Supported features by platform

The following tables list security features available in Deep Security Agent 20 and Deep Security Virtual Appliance for each operating system:

Earlier versions of agents are compatible with other operating systems. These agents do not support new features. For details, see Agent platform compatibility.

To access information about features in earlier agent versions:

Topics on this page:

AIX

For a list of supported AIX versions, see Agent platform compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection FileScans Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
AIX 6.1 TL 9 or later ✔ 7
AIX 7.1 TL 3 or later
✔ 6
AIX 7.2 TL 0 or later ✔ 6
AIX 7.3 TL 0 or later ✔ 13

AlmaLinux

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection 11 File Scans 5 Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
AlmaLinux 8 (64-bit) 10
AlmaLinux 8 (64-bit) 10
AlmaLinux 9 (64-bit) 18

Amazon Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Amazon Linux (64‑bit) ✔ 6 ✔ 5
Amazon Linux 2 (64‑bit) ✔ 6 ✔ 11 ✔ 5 ✔ 9
Amazon Linux 2 (AWS Arm-based Graviton2) 6
and
Amazon Linux 2 (AWS ARM-Based Graviton 3) 12
✔ 7 ✔ 7 ✔ 7 ✔ 6 ✔ 6 ✔ 6 ✔ 6 ✔ 8 ✔ 8 ✔ 8 ✔ 8 ✔ 7 ✔ 8 ✔ 7 ✔ 8 ✔ 8
Amazon Linux 2023 (64‑bit)20
✔ 5
Amazon Linux 2023 (AWS Arm-based Graviton2) 20

CentOS Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring 6 Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
CentOS 6 (32‑bit)
CentOS 6 (64‑bit) ✔ 5
CentOS 7 (64‑bit) ✔ 11 ✔ 5
CentOS 8 (64-bit) ✔ 11 ✔ 5

CloudLinux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring 6 Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection 11 File Scans 5 Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
CloudLinux 7 (64‑bit)
CloudLinux 8 (64-bit)

Debian Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring 6 Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans 5 Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Debian Linux 8 (64‑bit)
Debian Linux 9 (64‑bit) ✔ 11
Debian Linux 10 (64-bit) ✔ 11
Debian Linux 11 (64-bit)
Debian Linux 12 (64-bit) 24

Miracle Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring 6 Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection 11 File Scans 5 Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Miracle Linux 8 (64‑bit) 23
Miracle Linux 9 (64 bit) 25

Oracle Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Oracle Linux 6 (32‑bit)
Oracle Linux 6 (64‑bit) ✔ 6 ✔ 8 ✔ 5
Oracle Linux 7 (64‑bit) ✔ 6 ✔ 8 ✔ 11 ✔ 5 ✔ 14
Oracle Linux 8 (64-bit) ✔ 6 ✔ 8 ✔ 11 ✔ 5 ✔ 15
Oracle Linux 9 (64-bit) ✔ 20 ✔ 5
Inspecting TLS traffic when Oracle Linux 8 is in FIPS mode requires using Advanced TLS traffic inspection to support the ciphers applied by its predefined cryptographic policy.

Red Hat Enterprise Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring 6 Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Red Hat Enterprise Linux 6 (32‑bit)
Red Hat Enterprise Linux 6 (64‑bit) ✔ 5
Red Hat Enterprise Linux 7 (64‑bit) ✔ 11 ✔ 5
Red Hat Enterprise Linux 8 (64‑bit) ✔ 11 ✔ 5 ✔ 9
Red Hat Enterprise Linux 8 (AWS Arm-based Graviton2) ✔ 5
Red Hat Enterprise Linux 8.6 (PowerPC little-endian) 28 ✔ 22
Red Hat Enterprise Linux 9 (PowerPC little-endian) ✔ 33 ✔ 33 ✔ 33 ✔ 33 ✔ 33 ✔ 33 ✔ 33 ✔ 33 ✔ 33 ✔ 35 ✔ 35 ✔ 35 ✔ 35 ✔ 35 ✔ 35 ✔ 35 ✔ 35 ✔ 35 ✔ 33 ✔ 35 ✔ 33
Red Hat Enterprise Linux 9 (64‑bit) ✔ 20 ✔ 5 ✔ 26
Red Hat Enterprise Linux Workstation 7 (64‑bit)  18 ✔ 5

