Deep Security has many tasks that you might want to perform automatically on a regular
basis. Scheduled tasks are useful when deploying Deep Security in your environment
and also later, to keep your system up to date and functioning smoothly. They are
especially useful for running scans on a regular basis during off-peak hours.
![]() |
TipYou can automate scheduled task creation and configuration using the Deep Security
API. For examples, see the Maintain Protection Using Scheduled Tasks guide in the Deep Security Automation Center.
|
Create scheduled tasks
To set up a scheduled task in the Deep Security Manager, click Administration > Scheduled Tasks > New. This opens the "New Scheduled Task Wizard", which takes you through the steps to
create a scheduled task.
Check for Security Updates: Regularly check for security updates and import them into Deep Security when they
are available. For most organizations, performing this task once daily is ideal.
![]() |
NoteWith Deep Security 11.0 Update 2 or later, the "Check for Security Updates" task ignores
offline hosts that have been uncommunicative for 30 days or more.
|
Check for Software Updates: Regularly check for Deep Security Agent software updates and download them when they
are available.
Discover Computers: Periodically check for new computers on the network by scheduling a Discovery operation.
You will be prompted for an IP range to check and asked to specify which computer
group the new computer will be added to. This task is useful for discovering computers
that are not part of your cloud connector.
Generate and Send Report: Automatically generate reports and optionally have them emailed to a list of users.
Scan Computers for Integrity Changes: Causes the Deep Security Manager to perform an Integrity Scan to compare a computer's
current state against its baseline.
Scan computers for Malware: Schedules a Malware Scan. The configuration of the scan is specified on the Policy
or Computer Editor > Anti-Malware page for each computer. For most organizations,
performing this task once weekly (or according to your organization’s policies) is
ideal. When you configure this task, you can specify a timeout value for the scan.
The timeout option is available for daily, weekly, monthly, and once-only scans. It
is not available for hourly scans. When a scheduled malware scan is running and the
timeout limit has been reached, any tasks that are currently running or pending are
canceled.
![]() |
TipWhen a Scan Computers for Malware task times out, the next scheduled scan starts over from the beginning (it does not
start where the previous scan ended). The goal is to perform a complete scan, so consider
making some configuration changes if your scans regularly reach the timeout limit.
You can change the malware scan configuration to add some exceptions, or extend the
timeout period.
|
Scan Computers for Open Ports: Schedule periodic port scans on one or more computers. You can specify individual
computers or all computers belonging to a particular computer group. Deep Security
Manager will scan the port numbers defined on the Scanning tab in the Policy or Computer
Editor > Settings page.
Scan Computers for Recommendations: Causes the Deep Security Manager to scan the computer(s) for common applications
and then make recommendations based on what is detected. Performing regular recommendation
scans ensures that your computers are protected by the latest relevant rule sets and
that those that are no longer required are removed. If you have set the "Automatically
implement Recommendations" option for each of the three protection modules that support
it, Deep Security will assign and unassign rules that are required. If rules are identified
that require special attention, an alert will be raised to notify you. For most organizations,
performing this task once a week is ideal.
![]() |
NoteRecommendation Scans can be CPU-intensive, so when scheduling Recommendation Scans,
it is best practice to set the task by group (for example, per policy or for a group
of computers, no more than 1,000 machines per group) and spread it in different days
(for example, database server scans scheduled every Monday; mail server scans scheduled
every Tuesday, and so on). Schedule Recommendation Scans more frequently for systems
that change often.
|
Scheduled Agent Upgrade Task: Schedules an agent upgrade. You can reference Upgrade best practices for agents to help you determine the best schedule for agent upgrades.
![]() |
TipYou can configure this task to upgrade the agent to the latest version, or one of
the two versions before it. The exact version the agent will upgrade to is determined
when the scheduled task is executed. The examples provided within the scheduled task
configuration wizard are based on the Red Hat Enterprise Linux agent versions.
|
Send Outstanding Alert Summary: Generate an email listing all outstanding (unresolved) alerts.
Send Policy: Regularly check for and send updated policies. Scheduled updates allow you to follow
an existing change control process. Scheduled tasks can be set to update machines
during maintenance windows, off hours, etc.
Synchronize Cloud Account: Synchronize the Computers list with an added cloud account. (Only available if you
have added a cloud account to the Deep Security Manager. Applies to Azure and vCoud
accounts only. Not available for other cloud account types such as AWS and Google
Cloud Platform (GCP).)
Synchronize Directory: Synchronize the Computers list with an added LDAP directory. (Only available if you
have added an LDAP directory to the Deep Security Manager.)
Synchronize Users/Contact: Synchronize the Users and Contacts lists with an added Active Directory. (Only available
if you have added an Active Directory to the Deep Security Manager.)
Synchronize VMware vCenter: Synchronize the Computers list with an added VMware vCenter. (Only available if you
have added a VMware vCenter to the Deep Security Manager.)
Enable or disable a scheduled task
Existing scheduled tasks can be enabled or disabled. For example, you might want to
temporarily disable a scheduled task while you perform certain administrative duties
during which you don't want any activity to occur. The control to enable or disable
a scheduled task is on the General tab of the Task's Properties window.
Set up scheduled reports
Scheduled reports are scheduled tasks that periodically generate and distribute reports
to users and contacts (this feature used to be named "Recurring Reports"). Most of
the options are identical to those for single reports, with the exception of the time
filter.
![]() |
TipTo generate a report on specific computers from multiple computer groups, create a
user who has viewing rights only to the computers in question and then either create
a scheduled task to regularly generate an "All Computers" report for that user or
sign in as that user and run an "All Computers" report. Only the computers to which
that user has viewing rights will be included in the report.
|