Secure your environment with Trend Micro Deep Security

Thank you for purchasing Deep Security! You've taken your first step towards a secured environment across your physical, virtual, cloud, and container platforms.
We'll do everything we can to help and support you from preparation to operation. We're excited to have you onboard, so let's get started.

Preparation Before Installation

Create your account and get the Activation Code for product instllation

Get an overview of system components.

  • Deep Security Manager (DSM) : It is a required component to manage Deep Security Agent, Deep Security Relay, and Deep Security Virtual Appliance. It provides a centralized web-based management console.
  • Deep Security Agent (DSA) : A component that is installed on a computer and provides multiple security functions.
  • Deep Security Virtual Appliance (DSVA) : A component (appliance) that agentlessly provides security functions in cooperation with VMware virtual infrastructure.
  • Deep Security Relay (DSR) : Deep Security Agent contains a Relay module. It distributes software modules, pattern files, and kernel support packages throughout your network of Deep Security components.
  • Database : The component required for all Deep Security operations to keep the Deep Security Manager communicating with the database.
step1 image 1

Know the key features

  • Anti-Malware protects the computer against malicious software.
  • Web Reputation monitors HTTP access and blocks connections to malicious sites.
  • Firewall detects and blocks unauthorized communication with rules that set IP addresses, ports, etc.
  • Intrusion Prevention inspects incoming and outgoing traffic to detect and block suspicious activity. This prevents exploitation of known and zero-day vulnerabilities. Deep Security supports "virtual patching", you can use Intrusion Prevention rules to shield from known vulnerabilities until they can be patched.
  • Integrity Monitoring provides the ability to track both authorized and unauthorized changes made to an instance and enables you to receive alerts about unplanned or malicious changes.
  • Log Inspection captures and analyzes system logs to provide audit evidence for PCI DSS or internal requirements that your organization may have.
  • Application Control monitors software, detects unauthorized software, and then let you choose whether to allow or block a software, and optionally lock down the computer.

Check the system requirements, sizing, ports, URL, and IP address required to enable communication.

What’s new in Deep Security

Get the latest version of Deep Security program and install each component.

Watch how to install Deep Security

Setting the Required Functions

Once the installation is complete, set the necessary protection functions and test the following modules:

  • Anti-Malware
  • Web Reputation
  • Firewall
  • Intrusion Prevention
  • Integrity Monitoring
  • Log Inspection
  • Application Control

Watch how to configure each function

Make the following settings according to your environment policy.

  • Daily check for security updates
  • Perform scan for recommendations
  • Weekly scheduled scan for Anti-Malware
  • Event retention period
  • Alert notification
  • Create users and roles
Optimize Deep Security’s System Design

Let's actually start the operation. We have prepared some useful tips for your operation and various situations.

  • Operational tips
  • Troubleshooting support (e.g. what to do when something happens)
  • Weekly scheduled scan for Anti-Malware
  • Maintenance support (e.g. upgrade and backup method)