Red Hat OpenShift

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring 6 Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
OpenShift supported versions 31

Rocky Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection 11 File Scans  5 Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Rocky Linux 8 (64-bit) 10
Rocky Linux 9 (64-bit) 17

Solaris

For a list of supported Solaris versions, see Agent platform compatibility. For more information, see How does agent protection work for Solaris zones?

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand 4 Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Solaris

SUSE Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring 6 Predictive Machine Learning 8 Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection 11 File Scans 5 Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
SUSE Linux Enterprise Server 12 SP1, SP2, SP3, SP4, SP5 (64‑bit) 27 ✔ 14
SUSE Linux Enterprise Server 12 SP5 (PowerPC little-endian) ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 28 ✔ 28 ✔ 28 ✔ 28 ✔ 27 ✔ 28 ✔ 27 ✔ 27 ✔ 27
SUSE Linux Enterprise Server 15 SP1, SP2, SP3, SP4 (64‑bit) ✔ 14
SUSE Linux Enterprise Server 15 SP2, SP3, SP4, SP5 (PowerPC little-endian) ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 27 ✔ 28 ✔ 28 ✔ 28 ✔ 28 ✔ 27 ✔ 28 ✔ 27 ✔ 27 ✔ 27
SUSE Linux Enterprise Server 15 SP5 (AWS Arm-based Graviton2) 29
SUSE Linux Enterprise Server 15 SP6 (AWS Arm-based Graviton2) 32

Ubuntu Linux

Real-time Anti-Malware requires a compatible file system. See Linux file system compatibility.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans 5 Directory Scans Scans of Running Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Processes, Listening Ports
Ubuntu 16.04 (64‑bit) ✔ 6 ✔ 8
Ubuntu 18.04 (64‑bit) ✔ 6 ✔ 8 ✔ 11
Ubuntu 18.04 (AWS Arm-based Graviton2) 10
Ubuntu 20.04 (64‑bit) ✔ 6 ✔ 8 ✔ 11
Ubuntu 20.04 (AWS Arm-based Graviton2) 10
Ubuntu 22.04 (64‑bit) ✔ 6 ✔ 8 ✔ 20
Ubuntu 22.04 (AWS Arm-based Graviton2) 13
Ubuntu 24.04 (64‑bit) 32 ✔ 6 ✔ 8 ✔ 20

Microsoft Windows

For details on supported Windows 10 update releases, see Deep Security Support for Windows 10 and Deep Security Support for Windows Server Core.

For details on supported Windows 11 update releases, see Trend Cloud One - Endpoint & Workload Security and Deep Security Support for Windows 11.

