Secure your environment with Trend Micro Deep Security
Thank you for purchasing Deep Security! You've taken your first step towards a secured environment across your physical, virtual, cloud, and container platforms.
We'll do everything we can to help and support you from preparation to operation. We're excited to have you onboard, so let's get started.
Preparation Before Installation
Create your account and get the Activation Code for product instllation
- Trend Micro Customer License Portal
If you need the guide for Customer License Portal, Refer to the Trend Micro Customer Licensing Portal User's Guide for instructions.
Get an overview of system components.
- Deep Security Manager (DSM) : It is a required component to manage Deep Security Agent, Deep Security Relay, and Deep Security Virtual Appliance. It provides a centralized web-based management console.
- Deep Security Agent (DSA) : A component that is installed on a computer and provides multiple security functions.
- Deep Security Virtual Appliance (DSVA) : A component (appliance) that agentlessly provides security functions in cooperation with VMware virtual infrastructure.
- Deep Security Relay (DSR) : Deep Security Agent contains a Relay module. It distributes software modules, pattern files, and kernel support packages throughout your network of Deep Security components.
- Database : The component required for all Deep Security operations to keep the Deep Security Manager communicating with the database.
Know the key features
- Anti-Malware protects the computer against malicious software.
- Web Reputation monitors HTTP access and blocks connections to malicious sites.
- Firewall detects and blocks unauthorized communication with rules that set IP addresses, ports, etc.
- Intrusion Prevention inspects incoming and outgoing traffic to detect and block suspicious activity. This prevents exploitation of known and zero-day vulnerabilities. Deep Security supports "virtual patching", you can use Intrusion Prevention rules to shield from known vulnerabilities until they can be patched.
- Integrity Monitoring provides the ability to track both authorized and unauthorized changes made to an instance and enables you to receive alerts about unplanned or malicious changes.
- Log Inspection captures and analyzes system logs to provide audit evidence for PCI DSS or internal requirements that your organization may have.
- Application Control monitors software, detects unauthorized software, and then let you choose whether to allow or block a software, and optionally lock down the computer.
Check the system requirements, sizing, ports, URL, and IP address required to enable communication.
- System requirements
- Supported operating system and database
- Detailed support for Windows 10
- Supported Linux kernel
- Sizing guide
- Communication port number, URL, and IP address
- Co-existing with another Anti-Malware product
- Free version database supported by Deep Security
What’s new in Deep Security
Step 2: Installation
Get the latest version of Deep Security program and install each component.
Watch how to install Deep Security
Setting the Required Functions
Once the installation is complete, set the necessary protection functions and test the following modules:
- Anti-Malware
- Web Reputation
- Firewall
- Intrusion Prevention
- Integrity Monitoring
- Log Inspection
- Application Control
Watch how to configure each function
Step 4: System Design
Make the following settings according to your environment policy.
- Daily check for security updates
- Perform scan for recommendations
- Weekly scheduled scan for Anti-Malware
- Event retention period
- Alert notification
- Create users and roles
Step 5: Operation
Let's actually start the operation. We have prepared some useful tips for your operation and various situations.
- Operational tips
- Troubleshooting support (e.g. what to do when something happens)
- Weekly scheduled scan for Anti-Malware
- Maintenance support (e.g. upgrade and backup method)
Follow Deep Security Best Practices
Trend Micro Resource & Support
Deep Security Help Center contains the latest and comprehensive information about Deep Security. For any concerns or questions, you may refer to our product documentation.
Deep Security Help CenterRead our knowledge base articles for troubleshooting steps and quick how-to guides. You may also create a business support portal account to submit and manage your inquiries about our product.
Business Support PortalIf you haven’t used any Trend Micro product, our onboarding guide will help you get started. Learn how to manage your product and service license keys, open support cases, and join our education courses.
Getting Started with Trend Micro