Deep Security Automation Center
keyboard_arrow_down
  • 12.0
  • 20.0
  • Home
  • Guides/Cookbook
  • SDKs
  • API Reference
  • Support
  • Changelog
  • First steps
  • First Steps Toward Deep Security Automation
  • Send Your First Request Using the API
  • Run the Code Examples
  • Notes about Resource Property Values
  • About the Overrides Parameter
  • Search for Resources
  • API Rate Limits
  • Performance Tips
  • SDK Version Compatibility
  • API cookbook
  • About the API Cookbook
  • Set Up to Use Bash or PowerShell
  • Get a List of Computers (Bash and PowerShell)
  • Search for a Policy (Bash and PowerShell)
  • Assign a Policy to a Computer (Bash and PowerShell)
  • Assign a Policy to Many Computers (Bash and PowerShell)
  • Index of code examples
  • Index of Code Examples
  • Use the legacy APIs
  • Use the Legacy APIs
  • Transition From the SOAP API
  • Use the Legacy REST API
  • Deploy Deep Security
  • Trend Micro Hybrid Cloud Security Command Line Interface (THUS)
  • Deploy Deep Security
  • Use Scripts to Deploy Deep Security Manager and Agent
  • Integrate Deep Security with AWS Services
  • Add Computers
  • Add an Amazon Web Services Connector
  • Add a Google Cloud Platform Connector
  • Control Access Using Roles
  • Create and manage API keys
  • Create and Manage API Keys
  • Create an API Key Using Code
  • Create an API Key Using Deep Security Manager
  • Manage API Keys after their Creation
  • Configure Deep Security Manager System Settings
  • Monitor Deep Security Events
  • Create and manage tenants
  • Create and Manage Tenants
  • Create a Tenant
  • Authenticate and Interact with a Tenant
  • Iterate Over Tenants
  • Configure protection
  • Configure Protection
  • Create and Configure a Policy
  • Configure Firewall
  • Configure Intrusion Prevention
  • Configure Anti-Malware
  • Configure Web Reputation
  • Configure Application Control
  • Configure Application Control
  • Configure Application Control for a policy
  • Allow or Block Unrecognized Software
  • Create a Shared Ruleset
  • Add Global Rules
  • Configure Maintenance Mode During Upgrades
  • Configure Integrity Monitoring
  • Configure Log Inspection
  • Configure Device Control
  • Create and Modify Lists
  • Create and Configure Schedules
  • Configure Computers to Override Policies
  • Maintain protection
  • Maintain Protection
  • Report on Computer Status
  • Patch Unprotected Computers
  • Assign Rules with Recommendation Scans
  • Maintain Protection Using Scheduled Tasks
  • Troubleshooting Tips
  • Settings Reference

Configure Protection

Use the API to configure the protection of your assets:

  • Create and Configure a Policy
  • Configure Firewall
  • Configure Intrusion Prevention
  • Configure Anti-Malware
  • Configure Web Reputation
  • Configure Application Control
  • Configure Integrity Monitoring
  • Configure Log Inspection
  • Configure Device Control
  • Create and Modify Lists
  • Create and Configure Schedules
  • Configure Computers to Override Policies
© Copyright Trend Micro