Navigate Guideskeyboard_arrow_down First steps First Steps Toward Deep Security Automation Send Your First Request Using the API Run the Code Examples Notes about Resource Property Values About the Overrides Parameter Search for Resources API Rate Limits Performance Tips SDK Version Compatibility API cookbook About the API Cookbook Set Up to Use Bash or PowerShell Get a List of Computers (Bash and PowerShell) Search for a Policy (Bash and PowerShell) Assign a Policy to a Computer (Bash and PowerShell) Assign a Policy to Many Computers (Bash and PowerShell) Index of code examples Index of Code Examples Use the legacy APIs Use the Legacy APIs Transition From the SOAP API Use the Legacy REST API Deploy Deep Security Trend Micro Hybrid Cloud Security Command Line Interface (THUS) Deploy Deep Security Use Scripts to Deploy Deep Security Manager and Agent Integrate Deep Security with AWS Services Add Computers Add an Amazon Web Services Connector Add a Google Cloud Platform Connector Control Access Using Roles Create and manage API keys Create and Manage API Keys Create an API Key Using Code Create an API Key Using Deep Security Manager Manage API Keys after their Creation Configure Deep Security Manager System Settings Monitor Deep Security Events Create and manage tenants Create and Manage Tenants Create a Tenant Authenticate and Interact with a Tenant Iterate Over Tenants Configure protection Configure Protection Create and Configure a Policy Configure Firewall Configure Intrusion Prevention Configure Anti-Malware Configure Web Reputation Configure Application Control Configure Application Control Configure Application Control for a policy Allow or Block Unrecognized Software Create a Shared Ruleset Add Global Rules Configure Maintenance Mode During Upgrades Configure Integrity Monitoring Configure Log Inspection Configure Device Control Create and Modify Lists Create and Configure Schedules Configure Computers to Override Policies Maintain protection Maintain Protection Report on Computer Status Patch Unprotected Computers Assign Rules with Recommendation Scans Maintain Protection Using Scheduled Tasks Troubleshooting Tips Settings Reference Maintain Protection Automate the tasks that you regularly perform to maintain protection of your assets: Report on computer status Patch unprotected computers Apply recommendations Maintain protection using scheduled tasks keyboard_arrow_up