Scheduled Tasks
The Scheduled Tasks page lets you automate and schedule certain common tasks.
From the main page you can:
- Create New Scheduled Tasks (
)
- Delete a Scheduled Task (
)
- Examine or modify the Properties of an existing Scheduled Task (
)
- Duplicate (and then modify) existing Scheduled Tasks (
)
- Run (
) a selected Scheduled Task
Click New (
) and select "New Scheduled Task". The wizard that appears will guide you through the steps of creating a new Scheduled Task. You will be prompted for different information depending on the type of task.
Scheduled Tasks
The following Tasks can be scheduled:
- Backup: Perform regular database backups. (This option is only available if you are using a Derby or Microsoft SQL Server database.)
- Check for Security Updates: Regularly check for security updates and import them into Vulnerability ProtectionDeep Security when they are available.
- Check for Software Updates: Regularly check for Vulnerability ProtectionDeep Security software updates and download them when they are available.
- Discover Computers: Periodically check for new computers on the network by scheduling a Discovery operation. You will be prompted for an IP range to check and asked to specify which computer group the new computer will be added to.
- Generate and Send Report: Automatically generate reports and optionally have them emailed to a list of Users.
- Run Script: If the Syslog options do not meet your event notification requirements, it may be possible for Trend Micro to provide a solution using custom-written scripts. Contact Trend Micro for more information.
- Scan Computers for Integrity Changes: Causes the Vulnerability ProtectionDeep Security Manager to perform an Integrity Scan to compare a computer's current state against its baseline.
- Scan computers for Malware: Schedules a Malware Scan. The configuration of the scan is the same as that specified on the Policy/Computer Editor > Anti-Malware page for each computer.
- Scan Computers for Open Ports: Schedule periodic port scans on one or more computers. You can specify individual computers or all computers belonging to a particular computer group. The ports that will be scanned are those defined on the Scanning tab in the Policy/Computer Editor > Settings page.
- Scan Computers for Recommendations: Causes the Vulnerability ProtectionDeep Security Manager to scan the computer(s) for common applications and then make recommendations based on what is detected.
- Send Outstanding Alert Summary: Generate an email listing all outstanding (unresolved) Alerts.
- Send Policy: Regularly check for and send updated policies.
- Synchronize Cloud Account: Synchronize the Computers list with an added Cloud account. (Only available if you have added a Cloud account to the Vulnerability ProtectionDeep Security Manager.)
- Synchronize Computers with OfficeScan: Synchronize the Computers list with an OfficeScan server. (Only available if you have added an OfficeScan server to the Vulnerability Protection Manager.)
- Synchronize Directory: Synchronize the Computers list with an added LDAP directory. (Only available if you have added an LDAP directory to the Vulnerability ProtectionDeep Security Manager.)
- Synchronize Users/Contacts: Synchronize the Users and Contacts lists with an added Active Directory. (Only available if you have added an Active Directory to the Vulnerability ProtectionDeep Security Manager.)
- Synchronize VMware vCenter: Synchronize the Computers list with an added VMware vCenter. (Only available if you have added a VMware vCenter to the Vulnerability ProtectionDeep Security Manager.)
- Synchronize Computers with OfficeScan: Synchronize the Computers list with a configured OfficeScan Server. By default, synchronization happens every 10 minutes. If you want to synchronize on a different schedule, use this scheduled task and turn off the default synchronization. See OfficeScan Server for instructions.
With Agent-based protection, scheduled tasks use the same time zone as the endpoint operating system. With Agentless protection, scheduled tasks use the same time zone as the Deep Security Virtual Appliance.
Enabling or Disabling a Scheduled Task
Existing Scheduled Tasks can be enabled or disabled. For example, you may want to temporarily disable a Scheduled Task while you perform certain administrative duties during which you don't want any activity to occur. The control to enable or disable a Scheduled Task is on the General tab of the Task's Properties window.