Follow these steps depending on your preferred scan configuration process.
Real-time malware scan configuration
- On the Deep Security console go to Policies > Malware Scan Configuration > New > New Real-time Scan Configuration.
- Under General tab, name the policy.
- Under Inclusions tab, make sure to select All Directories.
- Go to the Advanced tab. Follow the settings indicated in the following screenshots:
Manual/scheduled malware scan configuration
- On the Deep Security console go to Policies > Malware Scan Configuration > New > Manual Scan Configuration.
- Under General tab, name the policy. Follow the settings indicated in the following screenshot:
- Under the Inclusions tab, select All Directories.
- Go to the Advanced tab. Follow the settings indicated in the following screenshots:
Policy creation
- On Deep Security console go to Policies > Duplicate Base Policy.
- Right-click the newly created Duplicate then select Details.
- Under the Overview tab, name the policy and click Save.
- On the left panel go to Anti-Malware > General tab. Apply the policy created earlier with Default unchecked.
- Under the Smart Protection tab, make sure Smart Scan is set to On.
Scheduled tasks for Security Updates
- From the main console, go to Administration > Scheduled tasks > New > Check for Security Updates then select Daily. Click Next.
- Set preferred time and time zone.
- Select All Computers.
- Name the task and click Finish.
Scheduled tasks for Malware Scan
- From the main console, go to Administration > Scheduled Tasks > New > Scan Computers for Malware then select Weekly. Click Next.
- Set preferred time, day and time zone. Click Next.
- Select All Computers.
Depending on environment size, you may divide the scanning per group.
- Name the tasks, and make sure to enable them. Click Finish.
Firewall & Intrusion Prevention
The configuration of the Firewall and Intrusion Prevention may be complicated due to different environment setup. Please refer to the following articles for more detailed information:
- Firewall settings
- Define stateful firewall configurations
- Scan for open ports
- Configure intrusion prevention rules
- Intrusion prevention events
Integrity Monitoring
The detailed configuration of the Integrity Monitoring (IM) is shown in the following articles:
- Set up Integrity Monitoring
- Create an Integrity Monitoring rule
- About the Integrity Monitoring rules language
The detailed information on IM events is shown in the article, Integrity monitoring events.
Log Inspection
The detailed information of the Log Inspection (LI) is shown in the article, Set up Log Inspection.
Users could create their own LI rules. The article, Define a Log Inspection rule for use in policies, shows detailed information for creating LI rules,
The detailed information of the LI events is shown in the article, Log inspection events.
Scanning for Recommendations (Task)
- From main console, go to Administration > Scheduled tasks > New > Scan Computers for Recommendations then select Weekly. Click Next.
- Set preferred time, day and time zone. Click Next.
- Set Group depending on your preference.
Depending on environment size, you may divide the scanning per group or per policy.
- Name the tasks, and make sure to enable them. Click Finish.