leaderssite.blogg.se

Trend micro deep security
Trend micro deep security








On Deep Security Manager, go to Administration > System Settings > Advanced.The API is disabled by default as it does not require authentication to access. However, there is an exception: if you want to use status monitoring, you must enable it first. They do not require any additional configuration. Most functions of the REST API are available after Deep Security Manager has been installed and started. Develop a REST API client to communicate with Deep Security Manager.Įnabling the Status Monitoring API (Optional).Obtain the Deep Security Manager's SSL Certificate.Create a user account that an external Web Service client can utilize.Enable the Status Monitoring API (Optional).The basic steps to getting started with the REST API are as follows: Usage Monitoring - retrieve statistics about what operations Deep Security Manager has performed for which tenants.

Trend micro deep security update#

Tenant Management - create, list, update and delete tenant accounts create and list database servers used by tenants.Status Monitoring - view the status of Deep Security Manager nodes, including various health checks.Events - list Anti-Malware and Web Reputation events.Cloud Accounts - create, list, update, and delete cloud accounts that Deep Security Manager synchronizes with force cloud synchronization.Authentication - sign a user in and out.The REST API includes the following functionality: Documentation of these projects can be found at the RESTEasy project and the Apache HttpComponents™ project. The included Java REST API client is based on the RESTEasy project and uses Apache HttpComponents™ for HTTP transport. This API documentation is generated from the included Java REST API client but is not specific to any programming language. The REST API uses standard HTTP mechanisms such as GET and PUT and popular data encoding methods such as JSON and XML.Įvery API call available in the REST interface, the HTTP syntax required to access it including the HTTP path and method (GET, PUT, etc.), and a description of the structure of the data passed to or from the API call can be found in the following documentation: This allows for an easy, programming language-neutral method to externally access data and programming configurations. Deep Security includes a REST (REpresentational State Transfer) Web Services API to allow Deep Security functionality to be integrated with other applications.








Trend micro deep security