Deep Security WebService SDK
Deep Security WebService SDK
Micro Incorporated reserves the right to make changes to this document and to the products described herein
without notice. Before installing and using the software, please review the readme files, release notes, and the latest
version of the applicable user documentation, which are available from the Trend Micro Web site at:
http://downloadcenter.trendmicro.com/
Trend Micro, the Trend Micro t-ball logo, Deep Security, and TrendLabs are trademarks or registered trademarks of Trend
Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.
Copyright © 2017 Trend Micro Incorporated. All rights reserved.
Document Part No.: APEM97219_150921
The user documentation for Trend Micro Deep Security introduces the main features of the software and installation
instructions for your production environment. Read through it before installing or using the software.
Detailed information about how to use specific features within the software are available in the online help file and the
online Knowledge Base at Trend Micro’s Web site.
Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any
Trend Micro document, please contact us at [email protected].
Please evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
2 | P a g e
Contents
What Is Trend Micro Deep Security? .................................................................................................................. 4
What Are Web Services? .................................................................................................................................... 4
Audience ......................................................................................................................................................... 4
Terminology .................................................................................................................................................... 4
Getting Started ................................................................................................................................................... 6
Enabling the Web Service API ......................................................................................................................... 6
Creating a Web Service Administrator Account ............................................................................................. 7
Obtaining the Web Service WSDL and SSL Certificate .................................................................................... 8
Developing a Web Service Client Application ................................................................................................. 9
Web Service API Capabilities ............................................................................................................................ 11
What Is Possible? .......................................................................................................................................... 11
What is Not Possible? ................................................................................................................................... 15
Reference .......................................................................................................................................................... 18
Transport Objects ......................................................................................................................................... 18
Enumeration Objects .................................................................................................................................... 68
Web Methods ............................................................................................................................................... 93
3 | P a g e
What Is Trend Micro Deep Security?
Trend Micro™ Deep Security™ is a server and application protection software that allows systems to become
self-defending. Deep Security Agent is deployed on physical servers and virtual machines to provide
comprehensive protection, including:
• Firewall Intrusion Detection and Prevention (IDS/IPS)
• Web Application Protection
• Application Control
• Integrity Monitoring
• Log Inspection
All Deep Security Agents are centrally managed by Deep Security Manager.
Audience
This document is targeted at customer and partner system integrators, and customization developers. A typical
application of the Web Service API would be to integrate Deep Security into existing configuration and control
management systems, or collection of events. It is assumed that the reader is familiar with Trend Micro Deep
Security, software development in a recommended language, and the concepts and terminology described in
the Terminology section.
Terminology
Term Description
Web Service Web Services is defined as an application programming interface (API) used to
remotely access service-exposed information and functionality that is executed
on the remote system hosting the Web service. It is a collection of web methods
assembled into a service.
WSDL Web Service Definition Language (WSDL) is defined by the Web Service as the
source for all knowledge of the service-available functionality. Web Service
development tools will consume the WSDL and automatically generate the
client-side code required to build a Web Service client for that service.
Web Method A function of the Web Service called from the client that is executed by the
service as a remote call.
4 | P a g e
SOAP SOAP (Simple Object Access Protocol) is a protocol specification for exchanging
structured information in the implementation of Web Services. Its message
format is based on XML and relies on other protocols for message
communication between client and server.
HTTP HTTP is a request/response message standard for client/service communication
used by Internet browsers and web servers.
HTTPS HTTPS is a combination of HTTP and the SSL/TLS protocol. This allows for
encrypted communication between HTTP client/service partners.
IDE Integrated Development Environment (IDE) is a development tool used for
designing, developing, compiling, and debugging software application.
5 | P a g e
Getting Started
The basic steps to getting started with the Web Service API are as follows:
https://<hostname/IP>:4119
6 | P a g e
Creating a Web Service Administrator Account
Deep Security Manager allows for powerful role-based access, including settings to control if an administrator
account may access the Web Service API or Manager user interface. For security reasons, it is recommended
that a new administrator account and a new Web Service-specific role be created.
The Web Service API enforces all other Role access controls, such as Computer Rights, Security Profile Rights,
and User Rights. If a Role is created for the Web Service API that only permits Computers of a certain Computer
Group to be viewable, then a Web Service client using that administrator will only be able to access the specified
Computer Group.
To create a new Role for Web Service only access, complete the following steps:
https://<hostname/IP>:4119
2) Navigate to Administration -> User Management -> Roles, and click New...
3) Create the Role as normal, but de-select “Allow Access to Deep Security Manager User Interface” and
select “Allow Access to Web Service API”.
4) When all other configuration is complete, click Save.
5) Navigate to User Management -> Users, and click New.
6) Create a new administrator for use only with the Web Service API. Assign the new Role previously
created to this administrator.
7 | P a g e
Obtaining the Web Service WSDL and SSL Certificate
All Web Service SOAP implementations will require the target Web Service WSDL file. The WSDL is used to
automatically generate source code that can be used for developing the Web Service client application.
Additionally, the respective SOAP implementation will need to reconcile the fact that HTTPS communication is
required between the client application and the Deep Security Manager Web Service. Typically this means that
the Deep Security Manager SSL certificate will need to be imported in the trusted X.509 certification used by the
SOAP implementation. For example, Microsoft Visual Studio requires that the SSL certificate be imported into
the Windows certificate store on each Windows platform that the client application will run on. For Java Axis,
the Java Key Store is used and can be easily copied with the client application to each platform that the client
application will run on. Alternatively there is the option to develop an alternative certificate validation policy
implementation to bypass this default requirement.
To download the Web Service WSDL file, complete the following steps:
1) Open an Internet browser and connect to the Deep Security Manager Web Service URI:
https://<hostname/IP>:4119/webservice/Manager?WSDL
2) Save the document as Manager.wsdl.
There are many ways to retrieve an installed Deep Security Manager's public certificate. The following is one
method using Firefox:
1) Launch Firefox and connect to the Deep Security Manager web page.
2) Double-click on the Lock icon next to the address.
3) Click More Information.
4) Click View Certificate.
5) Click the Details tab.
6) Click Export...
7) Export the certificate as "X.509 Certificate (DER)".
8) Save it as Manager.cer.
8 | P a g e
Developing a Web Service Client Application
Using a programming language that supports the SOAP (http://en.wikipedia.org/wiki/SOAP) over HTTP standard,
a client application can be developed to make remote calls to Deep Security Manager. The language chosen
should be the conclusion of familiarity, suitability for the task at hand, and language compatibility for the
intended integration. Apache Axis works well and is the native implementation of the Web Service itself. The
Microsoft .Net Framework’s support for Web Services through Visual Studio is a very robust choice. Here is a list
of potential SOAP Web Service implementations that can be used:
Once the selected development environment has been configured, the SOAP implementation will require that
the Deep Security Manager WSDL be added and source code generated from it before development can begin.
For example, with Microsoft Visual Studio a new Project can be created, and the Manager WSDL file can be
added as a new Web Reference, with Apache Axis for Java leverage ANT and the wsdl2java task in order to
generate Java code from the WSDL file.
Next, the respective SOAP implementation will have support for HTTPS communication, which requires that the
Deep Security Manager SSL certificate be imported into a supported key store container. For Microsoft Windows
and Visual Studio, this is the Windows Certificate Store. To import the certificate, it can be double-clicked on the
Web Service client application machine, and imported as trusted. For Java and Apache Axis, the SSL certificate
9 | P a g e
will need to be imported into the JDK/JRE “cacerts” key store using the Java keytool command that is included
with the JDK/JRE.
For more information on how to import a SSL certificate, or how to use HTTPS support for the respective SOAP
implementation, consult the SOAP implementation documentation.
For more examples on how to develop with the Deep Security Manager Web Service API, see the Trend Micro
Deep Security Web Service sample package. It can be obtained from a Trend Micro sales or support
representative.
10 | P a g e
Web Service API Capabilities
The Deep Security Manager Web Service API enables customers and partners to:
• Retrieve configuration and event information
• Create, update and delete configuration settings
• Initiate a Manager operation
What Is Possible?
Although the Web Service API endeavors to implement as many Deep Security Manager features as possible, not
all functionality that is available in the Deep Security Manager interface is necessarily available through the Web
Service API. The following list details the high level functionality, grouped by major category, which is possible
with the Web Service API.
Dashboard
• Retrieve counters for dashboard widgets
• Retrieve feature summary for the system
• Retrieve an overall computer and alert status for the system
Computers
• Retrieve Computers
• Add/Update a computer
• Delete a Computer
• Activate a Computer
• Deactivate a Computer
• Lock a Computer
• Unlock a Computer
• Retrieve Computer status
• Initiate Computer "Update Now" operation
• Initiate Computer "Get Events Now" operation
• Initiate Computer Agent software upgrade operation
• Assign Computer to a Security Profile
• Un-assign Computer from a Security Profile
• Get System settings configured at the Computer level
• Set(override) System settings configured at the Computer level
• Clear System settings configured at the Computer level
Groups
• Retrieve Groups
• Add/Update a Group
• Delete a Group
• Move a Computer to a Group
11 | P a g e
Security Profile
• Retrieve Security Profiles
• Add/Update a Security Profile
• Edit a Security Profile
• Delete a Security Profile
• Set Firewall/DPI/Integrity Monitoring/Log Inspection state at Security Profile level
• Assign Firewall/DPI/Integrity Monitoring/Log Inspection rules at Security Profile level
• Unassign Firewall/DPI/Integrity Monitoring/Log Inspection rules at Security Profile level
• Get System setting configured at the Security Profile level
• Set(override) System settings configured at the Security Profile level
• Clear System settings configured at the Security Profile level
Anti-Malware
• Retrieve Anti-Malware events
• Retrieve Anti-Malware configurations
• Add/Update Anti-Malware configurations
• Delete Anti-Malware configurations
• Add/Update Directory Lists
• Delete Directory Lists
• Add/Update File Lists
• Delete File Lists
• Add/Update File Extension Lists
• Delete File Extension Lists
Web Reputation
• Retrieve Web Reputation events
• Retrieve Web Reputation configurations *
• Add/Update Web Reputation configurations *
• Delete Web Reputation configurations *
These operations are performed with the system setting APIs and not via dedicated APIs.
Firewall
• Retrieve Firewall events
• Retrieve Firewall rules
• Add/Update Firewall rule
• Edit Firewall rule
• Delete Firewall rule
• Retrieve Stateful Configurations
• Add/Update Stateful Configurations
• Edit Stateful Configurations
• Delete Stateful Configurations
12 | P a g e
Deep Packet Inspection
• Retrieve DPI events
• Retrieve DPI rules
• Add/Update DPI rule
• Edit DPI rule
• Delete DPI rule
• Retrieve Application Types
• Add Application Types
• Edit Application Types
• Delete Application Types
• Retrieve Application Type Overrides
• Add Application Type Overrides
• Edit Application Type Overrides
• Delete Application Type Overrides
Note that only user-created Application Types can be modified or deleted. Application Types issued by Trend
Micro are read-only.
Note that Application Type Overrides are only supported at the Security Policy level, not the Computer level.
Integrity Monitoring
• Retrieve Integrity Monitoring events
• Retrieve Integrity Monitoring rules
• Add/Update Integrity Monitoring rules
• Edit Integrity Monitoring rules
• Delete Integrity Monitoring rules
• Initiate Computer "Scan For Integrity Changes" operation
• Initiate Computer "Rebuild Baseline" operation
Log Inspection
• Retrieve Log Inspection events
• Retrieve Log Inspection rules
• Add/Update Log Inspection rules
• Edit Log Inspection rules
• Delete Log Inspection rules
• Retrieve Log Inspection Decoders
• Add/Update Log Inspection Decoder
• Edit Log Inspection Decoder
• Delete Log Inspection Decoder
IP Lists
• Retrieve IP Lists
• Add/Update IP list
• Edit IP lists
13 | P a g e
• Delete IP lists
MAC Lists
• Retrieve MAC Lists
• Add/Update MAC list
• Edit MAC lists
• Delete MAC lists
14 | P a g e
Port Lists
• Retrieve Port Lists
• Add/Update Port list
• Edit Port lists
• Delete Port lists
Schedules
• Retrieve Schedules
• Add/Update Schedules
• Edit Schedules
• Delete Schedules
System
• Retrieve System Events
• Get System(global) settings
• Set System(global) settings
• Retrieve System Information
License
• Retrieve License
• Update License
Updates
• Retrieve Security Center customer account
• Set Security Center customer account
• Test Security Center customer account
• Import Security Update from file
• Retrieve stored Security Updates
• Apply stored Security Update
• Export stored Security Update
• Delete stored Security Update
• Retrieve stored Agent/Appliance software
• Export stored software
• Delete stored software
Alerts
• Retrieve Alert
• Dismiss Alerts
15 | P a g e
Reports
• Generate Reports
Computers
• Edit Computer general information
• Initiate “Scan for Recommendations” operation
• Clear Recommendations
• Create Diagnostic Package
• Configure Computer interface settings
• Edit Firewall/DPI/Integrity Monitoring/Log Inspection state at Computer level
• Assign Firewall/DPI/Integrity Monitoring/Log Inspection rules at Computer level
• Override Firewall/DPI/Integrity Monitoring/Log Inspection rule configurations at Computer level
• Override Application Type Properties at Computer level
Groups
• Add vCenter
• Configure Directory/Sync with LDAP
Security Profile
• Select "Real Time" Integrity Monitoring state at Security Profile level
• Override Firewall/DPI/Integrity Monitoring/Log Inspection rule configurations at Security Profile level
Anti-Malware
• Retrieve or operate on quarantined files
Firewall
• Assign Context to a rule
Integrity Monitoring
• Select "Real Time" Integrity Monitoring state
• Edit [configuration] of downloaded Integrity Monitoring rules
• Assign Context to a Integrity Monitoring rule
Log Inspection
• Edit [configuration] of downloaded Log Inspection rules
• Assign Context to a Log Inspection rule
16 | P a g e
Contexts
• Retrieve Contexts
• Add/Update/Edit/Delete Context
Tags
• Delete Tags
Scheduled Tasks
• Retrieve Scheduled Tasks
• Add/Edit/Delete Scheduled Tasks
Role
• Retrieve Roles
• Add/Edit/Delete Roles
Users
• Retrieve Users
• Add/Edit/Delete Users
Contacts
• Retrieve Contacts
• Add/Edit/Delete Contacts
Updates
• Download Security Update from Security Center
• Download Software from Security Center
17 | P a g e
Reference
This section describes all relevant transport and enumeration class objects.
Transport Objects
Transport objects are modeled after Deep Security Manager web interface objects and configuration groups.
These transport objects can be constructed as new or retrieved from the Manager by calling the appropriate
web method.
A Web Service definition may declare object classes that inherit properties from other base object classes, so
only the relevant object classes are covered in this section. If during development, you encounter any WSDL-
defined object classes that are not documented, they are likely inherited base object classes or response object
classes that are not directly used by any Web Methods and do not have any direct value.
ApplicationTypeTransport
DESCRIPTION Represents an Application Type that reflects some network attributes to which DPI rules are
assigned. The DPI engine will determine if a DPI rule should apply to a connection based on
the assigned Application Type network attributes.
PROPERTIES
Name Type Description
ID int ApplicationTypeTransport ID
description string ApplicationTypeTransport description
name string ApplicationTypeTransport name
TBUID string Internal TBUID of a Trend Micro issued
Application Type
direction EnumDirection The initial direction of the connection
which this ApplicationTypeTransport
would apply, e.g., INCOMING, OUTGOING
Depending on whether the application
type is a server or client, the initial
direction of the connection to inspect
would either be INCOMING for a server,
or OUTGOING for a client. E.g. Inspection
of “Web Server Common” Application
Type for a connection stream on TCP port
80 would be initially an INCOMING
direction because incoming Web Server
connections should be inspected
18 | P a g e
ignoreRecommendations boolean Whether the Recommendation Engine
should ignore this rule
protocolIcmp ProtocolIcmp ApplicationTypeTransport protocol ICMP
type
protocolPortBased ProtocolPortBased ApplicationTypeTransport protocol Port
type
protocolType EnumApplicationTypeProtocolType ApplicationTypeTransport protocol
Application type, e.g., UCMP, TCP, UDP,
TCP_UDP
authoritative boolean Whether the rule is an internal read only
Trend Micro rule
ApplicationTypeOverrideTransport
DESCRIPTION Represents an Override for a specific Application Type and Security Profile. The ports
and/or the recommendations flag can be overridden.
