Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Best practices in deploying and managing Deep Security 9.0

    • Updated:
    • 4 Apr 2016
    • Product/Version:
    • Deep Security 9.0
    • Platform:
    • CentOS 6 32-bit
    • CentOS 6 64-bit
    • IBM AIX 5.3
    • IBM AIX 6.1
    • Linux - Red Hat RHEL 5 32-bit
    • Linux - Red Hat RHEL 5 64-bit
    • Linux - Red Hat RHEL 6 32-bit
    • Linux - Red Hat RHEL 6 64-bit
    • Linux - SuSE 10
    • Linux - SuSE 10 64-bit
    • Linux - SuSE 11
    • Linux - SuSE 11 64-bit
    • Ubuntu 10.04 64-bit
    • Ubuntu 12.04 64-bit
    • VMware ESXi 5.0
    • VMware ESXi 5.1
    • VMware ESXi 5.5
    • VMware vCenter 5.0
    • Windows 2003 Enterprise 64-bit
    • Windows 2003 Server R2
    • Windows 2008 Datacenter 64-bit
    • Windows 2008 Enterprise
    • Windows 2008 Enterprise 64-bit
    • Windows 2008 Server R2
    • Windows 2008 Server R2 Datacenter
    • Windows 2008 Server R2 with Hyper-V(TM)
    • Windows 2012 Enterprise
    • Windows 7 32-bit
    • Windows 7 64-bit
    • Windows 8 32-bit
    • Windows 8 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP Professional 64-bit
    • Windows XP SP2 32-bit
    • Windows XP SP3 32-bit
Summary

Ensure optimum performance of Deep Security 9.0 by implementing procedures specified in the Best Practice Guide.

Details
Public

Refer to the Deep Security 9.0 Best Practice Guide PDF file for recommended procedures and more information on the following topics:

  • Operating systems
  • Database systems
  • VMware vSphere and vShield compatibility with Deep Security
  • VMware tools and vShield Endpoint drivers (for Agentless Anti-Malware)
  • Deep Security Manager
  • Database
  • Deep Security Virtual Appliance
  • Deep Security Relay
  • Deep Security components
    • Deep Security Manager
    • Deep Security Agent/Relay
    • Deep Security Virtual Appliance
    • Database
  • VMware components
  • Deployment scenario samples
  • Testing Deep Security
  • General upgrade recommendations
  • Upgrade from Deep Security 8.0 SP2 (and ESXi 4.1 to 5.x) when using Agentless protection
  • Upgrade from Deep Security 8.0 SP2 when using Agent-based protection only
  • Upgrade from 9.0 to the latest patch or service pack
  • Upgrade the Deep Security Agent manually
  • UI Configurations
    • Dashboard
    • Alerts
    • Policies
  • Module Configurations
    • Anti-Malware
    • Web Reputation
    • Firewall
    • Intrusion Prevention
    • Integrity Monitoring
    • Log Inspection
  • Administration and System Settings
    • Recommendation Scan
    • System settings
  • Deep Security Manager
    • Configure the Deep Security Manager's maximum memory usage
    • Configure multiple Managers
    • Performance profiles
  • Deep Security Virtual Appliance
    • Adjust the heap size settings of the Filter Driver
    • Prevent heap size exhaustion
  • Database
    • Exclude database files from Anti-malware scans
    • Auto-growth and database maintenance
    • Database indexing
  • High availability
  • Remove a virtual machine from Deep Security protection in a disaster
  • Recover a physical machine (with DSA) in a disaster
  • Recover an inaccessible DSVA
  • Isolate a Deep Security issue
  • Multi-tenant environment
  • Environments using Teamed NICs
  • Air-gapped environments
  • Solaris Zones
  • Microsoft Cluster Servers
  • Virtualized Environments (VDI)
  • Private, public and hybrid cloud environments
Premium
Internal
Rating:
Category:
Configure
Solution Id:
1102136
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.