
Use this screen to create regular and scheduled tasks. Regular damage cleanup tasks are performed on demand, whereas scheduled damage cleanup tasks are performed based on a specific schedule.
Tasks provide central reporting back to the Control Manager server. The following two centralized management actions are available when performing tasks:
Assessment only: assessment on machines with possible virus remnants still in the network
Cleanup: assessment and cleanup including removal of virus remnants that could re-attack a network
To create a task:
Do the following:
Type the name of the task in Name. Valid name strings can be up to 48 characters long. The following characters are not allowed: \ / : * ? " < > | & � For example, iT#3-01-03-2004-mP.
In Step 1 of 3, click Select Machines to select the target machines for this task. A Trend Micro security certificate window will appear. Accept the certificate to proceed with machine selection. After machine selection, the target machines will appear under Selected Machines. See Selecting Machines for additional information.
In Step 2 of 3, do the following:
Select one of the following:
One time on month - day - year: select this option to specify the exact date when a task should run once. Select a month, day, and year from each drop down menu. For example, when selecting One time on January 01 2003, this task will run once on the specified date.
Every day: select this option to run a task everyday
Every number of weeks on day of week: select this option to specify how often a task should run once. Select the number of weeks (1 through 4) and the day of the week (Sunday through Saturday) from each drop down menu. For example, when selecting Every 1 week on Sunday, this task will run once every week on Sunday.
Every month on day of month: select this option to run a task once on a specific day of each month. Select the day of the month (first through last) from each drop down menu. For example, when selecting Every month on 1st day of the month, this task will run on the first day of each month.
On hold: select this option to create a regular task without specifying when it will run; when selecting this option, the task will only run if the user clicks Run Now in Tasks
Select the starting time for the task from the two drop down menus. The first drop down menu shows the hours (00 - 23). The second drop down menu displays the minutes (00 - 59).
For example, for 11:34 P.M., select 23 in the hours drop down menu, and 34 in the minutes drop down menu.
In Step 3 of 3, select the action the task will perform. The two actions tasks can perform are Assessment only and Cleanup. To simultaneously perform a Vulnerability Assessment task, enable Vulnerability Assessment.
If you have purchased Vulnerability Assessment, you can run a Vulnerability Assessment task along with the Damage Cleanup task you are attempting to create.
After selecting EnableVulnerability Assessment, you can choose the type of Vulnerability Assessment task will run based on the following actions:
Assess by all vulnerability names
The task scans for all the known vulnerabilities in the current Vulnerability Assessment pattern.
For a complete listing of all the known vulnerabilities refer to the Trend Micro Web site at http://www.trendmicro.com/advisory/.
When you select this action you can also request enforcement on machines according to the risk they present to the network. Select Enable enforcement on machines that are and then select a security risk level to set an enforcement for this task. The task applies enforcement policies to all machines that present vulnerabilities of the identified risk level.
Assess by the selected vulnerability name(s) only
The task scans for only those vulnerabilities that you identify in the list. To include a vulnerability in the list, type the vulnerability name in the box. Click > to add vulnerability names to the task list and Remove to remove names from the list.
When you select this action you can also request enforcement on machines according to the vulnerability names. Select Enable enforcement on machines with any of the selected vulnerability name(s). The task will apply enforcement policies to all machines that contain the vulnerabilities identified in the scan.
After selecting EnableVulnerability Assessment and saving the
task, the Vulnerability Assessment task will run along with the
selected Damage Cleanup task and the
icon
will appear next to the task in the Damage
Cleanup Scheduled Tasks page. If after creating the task you clear
the Enable Vulnerability Assessment check
box or modify the Damage Cleanup task, the two tasks will run separately.
For more information on Vulnerability Assessment, refer to the Vulnerability
Assessment Help section.
Click Save to save this task and return to Damage Cleanup Tasks. Alternatively, click Cancel.
Enabling Vulnerability Assessment with Damage Cleanup Tasks