PROPERTIES
Name Type Description
ID int ApplicationTypeOverrideTransport ID
ApplicationTypeID int ApplicationTypeTransportID this override
applies to
SecurityProfileID int SecurityProfileTransportID this override
applies to
portType EnumPortType Assigned EnumPortType, e.g., ANY,
PORTS, DEFINED_LIST
ports String Comma delimited list of ports and ranges
if portType is PORTS
portListID Integer PortListTransport ID assigned if portType
is DEFINED_LIST
ignoreRecommendations boolean Whether the Recommendation Engine
should ignore this rule
ApplierInformationTransport
DESCRIPTION Represents the response information regarding the application of a software update using
the securityUpdateApply web method.
PROPERTIES
Name Type Description
19 | P a g e
DPIRulesAdded int Number of DPI rules added
DPIRulesAddedAndAssigned int Number of DPI rules added and assigned
DPIRulesDeleted int Number of DPI rules removed
DPIRulesUpdated int Number of DPI rules updated
applicationTypesAdded int Number of Application Types added
applicationTypesDeleted int Number of Application Types removed
applicationTypesUpdated int Number of Application Types updated
detailedSummary string Detailed string summary of the update operation
integrityMonitoringRulesAdded int Number of Integrity Monitoring rules added
integrityMonitoringRulesDeleted int Number of Integrity Monitoring rules removed
integrityMonitoringRulesUpdated int Number of Integrity Monitoring rules updated
logInspectionDecodersAdded int Number of Log Inspection Decoders added
logInspectionDecodersDeleted int Number of Log Inspection Decoders deleted
logInspectionDecodersUpdated int Number of Log Inspection Decoders updated
logInspectionRulesAdded int Number of Log Inspection rules added
logInspectionRulesDeleted int Number of Log Inspection rules deleted
logInspectionRulesUpdated int Number of Log Inspection rules updated
20 | P a g e
portListsAdded int Number of Port Lists added
portListsUpdated int Number of Port Lists updated
AttributeTransport
DESCRIPTION Represents an Integrity Monitoring entity object attribute that the parent rule should be
monitoring.
PROPERTIES
Name Type Description
DPIEventListTransport
DESCRIPTION Represents a returned list of DPI events.
PROPERTIES
Name Type Description
DPIEventTransport
DESCRIPTION Represents a DPI event and contains all properties that belong to the event.
PROPERTIES
Name Type Description
engine which are used to indicate conditions of the
engine and data capture, e.g., TRUNCATED 0x01,
OVERFLOW 0x02, SUPRESSED 0x04, HAVE DATA
0x08, REF DATA 0x10
dataIndex int Index of the final character in the data which
triggered the event
destinationIP string Destination IP Address
destinationMAC string Destination MAC Address
destinationPort string Destination Port
direction string Direction of the event, e.g., incoming, or outgoing
driverTime long Epoch time the Agent driver recorded at the time of
the event
endTime dateTime End time of the event if repeated multiple times,
e.g., Internet browsers will resend a request
multiple times if the connection is dropped and the
exact same event would be repeated multiple times
eventOrigin EnumEventOrigin Origin of the event, e.g., AGENT, GUESTAGENT,
APPLIANCEAGENT
flags string Data packet flags, e.g., ACK FIN
flow string Flow of the packet the log was recorded for in
relation to the connection direction, e.g., 0 =
FORWARD, 1 = BACKWARD
hostID int HostTransport ID of the computer where the event
was triggered
hostName string HostTransport Name of the computer where the
event was triggered
iface string Name of the physical network interface where the
event was triggered
note string Internal note property that the engine may set for
use by the Manager, e.g., Drop_data
packetSize int Size of the packet which triggered the event
protocol string Protocol of the connection
rank int Calculated Rank value (Computer Asset Value * IPS
Filter Ranking)
reason string Name of the DPI filter which triggered the event
repeatCount int Repeat count of the event if repeated multiple
times, e.g., Internet browsers will resend a request
multiple times if the connection is dropped and the
exact same event would be repeated multiple times
22 | P a g e
sourceIP string Source IP Address
sourceMAC string Source MAC Address
sourcePort string Source Port
startTime dateTime Start time of the event if repeated multiple times,
e.g., Internet browsers will resend a request
multiple times if the connection is dropped and the
exact same event would be repeated multiple times
status int Error status code which will be 0 if no abnormal
conditions were found
tags string Name of any event tags assigned to this event
DPIRuleTransport
DESCRIPTION Represents a DPI Rule that can be accessed to read, update, or when creating new DPI
Rules. Creating and updating DPI Rules is considered advanced and not a routine or
repetitive operation. Changing some configuration options, such as includePacketData or
raiseAlert are reasonable; however, creating a new DPI rule from scratch programmatically
should only be done if full testing of the ruleXML content has been performed prior.
When creating a new rule, if possible it is recommended that an existing base rule is
retrieved first, then modified to reflect the new rule, and saved as the new rule.
Once a new rule has been created and saved, the returned transport object from the save
rule method should be used for all subsequent configuration operations for the life of the
object. The reason for this is that the Manager will populate some fields during the save
operation, such as rule ID, and these fields will not be present if you do not use the returned
version after saving.
PROPERTIES
Name Type Description
ID int ID
name string Name
description string Description
TBUID string Internal TBUID of a Trend Micro issued DPI
Rule
applicationTypeID int ApplicationTypeTransport ID this rule is
assigned to
authoritative boolean Whether the rule is an internal read only
Trend Micro rule
23 | P a g e
cveNumbers string A comma separated listing of the CVE
Numbers from the vulnerability information
cvssScore double Final calculated CVSS score of the vulnerability
information. A rule may resolve multiple
vulnerabilities, so this will always be the
highest CVSS score.
detectOnly boolean Whether the rule is detect only
disableEvent boolean Whether the rule is disabled
eventOnPacketDrop boolean Whether the rule should trigger an event
when the connection is dropped
eventOnPacketModify boolean Whether the rule should trigger an event
when a packet is modified by a rule
(uncommon)
identifier string Public identifier of the filter used by Trend
Micro to track filters
ignoreRecommendations boolean Whether the Recommendation Engine should
ignore this rule
includePacketData boolean Whether this rule events should include
packet data
issued dateTime Date this rule was issued
msNumbers string A comma separated listing of the Microsoft ID
from the vulnerability information
patternAction EnumDPIRuleAction Action for START_END_PATTERNS type rule,
e.g., DROP_CLOSE, LOG_ONLY
patternCaseSensitive boolean Whether a START_END_PATTERNS type rule
should consider case sensitivity
patternEnd string End pattern
patternIf EnumDPIRuleIf Trigger if a START_END_PATTERNS type rule
meets the criteria, e.g.,
ALL_PATTERNS_FOUND,
ANY_PATTERNS_FOUND,
NO_PATTERNS_FOUND
patternPatterns string A newline separated list of strings which will
be used by a START_END_PATTERNS type rule
patternStart string Start pattern
priority EnumDPIRulePriority Rule priority, e.g., HIGHEST, NORMAL, LOWEST
raiseAlert boolean Whether an alert should be raised when the
rule triggers
24 | P a g e
ruleXML string Rule XML of a CUSTOM_XML type rule. This
may not be available for rules that have
thirdBrigade set to TRUE
scheduleID int ScheduleTransport ID assigned to this rule
severity EnumDPIRuleSeverity Severity, e.g., CRITICAL, LOW
signatureAction EnumDPIRuleAction Action for SIGNATURE type rule, e.g.,
DROP_CLOSE, LOG_ONLY
signatureCaseSensitive boolean Whether a SIGNATURE type rule should
consider case sensitivity
signatureSignature string Signature string which will be used by a
SIGNATURE type rule
templateType EnumDPIRuleTemplateType Rule Type, e.g., CUSTOM_XML, SIGNATURE,
START_END PATTERNS
EditableSettingStoredTransport
DESCRIPTION Represents existing Manager settings that can apply to a computer, Security Profile, or
System. For example, the DPI engine can be configured to be in Detect at the System scope
(top level) and the Security Profile scope can be configured to Prevent.
PROPERTIES
Name Type Description
EntityTransport
DESCRIPTION Represents an Integrity Monitoring entity object that references the attributes the parent
rule should be monitoring.
PROPERTIES
Name Type Description
25 | P a g e
FirewallEventTransport
DESCRIPTION Represents a Firewall event and contains all properties that belong to the event.
PROPERTIES
Name Type Description
hostID int HostTransport ID of the computer where the event
was triggered
27 | P a g e
hostName string HostTransport Name of the computer where the
event was triggered
iface string Name of the physical network interface where the
event was triggered
note string Internal note property that the engine may set for
use by the Manager, e.g., Drop_data
packetSize int Size of the packet which triggered the event
protocol string Protocol of the connection
rank int Calculated Rank value (Computer Asset Value * IPS
Filter Ranking)
reason string Name of the Firewall rule which triggered the event
repeatCount int Repeat count of the event if repeated multiple
times, e.g., Internet browsers will resend a request
multiple times if the connection is dropped and the
exact same event would be repeated multiple times
sourceIP string Source IP Address
sourceMAC string Source MAC Address
sourcePort string Source Port
startTime dateTime Start time of the event if repeated multiple times,
e.g., Internet browsers will resend a request
multiple times if the connection is dropped and the
exact same event would be repeated multiple times
status int Error status code which will be 0 if no abnormal
conditions were found
tags string Name of any event tags assigned to this event
FirewallRuleTransport
DESCRIPTION Represents a Firewall Rule that can be accessed to create, read, or update. Note that some
fields are dynamically required. For example, if destinationIPType is set to RANGE, then
destinationIPRangeFrom and destinationIPRangeTo are required fields, but
destinationIPListID and destinationIPMask are not. The Web Service validation of these
transport object properties is the same as what is validated in the Manager web interface
itself. For an initial idea on how to configure a new rule transport object, see the Manager
interface itself and the configurable fields you would like to attempt programmatically
through the Web Service API.
When creating new rule, if possible it is recommended that an existing base rule be
retrieved first, then modified to reflect the new rule, and then saved as the new rule.
28 | P a g e
Once a new rule has been created and saved, the returned transport object from the save
rule method should be used for all subsequent configuration operations for the life of the
object. The reason for this is the Manager will populate some fields during the save
operation, such as rule ID, and these fields will not be present if you do not use the returned
version after saving.
Note that there is some complex property validation that is generally implemented by the
Manager web interface. For example, if the destinationIPType DEFINED_LIST is set, then the
destinationIPListID will be required. If the destinationIPType RANGE is set, then
destinationIPRangeFrom and destinationIPRangeTo will be required. This validation will be
reported in the form of an exception when trying to save the object.
PROPERTIES
Name Type Description
ID int ID
name string Name
description string Description
action EnumFirewallRuleAction Resulting action of the triggered event, e.g.,
log or deny
anyFlags boolean Overriding packet flag criteria that includes
any packet flags
destinationIP string Destination IP Address
destinationIPListID int IPListTransport ID of the assigned IP List
destinationIPMask string Destination IP Mask
destinationIPNot boolean Whether the destination IP criteria should be
negative
destinationIPRangeFrom string Destination IP range from value
destinationIPRangeTo string Destination IP range to value
destinationIPType EnumFirewallRuleIPType Assigned EnumFirewallRuleIPType, e.g., ANY,
MASKED_IP, RANGE, DEFINED_LIST
destinationMAC string Destination MAC
destinationMACListID int Assigned MACListTransport ID
destinationMACNot boolean Whether the destination MAC criteria should
be negative
destinationMACType EnumMACType Assigned EnumMACType, e.g., ANY, MAC,
DEFINED_LIST
destinationPortListID int Assigned PortListTransport ID
29 | P a g e
destinationPortNot boolean Whether the destination Port criteria should
be negative
destinationPortType EnumPortType Assigned EnumPortType, e.g., ANY, PORTS,
DEFINED_LIST
destinationPorts string Destination Ports
destinationSingleIP string Destination single IP
disabledLog boolean Disable logging of events triggered by this rule
frameNot boolean Whether the assigned frameType criteria
should be negative
frameNumber string If frameType is OTHER, then use this value
frameType EnumFirewallRuleFrameType Assigned EnumFirewallRuleFrameType, e.g.,
ANY, IP, ARP, REARP, OTHER
icmpCode int If protocolType is ICMP, and anyFlags set to
false, then include this ICMP code for the
specified icmpType
icmpNot boolean Whether the icmpType flags should be
negative
icmpType int If protocolType is ICMP, and anyFlags set to
false, then include this ICMP type code, e.g.,
30 = Traceroute, 37 = Domain Name Request
packetDirection EnumDirection Direction of the event, e.g., incoming, or
outgoing
priority EnumFirewallRulePriority Assigned EnumFirewallRulePriority, e.g.,
HIGHEST, NORMAL, LOW
protocolNot boolean Whether the destination Protocol criteria
should be negative
protocolNumber int If protocolType is set to OTHER, use this value
protocolType EnumFirewallRuleProtocolType Assigned EnumFirewallRuleProtocolType, e.g.,
ANY, ICMP, ICMPV6, TCP, UDP, TCP_UDP,
OTHER
raiseAlert boolean Whether an alert should be raised when the
rule triggers
scheduleID int ScheduleTransport ID assigned to this rule
sourceIP string Source IP Address
sourceIPListID int IPListTransport ID of the assigned IP List
sourceIPMask string Source IP Mask
sourceIPNot boolean Whether the source IP criteria should be
30 | P a g e
negative
sourceIPRangeFrom string Source IP range from value
sourceIPRangeTo string Source IP range to value
sourceIPType EnumFirewallRuleIPType Assigned EnumFirewallRuleIPType, e.g., ANY,
MASKED_IP, RANGE, DEFINED_LIST
sourceMAC string Source MAC
sourceMACListID int Assigned MACListTransport ID
sourceMACNot boolean Whether the source MAC criteria should be
negative
sourceMACType EnumMACType Assigned EnumMACType, e.g., ANY, MAC,
DEFINED_LIST
sourcePortListID int Assigned PortListTransport ID
sourcePortNot boolean Whether the source Port criteria should be
negative
sourcePortType EnumPortType Assigned EnumPortType, e.g., ANY, PORTS,
DEFINED_LIST
sourcePorts string Source Ports
sourceSingleIP string Source single IP
tcpFlagACK boolean If protocolType includes TCP, and anyFlags set
to false, then include TCP packets with the ACK
flag
tcpFlagFIN boolean If protocolType includes TCP, and anyFlags set
to false, then include TCP packets with the FIN
flag
tcpFlagPSH boolean If protocolType includes TCP, and anyFlags set
to false, then include TCP packets with the PSH
flag
tcpFlagRST boolean If protocolType includes TCP, and anyFlags set
to false, then include TCP packets with the RST
flag
tcpFlagSYN boolean If protocolType includes TCP, and anyFlags set
to false, then include TCP packets with the SYN
flag
tcpFlagURG boolean If protocolType includes TCP, and anyFlags set
to false, then include TCP packets with the
URG flag
tcpNot boolean Whether the TCP Flag criterion should be
negative
31 | P a g e
HostFilterTransport
DESCRIPTION Used as search criteria to limit the scope of objects returned by computer-related
attributes, such as by a Group, a Security Profile, or a specific computer. The event retrieval-
related methods will require a HostFilterTransport that is empty to search for all events, or
with specific properties populated to limit the scope of the search. For example, setting the
HostFilterTransport securityProfileID property to the ID of a Security Profile will limit any
event retrieval method calls to events that pertain to computers with the specific Security
Profile assigned.
PROPERTIES
Name Type Description
HostGroupTransport
DESCRIPTION Represents a computer group folder that computers can be assigned to for organizational
purposes.
PROPERTIES
Name Type Description
ID int ID
name string Name
description string Description
external boolean Administrative external boolean for integration
purposes
externalID string Administrative external ID for integration purposes
parentGroupID int If the group belongs to a parent group, then this ID
will be set and used to retrieve the parent group
HostStatusTransport
DESCRIPTION Contains the overall status information of a computer, VMWare ESX server, or Deep
Security Virtual Appliance. Physical computers, virtual machines, ESX servers, and Deep
Security Virtual Appliances are all represented as HostTransport objects. The requested
computer HostStatusTransport object can contain optional information about the ESX a
virtual machine belongs to, or information about an ESX server.
