bypass VM guest traffic on the host (in both incoming and outgoing directions) so that you are not filtering the same traffic twice on the host and on the guest. Allow Spyware The Allow Spyware/Greyware setting in Anti-Malware Configurations only applies to Windows Deep Security Agents. This feature is not supported on Linux Agents or by the Deep Security Virtual Appliance. Process Image File Exclusion The ability to exclude process image files from Real-time Anti-Malware scans is not supported on Linux Agents. 10