Trend Micro, the Trend Micro t-ball logo, Deep Security ...

 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at:



Trend Micro, the Trend Micro t-ball logo, Deep Security, Control Server Plug-in, Damage Cleanup Services, eServer Plug-in, InterScan, Network VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Document version: 1.5 Document number: APEM96929_150423 Release date: September 2015 Document last updated: January 19, 2017

Table of Contents

Introduction ................................................................................................................................ 5

About This Document ...................................................................................................................................................................... 6 About Deep Security ....................................................................................................................................................................... 8 What's New ................................................................................................................................................................................ 11 System Requirements ................................................................................................................................................................... 13

Preparation ............................................................................................................................... 17

What You Will Need (VMware vShield) ............................................................................................................................................. 18 Database Considerations ............................................................................................................................................................... 21 Minimum VMware Privileges for DSVA Deployment (vShield) .............................................................................................................. 23 Choosing Agentless Protection or Combined Mode ............................................................................................................................. 25 Preparing a vShield Environment for Agentless Protection .................................................................................................................. 26

Installation ................................................................................................................................ 28

Installing the Deep Security Manager .............................................................................................................................................. 29 Manually Installing the Deep Security Agent ..................................................................................................................................... 36 Installing and Configuring a Relay-enabled Agent.............................................................................................................................. 47 Deploying Agentless Protection in a vShield Environment ................................................................................................................... 48 Installing the Deep Security Notifier ................................................................................................................................................ 52

Upgrading ................................................................................................................................. 54

Planning Your Upgrade .................................................................................................................................................................. 55 Upgrading to Full Agentless Protection ...................................................................................................................................... 57 Upgrading to Agentless Anti-Malware and Integrity Monitoring ..................................................................................................... 58 Upgrading to Combined Mode .................................................................................................................................................. 63 Upgrading from vSphere 5.5 to 6.0 .......................................................................................................................................... 68

Appendices ................................................................................................................................ 69

Deep Security Manager Memory Usage ............................................................................................................................................ 70 Deep Security Virtual Appliance Memory Usage ................................................................................................................................ 71 Deep Security Manager Performance Features .................................................................................................................................. 73 Upgrade Multi-Node Deep Security Manager ..................................................................................................................................... 74 Creating an SSL Authentication Certificate ....................................................................................................................................... 75

Silent Install of Deep Security Manager ........................................................................................................................................... 79 Deep Security Manager Settings Properties File ................................................................................................................................ 81 Enable Multi-Tenancy .................................................................................................................................................................... 87 Multi-Tenancy (Advanced) ............................................................................................................................................................. 95 Installing a Database for Deep Security (Multi-Tenancy Requirements) ................................................................................................ 97 Uninstalling Deep Security from your vShield Environment ............................................................................................................... 101

Introduction

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download