32 | P a g e
PROPERTIES
Name Type Description
HostTransport
DESCRIPTION The primary computer transport object that represents the computer systems Deep
Security is aware of. Physical computers, virtual machines, ESX servers, and Deep Security
Virtual Appliances are all represented as HostTransport objects.
To determine a HostTransport status (e.g., Activated, Offline, Installed, etc.) the computer
HostStatusTransport should be retrieved and the assigned ProtectionStatusTransport
objects should be inspected. The HostTransportStatus will reflect the overall protection
status of a computer. If protection is applied by both an in-guest Agent and Virtual
Appliance, then two ProtectionStatusTransport objects will be assigned. Agent and Virtual
Appliance protection may have different protection capabilities enabled, so inspection of all
33 | P a g e
assigned ProtectionStatusTransport objects should considered. Note that this is only
necessary where a Virtual Appliance is deployed. Computers and virtual machines that only
use Agent protection may only use the HostTransportStatus.
PROPERTIES
Name Type Description
IDFilterTransport
DESCRIPTION Used as a search criteria to limit the scope of objects returned by event transport object ID.
Each event transport object, such as IntegrityEventTransport, includes an ID property that is
assigned as the primary key of an event when it is generated by a computer agent. Using
IDFilterTransport, it is possible to filter event retrieval by this event ID in order to retrieve a
specific event by ID, or events that are greater or less than a specified ID. For example, a
utility that is designed to retrieve all new events on an interval can use the event ID
property to uniquely identify which events have already been retrieved. This way retrieval
of duplicate events can be avoided.
Note that this structure is limited to 32 bit integers for IDs. IDFilterTransport2 supports 64
bit IDs and should be used with the associated event retrieval method in preference to this
structure.
PROPERTIES
Name Type Description
IDFilterTransport2
DESCRIPTION Used as a search criteria to limit the scope of objects returned by event transport object ID.
Each event transport object, such as IntegrityEventTransport, includes an ID property that is
assigned as the primary key of an event when it is generated by a computer agent. Using
IDFilterTransport2, it is possible to filter event retrieval by this event ID in order to retrieve a
34 | P a g e
specific event by ID, or events that are greater or less than a specified ID. For example, a
utility that is designed to retrieve all new events on an interval can use the event ID
property to uniquely identify which events have already been retrieved. This way retrieval
of duplicate events can be avoided.
PROPERTIES
Name Type Description
IntegrityEventTransport
DESCRIPTION Represents an Integrity monitoring event and contains all properties that belong to the
event. Depending on the triggering rule and the target entity types and attributes
monitoring, key, process, and user may contain information about the changed service, file,
or user account. The isEntity and wasEntity properties may be used to inspect the changes
made to the attribute that triggered the event; however, the description will contain a
verbose explanation of the changes.
PROPERTIES
Name Type Description
35 | P a g e
rank int Calculated Rank value (Computer Asset Value * IPS
Filter Ranking)
reason string Name of the Integrity rule which triggered the
event
severity EnumIntegrityRuleSeverity EnumIntegrityRuleSeverity severity level of the
triggered event, e.g., CRITICAL, HIGH, MEDIUM,
LOW
tags string Name of any event tags assigned to this event
type string Key type, e.g., Directory, File, Group, Installed
Software, Service, User
user string Name of the user which the Integrity rule triggered
on during a scan (if available)
wasEntity EntityTransport EntityTransport of the monitored entity before the
change which triggered the event
IntegrityRuleTransport
DESCRIPTION Represents an Integrity Monitoring Rule that can be accessed to create, read, or update.
When creating new rule, if possible it is recommended that an existing base rule be
retrieved first, then modified to reflect the new rule, and then saved as the new rule.
Once a new rule has been created and saved, the returned transport object from the save
rule method should be used for all subsequent configuration operations for the life of the
object. The reason for this is the Manager will populate some fields during the save
operation, such as rule ID, and these fields will not be present if you do not use the returned
version after saving.
PROPERTIES
Name Type Description
ID int ID
name string Name
description string Description
TBUID string Internal TBUID of a Trend Micro issued Integrity
Monitoring rule
allowOnChange boolean Whether on change detection is enabled
36 | P a g e
authoritative boolean Whether the rule is an internal read only Trend
Micro rule
content string XML content of the rule
identifier string Public identifier of the filter used by Trend Micro
to track rules
ignoreRecommendations boolean Whether the Recommendation Engine should
ignore this rule
issued dateTime Date this rule was issued
minAgentVersion string Minimum Agent version which can support this
rule
minManagerVersion string Minimum Manager version which can support this
rule
raiseAlert boolean Whether an alert should be raised when the rule
triggers
severity EnumIntegrityRuleSeverity EnumDPIRuleSeverity Severity, e.g., CRITICAL,
LOW
IPListTransport
DESCRIPTION Represents an IP Address List which can be assigned to other objects, such as Firewall rules.
PROPERTIES
Name Type Description
ID int IPListTransport ID
description string IPListTransport description
name string IPListTransport name
items string A newline separated list of IP Addresses
LogInspectionDecoderTransport
DESCRIPTION Represents a Log Inspection log file decoder. Log Inspection rules are applied after a log file
has been first decoded. Some log files require special decoding because of the format the
log data is contained in.
PROPERTIES
Name Type Description
ID int IPListTransport ID
37 | P a g e
description string IPListTransport description
name string IPListTransport name
TBUID string Internal TBUID of a Trend Micro issued Integrity
Monitoring rule
authoritative boolean Whether the rule is an internal read only Trend
Micro rule
content string XML content of the decoder
identifier string Public identifier of the filter used by Trend Micro to
track rules
issued dateTime Date this rule was issued
minAgentVersion string Minimum Agent version which can support this rule
minManagerVersion string Minimum Manager version which can support this
rule
LogInspectionEventTransport
DESCRIPTION Represents a Log Inspection event and contains all properties that belong to the event. Due
to the dynamic nature of monitoring many different kinds of application log file, few or
many of the properties may be populated. For example, some inspected log files can
contain information about a remote computer and so the sourceIP and sourceUser may be
populated, while other log files may only contain application related entries like
programName. Do not rely on a descriptive property to be always present. Instead perform
proper null value checking before utilizing the property.
PROPERTIES
Name Type Description
38 | P a g e
destinationUser string Destination User if available
destinationPort string Destination Port if available
fullEvent string Copy of the triggered full log entry
groups string Groups of the LogInspectionRuleTransport triggered
sub-rule
hostID int HostTransport ID of the computer where the event
was triggered
hostName string HostTransport Name of the computer where the
event was triggered
location string Location of the inspected log file
logTime dateTime Time of the triggered event
message string
programName string Name of the monitored log file application
rank string Calculated Rank value (Computer Asset Value * IPS
Filter Ranking)
reason string Name of the Log Inspection rule that triggered the
event
ruleID int LogInspectionRuleTransport sub-rule ID as defined
in the rule syntax
severity string Severity of the triggered sub-rule, e.g., Lowest = 1,
Critical = 15
sourceHostName string Source hostname if available
sourceID string Source ID if available
sourceIP string Source IP Address if available
sourcePort string Source Port if available
sourceUser string Source User if available
status string
systemName string System name of the computer the event triggered
on
tags string Name of any event tags assigned to this event
url string URL attribute of the log event if available
LogInspectionRuleTransport
DESCRIPTION Represents a Log Inspection Rule that can be accessed to create, read, or update.
When creating new rule, if possible it is recommended that an existing base rule is retrieved
first, and then modified to reflect the new rule, then saved as the new rule.
39 | P a g e
Once a new rule has been created and saved, the returned transport object from the save
rule method should be used for all subsequent configuration operations for the life of the
object. The reason for this is the Manager will populate some fields during the save
operation, such as rule ID, and these fields will not be present if you do not use the returned
version after saving.
PROPERTIES
Name Type Description
ID int ID
name string Name
description string Description
TBUID string Internal TBUID of a Trend Micro issued Log Inspection rule
alertMinSeverity int Minimum severity at which a sub-rule event will trigger a rule Alert
authoritative boolean Whether the rule is an internal read only Trend Micro rule
content string XML content of the rule
40 | P a g e
files string XML content that reflects the log file and format to inspect
This should contain one or more <localfile> node elements that
require <location> and <log_format> elements where location is a
path to the log file and format is one of the following pre-defined log
handlers:
• single-line-text-log
• syslog
• snort-full
• snort-fast
• apache
• iis
• squid
• nmapg
• mysql_log
• postgresql_log
• djb-multilog
• eventlog
Windows Event Log example:
<localfile>
<location>Application</location>
<log_format>eventlog</log_format>
</localfile>
Multiple single line log files example:
<localfile>
<location>c:\application\error.log</location>
<log_format>single-line-text-log</log_format>
</localfile>
<localfile>
<location>c:\application\debug.log</location>
<log_format>single-line-text-log</log_format>
</localfile>
41 | P a g e
NOTE: LogInspectionRuleTransport objects with the thirdBrigade
property set to TRUE will return JIT (Just-In-Time) output logic from
the Log Inspection engine and can include internal engine logic
fragments. Do not attempt to reuse this internal logic when updating
or creating custom Log Inspection rules
Please consult the Deep Security User Guide for more information on
supported log file formats
identifier string Public identifier of the filter used by Trend Micro to track filters
ignoreRecommendations boolean Whether the Recommendation Engine should ignore this rule
issued dateTime Date this rule was issued
minAgentVersion string Minimum Agent version that can support this rule
minManagerVersion string Minimum Manager version that can support this rule
raiseAlert boolean Whether an alert should be raised when the rule triggers
MACListTransport
DESCRIPTION Represents a MAC Address List that can be assigned to other objects, such as Firewall rules.
PROPERTIES
Name Type Description
ID int MACListTransport ID
description string MACListTransport description
name string MACListTransport name
items string A newline separated list of MAC Addresses
PortListTransport
DESCRIPTION Represents a Port List that can be assigned to other objects, such as Firewall rules.
PROPERTIES
Name Type Description
ID int PortListTransport ID
description string PortListTransport description
name string PortListTransport name
items string A newline separated list of Ports
TBUID string Internal TBUID
42 | P a g e
ProtectionStatusTransport
DESCRIPTION Represents the protection status of a host that is provided by and Agent or Virtual
Appliance. A HostTransport object may have up to two ProtectionStatusTransport objects
assigned if the computer is a Virtual Machine protected by an in-guest Agent.
PROPERTIES
Name Type Description
ProtocolIcmp
DESCRIPTION Represents a basic ICMP protocol type container.
PROPERTIES
Name Type Description
ProtocolPortBased
DESCRIPTION Represents an Application Type port protocol container.
PROPERTIES
Name Type Description
ScheduleTransport
DESCRIPTION Represents a Schedule container.
PROPERTIES
Name Type Description
ID int ScheduleTransport ID
description string ScheduleTransport description
name string ScheduleTransport name
hourOfWeek String A custom format that represents each hour of a
week. The format is a single line sequence of 168
one and zero characters where a one represents an
hour of the week that the assigned schedule should
execute beginning Sunday morning. For example,
44 | P a g e
the following truncated sample would execute
Monday at 4am:
0000000000000000000000000001000000…
SecurityProfileTransport
DESCRIPTION Represents a Security Profile container that can be assigned to other Computers by ID using
their HostTransport object.
PROPERTIES
Name Type Description
ID int SecurityProfileTransport ID
description string SecurityProfileTransport description
name string SecurityProfileTransport name
DPIRuleIDs int[] Array of assigned DPIRuleTransport IDs
DPIState EnumSecurityProfileDPIState Assigned EnumSecurityProfileDPIState, e.g., ON,
OFF, PASSIVE, INHERITED
antiMalwareManualID int Anti Malware Manual ID
antiMalwareManualInhe boolean Anti Malware Manual Inherit
rit
antiMalwareRealTimeID int Anti Malware Real Time ID
antiMalwareRealTimeIn boolean Anti Malware Real Time Inherit
herit
antiMalwareRealTimeSc int Anti Malware Real Time Schedule ID
heduleID
antiMalwareScheduledI int Anti Malware Scheduled ID
D
antiMalwareScheduledI boolean Anti Malware Scheduled Inherit
nherit
antiMalwareState EnumSecurityProfileAntiMalwa Assigned EnumSecurityProfileAntiMalwareState,
reState e.g., ON, OFF, INHERITED
applicationTypeIDs int[] Array of assigned ApplicationTypeTransport IDs
firewallRuleIDs int[] Array of assigned FirewallRuleTransport IDs
firewallState EnumSecurityProfileFirewallSta Assigned EnumSecurityProfileFirewallState, e.g.,
te ON, OFF, INHERITED
integrityRuleIDs int[] Array of assigned
IntegrityMonitoringRuleTransport IDs
45 | P a g e
integrityState EnumSecurityProfileIntegritySt Assigned EnumSecurityProfileIntegrityState, e.g.,
ate ON, OFF, INHERITIED
logInspectionRuleIDs int[] Array of assigned LogInspectionRuleTransport IDs
logInspectionState EnumSecurityProfileLogInspecti Assigned EnumSecurityProfileLogInspectionState,
onState e.g., ON, OFF, INHERITED
parentSecurityProfileID int Assigned Security Profile ID
recommendationState EnumSecurityProfileRecommen Assigned
dationState EnumSecurityProfileRecommendationState, e.g.,
OFF, ONGOING
scheduleID int Assigned ScheduleTransport ID
statefulConfigurationID int Assigned StatefulConfigurationTransport ID
SecurityUpdateTransport
DESCRIPTION Represents a downloaded Security Update that can be applied. Once applied, all updates to
rules and recommendations in the Security Update will be available to Deep Security. Deep
Security Manager can download and keep multiple Security Updates, but only one can be
applied at a time. The currently applied Security Update is indicated by the appliedState
property EnumSecurityUpdateAppliedState APPLIED_CURRENT value.
PROPERTIES
Name Type Description
ID int SecurityUpdateTransport ID
appliedState EnumSecurityUpdateAppliedState Applied state, e.g., APPLIED,
APPLIED_CURRENT, NOT_APPLIED
contentSummary string Summary of the Security Update
detectOnly boolean Used to indicate whether new Security Update
rules should be applied as Detect Only. This
can be used to limit risk associated with
automatic assignment of untested new rules in
a new Security Update
This property should be set before calling the
securityUpdateApply() method for it to be
effective
downloaded dateTime Download date
name string Simple friendly name
released dateTime Trend Micro release date
46 | P a g e
SoftwareTransport
DESCRIPTION Represents a downloaded Software update that can be applied to the target type. Generally
Software updates are Agent software updates. However Deep Security Virtual Appliances
can also be considered a Software package.
PROPERTIES
Name Type Description
ID int SecurityUpdateTransport ID
fingerprint string Hashed fingerprint of the software file
imported dateTime Download or import date
name string Simple friendly name
notes string Release notes
platform string Target platform
released dateTime Trend Micro release date
version string Software version
StatefulConfigurationTransport
DESCRIPTION Represents a Stateful Inspection configuration container.
PROPERTIES
Name Type Description
ID int StatefulConfigurationTransport ID
description string StatefulConfigurationTransport description
name string StatefulConfigurationTransport name
ackStormDropConnection boolean Enable ACK Storm protection connection drops
when detected
ackStormProtection boolean Enable ACK Storm protection
ackStormProtectionThreshold int The number of acknowledged packets before
enforcing ACK Stork protection
allowIncomingActiveFTP boolean Allow Active FTP when assigned computer acts as
a server
allowIncomingPassiveFTP boolean Allow Passive FTP when assigned computer acts as
a server
47 | P a g e
allowOutgoingActiveFTP boolean Allow Active FTP when assigned computer acts as
a client
48 | P a g e
allowOutgoingPassiveFTP boolean Allow Passive FTP when assigned computer acts as
a client
denyFragmentedPackets boolean Deny incoming fragmented packets
denyTcpCwrEceFlags boolean Deny TCP packets containing CWR, EXE flags when
there is network congestion (See RFC 3168 for ECN
field definitions)
enableICMPStatefulInspection boolean Enable stateful inspection of packets at the ICMP
level
enableICMPStatefulLogging boolean Enable logging of ICMP stateful inspection
enableTCPStatefulInspection boolean Enable stateful inspection of packets at the TCP
level
enableTCPStatefulLogging boolean Enable logging of TCP stateful inspection
enableUDPStatefulInspection boolean Enable stateful inspection of packets at the UDP
level
enableUDPStatefulLogging boolean Enable logging of UDP stateful inspection
limitHalfOpenConnections boolean Enable limiting of the number of half open TCP
connections
limitHalfOpenConnectionsTo int The number of limited half open TCP connections
limitIncomingConnections boolean Enable limiting of incoming connections from a
single computer
limitIncomingConnectionsTo int The number of limited incoming connection from a
single computer
limitOutgoingConnections boolean Enable limiting of outgoing connections from a
single computer
limitOutgoingConnectionsTo int The number of limited outgoing connection from a
single computer
synFloodProtection boolean Enable SYN flood protection
synFloodProtectionThreshold int The number of half open TCP connections allowed
before SYN flood protection is enforced
49 | P a g e
SystemEventTransport
DESCRIPTION Represents a Deep Security Manager System event. A System event can target many
different aspects of Deep Security, such as a configuration change to a Security Profile or
Computer setting, or applying a Security Update to a Computer.
