Creating a Damage Cleanup Task

Use this screen to create regular and scheduled tasks. Regular damage cleanup tasks are performed on demand, whereas scheduled damage cleanup tasks are performed based on a specific schedule.

Tasks provide central reporting back to the Control Manager server. The following two centralized management actions are available when performing tasks:

To create a task:

  1. Do the following:

  1. Type the name of the task in Name. Valid name strings can be up to 48 characters long. The following characters are not allowed:  \ / : * ? " < > | & �   For example, iT#3-01-03-2004-mP.

  2. In Step 1 of 3, click Select Machines to select the target machines for this task. A Trend Micro security certificate window will appear. Accept the certificate to proceed with machine selection. After machine selection, the target machines will appear under Selected Machines. See Selecting Machines for additional information.

  1. In Step 2 of 3, do the following:

    1. Select one of the following:

      • One time on month - day - year: select this option to specify the exact date when a task should run once. Select a month, day, and year from each drop down menu. For example, when selecting One time on January 01 2003, this task will run once on the specified date.

    1. Select the starting time for the task from the two drop down menus. The first drop down menu shows the hours (00 - 23). The second drop down menu displays the minutes (00 - 59).

For example, for 11:34 P.M., select 23 in the hours drop down menu, and 34 in the minutes drop down menu.    

  1. In Step 3 of 3, select the action the task will perform. The two actions tasks can perform are Assessment only and Cleanup. To simultaneously perform a Vulnerability Assessment task, enable Vulnerability Assessment.

    If you have purchased Vulnerability Assessment, you can run a Vulnerability Assessment task along with the Damage Cleanup task you are attempting to create.

    After selecting EnableVulnerability Assessment, you can choose the type of Vulnerability Assessment task will run based on the following actions:

    • Assess by all vulnerability names

    The task scans for all the known vulnerabilities in the current Vulnerability Assessment pattern.

    For a complete listing of all the known vulnerabilities refer to the Trend Micro Web site at http://www.trendmicro.com/advisory/.

    When you select this action you can also request enforcement on machines according to the risk they present to the network. Select Enable enforcement on machines that are and then select a security risk level to set an enforcement for this task. The task applies enforcement policies to all machines that present vulnerabilities of the identified risk level.

    • Assess by the selected vulnerability name(s) only

    The task scans for only those vulnerabilities that you identify in the list. To include a vulnerability in the list, type the vulnerability name in the box. Click > to add vulnerability names to the task list and Remove to remove names from the list.

    When you select this action you can also request enforcement on machines according to the vulnerability names. Select Enable enforcement on machines with any of the selected vulnerability name(s). The task will apply enforcement policies to all machines that contain the vulnerabilities identified in the scan.

    After selecting EnableVulnerability Assessment and saving the task, the Vulnerability Assessment task will run along with the selected Damage Cleanup task and the  icon will appear next to the task in the Damage Cleanup Scheduled Tasks page. If after creating the task you clear the Enable Vulnerability Assessment check box or modify the Damage Cleanup task, the two tasks will run separately. For more information on Vulnerability Assessment, refer to the Vulnerability Assessment Help section.

     

  2. Click Save to save this task and return to Damage Cleanup Tasks. Alternatively, click Cancel.

See also:

Enabling Vulnerability Assessment with Damage Cleanup Tasks