For Windows 2012 and later, both Desktop Experience and Server Core installations are supported (any exceptions are mentioned in the table). For Windows Server 2008 and 2008 R2, only Full Installations are supported.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode Device Control
Real-time scan On-demand scan Browser Extension Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Chrome Edge Unencrypted Traffic SSL Encrypted Traffic Advanced TLS Traffic Inspection File Scans Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
Windows 7 (32‑bit) ✔ 34 ✔ 8
Windows 7 (64‑bit) ✔ 34 ✔ 8
Windows 7 Embedded (32‑bit) 2 ✔ 8
Windows 8 (32‑bit) ✔ 34 ✔ 8
Windows 8 (64‑bit) ✔ 34 ✔ 8
Windows 8.1 (32‑bit) ✔ 34 ✔ 8
Windows 8.1 (64‑bit) ✔ 34 ✔ 8
Windows 8.1 Embedded (32‑bit) 2 ✔ 8
Windows 10 (32‑bit) ✔ 34 ✔ 8
Windows 10 (64‑bit) ✔ 17 ✔ 22 ✔ 16 ✔ 34 ✔ 8
Windows 10 IoT Enterprise 2019 LTSC (32- and 64-bit) 2 ✔ 8
Windows 10 IoT Enterprise 2021 LTSC (64-bit) 2 ✔ 8
Windows 10 Enterprise multi-session (64-bit) ✔ 34 ✔ 8
Windows 11 (64‑bit) ✔ 17 ✔ 22 ✔ 16 ✔ 34 ✔ 819
Windows Server 2008 (32‑bit) ✔ 17
Windows Server 2008 (64‑bit) ✔ 17
Windows Server 2008 R2 (64‑bit) ✔ 5 ✔ 5 ✔ 17
Windows Server 2012 (64‑bit) ✔ 35 ✔ 35 ✔ 3 ✔ 17
Windows Server 2012 R2 (64‑bit) ✔ 11 ✔ 5 ✔ 5 ✔ 3 ✔ 17
Windows Server 2016
(LTSC, version 1607) (64‑bit)
✔ 17 ✔ 22 ✔ 11 ✔ 5 ✔ 5 ✔ 17
Windows Server Core (SAC, version 1709) (64‑bit) ✔ 5 ✔ 5
Windows Server 2019
(LTSC, version 1809) (64‑bit)
✔ 17 ✔ 22 ✔ 11 ✔ 5 ✔ 5 ✔ 17
Windows Server 2022
(LTSC, version 21H2) (64‑bit)
✔ 21 ✔ 22 ✔ 5 ✔ 5 ✔ 17

FIPS mode for Windows Desktop platforms might work, but is not supported.

Deep Security Virtual Appliance 20 (NSX) supported guest operating systems

Deep Security Virtual Appliance can protect guest VMs that run any OS shown below, if VMware supports it. For the list of operating systems that VMware supports, see the VMware Compatibility search tool. When using the tool, make sure that:

  • What are you looking for? is set to Guest OS.
  • OS Vendor is set to an OS shown below.

If you are using combined mode, the agent must also support the OS of the guest VM.

Supported features also vary by NSX license type. For details, see VMware deployments with the virtual appliance and NSX.

Anti-Malware Web Reputation Service Firewall Intrusion
Prevention
System
Integrity
Monitoring
Log Inspection Application Control Recommen-
dation Scan
Relay Scanner Vision One (XDR) FIPS mode
Real-time On-demand Real-time On-demand
Feature Set 1 1 Process memory scan, Registry scan Behavior monitoring Predictive Machine Learning Feature Set 1 1 Unencrypted Traffic SSL Encrypted Traffic File Scans Directory Scans Scans of Running Services, Processes, Listening Ports File and Directory Scans Registry Scans Scans of Running Services, Processes, Listening Ports
OS vendors supported by the appliance on NSX Data Center for vSphere (NSX-V)
Microsoft Windows N/A
Red Hat Enterprise Linux N/A
CentOS Linux N/A
Oracle Linux N/A
SUSE Linux N/A
Ubuntu Linux N/A
Debian Linux N/A
OS vendors supported by the appliance on NSX-T Data Center 3.x (NSX-T 3.x)
Microsoft Windows N/A
Red Hat Enterprise Linux N/A
CentOS Linux N/A
Oracle Linux N/A
SUSE Linux N/A
Ubuntu Linux N/A
Debian Linux N/A

Footnotes:

1

Feature Set 1 includes signature-based file scanning, spyware scanning, and document exploit protection.