PROPERTIES
Name Type Description
SystemInformationTransport
DESCRIPTION Represents a Deep Security Manager system information container.
PROPERTIES
Name Type Description
50 | P a g e
TimeFilterTransport
DESCRIPTION Used as search criteria limit the scope of objects returned by time related attributes, such as
from, to, or a specific time. If the type is set to EnumTimeFilterType CUSTOM_RANGE, then
the rangeFrom and rangeTo property will be required. If the EnumTimeFilterType
SPECIFIC_TIME type is set, then the specifiicTime property will be required.
PROPERTIES
Name Type Description
UserTransport
DESCRIPTION Represents User Transport.
PROPERTIES
Name Type Description
ID int
country string
description string
emailAddress string
fullName string
language string
lockedOut boolean
mobileNumber string
pagerNumber string
password string
passwordNeverExpires boolean
phoneNumber string
receiveNotifications boolean
51 | P a g e
TagFilterTransport
DESCRIPTION Used as a search criteria to specify the criteria of tags for the search
PROPERTIES
Name Type Description
CounterTransport
DESCRIPTION This object represents an abstraction of data that is represented on the dashboard.
PROPERTIES
Name Type Description
52 | P a g e
CounterHostTransport
DESCRIPTION A counter object specific from a host. This extends from CounterTransport, so all fields of
that class apply here.
PROPERTIES
Name Type Description
CounterWithIDTransport
DESCRIPTION A counter object specific for a specific item, typically a rule. This extends from
CounterTransport, so all fields of that class apply here.
PROPERTIES
Name Type Description
CounterAlertTypeTransport
DESCRIPTION A counter object that aggregates alert information. This extends from CounterTransport, so
all fields of that class apply here.
PROPERTIES
Name Type Description
FeatureSummaryDetailTransport
DESCRIPTION An object that represents the status summary of a protection module.
PROPERTIES
Name Type Description
53 | P a g e
totalEventNum long Total number of events
preventedEventNum long Number of events that were prevented
detectedEventNum long Number of events that were detected
previousTotalEventNum long Total event count for the previous time period
previousPreventedEventNum long Prevent count for the previous time period
previousDetectedEventNum long Detect count for the previous time period
HostStatusSummaryTransport
DESCRIPTION An object that represents the high level computer summary for the system.
PROPERTIES
Name Type Description
StatusSummaryTransport
DESCRIPTION An collection of objects that represent the high level status for the system
PROPERTIES
Name Type Description
54 | P a g e
ComponentInfoTransport
DESCRIPTION Represents the information for an individual component in the system. Components are
patterns, rule updates, manifests, etc.., typically items that are visible on the System-
>Updates page.
PROPERTIES
Name Type Description
JobProgressTransport
DESCRIPTION Collects the progress for a given system job, i.e., " Update Security Configuration on N
computers"
PROPERTIES
Name Type Description
ConfigurationTransport
55 | P a g e
DESCRIPTION The superclass for many configuration transport objects.
PROPERTIES
Name Type Description
ProtectionStatusTransport
DESCRIPTION An object representing the current module protection status for a given computer.
PROPERTIES
Name Type Description
56 | P a g e
SystemEventListTransport
DESCRIPTION A collection of system events
PROPERTIES
Name Type Description
IntegrityEventListTransport
DESCRIPTION A collection of integrity events
PROPERTIES
Name Type Description
LogInspectionEventListTransport
DESCRIPTION A collection of log inspection events
PROPERTIES
Name Type Description
ScanFileListTransport
DESCRIPTION Extends ItemsTransport, this is a collection of File Lists.
PROPERTIES
Name Type Description
57 | P a g e
ScanFileExtListTransport
DESCRIPTION Extends ItemsTransport, this is a collection of File Extension Lists.
PROPERTIES
Name Type Description
ScanDirectoryListTransport
DESCRIPTION Extends ItemsTransport, this is a collection of Directory Lists.
PROPERTIES
Name Type Description
AntiMalwareTransport
DESCRIPTION An object that represents an anti malware configuration object.
PROPERTIES
Name Type Description
58 | P a g e
scanCompressed boolean Should compressed files be
scanned
scanCompressedLayer int Maximum Compressed Layers
scannable
scanCompressedSmaller int Used by Scan Compressed. The size
is in MB
scanCompressedNumberOfFiles int The maximum number of files to
scan in a compressed file
scanDirList int The ID of the Directory list to scan,
if folderToScan is setup to point at
a specific list
scanFilesActivity EnumAntiMalwareScanFilesActivity During real time scan, whether to
scan files opened for read, write, or
read and write
secondScanAction EnumAntiMalwareScanCustomAction The second specific customer
action to perform
toScanFileExtListID int The File Extension list ID to scan
spywareEnabled boolean Is spyware enabled
scanCustomActionForGeneric EnumAntiMalwareScanCustomAction A specific custom action to perform
for malware classified as generic
unScannableFileAction EnumAntiMalwareScanCustomAction A specific custom action to perform
for malware the is unscannable
configurationType EnumAntiMalwareConfigType Type of config, either for Real-Time
scan or Manual/Scheduled
scanNetworkFolder boolean If network folders should be
scanned
cpuUsage EnumAntiMalwareCpuUsage Controls CPU Usage Level
scanOLE boolean Scan embedded Microsoft Office
objects
scanOLEExploit boolean Option to detect exploit code in
OLE files
scanOLELayer int OLE layers to scan
scanActionForVirus EnumAntiMalwareScanCustomAction Scan action for Malware of type
Virus
scanActionForTrojans EnumAntiMalwareScanCustomAction Scan action for Malware of type
Trojans
scanActionForPacker EnumAntiMalwareScanCustomAction Scan action for Malware of type
Packer
59 | P a g e
scanActionForSpyware EnumAntiMalwareScanCustomAction Scan action for Malware of type
Spyware
scanActionForOtherThreats EnumAntiMalwareScanCustomAction Scan action for Malware of type
other threats
scanActionForCookie EnumAntiMalwareScanCustomAction Scan action for Malware of type
cookie
excludeScanProcessFileListID int File list ID of excluded processes
AntiMalwareSpywareItemTransport
DESCRIPTION Represents an Anti-Malware spyware event and contains all properties that belong to the
event.
PROPERTIES
Name Type Description
antiMalwareQuarantinedFileID int If a file was quarantined as a result of the event, this will contain
the ID of the quarantined file
antiMalwareSpywareItemID int If a this event was the result of spyware, this will point at the ID of
the spyware item
hostID int The host ID this event corresponds to
objectInfo string File-path, registry key, process name...etc
objectType int Type identifier for Process, Cookies, File System, System Registry,
Shortcut Link, Host File, Other
riskLevel int Risk level gauge Very Low (0), Low (25), Medium(50), High(75),
Very High(100)
scanAction int Scan Action: The action taken upon each spyware items: Pass (1),
Delete (2), Quarantined (3), Clean (4), Deny Access (5)
scanResultAction int Represent whether the action is successful (0) or failed (Error
Code)
spywareType int Type identifier for Adware, Cookie, Dialer, Keylogger, Trojan,
Worm, Downloader, etc
60 | P a g e
AntiMalwareEventTransport
DESCRIPTION Represents an Anti-Malware event
PROPERTIES
Name Type Description
61 | P a g e
scanType EnumAntiMalwareScanType Type of scan this event was captured under
62 | P a g e
spywareItems ArrayOfAntiMalwareSpywareItemTr An array of spyware items associated with this
ansport event
startTime dateTime Starttime of this event if it was repeated
multiple times (not currently used)
tags string Any tags associated with this event
summaryScanResult string Summary field for the Scan Result: e.g. passed,
deleted, quarantined, cleaned, deny access.
AntiMalwareEventListTransport
DESCRIPTION A list of Anti-Malware events
PROPERTIES
Name Type Description
AlertStatusTransport
DESCRIPTION An object representing summary information for one individual alert
PROPERTIES
Name Type Description
HostDetailTransport
DESCRIPTION An object that holds detailed information about one computer object. All the "overall"
fields are fields created by merging states of potentially multiple endpoints (i.e., Agent +
Appliance).
PROPERTIES
Name Type Description
63 | P a g e
antiMalwareIntelliTrapExceptionVersio string Current version of the IntelliTrap exception pattern
n
antiMalwareIntelliTrapVersion string Current version of the IntelliTrap pattern
antiMalwareSmartScanPatternVersion string Current version of the Smart Scan pattern
antiMalwareSpywarePatternVersion string Current version of the Spyware pattern
hostGroupName string Name of Group this computer belongs to
cloudObjectImageId string Cloud Object Image Id
cloudObjectInstanceId string Cloud Object Instance Id
cloudObjectInternalUniqueId string Cloud Object Internal Unique Id
cloudObjectSecurityGroupIds string Cloud Object Security Group Ids
cloudObjectType EnumCloudObje Cloud Object Type
ctType
hostLight EnumHostLight Current color that represents the computers status
lastAnitMalwareScheduledScan dateTime Last time an Anti-Malware scheduled scan was
performed
lastAntiMalwareEvent dateTime The time of the most recent Anti-Malware event
for this computer
lastAntiMalwareManualScan dateTime Last time an Anti-Malware manual scan was
performed
lastDpiEvent dateTime The time of the most recent DPI Event for this
computer
lastFirewallEvent dateTime The time of the most recent Firewall Event for this
computer
lastIPUsed string The last IP that was used for this computer during
communication with the manager
lastIntegrityMonitoringEvent dateTime The time of the most recent Integrity Monitoring
Event for this computer
lastLogInspectionEvent dateTime The time of the most recent Log Inspection Event
for this computer
light int An integer representing the computers status light
locked boolean The locked state of the computer
overallAntiMalwareStatus string Overall Anti-Malware status of the computer
overallDpiStatus string Overall DPI status of the computer
overallFirewallStatus string Overall Firewall status of the computer
overallIntegrityMonitoringStatus string Overall Integrity Monitoring status of the computer
overallLastRecommendationScan dateTime The time of the last recommendation scan
64 | P a g e
overallLastSuccessfulCommunication dateTime The time of the last communication with the
Manager
overallLastSuccessfulUpdate dateTime The time of the last successful Configuration
Update
overallLastUpdateRequired dateTime The time the last configuration update was
required at the manager
overallLogInspectionStatus string Overall Log Inspection status of the computer
overallStatus string Overall status of the computer
overallVersion string Overall version of the computer
securityProfileName string Name of the security profile assigned to the
computer
virtualName string Internal virtual name (only populated if this is a
computer provisioned through vCenter)
virtualUuid string Internal virtual UUID (only populated if this is a
computer provisioned through vCenter)
componentKlasses ArrayOf_xsd_int Array of class ids for components
componentNames ArrayOf_xsd_str Array of component names
ing
componentTypes ArrayOf_xsd_int Array of component types
componentVersions ArrayOf_xsd_str Array of component versions
ing
overallWebReputationStatus string Overall Web Reputation status of the computer
lastWebReputationEvent dateTime The time of the most recent Web Reputation event
for this computer
HostInterfaceTransport
DESCRIPTION The Host's Interface Transport Object.
PROPERTIES
Name Type Description
65 | P a g e
ExternalFilterTransport
DESCRIPTION A filter that can be used to filter by the ExternalID field of a host or host group
PROPERTIES
Name Type Description
66 | P a g e
WebReputationEventTransport
DESCRIPTION An object representing a web reputation event
PROPERTIES
Name Type Description
WebReputationEventListTransport
DESCRIPTION A list of web reputation event objects.
PROPERTIES
Name Type Description
67 | P a g e
Enumeration Objects
EnumApplicationTypeProtocolType
DESCRIPTION Application Type Protocol enumeration.
Values ICMP
TCP
UDP
TCP_UDP
EnumAntiMalwareFilesToScan
DESCRIPTION Anti Malware Files to Scan enumeration.
Values ALLFILES
INTELLISCAN
EXTLISTSCAN
EnumAntiMalwareScanCustomAction
DESCRIPTION Anti Malware Scan Custom Action enumeration.
Values UNSPECIFIED
PASS
DELETE
QUARANTINE
CLEAN
DENY_ACCESS
EnumAntiMalwareFoldersToScan
DESCRIPTION Anti Malware Folders to Scan enumeration.
Values ALLFOLDERS
SPECIFIEDFOLDERS
68 | P a g e
EnumAntiMalwareScanAction
DESCRIPTION Value comparison result enumeration.
Values INTELLIACTION
CUSTOMACTION
EnumAntiMalwareScanFilesActivity
DESCRIPTION Anti Malware Scan Files Activity enumeration.
Values READ_ONLY
WRITE_ONLY
READ_WRITE
EnumAntiMalwareConfigType
DESCRIPTION Anti Malware Configuration Type enumeration.
Values CONFIGURATIONTYPE_RTS
CONFIGURATIONTYPE_ODS
EnumAntiMalwareCpuUsage
DESCRIPTION Anti Malware CPU Usage enumeration.
Values CPUUSAGE_LOW
CPUUSAGE_MEDIUM
CPUUSAGE_HIGH
EnumAntiMalwareScanType
DESCRIPTION Malware scan type enumeration.
Values REALTIME
MANUAL
SCHEDULED
QUICK
69 | P a g e
EnumCompareResults
DESCRIPTION Value comparison result enumeration.
Values LESS_THAN
EQUAL_TO
GREATER_THAN
INCOMPATIBLE
EnumCounterFilter
DESCRIPTION Counter Filter enumeration.
Values ANTI_MALWARE_COMPUTER_ACTIVITY
INTEGRITY_COMPUTER_ACTIVITY
LOG_INSPECTION_COMPUTER_ACTIVITY
FIREWALL_DETECT_COMPUTER_ACTIVITY
FIREWALL_PREVENT_COMPUTER_ACTIVITY
FIREWALL_ALL_COMPUTER_ACTIVITY
DPI_DETECT_COMPUTER_ACTIVITY
DPI_PREVENT_COMPUTER_ACTIVITY
DPI_ALL_COMPUTER_ACTIVITY
ANTI_MALWARE_ACTIVITY
ANTI_MALWARE_INCOMPLETE_SCAN
FIREWALL_PREVENT_RULES
FIREWALL_DETECT_RULES
FIREWALL_PREVENT_COMMON_EVENTS
FIREWALL_DETECT_COMMON_EVENTS
FIREWALL_PREVENT_ACTIVITY
FIREWALL_DETECT_ACTIVITY
FIREWALL_ALL_ACTIVITY
FIREWALL_PREVENT_IP_ACTIVITY
FIREWALL_DETECT_IP_ACTIVITY
FIREWALL_PREVENT_PORT_ACTIVITY
FIREWALL_DETECT_PORT_ACTIVITY
70 | P a g e
DPI_PREVENT_RULES
DPI_DETECT_RULES
DPI_ALL_RULES
DPI_PREVENT_COMMON_EVENTS
DPI_DETECT_COMMON_EVENTS
DPI_ALL_COMMON_EVENTS
DPI_PREVENT_ACTIVITY
DPI_DETECT_ACTIVITY
DPI_PREVENT_IP_ACTIVITY
DPI_DETECT_IP_ACTIVITY
DPI_PREVENT_APP_TYPE_ACTIVITY
DPI_DETECT_APP_TYPE_ACTIVITY
INTEGRITY_ACTIVITY
INTEGRITY_KEY_ACTIVITY
LOG_INSPECTION_ACTIVITY
LOG_INSPECTION_DESCRIPTION_ACTIVITY
ALERT_TYPE
RECONNAISSANCE_SCAN_ACTIVITY
SYSTEM_EVENT_SUMMARY
WEB_REPUTATION_COMPUTER_ACTIVITY
WEB_REPUTATION_URL_ACTIVITY
EnumCounterSumFilter
DESCRIPTION Counter Sum Filter enumeration.
