Index of Code Examples in Guides

Click a link to open the corresponding code example in a guide. These examples demonstrate how to use the SDKs to automate Deep Security administration tasks. These examples typically implement multi-step algorithms.

The examples in the API Reference are not listed here. In the API Reference, for each operation, an example illustrates how to execute the operation using an SDK.

First Steps Toward Deep Security Automation

Configure Deep Security Manager System Settings

Control Access Using Roles

Create and Manage API Keys

Create and Configure Policies

Create and Configure Common Objects of Protection Modules

Configure Policy, Computer, and System Settings

Configure Computers to Override Policies

Discover Computer Security Statuses and Patch Vulnerabilities

Maintain Protection Using Scheduled Tasks

Search for Resources