Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Understanding how Recommendation Scan works

    • Updated:
    • 2 Jan 2018
    • Product/Version:
    • Deep Security 10.0
    • Deep Security 10.1
    • Deep Security 10.2
    • Deep Security 9.6
    • Platform:
    • N/A N/A
Summary

Some users may wonder how Deep Security Agent or Deep Security Virtual Appliance detects whether a software has been installed on Windows or Linux. In some cases, users may also ask if Deep Security can detect an application set to "Extract and Use" or "Compile and Use". Learn how Deep Security works to detect such scenarios.

Details
Public

Generally speaking, Deep Security runs Recommendation Scan by sending a scanning rule, which is hidden to customers, to the agent side (Deep Security Agent or virtual agent) in several batches. The detection rule greps the installed software information via registry for Windows, and RPM or DEB database for Linux systems.

In addition, there is also a deprecated legacy method that will check the following paths for installed binaries on Linux systems:

  • /sbin/
  • /bin/
  • /usr/sbin/
  • /usr/bin/
  • /usr/local/sbin/
  • /usr/local/bin/

This is the reason why Deep Security can still detect the "Extract and Use" or "Compile and Use" applications when you put their binary in the folders mentioned above. However, going through file system for binaries is quite expensive, so this method has been deprecated. It means that we cannot assure that this legacy method can still work correctly for all "Extract and Use" or "Compile and Use" application on all DPI rules. Also, the detection rule will not work if you put the binary into a folder not listed above.

Premium
Internal
Rating:
Category:
SPEC
Solution Id:
1119170
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.