Values FIREWALL_PREVENT_ACTIVITY
FIREWALL_DETECT_ACTIVITY
FIREWALL_PREVENT_RULES
71 | P a g e
FIREWALL_DETECT_RULES
FIREWALL_PREVENT_COMMON_EVENTS
FIREWALL_DETECT_COMMON_EVENTS
DPI_PREVENT_ACTIVITY
DPI_DETECT_ACTIVITY
DPI_PREVENT_RULES
DPI_DETECT_RULES
DPI_PREVENT_COMMON_EVENTS
DPI_DETECT_COMMON_EVENTS
INTEGRITY_ACTIVITY
ANTI_MALWARE_ACTIVITY
LOG_INSPECTION_ACTIVITY
LOG_INSPECTION_SEVERITY_LOW
LOG_INSPECTION_SEVERITY_MEDIUM
LOG_INSPECTION_SEVERITY_HIGH
LOG_INSPECTION_SEVERITY_CRITICAL
INTEGRITY_SEVERITY_LOW
INTEGRITY_SEVERITY_MEDIUM
INTEGRITY_SEVERITY_HIGH
INTEGRITY_SEVERITY_CRITICAL
ANTI_MALWARE_SCANACTION_PASS
ANTI_MALWARE_SCANACTION_DELETE
ANTI_MALWARE_SCANACTION_QUARANTINE
ANTI_MALWARE_SCANACTION_CLEAN
ANTI_MALWARE_SCANACTION_DENY_ACCESS
ANTI_MALWARE_SCANACTION_FAILED
WEB_REPUTATION_ACTIVITY
WEB_REPUTATION_RISK_UNTESTED
WEB_REPUTATION_RISK_BLOCKED
WEB_REPUTATION_RISK_SAFE
WEB_REPUTATION_RISK_SUSPICIOUS
WEB_REPUTATION_RISK_HIGHLY_SUSPICIOUS
WEB_REPUTATION_RISK_DANGEROUS
72 | P a g e
EnumCloudObjectType
DESCRIPTION Cloud Object Types.
Values AMAZON_VM
VCLOUD_VM
EnumDirection
DESCRIPTION Connection direction enumeration.
Values INCOMING
OUTGOING
EnumDPIRuleAction
DESCRIPTION DPI rule action enumeration.
Values DROP_CLOSE
LOG_ONLY
EnumDPIRuleIf
DESCRIPTION DPI rule start/end pattern conditional enumeration.
Values ALL_PATTERNS_FOUND
ANY_PATTERNS_FOUND
NO_PATTERNS_FOUND
EnumDPIRulePriority
DESCRIPTION DPI rule priority enumeration.
Values HIGHEST
HIGH
NORMAL
LOW
LOWEST
EnumDPIRuleSeverity
73 | P a g e
DESCRIPTION DPI rule severity enumeration.
Values CRITICAL
HIGH
MEDIUM
LOW
EnumDPIRuleTemplateType
DESCRIPTION DPI rule template type enumeration.
Values CUSTOM_XML
SIGNATURE
START_END_PATTERNS
EnumEditableSettingKey
DESCRIPTION Editable system settings enumeration.
Values CONFIGURATION_MOTD_TEXT
CONFIGURATION_SPNFB_BANDWIDTHLIMITATION
CONFIGURATION_SPNFB_ENABLEFEEDBACK
CONFIGURATION_SPNFB_ENABLESUSPICIUSFILEFEEDBACK
CONFIGURATION_SPNFB_FEEDBACKINTEVALBYMINUTES
CONFIGURATION_SPNFB_FEEDBACKINTEVALBYTHREATS
CONFIGURATION_SPNFB_INDUSTRYTYPE
CONFIGURATION_AGENTCOMMUNICATIONS
CONFIGURATION_AGENTHARDENING
CONFIGURATION_AGENTHARDENINGPASSWORDFLAG
CONFIGURATION_AGENTHARDENINGPASSWORDVALUE
CONFIGURATION_AGENTINITIATEDACTIVATION
CONFIGURATION_AGENTINITIATEDACTIVATIONACTIVEHOST
CONFIGURATION_AGENTINITIATEDACTIVATIONALLOWHOSTNAME
CONFIGURATION_AGENTINITIATEDACTIVATIONIPLIST
CONFIGURATION_AGENTINITIATEDACTIVATIONSECURITYPROFILE
CONFIGURATION_AGENTLOGFLUSHINTERVAL
CONFIGURATION_ANTIMALWAREGLOBALMANUALSCANCONFIG
74 | P a g e
CONFIGURATION_ANTIMALWAREGLOBALREALTIMESCANCONFIG
CONFIGURATION_ANTIMALWAREGLOBALREALTIMESCANSCHEDULECONFIG
CONFIGURATION_ANTIMALWAREGLOBALSCHEDULEDSCANCONFIG
CONFIGURATION_ANTIMALWARESTATE
CONFIGURATION_AUTOREQUIRESUPDATE
CONFIGURATION_AUTOUPDATEAPPLIANCECOMPONENTAFTERACTIVATION
CONFIGURATION_AUTOMATICALLYDELETEANTIMALWAREEVENTSOLDERTHANMINUTE
S
CONFIGURATION_AUTOMATICALLYDELETECOUNTERSOLDERTHANMINUTES
CONFIGURATION_AUTOMATICALLYDELETEDPIEVENTSOLDERTHANMINUTES
CONFIGURATION_AUTOMATICALLYDELETEEVENTSOLDERTHANMINUTES
CONFIGURATION_AUTOMATICALLYDELETEFIREWALLEVENTSOLDERTHANMINUTES
CONFIGURATION_AUTOMATICALLYDELETEINTEGRITYEVENTSOLDERTHANMINUTES
CONFIGURATION_AUTOMATICALLYDELETELOGINSPECTIONEVENTSOLDERTHANMINUTE
S
CONFIGURATION_AUTOMATICALLYDELETEWEBREPUTATIONEVENTSOLDERTHANMINUT
ES
CONFIGURATION_AUTOMATICALLYUPDATEIPS
CONFIGURATION_CANHOSTCONTACTGLOBALIAU
CONFIGURATION_CANROAMINGAGENTUPDATECOMPONENT
CONFIGURATION_COLLECTFULLANTIMALWAREEVENTS
CONFIGURATION_COLLECTFULLINTEGRITYEVENTS
CONFIGURATION_COLLECTFULLLOGINSPECTIONEVENTS
CONFIGURATION_CONTEXTS_EXPECTEDCONTENTREGEX
CONFIGURATION_CONTEXTS_TESTINTERVAL
CONFIGURATION_CONTEXTS_TESTURI
CONFIGURATION_DEFAULTALERTEMAIL
CONFIGURATION_DEFAULTFORNEWADMINISTRATORSHIDEUNLICENSEDMODULES
CONFIGURATION_DEFAULTHEARTBEATPERIOD
CONFIGURATION_DETECTIONENGINESTATE
CONFIGURATION_DETECTIONENGINESTATEAUTOAPPLYDPIRULES
CONFIGURATION_DETECTIONENGINESTATEAUTOAPPLYINTEGRITYRULES
CONFIGURATION_DETECTIONENGINESTATEAUTOAPPLYLOGINSPECTIONRULES
CONFIGURATION_DSMGUID
75 | P a g e
CONFIGURATION_DSRUAUTOAPPLYNEWDSRUS
CONFIGURATION_ENABLEEXCLUSIVEINTERFACES
CONFIGURATION_ENVIRONMENTVARIABLEOVERRIDES
CONFIGURATION_EXCLUSIVEINTERFACEPATTERNS
CONFIGURATION_EXPORTEDFILECHARACTERENCODING
CONFIGURATION_FORWARDLOGS_ANTIMALWARE
CONFIGURATION_FORWARDLOGS_ANTIMALWARE_DIRECT
CONFIGURATION_FORWARDLOGS_INTEGRITY
CONFIGURATION_FORWARDLOGS_INTEGRITY_DIRECT
CONFIGURATION_FORWARDLOGS_LOGINSPECTION
CONFIGURATION_FORWARDLOGS_LOGINSPECTION_DIRECT
CONFIGURATION_FORWARDLOGS_PNP
CONFIGURATION_FORWARDLOGS_PNP_DIRECT
CONFIGURATION_FORWARDLOGS_WRS
CONFIGURATION_FORWARDLOGS_WRS_DIRECT
CONFIGURATION_GENERATEDEVENTSPERMINUTE_ANTIMALWARE
CONFIGURATION_GENERATEDEVENTSPERMINUTE_INTEGRITY
CONFIGURATION_GENERATEDEVENTSPERMINUTE_LOGINSPECTION
CONFIGURATION_GENERATEDEVENTSPERMINUTE_PNP
CONFIGURATION_GENERATEDEVENTSPERMINUTE_WRS
CONFIGURATION_GLOBALSTATEFULCONFIG
CONFIGURATION_INTEGRITYCRITICALRANK
CONFIGURATION_INTEGRITYHIGHRANK
CONFIGURATION_INTEGRITYLOWRANK
CONFIGURATION_INTEGRITYMEDIUMRANK
CONFIGURATION_LOGINSPECTIONAPPLYTAGSTOGROUPS
CONFIGURATION_LOGINSPECTIONCRITICALRANK
CONFIGURATION_LOGINSPECTIONHIGHRANK
CONFIGURATION_LOGINSPECTIONLOWRANK
CONFIGURATION_LOGINSPECTIONMEDIUMRANK
CONFIGURATION_LOGINSPECTIONSTATE
CONFIGURATION_LOGINSPECTIONSTORAGECLIP
CONFIGURATION_LOGINSPECTIONSYSLOGCLIP
76 | P a g e
CONFIGURATION_LOGGINGOVERRIDE
CONFIGURATION_MAXHOSTCLOCKSHIFT
CONFIGURATION_MAXMISSEDHEARTBEATS
CONFIGURATION_MAXIMUMAGENTINSTALLERSARCHIVED
CONFIGURATION_MAXIMUMSECURITYUPDATESARCHIVED
CONFIGURATION_NETWORKCONTROLSTATE
CONFIGURATION_NETWORKDRIVERMODE
CONFIGURATION_NEWVMSACTIVATIONSECURITYPROFILE
CONFIGURATION_NONNOTIFYINGSYSTEMEVENTS
CONFIGURATION_NONRECORDINGSYSTEMEVENTS
CONFIGURATION_NOTIFICATIONMSGFORAM
CONFIGURATION_NOTIFICATIONMSGFORWP
CONFIGURATION_PACKET_DRIVER_BLOCKIPV6
CONFIGURATION_PACKET_DRIVER_BLOCKIPV6FOR8PLUS
CONFIGURATION_PACKET_DRIVER_BLOCKSAMESRCDSTIP
CONFIGURATION_PACKET_DRIVER_BYPASSWAASCONNECTIONS
CONFIGURATION_PACKET_DRIVER_CONNECTIONEVENTSICMP
CONFIGURATION_PACKET_DRIVER_CONNECTIONEVENTSTCP
CONFIGURATION_PACKET_DRIVER_CONNECTIONEVENTSUDP
CONFIGURATION_PACKET_DRIVER_DEBUGMODE
CONFIGURATION_PACKET_DRIVER_DEBUGPACKETMAX
CONFIGURATION_PACKET_DRIVER_DROP6TO4BOGONS
CONFIGURATION_PACKET_DRIVER_DROPEVASIVERETRANSMIT
CONFIGURATION_PACKET_DRIVER_DROPIPZEROPAYLOAD
CONFIGURATION_PACKET_DRIVER_DROPIPV6BOGONS
CONFIGURATION_PACKET_DRIVER_DROPIPV6MINMTU
CONFIGURATION_PACKET_DRIVER_DROPIPV6RESERVED
CONFIGURATION_PACKET_DRIVER_DROPIPV6SITELOCAL
CONFIGURATION_PACKET_DRIVER_DROPIPV6TYPE0
CONFIGURATION_PACKET_DRIVER_DROPTEREDOANOMALIES
CONFIGURATION_PACKET_DRIVER_DROPTUNNELDEPTHEXCEEDED
CONFIGURATION_PACKET_DRIVER_FILTERIPV4TUNNELS
CONFIGURATION_PACKET_DRIVER_FILTERIPV6TUNNELS
77 | P a g e
CONFIGURATION_PACKET_DRIVER_FRAGMINOFFSET
CONFIGURATION_PACKET_DRIVER_FRAGMINSIZE
CONFIGURATION_PACKET_DRIVER_IGNORESTATUS0
CONFIGURATION_PACKET_DRIVER_IGNORESTATUS1
CONFIGURATION_PACKET_DRIVER_IGNORESTATUS2
CONFIGURATION_PACKET_DRIVER_LOGRULES
CONFIGURATION_PACKET_DRIVER_LOGSPERSEC
CONFIGURATION_PACKET_DRIVER_MAXCONNECTIONSICMP
CONFIGURATION_PACKET_DRIVER_MAXCONNECTIONSPERIODICCLEANUP
CONFIGURATION_PACKET_DRIVER_MAXCONNECTIONSTCP
CONFIGURATION_PACKET_DRIVER_MAXCONNECTIONSUDP
CONFIGURATION_PACKET_DRIVER_MAXTUNNELDEPTH
CONFIGURATION_PACKET_DRIVER_NODEMAX
CONFIGURATION_PACKET_DRIVER_PASSNULLIP
CONFIGURATION_PACKET_DRIVER_PDUSNAPLENGTH
CONFIGURATION_PACKET_DRIVER_PDUSTATEFUL
CONFIGURATION_PACKET_DRIVER_PDUSTATEFULFIRST
CONFIGURATION_PACKET_DRIVER_PDUSTATEFULPERIOD
CONFIGURATION_PACKET_DRIVER_SETTINGSENABLED
CONFIGURATION_PACKET_DRIVER_SSLSESSIONSIZE
CONFIGURATION_PACKET_DRIVER_SSLSESSIONTIME
CONFIGURATION_PACKET_DRIVER_STRICTTEREDOPORTCHECK
CONFIGURATION_PACKET_DRIVER_TCPMSSLIMIT
CONFIGURATION_PACKET_DRIVER_TCPSILENTRST
CONFIGURATION_PACKET_DRIVER_TIMEOUTACKSTORM
CONFIGURATION_PACKET_DRIVER_TIMEOUTBOOTSTART
CONFIGURATION_PACKET_DRIVER_TIMEOUTCLOSEWAIT
CONFIGURATION_PACKET_DRIVER_TIMEOUTCLOSED
CONFIGURATION_PACKET_DRIVER_TIMEOUTCLOSING
CONFIGURATION_PACKET_DRIVER_TIMEOUTCOLDSTART
CONFIGURATION_PACKET_DRIVER_TIMEOUTCONNCLEANUP
CONFIGURATION_PACKET_DRIVER_TIMEOUTDISCONNECT
CONFIGURATION_PACKET_DRIVER_TIMEOUTERROR
78 | P a g e
CONFIGURATION_PACKET_DRIVER_TIMEOUTESTAB
CONFIGURATION_PACKET_DRIVER_TIMEOUTFINWAIT
CONFIGURATION_PACKET_DRIVER_TIMEOUTICMP
CONFIGURATION_PACKET_DRIVER_TIMEOUTLASTACK
CONFIGURATION_PACKET_DRIVER_TIMEOUTSYNRCVD
CONFIGURATION_PACKET_DRIVER_TIMEOUTSYNSENT
CONFIGURATION_PACKET_DRIVER_TIMEOUTUDP
CONFIGURATION_PACKET_DRIVER_VERIFYTCPCHECKSUM
CONFIGURATION_PACKETFILTERDENYRANK
CONFIGURATION_PACKETFILTERLOGONLYRANK
CONFIGURATION_PACKETFILTERREJECTIONRANK
CONFIGURATION_PACKETLOG_CACHELIFETIME
CONFIGURATION_PACKETLOG_CACHESIZE
CONFIGURATION_PACKETLOG_CACHESTALETIME
CONFIGURATION_PACKETLOG_IGNORE
CONFIGURATION_PACKETLOG_KEEP
CONFIGURATION_PACKETLOG_LOGOUTOFALLOWEDPOLICY
CONFIGURATION_PACKETLOG_MAXSIZE
CONFIGURATION_PAYLOAD_DRIVER_IPFRAGSENDTIMEEXCEEDED
CONFIGURATION_PAYLOAD_DRIVER_MAXIPFRAG
CONFIGURATION_PAYLOAD_DRIVER_SETTINGSENABLED
CONFIGURATION_PAYLOAD_DRIVER_TIMEOUTFRAGMENT
CONFIGURATION_PAYLOADFILTERCRITICALRANK
CONFIGURATION_PAYLOADFILTERERRORRANK
CONFIGURATION_PAYLOADFILTERHIGHRANK
CONFIGURATION_PAYLOADFILTERLOWRANK
CONFIGURATION_PAYLOADFILTERMEDIUMRANK
CONFIGURATION_PAYLOADLOGFIRSTPDU
CONFIGURATION_PENDINGAGENTUPDATEALERTLIMIT
CONFIGURATION_PORTSTOSCAN
CONFIGURATION_QUARANTINE_MAXFILESIZE
CONFIGURATION_QUARANTINE_MAXGUESTSPACE
CONFIGURATION_QUARANTINE_MAXQUARANTINEDSPACE
79 | P a g e
CONFIGURATION_RAISEAGENTOFFLINEERRORSFORINACTIVEVMS
CONFIGURATION_RECOMMENDATIONMONITORINTERVAL
CONFIGURATION_RELAYUPDATESOURCE
CONFIGURATION_RELAYUPDATESOURCE_OTHERAU_URL
CONFIGURATION_SCANLIMITATION_MAXFILESCANSIZE
CONFIGURATION_SINGLEEXCLUSIVEINTERFACEENABLED