2

Because embedded operating systems usually run on custom hardware (for example, on point-of-sale terminals), you should thoroughly test your specific hardware platform prior to deployment in a production environment. Trend Micro tests Windows Embedded platforms in a virtualized environment. If you need to raise a case with Trend Micro Support, try to reproduce the problem in a virtualized environment. If the issue cannot be reproduced in a virtualized environment, and is specific to your custom hardware, Trend Micro Support might require you to provide remote access to it for diagnostics.

Windows 10 IoT was formerly named Windows 10 Embedded, and is therefore considered a Windows Embedded platform.

3

Requires a Full/Desktop Experience installation. Server Core is not supported.

4

Anti-Malware on-demand scans are supported on all Solaris file systems.

5

Supports enhanced real-time integrity monitoring, which uses the application control driver to get information about who changed a monitored file.

6

Requires Deep Security Agent 20.0.0-1822 (20 LTS Update 2021-01-18) or later.

7

Requires Deep Security Agent 20.0.0-2204 (20 LTS Update 2021-04-12) or later.

8

Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2022-07-04) or later.

9

Requires Deep Security Agent 20.0.0-2921 (20 LTS Update 2021-08-30) or later.

10

Requires Deep Security Agent 20.0.0-3288 (20 LTS Update 2021-10-28) or later.

11

Requires Deep Security Agent 20.0.0-4185 (20 LTS Update 2022-04-06) or later.

12

Requires Deep Security Agent 20.0.0-5137 (20 LTS Update 2022-07-26) or later.

13

Requires Deep Security Agent 20.0.0-5394 (20 LTS Update 2022-08-29) or later.

14

Requires Deep Security Agent 20.0.0-5761 (20 LTS Update 2022-10-21) or later.

15

Requires Deep Security Agent 20.0.0-5953 (20 LTS Update 2022-11-22) or later.

16

Requires Deep Security Agent 20.0.0-5995 (20 LTS Update 2022-11-28) or later.

17

Requires Deep Security Agent 20.0.0-6313 (20 LTS Update 2023-01-31) or later.

18

Requires Deep Security Agent 20.0.0-6912 (20 LTS Update 2023-05-02) or later.

19

For Windows 11 systems, the Mobile (MTP/PTP) read-only protocol for Device Control requires Deep Security Agent 20.0.0-5810 (20 LTS Update 2022-10-27) or later.

20

Requires Deep Security Agent 20.0.0-7303 (20 LTS Update 2023-06-28) or later.

21

Requires Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later.

22

Requires Deep Security Agent 20.0.0-7943 (20 LTS Update 2023-09-26) or later.

23

Miracle Linux 8 is supported by Deep Security Agent 20.0.0-7719 (20 LTS Update 2023-08-29) or later for Red Hat Enterprise Linux 8.

24

Requires Deep Security Agent 20.0.0-8438 (20 LTS Update 2023-12-12) or later.

25

Miracle Linux 9 is supported by Deep Security Agent 20.0.0-8137 (20 LTS Update 2023-10-26) or later for Red Hat Enterprise Linux 9.

26

Requires Deep Security Agent 20.0.1-4540 (20 LTS Update 2024-03-20) or later.

27

Requires Deep Security Agent 20.0.1-7380 (20 LTS Update 2024-04-24) or later.

28

Requires Deep Security Agent 20.0.1-12510 (20 LTS Update 2024-06-26) or later.

29

Requires Deep Security Agent 20.0.1-14610 (20 LTS Update 2024-07-20) or later.

30

Requires Deep Security Agent 20.0.0-8268 (20 LTS Update 2023-11-21) or later.

31

See Deep Security Agent version for Red Hat OpenShift

32

Requires Deep Security Agent 20.0.0-4959 (20 LTS Update 2022-07-04) or later.

33

Requires Deep Security Agent 20.0.1-21510 (20 LTS Update 2024-10-16) or later.

34

Requires Deep Security Agent 20.0.0-5512 (20 LTS Update 2022-09-22) or later.

35

Requires Deep Security Agent 20.0.1-23340 (20 LTS Update 2024-11-13) or later.