web
You’re offline. This is a read only version of the page.
close
Automation Center
Automation Center
Trend Micro Deep Security™
  • Home
  • Guides
  • SDKs
  • API Reference
    • v20.0
    • v12.0
  • Support
    • Trend Micro Business Support
    • Help Center
Deep Security Automation Center

Deep Security Automation Center

  • First Steps Toward Deep Security Automation
    • Send Your First Request Using the API
      • Set up your development environment
      • Authenticate with Deep Security Manager
      • Perform a GET request: list policies
        • List policies: Python example
        • List policies: JavaScript example
        • List policies: Java example
      • Perform a POST request: search firewall rules
        • Search firewall rules: Python example
        • Search firewall rules: JavaScript example
        • Search firewall rules: Java example
      • Get the Deep Security Manager version
    • Run the Code Examples
    • Notes about Resource Property Values
    • About the Overrides Parameter
    • Search for Resources
      • Search for Resources: Python Examples
      • Search for Resources: JavaScript Examples
      • Search for Resources: Java Examples
    • API Rate Limits
      • Configure API rate limits
      • Handle rate limit errors in your code
    • Performance Tips
      • Minimize computer response size
      • Use the overrides parameter
      • Directly configure rule assignments
      • Interact directly with single settings
      • Page your search results
    • SDK Version Compatibility
  • About the API Cookbook
    • Set Up to Use Bash or PowerShell
    • Get a List of Computers (Bash and PowerShell)
    • Search for a Policy (Bash and PowerShell)
    • Assign a Policy to a Computer (Bash and PowerShell)
    • Assign a Policy to Many Computers (Bash and PowerShell)
  • Index of Code Examples
  • Use the Legacy APIs
    • Transition From the SOAP API
    • Use the Legacy REST API
      • When to use the legacy REST API
      • Set up your environment to use the REST API
      • Develop a REST API client application
      • Special Considerations
  • Trend Micro Hybrid Cloud Security Command Line Interface (THUS)
    • Deploy Deep Security
    • Use Scripts to Deploy Deep Security Manager and Agent
    • Integrate Deep Security with AWS Services
    • Add Computers
    • Add an Amazon Web Services Connector
      • AWS Connector: Python Examples
      • AWS Connector: JavaScript Examples
      • AWS Connector: Java Examples
    • Add a Google Cloud Platform Connector
      • Google Cloud Platform Connector: Python Examples
      • Google Cloud Platform Connector: JavaScript Examples
      • Google Cloud Platform Connector: Java Examples
    • Control Access Using Roles
      • Control Access Using Roles: Python Examples
      • Control Access Using Roles: JavaScript Examples
      • Control Access Using Roles: Java Examples
    • Create and Manage API Keys
      • Create an API Key Using Code
        • Obtain a role ID
        • Create an API key using an SDK
        • Create an API key using a username and password
      • Create an API Key Using Deep Security Manager
      • Manage API Keys after their Creation
        • Reset a secret key
        • Control API key access after creation
    • Configure Deep Security Manager System Settings
      • Retrieve, modify, or reset a single system setting
      • List or modify multiple system settings
    • Monitor Deep Security Events
    • Create and Manage Tenants
      • Create a Tenant
        • Synchronous and asynchronous tenant creation
        • General steps to create a tenant
        • Create Tenant: Example
      • Authenticate and Interact with a Tenant
        • Authenticate and Interact with a Tenant: Python Examples
        • Authenticate and Interact with a Tenant: JavaScript Examples
        • Authenticate and Interact with a Tenant: Java Examples
      • Iterate Over Tenants
        • Obtain intrusion prevention rules for all computers of active tenants: Python Example
        • Obtain intrusion prevention rules for all computers of active tenants: JavaScript Example
        • Obtain intrusion prevention rules for all computers of active tenants: Java Example
  • Configure Protection
    • Create and Configure a Policy
      • Create a policy
      • Assign a policy to a computer
      • Configure policy and default policy settings
      • Reset policy overrides
    • Configure Firewall
      • Firewall: Python Examples
      • Firewall: JavaScript Examples
      • Firewall: Java Examples
    • Configure Intrusion Prevention
      • Intrusion Prevention: Python Examples
      • Intrusion Prevention: JavaScript Examples
      • Intrusion Prevention: Java Examples
    • Configure Anti-Malware
      • Anti-Malware: Python Examples
      • Anti-Malware: JavaScript Examples
      • Anti-Malware: Java Examples
    • Configure Web Reputation
      • Web Reputation: Python Examples
      • Web Reputation: JavaScript Examples
      • Web Reputation: Java Examples
    • Configure Application Control
      • Configure Application Control for a policy
      • Allow or Block Unrecognized Software
      • Create a Shared Ruleset
      • Add Global Rules
      • Configure Maintenance Mode During Upgrades
    • Configure Integrity Monitoring
      • Integrity Monitoring: General Steps
      • Integrity Monitoring Example
      • Create an Integrity Monitoring rule
    • Configure Log Inspection
      • Log Inspection: General steps
      • Create a Log Inspection rule
      • Log Inspection Examples: Python
      • Log Inspection Examples: JavaScript
      • Log Inspection Examples: Java
    • Configure Device Control
    • Create and Modify Lists
    • Create and Configure Schedules
    • Configure Computers to Override Policies
      • Discover overrides
      • Configure computer overrides
      • Rule overrides
  • Maintain Protection
    • Report on Computer Status
      • Discover unprotected computers
        • Computer Status Examples: Python
        • Computer Status Examples: JavaScript
        • Computer Status Examples: Java
      • Get computer configurations
      • Discover the Anti-Malware configuration of a computer
      • Get applied intrusion prevention rules
    • Patch Unprotected Computers
      • Patch Unprotected Computers Examples: Python
      • Patch Unprotected Computers Examples: JavaScript
      • Patch Unprotected Computers Examples: Java
    • Assign Rules with Recommendation Scans
      • Recommendation Scans examples: Python
      • Recommendation Scans examples: JavaScript
      • Recommendation Scans examples: Java
    • Maintain Protection Using Scheduled Tasks
      • Create a scheduled task
      • Create, run, and delete a scheduled task
      • Run an existing scheduled task
      • Scheduled Tasks Examples: Python
      • Scheduled Tasks Examples: JavaScript
      • Scheduled Tasks Examples: Java
  • Troubleshooting Tips
  • Settings Reference
Use the Legacy APIs

Use the Legacy APIs

If you use the legacy Deep Security APIs, use the following guides to learn how they correlate with the Deep Security API:

  • Transition From the SOAP API
  • Use the Legacy REST API
  • Transition From the SOAP API
  • Use the Legacy REST API
Privacy Notice
© 2025 Trend Micro