CONFIGURATION_SMARTPROTECTIONSERVER_PROXYIDFORGLOBALSERVER
CONFIGURATION_SMARTPROTECTIONSERVER_SMARTSCANALLOWFALLBACK
CONFIGURATION_SMARTPROTECTIONSERVER_SMARTSCANLOCALSERVERS
CONFIGURATION_SMARTPROTECTIONSERVER_SMARTSCANUSEGLOBALSERVER
CONFIGURATION_SMARTPROTECTIONSERVER_SMARTSCANUSEPROXYFORGLOBALSERV
ER
CONFIGURATION_SMARTPROTECTIONSERVER_WEBREPUTATIONALLOWGLOBAL
CONFIGURATION_SMARTPROTECTIONSERVER_WEBREPUTATIONLOCALRATINGSERVER
CONFIGURATION_SMARTPROTECTIONSERVER_WEBREPUTATIONRATINGSERVERPROXYI
D
CONFIGURATION_SMARTPROTECTIONSERVER_WEBREPUTATIONUSELOCALRATINGSER
VER
CONFIGURATION_SMARTPROTECTIONSERVER_WEBREPUTATIONUSEPROXYFORGLOBAL
SERVER
CONFIGURATION_SMARTSCANSTATE
CONFIGURATION_SPYWAREAPPROVEDLIST
CONFIGURATION_SYSLOGFACILITY_ANTIMALWARE
CONFIGURATION_SYSLOGFACILITY_INTEGRITY
CONFIGURATION_SYSLOGFACILITY_LOGINSPECTION
CONFIGURATION_SYSLOGFACILITY_PNP
CONFIGURATION_SYSLOGFACILITY_WRS
CONFIGURATION_SYSLOGFORMAT_ANTIMALWARE
CONFIGURATION_SYSLOGFORMAT_INTEGRITY
CONFIGURATION_SYSLOGFORMAT_LOGINSPECTION
CONFIGURATION_SYSLOGFORMAT_PNP
CONFIGURATION_SYSLOGFORMAT_WRS
CONFIGURATION_SYSLOGHOST_ANTIMALWARE
CONFIGURATION_SYSLOGHOST_INTEGRITY
80 | P a g e
CONFIGURATION_SYSLOGHOST_LOGINSPECTION
CONFIGURATION_SYSLOGHOST_PNP
CONFIGURATION_SYSLOGHOST_WRS
CONFIGURATION_SYSLOGOVERRIDE_ANTIMALWARE
CONFIGURATION_SYSLOGOVERRIDE_INTEGRITY
CONFIGURATION_SYSLOGOVERRIDE_LOGINSPECTION
CONFIGURATION_SYSLOGOVERRIDE_PNP
CONFIGURATION_SYSLOGOVERRIDE_WRS
CONFIGURATION_SYSLOGPORT_ANTIMALWARE
CONFIGURATION_SYSLOGPORT_INTEGRITY
CONFIGURATION_SYSLOGPORT_LOGINSPECTION
CONFIGURATION_SYSLOGPORT_PNP
CONFIGURATION_SYSLOGPORT_WRS
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSCRIPTS
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSEXTENDEDDESCRIPTIONS
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSNMPADDRESS
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSNMPCOMMUNITY
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSNMPENABLED
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSNMPPORT
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSNMPRETRIES
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSNMPTIMEOUT
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSYSLOGADDRESS
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSYSLOGENABLED
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSYSLOGFACILITY
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSYSLOGFORMAT
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSYSLOGIDENTIFICATION
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSYSLOGPORT
CONFIGURATION_SYSTEMEVENTNOTIFICATIONSSYSLOGPREPENDTIMESTAMP
CONFIGURATION_SYSTEMINTEGRITYHASH
CONFIGURATION_SYSTEMINTEGRITYSTATE
CONFIGURATION_TRAFFICANALYSIS_FINGERPRINT_BLOCK
CONFIGURATION_TRAFFICANALYSIS_FINGERPRINT_ENABLED
CONFIGURATION_TRAFFICANALYSIS_FINGERPRINT_NOTIFY
81 | P a g e
CONFIGURATION_TRAFFICANALYSIS_GLOBAL_ANALYZE
CONFIGURATION_TRAFFICANALYSIS_GLOBAL_ENABLED
CONFIGURATION_TRAFFICANALYSIS_GLOBAL_IGNORE
CONFIGURATION_TRAFFICANALYSIS_NULL_BLOCK
CONFIGURATION_TRAFFICANALYSIS_NULL_ENABLED
CONFIGURATION_TRAFFICANALYSIS_NULL_NOTIFY
CONFIGURATION_TRAFFICANALYSIS_SCAN_BLOCK
CONFIGURATION_TRAFFICANALYSIS_SCAN_ENABLED
CONFIGURATION_TRAFFICANALYSIS_SCAN_NOTIFY
CONFIGURATION_TRAFFICANALYSIS_SYNFIN_BLOCK
CONFIGURATION_TRAFFICANALYSIS_SYNFIN_ENABLED
CONFIGURATION_TRAFFICANALYSIS_SYNFIN_NOTIFY
CONFIGURATION_TRAFFICANALYSIS_XMAS_BLOCK
CONFIGURATION_TRAFFICANALYSIS_XMAS_ENABLED
CONFIGURATION_TRAFFICANALYSIS_XMAS_NOTIFY
CONFIGURATION_UPDATEPROXYAUTH
CONFIGURATION_UPDATEPROXYFLAG
CONFIGURATION_UPDATEPROXYHOST
CONFIGURATION_UPDATEPROXYID
CONFIGURATION_UPDATEPROXYPASS
CONFIGURATION_UPDATEPROXYPORT
CONFIGURATION_UPDATEPROXYTYPE
CONFIGURATION_UPDATEPROXYUSER
CONFIGURATION_UPDATESOURCE
CONFIGURATION_UPDATESOURCE_INTRANET_UNC
CONFIGURATION_UPDATESOURCE_INTRANET_PASSWORD
CONFIGURATION_UPDATESOURCE_INTRANET_USER
CONFIGURATION_UPDATESOURCE_OTHERAU_URL
CONFIGURATION_VSUAUTOASSIGN
CONFIGURATION_VULNERABILITYSHIELDSTATE
CONFIGURATION_WEBREPUTATIONALERTINGON
CONFIGURATION_WEBREPUTATIONALLOWEDDOMAINURLS
CONFIGURATION_WEBREPUTATIONALLOWEDPAGEURLS
82 | P a g e
CONFIGURATION_WEBREPUTATIONBLOCKUNTESTEDPAGES
CONFIGURATION_WEBREPUTATIONBLOCKEDBYADMINISTRATORRANK
CONFIGURATION_WEBREPUTATIONBLOCKEDDOMAINURLS
CONFIGURATION_WEBREPUTATIONBLOCKEDKEYWORDS
CONFIGURATION_WEBREPUTATIONBLOCKEDPAGELINK
CONFIGURATION_WEBREPUTATIONBLOCKEDPAGEURLS
CONFIGURATION_WEBREPUTATIONDANGEROUSRANK
CONFIGURATION_WEBREPUTATIONENABLED
CONFIGURATION_WEBREPUTATIONHIGHLYSUSPICIOUSRANK
CONFIGURATION_WEBREPUTATIONPORTS
CONFIGURATION_WEBREPUTATIONSECURITYLEVEL
CONFIGURATION_WEBREPUTATIONSUSPICIOUSRANK
CONFIGURATION_WEBREPUTATIONUNTESTEDRANK
CONFIGURATION_WEBSERVICEAPIENABLED
LICENSES_HISTORIC
SECURITY_ACTIVESESSIONSALLOWED
SECURITY_ADMINISTRATORPASSWORDEXPIRY
SECURITY_ADMINISTRATORPASSWORDMINIMUMLENGTH
SECURITY_ADMINISTRATORPASSWORDREQUIRECASE
SECURITY_ADMINISTRATORPASSWORDREQUIREMIX
SECURITY_ADMINISTRATORPASSWORDREQUIRESPECIAL
SECURITY_MINUTESTOTIMEOUT
SECURITY_SIGNINATTEMPTSALLOWED
SMTP_BOUNCEEMAIL
SMTP_FROMEMAIL
SMTP_PASSWORD
SMTP_REQUIRESAUTHENTICATION
SMTP_URL
SMTP_USERNAME
WHOIS_IP
83 | P a g e
EnumEditableSettingStoredScope
DESCRIPTION Editable setting scope enumeration. This enumeration indicates which level to assign the
setting to, such as configuring the Syslog target settings at the Computer/Host level, or at
the Security Profile level.
Values HOST
PROFILE
SYSTEM
EnumEditableSettingUnit
DESCRIPTION Editable setting unit enumeration. This enumeration indicates a system settings unit or
type.
Values IPLIST_ID
PORTLIST_ID
NONE
SECONDS
MINUTES
HOURS
DAYS
WEEKS
MONTHS
YEARS
KBYTES
PERCENT
PORT
HOST
EMAIL
EnumEventOrigin
84 | P a g e
DESCRIPTION The origin of an event enumeration.
Values UNKNOWN
AGENT
GUESTAGENT
APPLIANCEAGENT
MANAGER
EnumExternalFilterType
DESCRIPTION The action a Firewall rule should result in once applied enumeration.
Values ALL_EXT_HOSTS
HOSTS_IN_EXT_GROUP
HOSTS_IN_EXT_GROUP_AND_ALL_SUBGROUPS
SPECIFIC_EXT_HOST
EnumFirewallRuleAction
DESCRIPTION The action a Firewall rule should result in once applied enumeration.
Values LOG_ONLY
ALLOW
DENY
FORCE_ALLOW
BYPASS
EnumFirewallRuleFrameType
DESCRIPTION A Firewall rule frame type enumeration.
Values ANY
IP
ARP
REVARP
OTHER
EnumFirewallRuleIPType
85 | P a g e
DESCRIPTION A Firewall rule IP type enumeration.
Values ANY
MASKED_IP
RANGE
DEFINED_LIST
SINGLE_IP
EnumFirewallRulePriority
DESCRIPTION A Firewall rule Priority enumeration.
Values HIGHEST
HIGH
NORMAL
LOW
LOWEST
EnumFirewallRuleProtocolType
DESCRIPTION A Firewall rule Protocol type enumeration.
Values ANY
ICMP
ICMPV6
IGMP
GGP
TCP
PUP
UDP
IDP
ND
RAW
TCP_UDP
OTHER
86 | P a g e
EnumHostDetailLevel
DESCRIPTION Host/Computer detail level enumeration.
Values LOW
MEDIUM
HIGH
EnumHostFilterType
DESCRIPTION Host/Computer filter type used when filtering retrieved events by Host, Group, Security
Profile or specific Hosts.
Values ALL_HOSTS
HOSTS_IN_GROUP
HOSTS_USING_SECURITY_PROFILE
HOSTS_IN_GROUP_AND_ALL_SUBGROUPS
SPECIFIC_HOST
MY_HOSTS
EnumHostLight
DESCRIPTION Host/Computer Light color enumeration.
Values GREEN
YELLOW
RED
GREY
BLUE
EnumHostType
DESCRIPTION Host/Computer type enumeration. Used to determine if the retrieve HostTransport object is
a VM, standard physical computer, ESX server, or Virtual Appliance.
Values STANDARD
ESX
APPLIANCE
VM
87 | P a g e
EnumIntegrityRuleSeverity
DESCRIPTION Integrity Monitoring rule severity enumeration.
Values CRITICAL
HIGH
MEDIUM
LOW
EnumJobType
DESCRIPTION Job Type enumeration.
Values UPDATE
EnumMalwareType
DESCRIPTION Malware type enumeration.
Values GENERAL
SPYWARE
EnumMACType
DESCRIPTION MAC List type enumeration.
Values ANY
MAC
DEFINED_LIST
EnumOperator
DESCRIPTION General filter operator enumeration. Used when filtering retrieved events by event ID that
are greater than, less than, or equal to.
Values GREATER_THAN
LESS_THAN
EQUAL
88 | P a g e
EnumPortType
DESCRIPTION Port List type enumeration.
Values ANY
MAC
DEFINED_LIST
EnumProtectionType
DESCRIPTION Computer protection type enumeration. Protection for a computer can be applied by an
installed Agent or by the Deep Security Virtual Appliance.
Values NONE
AGENT
APPLIANCE
EnumProtocolIcmpType
DESCRIPTION ICMP protocol type enumeration.
Values ICMP_ECHO
ICMP_TIMESTAMP
ICMP_INFORMATION
ICMP_ADDRESS_MASK
ICMP_MOBILE_REGISTRATION
EnumSecurityProfileDPIState
DESCRIPTION Security Profile DPI configured state enumeration.
Values ON
OFF
PASSIVE
INHERITED
89 | P a g e
EnumSecurityProfileFirewallState
DESCRIPTION Security Profile Firewall configured state enumeration.
Values ON
OFF
INHERITED
EnumSecurityProfileAntiMalwareState
DESCRIPTION Security Profile Anti Malware configured state enumeration.
Values ON
OFF
INHERITED
EnumSecurityProfileIntegrityState
DESCRIPTION Security Profile Integrity Monitoring configured state enumeration.
Values ON
OFF
INHERITED
EnumSecurityProfileLogInspectionState
DESCRIPTION Security Profile Log Inspection configured state enumeration.
Values ON
OFF
INHERITED
EnumSecurityProfileRecommendationState
DESCRIPTION Security Profile Recommendation Engine configured state enumeration.
Values OFF
ONGOING
90 | P a g e
EnumWebReputationEventRisk
DESCRIPTION Web Reputation Event Risk enumeration.
Values SAFE
SUSPICIOUS
HIGHLYSUSPICIOUS
DANGEROUS
UNTESTED
BLOCKEDBYADMINISTRATOR
EnumSecurityUpdateAppliedState
DESCRIPTION Security Update applied state. Can be used to determine if a retrieved or applied Security
Update has been applied and is currently active.
Values APPLIED
APPLIED_CURRENT
NOT_APPLIED
EnumState
DESCRIPTION Computer HostTransport state enumeration that can be used to determine what state a
computer is currently in.
Values NEUTRAL
VM_STOPPED
VM_PAUSED
STANDBY
UNKNOWN
NONE
INSTALLED
HAS_DSM_CERT
ACTIVATED
OTHER_DSM_AGENT
OFFLINE
91 | P a g e
EnumTagFilterType
DESCRIPTION Tag Filters Type enumeration.
