×

Systems and methods for evaluating security software configurations

  • US 10,318,742 B1
  • Filed: 11/28/2016
  • Issued: 06/11/2019
  • Est. Priority Date: 11/28/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for evaluating security software configurations, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying, within a software security system, a live configuration comprising active configuration settings applied by the software security system when protecting a computing system against abnormal activity;

    establishing, for the software security system, a test configuration comprising at least one configuration setting that is different from the live configuration;

    recording a live result of the software security system performing, using the live configuration, a protective action that protects the computing system against abnormal activity;

    generating an alternate result of the protective action by performing the protective action on the computing system using the test configuration instead of the live configuration and without applying changes resulting from the protective action to the computing system; and

    performing a security action based on the live result of the protective action and the alternate result of the protective action, wherein performing the security action comprises providing the live result of the protective action and the alternate result of the protective action to a backend system that;

    associates the live result and the alternate result with metadata about the computing system in a database;

    enables client software security systems to search the database based on metadata about computing systems protected by the software security systems to find a suggested configuration for the client software security system; and

    provides, by a user interface of the client software security system, a result of the search to an administrator of the client software security system.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×