I had a few questions over the last few months on Deep Security Deployment options, Sizing and General Configuration options. I thought that I would publish the link to our Trend Micro Deep Security Best Practice Guide. The guide have been recently updated to reflect all the new enhancements.
Here is an extract of the Guide :
Deep Security provides a single platform for server security to protect physical, virtual, and cloud servers as well as
hypervisors and virtual desktops. Tightly integrated modules easily expand to offer in-depth defenses, including anti-malware, web reputation, intrusion prevention, firewall, integrity monitoring, and log inspection. It is available in agent-less and agent-based options that can all be managed through a single console across physical, virtual, and cloud server deployments.
This guide is intended to help users to get the best productivity out of the product. It contains a collection of best
practices which are based on knowledge gathered from previous enterprise deployments, lab validations, and lessons learned in the field.
Examples and considerations in this document provide guidance only and do not represent strict design requirements. The guidelines in this document do not apply to every environment but will help guide you through the decisions that you need to configure Deep Security for optimum performance.
The guide can be downloaded here.