Values ALL
UNTAGGED
TAGS
EnumTimeFilterType
DESCRIPTION Time based filter enumeration. Used when filtering retrieved events by event time.
Values LAST_HOUR
LAST_24_HOURS
LAST_7_DAYS
CUSTOM_RANGE
SPECIFIC_TIME
EnumRuleType
DESCRIPTION Rule Type enumeration.
Values APPLICATIONTYPE
PAYLOADFILTER
FIREWALLRULE
INTEGRITYRULE
LOGINSPECTIONRULE
92 | P a g e
Web Methods
softwareRetrieveForHost()
DESCRIPTION Retrieves the software for a provided host id.
SYNTAX
PARAMETERS
hostID Identifying Host ID.
softwareVersionStringsCompare()
DESCRIPTION Compares two software version strings.
SYNTAX
PARAMETERS
version1 First version to compare.
93 | P a g e
systemInformationRetrieve()
DESCRIPTION Retrieves system information.
SYNTAX
PARAMETERS
sID Authentication session token ID.
hostGroupRetrieve()
DESCRIPTION Retrieves a Host Group by ID.
SYNTAX
PARAMETERS
ID Identifying Host Group ID.
hostGroupRetrieveByName()
DESCRIPTION Retrieves a Host Group by name.
SYNTAX
PARAMETERS
Name Identifying Host Group name.
94 | P a g e
hostGroupRetrieveAll()
DESCRIPTION Retrieves all Host Groups.
SYNTAX
PARAMETERS
sID Authentication session identifier ID.
hostGroupDelete()
DESCRIPTION Deletes a Host Group by ID.
SYNTAX
PARAMETERS
ID Identifying Host Group ID.
hostGroupCreate()
DESCRIPTION Creates a new Host Group.
SYNTAX
PARAMETERS
95 | P a g e
softwareApplyToHosts()
DESCRIPTION Apply an Agent software install to hosts by IDs.
SYNTAX
PARAMETERS
softwareStore()
DESCRIPTION Uploads and stores an Agent software installer on the Manager.
SYNTAX
PARAMETERS
96 | P a g e
softwareRetrieve()
DESCRIPTION Retrieves Agent install file SoftwareTransport object by ID.
SYNTAX
PARAMETERS
ID SoftwareTransport ID.
softwareRetrieveAll()
DESCRIPTION Retrieves all Agent install file SoftwareTransport objects.
SYNTAX
PARAMETERS
softwareExport()
DESCRIPTION Retrieves byte array representation of Agent install file object by ID.
SYNTAX
PARAMETERS
ID SoftwareTransport ID.
97 | P a g e
softwareDelete()
DESCRIPTION Deletes Agent install file by ID.
SYNTAX
PARAMETERS
securityUpdateStore()
DESCRIPTION Stores the provided Security Update on the Manager.
SYNTAX
PARAMETERS
securityUpdateGetApplierInformation()
DESCRIPTION Retrieves Security Update information on what would be applied.
SYNTAX
PARAMETERS
securityUpdateApply()
DESCRIPTION Applies a Security Update.
SYNTAX
PARAMETERS
securityUpdateRetrieve()
DESCRIPTION Retrieves Security Update.
SYNTAX
PARAMETERS
securityUpdateRetrieveAll()
DESCRIPTION Retrieves all Security Updates.
SYNTAX
PARAMETERS
securityUpdateExport()
99 | P a g e
DESCRIPTION Retrieves byte array representation of a Security Update.
SYNTAX
PARAMETERS
securityUpdateDelete()
DESCRIPTION Deletes a Security Update.
SYNTAX
PARAMETERS
getApiVersion()
DESCRIPTION Retrieves the Manager Web Service API version. Not the same as the Manager version.
SYNTAX
int getApiVersion()
PARAMETERS
getManagerTime()
100 | P a g e
DESCRIPTION Retrieve the Manager Web Service API version. Not the same as the Manager version.
SYNTAX
Date getManagerTime()
PARAMETERS
RETURNS Manager time as a language localized object. For example, a Java client would return a
Calendar object, and a C# client would return a DataTime object.
authenticate()
DESCRIPTION Authenticates a user for and returns a session ID for use when calling other Web Service
methods.
SYNTAX
PARAMETERS
authenticateTenant ()
DESCRIPTION Authenticates a user within the given tenant, and returns a session ID for use when calling
other methods of Manager. When no longer required, the session should be terminated
by calling endSession.
SYNTAX
PARAMETERS
endSession()
101 | P a g e
DESCRIPTION Ends an authenticated user session. The Web Service client should end the authentication
session in all exit cases.
SYNTAX
PARAMETERS
RETURNS
portListDelete()
DESCRIPTION Deletes Port Lists by ID.
SYNTAX
PARAMETERS
RETURNS
portListSave()
DESCRIPTION Saves a new or existing Port List.
SYNTAX
PARAMETERS
102 | P a g e
portListRetrieve()
DESCRIPTION Retrieves a Port List by ID.
SYNTAX
PARAMETERS
portListRetrieveByName()
DESCRIPTION Retrieves a Port List by name.
SYNTAX
PARAMETERS
portListRetrieveAll()
DESCRIPTION Retrieves all Port Lists.
SYNTAX
PARAMETERS
MACListDelete()
103 | P a g e
DESCRIPTION Deletes MAC Lists by ID.
SYNTAX
PARAMETERS
MACListSave()
DESCRIPTION Saves a new or existing MAC List.
SYNTAX
PARAMETERS
MACListRetrieve()
DESCRIPTION Retrieves a MAC List by ID.
SYNTAX
PARAMETERS
104 | P a g e
MACListRetrieveByName()
DESCRIPTION Retrieves a MAC List by name.
SYNTAX
PARAMETERS
MACListRetrieveAll()
DESCRIPTION Retrieves all MAC Lists.
SYNTAX
MACListTransport[]MACListRetrieveAll(String sID)
PARAMETERS
IPListDelete()
DESCRIPTION Deletes IP Lists by ID.
SYNTAX
PARAMETERS
IPListSave()
DESCRIPTION Saves a new or existing IP List.
105 | P a g e
SYNTAX
PARAMETERS
IPListRetrieve()
DESCRIPTION Retrieves an IP List by ID.
SYNTAX
PARAMETERS
ID IP List ID.
IPListRetrieveByName()
DESCRIPTION Retrieves an IP List by name.
SYNTAX
PARAMETERS
106 | P a g e
IPListRetrieveAll()
DESCRIPTION Retrieves all IP Lists.
SYNTAX
PARAMETERS
applicationTypeDelete()
DESCRIPTION Deletes Application Type by ID. Note that Application Types issued by Trend Micro
cannot be deleted.
SYNTAX
PARAMETERS
RETURNS
applicationTypeSave()
DESCRIPTION Saves a new or existing Application Type. Note that Application Types issued by Trend
Micro cannot be saved.
SYNTAX
PARAMETERS
107 | P a g e
applicationTypeRetrieve()
DESCRIPTION Retrieves an Application Type by ID.
SYNTAX
PARAMETERS
applicationTypeRetrieveByName()
DESCRIPTION Retrieves an Application Type by name.
SYNTAX
PARAMETERS
applicationTypeRetrieveAll()
DESCRIPTION Retrieves all Application Types.
SYNTAX
PARAMETERS
applicationTypeOverrideDelete()
108 | P a g e
DESCRIPTION Deletes Application Type Override by ID.
SYNTAX
PARAMETERS
RETURNS
applicationTypeOverrideSave()
DESCRIPTION Saves a new or existing Application Type Override.
SYNTAX
PARAMETERS
applicationTypeOverrideRetrieve()
DESCRIPTION Retrieves an Application Type Override by ID.
SYNTAX
PARAMETERS
applicationTypeOverrideRetrieveAll()
109 | P a g e
DESCRIPTION Retrieves all Application Type Overrides.
SYNTAX
PARAMETERS
firewallRuleDelete()
DESCRIPTION Deletes Firewall Rules by ID.
SYNTAX
PARAMETERS
firewallRuleSave()
DESCRIPTION Saves a new or existing Firewall Rule.
SYNTAX
PARAMETERS
110 | P a g e
firewallRuleRetrieve()
DESCRIPTION Retrieves a Firewall Rule by ID.
SYNTAX
PARAMETERS
firewallRuleRetrieveByName()
DESCRIPTION Retrieves a Firewall Rule by name.
SYNTAX
PARAMETERS
firewallRuleRetrieveAll()
DESCRIPTION Retrieves all Firewall Rule.
SYNTAX
PARAMETERS
DPIRuleDelete()
111 | P a g e
DESCRIPTION Deletes DPI Rules by ID.
SYNTAX
PARAMETERS
DPIRuleSave()
DESCRIPTION Saves a new or existing DPI Rule.
SYNTAX
PARAMETERS
DPIRuleRetrieve()
DESCRIPTION Retrieves a DPI Rule by ID.
SYNTAX
PARAMETERS
112 | P a g e
DPIRuleRetrieveByName()
DESCRIPTION Retrieves a DPI Rule by name.
SYNTAX
PARAMETERS
DPIRuleRetrieveAll()
DESCRIPTION Retrieves all DPI Rule.
SYNTAX
PARAMETERS
logInspectionRuleDelete()
DESCRIPTION Deletes Log Inspection Rules by ID.
SYNTAX
PARAMETERS
logInspectionRuleSave()
113 | P a g e
DESCRIPTION Saves a new or existing Log Inspection Rule.
SYNTAX
PARAMETERS
logInspectionRuleRetrieve()
DESCRIPTION Retrieves a Log Inspection Rule by ID.
SYNTAX
PARAMETERS
logInspectionRuleRetrieveByName()
DESCRIPTION Retrieves a Log Inspection Rule by name.
SYNTAX
PARAMETERS
114 | P a g e
logInspectionRuleRetrieveAll()
DESCRIPTION Retrieves all Log Inspection Rule.
SYNTAX
PARAMETERS
logInspectionDecoderDelete()
DESCRIPTION Deletes Log Inspection Decoder by ID.
SYNTAX
PARAMETERS
logInspectionDecoderSave()
DESCRIPTION Saves a new or existing Log Inspection Decoder.
SYNTAX
PARAMETERS
115 | P a g e
logInspectionDecoderRetrieve()
DESCRIPTION Retrieves a Log Inspection Decoder by ID.
SYNTAX
PARAMETERS
logInspectionDecoderRetrieveByName()
DESCRIPTION Retrieves a Log Inspection Decoder by name.
SYNTAX
PARAMETERS
logInspectionDecoderRetrieveAll()
DESCRIPTION Retrieves all Log Inspection Decoder.
SYNTAX
PARAMETERS
integrityRuleDelete()
116 | P a g e
DESCRIPTION Deletes Integrity Rules by ID.
SYNTAX
PARAMETERS
integrityRuleSave()
DESCRIPTION Saves a new or existing Integrity Rule.
SYNTAX
PARAMETERS
integrityRuleRetrieve()
DESCRIPTION Retrieves an Integrity Rule by ID.
SYNTAX
PARAMETERS
117 | P a g e
integrityRuleRetrieveByName()
DESCRIPTION Retrieves an Integrity Rule by name.
SYNTAX
PARAMETERS
integrityRuleRetrieveAll()
DESCRIPTION Retrieves all Integrity Rules.
SYNTAX
PARAMETERS
scheduleDelete()
DESCRIPTION Deletes Schedule by ID.
SYNTAX
PARAMETERS
scheduleSave()
118 | P a g e
DESCRIPTION Saves a new or existing Schedule.
SYNTAX
PARAMETERS
scheduleRetrieve()
DESCRIPTION Retrieves a Schedule by ID.
SYNTAX
PARAMETERS
id Schedule ID.
scheduleRetrieveByName()
DESCRIPTION Retrieves a Schedule by name.
SYNTAX
PARAMETERS
119 | P a g e
scheduleRetrieveAll()
DESCRIPTION Retrieves all Schedules.
SYNTAX
PARAMETERS
statefulConfigurationDelete()
DESCRIPTION Deletes Stateful Configuration by ID.
SYNTAX
PARAMETERS
statefulConfigurationSave()
DESCRIPTION Saves a new or existing Stateful Configuration.
SYNTAX
PARAMETERS
120 | P a g e
statefulConfigurationRetrieve()
DESCRIPTION Retrieves a Stateful Configuration by ID.
SYNTAX
PARAMETERS
statefulConfigurationRetrieveByName()
DESCRIPTION Retrieves a Stateful Configuration by name.
SYNTAX
PARAMETERS
statefulConfigurationRetrieveAll()
DESCRIPTION Retrieves all Stateful Configuration.
SYNTAX
PARAMETERS
securityProfileDelete()
121 | P a g e
DESCRIPTION Deletes Security Profile by ID.
SYNTAX
PARAMETERS
RETURNS
securityProfileSave()
DESCRIPTION Saves a new or existing Security Profile.
SYNTAX
PARAMETERS
securityProfileAssignToHost()
DESCRIPTION Assigns a Security Profile to a Host.
SYNTAX
PARAMETERS
RETURNS
122 | P a g e
hostSecurityProfileClear()
DESCRIPTION Un-assigns a Host from a Security Profile.
SYNTAX
PARAMETERS
hostMoveToHostGroup()
DESCRIPTION Assigns a Host Group to a Host.
SYNTAX
PARAMETERS
RETURNS
hostCreate()
DESCRIPTION Creates a new Host object.
SYNTAX
PARAMETERS
123 | P a g e
hostDelete()
DESCRIPTION Deletes Hosts from the Manager.
SYNTAX
PARAMETERS
hostRetrieve()
DESCRIPTION Retrieves a Host by ID.
SYNTAX
PARAMETERS
ID Host ID.
hostRetrieveByName()
DESCRIPTION Retrieves a Host by name.
SYNTAX
PARAMETERS
124 | P a g e
hostRetrieveByHostGroup()
DESCRIPTION Retrieves Hosts by Host Group.
SYNTAX
PARAMETERS
hostGetStatus()
DESCRIPTION Retrieves a Host status.
SYNTAX
PARAMETERS
id Host ID to retrieve.
hostAgentActivate()
DESCRIPTION Activates the agents on the set of hosts identified by IDs.
SYNTAX
PARAMETERS
hostAgentDeactivate()
125 | P a g e
DESCRIPTION Deactivates the agents on the set of hosts identified by IDs.
SYNTAX
PARAMETERS
hostUpdateNow()
DESCRIPTION Immediately initiates the update of hosts identified by IDs.
SYNTAX
PARAMETERS
hostIntegrityScan()
DESCRIPTION Immediately initiates an integrity scan update of hosts identified by IDs.
SYNTAX
PARAMETERS
126 | P a g e
hostRebuildBaseline()
DESCRIPTION Immediately initiates an integrity scan baseline rebuild of hosts identified by IDs.
SYNTAX
PARAMETERS
hostGetEventsNow()
DESCRIPTION Immediately initiates the fetch of events from hosts identified by IDs. The completion of
this method is not synchronized with the event retrieval.
SYNTAX
PARAMETERS
hostGetEventsNowSync()
DESCRIPTION Immediately initiates the fetch of events from hosts identified by IDs and will block until
the events are successfully retrieved or the Manager fails to communicate with the
computers requested. There is a maximum timeout of 60 seconds.
SYNTAX
PARAMETERS
127 | P a g e
securityProfileRetrieve()
DESCRIPTION Retrieves a Security Profile by ID.
SYNTAX
PARAMETERS
ID Identifying Security Profile ID.
securityProfileRetrieveByName()
DESCRIPTION Retrieves a Security Profile by name.
SYNTAX
PARAMETERS
name Identifying Security Profile name.
securityProfileRetrieveAll()
DESCRIPTION Retrieves all Security Profiles.
SYNTAX
PARAMETERS
sID Authentication session identifier ID.
128 | P a g e
systemSettingSet()
DESCRIPTION Sets the set of system setting key value pairs identified in the EditableSettingTransport
array.
SYNTAX
PARAMETERS
securityProfileSettingGet()
DESCRIPTION Retrieves the set of setting identified by the EnumEditableSettingKey array.
SYNTAX
PARAMETERS
securityProfileID Identifying Security Profile ID.
129 | P a g e
securityProfileSettingSet()
DESCRIPTION Sets a set of Security Profile setting key value pairs identified in the
EditableSettingTransport array.
