![]() ![]() ![]() The readiness check generates a "to do" list of compatibility issues (if any) for your specific environment.įor example, you may need to free disk space, allocate more vRAM, or upgrade old Deep Security Agents to supported versions. The installer also makes sure that all your deployment components are compatible with the new version of Deep Security Manager. Before it installs anything, it checks your environment to make sure it complies with system requirements. You must click the plus sign next to the software to see the hash (see the figure below).Ĭheck compatibility: Start the installer. Trend Micro publishes its hashes on the Deep Security Software page. To verify software authenticity, check the SHA256 hash (also called a fingerprint). Verify that the Deep Security installers are authentic (check hashes): If you do not upgrade your relays first, security component upgrades and software upgrades may fail. See About upgrades for information on installing or updating agents, relays, and the Deep Security Virtual Appliance.Īll Deep Security Relays must be upgraded before upgrading the Deep Security Agent. Agent and relay installers are not required they can be downloaded via the manager. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |