Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Features dependent on activation code in Deep Security

    • Updated:
    • 20 Aug 2014
    • Product/Version:
    • Deep Security 8.0
    • Deep Security 9.0
    • Deep Security 9.5
    • Platform:
    • HPUX 11.x
    • IBM AIX 5.3
    • IBM AIX 6.1
    • Linux - Red Hat RHEL 5 32-bit
    • Linux - Red Hat RHEL 5 64-bit
    • Linux - Red Hat RHEL 6 32-bit
    • Linux - Red Hat RHEL 6 64-bit
    • Linux - SuSE 10
    • Linux - SuSE 11
    • Ubuntu 10.04 64-bit
    • Ubuntu 12.04 64-bit
    • Windows 2003 Enterprise
    • Windows 2008 Enterprise
Summary
Know which features or modules of Deep Security will be available or not after the activation code expires.
Details
Public
When your full license expires, all features will still work, such as Anti-Malware, Web Reputation, Firewall, Intrusion Prevention, Integrity Monitoring, and Log Inspection. However, the component updates, such as pattern, rules and engine updates, will be disabled.
Premium
Internal
Rating:
Category:
SPEC
Solution Id:
1098594
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.