SYNTAX
PARAMETERS
securityProfileSettingClear()
DESCRIPTION Clears a set of Security Profile setting key value pairs identified in the
EnumEditableSettingKey array.
SYNTAX
PARAMETERS
130 | P a g e
hostSettingGet()
DESCRIPTION Retrieves the set of host settings identified by the EnumEditableSettingKey array.
SYNTAX
PARAMETERS
hostID Identifying host ID.
hostSettingSet()
DESCRIPTION Sets a set of host setting key value pairs identified in the EditableSettingTransport array.
SYNTAX
PARAMETERS
131 | P a g e
hostSettingClear()
DESCRIPTION Clears host overrides for the setting key value pairs identified in the
EnumEditableSettingKey array. The host Security Profile or System inherited setting will
then apply.
SYNTAX
PARAMETERS
systemEventRetrieve()
DESCRIPTION Retrieves the system events specified by the time, host and event ID filters. System
events that do not pertain to hosts can be included or excluded. This version
supports eventIdFilter filtering on event ID values of type “int” so it is recommended
to invoke systemEventRetrieve2 instead.
SYNTAX
PARAMETERS
systemEventRetrieve2()
DESCRIPTION Retrieves the system events specified by the time, host and event ID filters. System
events that do not pertain to hosts can be included or excluded.
132 | P a g e
SYNTAX
PARAMETERS
DPIEventRetrieve()
DESCRIPTION Retrieves the DPI events specified by the time, host and event ID filters. This
version supports eventIdFilter filtering on event ID values of type “int” so it is
recommended to invoke DPIEventRetrieve2 instead.
SYNTAX
PARAMETERS
DPIEventRetrieve2()
DESCRIPTION Retrieves the DPI events specified by the time, host and event ID filters.
SYNTAX
133 | P a g e
PARAMETERS
integrityEventRetrieve()
DESCRIPTION Retrieves the integrity events specified by the time, host and event ID filters. This
version supports eventIdFilter filtering on event ID values of type “int” so it is
recommended to invoke integrityEventRetrieve2 instead.
SYNTAX
PARAMETERS
IntegrityEventRetrieve2()
DESCRIPTION Retrieves the integrity events specified by the time, host and event ID filters.
SYNTAX
PARAMETERS
134 | P a g e
eventIdFilter IDFilterTransport2 to filter by.
135 | P a g e
logInspectionEventRetrieve()
DESCRIPTION Retrieves the Log Inspection events specified by the time, host and event ID
filters. This version supports eventIdFilter filtering on event ID values of type
“int” so it is recommended to invoke logInspectionEventRetrieve2 instead.
SYNTAX
PARAMETERS
logInspectionEventRetrieve2()
DESCRIPTION Retrieves the Log Inspection events specified by the time, host and event ID
filters.
SYNTAX
PARAMETERS
firewallEventRetrieve()
DESCRIPTION Retrieves the firewall events specified by the time, host and event ID filters. This
version supports eventIdFilter filtering on event ID values of type “int” so it is
recommended to invoke logInspectionEventRetrieve2 instead.
136 | P a g e
SYNTAX
PARAMETERS
firewallEventRetrieve2()
DESCRIPTION Retrieves the firewall events specified by the time, host and event ID filters.
SYNTAX
PARAMETERS
137 | P a g e
userDelete ()
DESCRIPTION Deletes the set of users defined identified by the provided ids. The user must have
rights to delete user.
SYNTAX
PARAMETERS
userSave ()
DESCRIPTION Saves the supplied user.
SYNTAX
PARAMETERS
userRetrieve ()
DESCRIPTION Retrieves the user with the provided ID (password is always blank)
SYNTAX
PARAMETERS
138 | P a g e
userRetrieveAll ()
DESCRIPTION Retrieves all users (password is always blank).
SYNTAX
PARAMETERS
roleGetDefaultID ()
DESCRIPTION Get the full access (read-only) role. This can be used for creating users, especially
for 'service users' (user accounts used for API integration).
SYNTAX
PARAMETERS
pluginRequest ()
DESCRIPTION Dispatches a generic message to a plugin. Can be used to 'push' data or events to a
plug-in via the WSAPI.
SYNTAX
PARAMETERS
RETURNS Output (can be string, XML, Base64, etc), blank if PLM shutdown.
139 | P a g e
counterRetrieve ()
DESCRIPTION Load a list of counters per host, based on the counter filter type.
This method access the underlying counters that power the dashboard and reports
efficiently. The text field of the CounterTransport object is varied by different
counters. The description is blank.
Value is the count for the event type (including duplicate rolled events).
SYNTAX
PARAMETERS
counterFilter Type of counter filter to access. Please refer to EnumCounterFilter for officially
supported values.
timeFilter The time range to pull.
hostFilter The host filter to constrain the query to. Not all hosts will be listed if they have a
value of 0.
tagFilter The tag filter or all tags. All returns an unbounded set, untagged returns only the
untagged events, otherwise the freeform field takes comma delimited tag names
(with the not '!' character indicating where not tagged).
sID Authentication session identifier ID.
counterHostRetrieve ()
DESCRIPTION Load a list of counters per host, based on the counter filter type.
SYNTAX
PARAMETERS
140 | P a g e
sID Authentication session identifier ID.
RETURNS CounterHostTransport object array for the hosts that have a value > 0.
counterWithIDRetrieve ()
DESCRIPTION Load a list of counters per host, based on the counter filter type.
SYNTAX
PARAMETERS
counterFilter Type of counter filter to access. Please refer to EnumCounterFilter for officially
supported values
timeFilter The time range to pull.
hostFilter The host filter to constrain the query to. Not all hosts will be listed if they have a
value of 0.
tagFilter The tag filter or all tags.
counterAlertTypeRetrieve ()
DESCRIPTION Retrieves the firewall events specified by the time, host and event ID filters.
SYNTAX
PARAMETERS
counterFilter Type of counter filter to access. Please refer to EnumCounterFilter for officially
supported values
timeFilter The time range to pull.
hostFilter The host filter to constrain the query to. Not all hosts will be listed if they have a
value of 0.
tagFilter IDFilterTransport to filter by.
141 | P a g e
sID Authentication session identifier ID.
counterSumRetrieve ()
DESCRIPTION Load a list of counters per host, based on the counter filter type.
SYNTAX
PARAMETERS
featureSummaryRetrieve ()
DESCRIPTION Get status summary of each protection feature.
SYNTAX
PARAMETERS
142 | P a g e
statusSummaryRetrieve ()
DESCRIPTION Return the status summary of the system.
SYNTAX
PARAMETERS
RETURNS Status summary including host status summary and alert numbers
componentSummaryRetrieve ()
DESCRIPTION Return component info for each component
SYNTAX
PARAMETERS
hostStatusSummaryRetrieve ()
DESCRIPTION Retrieves the summary of the hosts status (error, warning, online, locked,
unmanaged) as integers for the given hostFilter.
SYNTAX
PARAMETERS
143 | P a g e
hostJobProgress ()
DESCRIPTION Gets the progress of a given job type since the invocation time.
SYNTAX
PARAMETERS
hostClearWarningsErrors ()
DESCRIPTION Clear warnings and errors
SYNTAX
PARAMETERS
hostIDs The ids of the hosts to clear the warnings and errors
144 | P a g e
systemSettingGet ()
DESCRIPTION Retrieves the set of setting identified by the EnumEditableSettingKey[].
SYNTAX
PARAMETERS
securityProfileSettingClear ()
DESCRIPTION Removes the provided Security Profile's overrides for the settings in keys,
returning the values to those inherited from system.
SYNTAX
PARAMETERS
securityProfileID The ID of the security profile that the settings are for.
hostGetEventsNowSync ()
DESCRIPTION Immediately initiates the fetch of events from the host.
SYNTAX
PARAMETERS
145 | P a g e
retrieveActivationCode ()
DESCRIPTION Retrieves the current activation code for the specified module
SYNTAX
PARAMETERS
retrieveLicenseProfile ()
DESCRIPTION Retrieves the current license profile code for the specified module
SYNTAX
PARAMETERS
RETURNS The current license profile for the specified module in a String.
addActivationCode ()
DESCRIPTION Adds the activation code for the specified module
SYNTAX
PARAMETERS
moduleNumber The module number on which to perform the action. -1 for all modules, 0 for AV, 1
for NET, 2 for IM, 3 for LI
activationCode The activation code to add.
logInspectionRuleRetrieveAll ()
146 | P a g e
DESCRIPTION Retrieves all of the LogInspectionRules
SYNTAX
PARAMETERS
logInspectionDecoderRetrieveByName()
DESCRIPTION Retrieves the logInspectionDecoder with the provided name (Case Sensitive)
SYNTAX
PARAMETERS
scanFileListDelete()
DESCRIPTION Deletes the set of Scan File lists identified by the provided ids.
SYNTAX
PARAMETERS
scanFileListSave()
147 | P a g e
DESCRIPTION Saves the supplied Scan File list.
SYNTAX
PARAMETERS
scanFileListRetrieve()
DESCRIPTION Retrieves the Scan File list with the provided ID
SYNTAX
PARAMETERS
scanFileListRetrieveByName()
DESCRIPTION Retrieves the Scan File list with the provided name (Case sensitive)
SYNTAX
PARAMETERS
RETURNS ScanFileListTransport object with the IP list with the provided name.
scanFileListRetrieveAll ()
148 | P a g e
DESCRIPTION Retrieves all of the Scan File lists
SYNTAX
PARAMETERS
scanFileExtListDelete()
DESCRIPTION Deletes the set of Scan File Extension lists identified by the provided ids
SYNTAX
PARAMETERS
scanFileExtListSave ()
DESCRIPTION Deletes the set of Scan File Extension lists identified by the provided ids.
SYNTAX
PARAMETERS
scanFileExtListRetrieve ()
149 | P a g e
DESCRIPTION Retrieves the Scan File Extension list with the provided ID
SYNTAX
PARAMETERS
RETURNS ScanFileExtListTransport object with the IP list with the provided ID.
scanFileExtListRetrieveByName ()
DESCRIPTION Retrieves the Scan File Extension list with the provided name (Case sensitive)
SYNTAX
PARAMETERS
scanFileExtListRetrieveAll()
DESCRIPTION Retrieves all of the Scan File Extension lists
SYNTAX
PARAMETERS
scanDirectoryListDelete ()
150 | P a g e
DESCRIPTION Retrieves all of the Scan File Extension lists
SYNTAX
PARAMETERS
scanDirectoryListSave()
DESCRIPTION Saves the supplied Scan File Extension list
SYNTAX
PARAMETERS
scanDirectoryListRetrieve()
DESCRIPTION Retrieves the Scan Directory list with the provided ID
SYNTAX
PARAMETERS
RETURNS ScanDirectoryListTransport object with the IP list with the provided ID.
scanDirectoryListRetrieveByName()
151 | P a g e
DESCRIPTION Retrieves the Scan Directory list with the provided name (Case sensitive)
SYNTAX
PARAMETERS
scanDirectoryListRetrieveAll()
DESCRIPTION Retrieves all of the Scan Directory lists.
SYNTAX
PARAMETERS
antiMalwareDelete()
DESCRIPTION Deletes the set of AntiMalware identified by the provided ids
SYNTAX
PARAMETERS
antiMalwareSave()
152 | P a g e
DESCRIPTION Saves the supplied AntiMalware
SYNTAX
PARAMETERS
antiMalwareRetrieve()
DESCRIPTION Retrieves the AntiMalware with the provided ID
SYNTAX
PARAMETERS
antiMalwareRetrieveByName()
DESCRIPTION Retrieves the AntiMalware with the provided name (Case sensitive)
SYNTAX
PARAMETERS
antiMalwareRetrieveAll()
153 | P a g e
DESCRIPTION Retrieves all of the AntiMalware
SYNTAX
PARAMETERS
antiMalwareEventRetrieve()
DESCRIPTION Retrieves the AntiMalware events specified by the time and host filter. This
version supports eventIdFilter filtering on event ID values of type “int” so it is
recommended to invoke antMalwareEventRetrieve2 instead.
SYNTAX
PARAMETERS
antiMalwareEventRetrieve2()
DESCRIPTION Retrieves the AntiMalware events specified by the time and host filter.
SYNTAX
PARAMETERS
154 | P a g e
sID Authentication session identifier ID.
updateComponents()
DESCRIPTION Performs a global component update of the system. This will do a full update of
all relays, and then the corresponding agent updates
SYNTAX
PARAMETERS
updateComponentFromAU()
DESCRIPTION Performs a global component update of the system. This will do a full update of
all relays, and then the corresponding agent updates, and also for legacy purposes,
if 7.5 Appliances are in use, we will utilize some of the parameters and attempt to
perform specific updates for those legacy Appliances.
SYNTAX
public boolean updateComponentFromAU(int type, int id, boolean applyDSRU, String sID)
PARAMETERS
hostAntiMalwareScan()
DESCRIPTION Trigger Anti-Malware Manual Scan on specified host.
155 | P a g e
SYNTAX
PARAMETERS
hostUpdateComponent()
DESCRIPTION Update Component
SYNTAX
public void hostUpdateComponent(int[] hostIDs, int type, int id, String sID)
PARAMETERS
id Component id (ignored)
hostRollbackComponent()
DESCRIPTION Rollback Component on DSVA to the previous version
SYNTAX
public void hostRollbackComponent(int[] hostIDs, int type, int id, String sID)
PARAMETERS
id Component id (ignored)
alertStatusRetrieve()
DESCRIPTION Retrieves the alerts.
156 | P a g e
SYNTAX
PARAMETERS
userRetrieveByName()
DESCRIPTION Retrieves the user with the provided username (Case Sensitive) (password is
always blank)
SYNTAX
PARAMETERS
counterRetrieve()
DESCRIPTION Load a list of counters per host, based on the counter filter type.
SYNTAX
PARAMETERS
157 | P a g e
counterFilter Type of counter filter to access. Please refer to EnumCounterFilter for officially
supported values.
timeFilter The time range to pull.
hostFilter The host filter to constrain the query to. Not all hosts will be listed if they have a
value of 0.
tagFilter The tag filter or all tags. All returns an unbounded
hostDetailRetrieve()
DESCRIPTION Retrieves the detail information of hosts.
SYNTAX
PARAMETERS
hostDetailRetrieveByName()
DESCRIPTION Retrieves the detail information of host.
SYNTAX
PARAMETERS
158 | P a g e
hostname The name of host
hostDetailRetrieveByExternal()
DESCRIPTION Retrieves the detail information of hosts by External ID (Host/HostGroup).
SYNTAX
PARAMETERS
hostDetailRetrieveByNameStartsWith()
DESCRIPTION Retrieves the detail information of host by starting with startsWithHostname.
SYNTAX
PARAMETERS
159 | P a g e
startsWithHostname The name of host
webReputationEventRetrieve()
DESCRIPTION Retrieves the Web Reputation events specified by the time and host filter. This
version supports eventIdFilter filtering on event ID values of type “int” so it is
recommended to invoke webReputationEventRetrieve2 instead.
SYNTAX
PARAMETERS
webReputationEventRetrieve2()
DESCRIPTION Retrieves the Web Reputation events specified by the time and host filter.
SYNTAX
PARAMETERS
160 | P a g e
RETURNS WebReputationEventListTransport object.
hostRecommendationScan()
DESCRIPTION Initiate a host recommendation scan.
SYNTAX
PARAMETERS
hostRecommendationsClear()
DESCRIPTION Clear the existing host recommendation.
SYNTAX
PARAMETERS
hostRecommendationsResolve()
DESCRIPTION Manually resolve recommendations on unresolved hosts by type and rules.
SYNTAX
PARAMETERS
161 | P a g e
hostRecommendationRuleIDsRetrieve()
DESCRIPTION Retrieve host recommendation rule IDs.
SYNTAX
public int[] hostRecommendationRuleIDsRetrieve(int hostID, int type, boolean onlyunassigned, String sID)
PARAMETERS
onlyunassigned Boolean to specify if the function should only return rules that are recommended,
and not assigned at the host.
sID Authentication session identifier ID.
securityProfileRecommendationRuleIDsRetrieve()
DESCRIPTION Retrieve security profile recommendation rule IDs.
SYNTAX
PARAMETERS
hostRecommendationUnresolvedRetrieve()
DESCRIPTION Retrieve hosts with unresolved recommendation rule IDs.
SYNTAX
162 | P a g e
PARAMETERS
163 | P a g e