Secure your environment with Trend Micro Deep Security
Thank you for purchasing Deep Security! You've taken your first
step towards a secured environment across your physical,
virtual, cloud, and container platforms.
We'll do everything we can to help and support you from
preparation to operation. We're excited to have you onboard, so
let's get started.
Preparation Before Installation
Create your account and get the Activation Code for product instllation
-
Trend Micro Customer License Portal
If you need the guide for Customer License Portal, Refer to the Trend Micro Customer Licensing Portal User's Guide for instructions.
Get an overview of system components.
- Deep Security Manager (DSM) : It is a required component to manage Deep Security Agent, Deep Security Relay, and Deep Security Virtual Appliance. It provides a centralized web-based management console.
- Deep Security Agent (DSA) : A component that is installed on a computer and provides multiple security functions.
- Deep Security Virtual Appliance (DSVA) : A component (appliance) that agentlessly provides security functions in cooperation with VMware virtual infrastructure.
- Deep Security Relay (DSR) : Deep Security Agent contains a Relay module. It distributes software modules, pattern files, and kernel support packages throughout your network of Deep Security components.
- Database : The component required for all Deep Security operations to keep the Deep Security Manager communicating with the database.
Know the key features
- Anti-Malware protects the computer against malicious software.
- Web Reputation monitors HTTP access and blocks connections to malicious sites.
- Firewall detects and blocks unauthorized communication with rules that set IP addresses, ports, etc.
- Intrusion Prevention inspects incoming and outgoing traffic to detect and block suspicious activity. This prevents exploitation of known and zero-day vulnerabilities. Deep Security supports "virtual patching", you can use Intrusion Prevention rules to shield from known vulnerabilities until they can be patched.
- Integrity Monitoring provides the ability to track both authorized and unauthorized changes made to an instance and enables you to receive alerts about unplanned or malicious changes.
- Log Inspection captures and analyzes system logs to provide audit evidence for PCI DSS or internal requirements that your organization may have.
- Application Control monitors software, detects unauthorized software, and then let you choose whether to allow or block a software, and optionally lock down the computer.
Check the system requirements, sizing, ports, URL, and IP address required to enable communication.
- System requirements
- Supported operating system and database
- Detailed support for Windows 10
- Supported Linux kernel
- Sizing guide
- Communication port number, URL, and IP address
- Co-existing with another Anti-Malware product
- Free version database supported by Deep Security
What’s new in Deep Security
Get the latest version of Deep Security program and install each component.
Watch how to install Deep Security
Setting the Required Functions
Once the installation is complete, set the necessary protection functions and test the following modules:
- Anti-Malware
- Web Reputation
- Firewall
- Intrusion Prevention
- Integrity Monitoring
- Log Inspection
- Application Control
Watch how to configure each function
Make the following settings according to your environment policy.
- Daily check for security updates
- Perform scan for recommendations
- Weekly scheduled scan for Anti-Malware
- Event retention period
- Alert notification
- Create users and roles
Let's actually start the operation. We have prepared some useful tips for your operation and various situations.
- Operational tips
- Troubleshooting support (e.g. what to do when something happens)
- Weekly scheduled scan for Anti-Malware
- Maintenance support (e.g. upgrade and backup method)
Follow Deep Security Best Practices