When you create a task you choose one of the following actions.
Assessment by all vulnerability names
The task scans for all the known vulnerabilities in the current Vulnerability Assessment pattern file.
For a complete listing of all the known vulnerabilities refer to the Trend Micro Web site at http://www.trendmicro.com/advisory/.
When you select this action you can also request enforcement on machines according to the risk they present to the network. Select Enable enforcement on machines that are and then select a security risk level to set an enforcement for this task. The task applies enforcement policies to all machines that present vulnerabilities of the identified risk level.
Assess by the selected vulnerability name(s) only
The task scans for only those vulnerabilities that you identify in the list. To include a vulnerability in the list, type the vulnerability name in the box. Click to add vulnerability names to the task list and Remove to remove names from the list.
When you select this action you can also request enforcement on machines according to the vulnerability names. Select Enable enforcement on machines with any of the selected vulnerability name(s). The task will apply enforcement policies to all machines that contain the vulnerabilities identified in the scan.
Regardless of the action option that you choose, you can also select Enable Damage Cleanup Services for this task with .... When you select this option, the Vulnerability Assessment task that you create runs at the same time as a Damage Cleanup Services task. An icon appears next to the task to indicate that Damage Cleanup Services is now enabled. However, if at a later time you decide to stop sharing the task, then both tasks can no longer run at the same time. When this situation exists, one task is queued to immediately follow the other task.
You can select to enable Damage Cleanup Services for tasks that perform the following actions:
Assessment only: the shared task performs both a Vulnerability Assessment and a Damage Cleanup Services assessment. It does not perform any cleanup functions.
Cleanup: the shared task performs a Vulnerability Assessment and a Damage Cleanup Services assessment. It also performs cleanup services on any damage it finds on the machines.
Refer to Using Damage Cleanup Services for more information about the Damage Cleanup Services assessment and cleanup functions.