×

Retention and accessibility of data characterizing events on an endpoint computer

  • US 10,354,067 B2
  • Filed: 11/18/2016
  • Issued: 07/16/2019
  • Est. Priority Date: 02/26/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • computer hardware having at least one data processor and memory storing instructions which, when executed by the at least one data processor, result in configured to perform operations comprising;

    harvesting, by an endpoint computer system, data relating to a plurality of events occurring within an operating environment of the endpoint computer system, the harvesting comprising receiving and/or inferring the data using one or more sensors executing on the endpoint computer system;

    adding the data to a local data store maintained on the endpoint computer system, the local data store comprising an audit log, the audit log comprising a series of data containers, each data container in the series comprising a tamper resistant feature, currently generated forensic data being stored in a current data container of the series while preceding data containers in the series are closed to further write operations;

    generating a query response in response to a query specifying an artifact on the endpoint computer system and/or an event of the plurality of events, the generating comprising identifying and retrieving responsive data from the local data store, the responsive data being related to the artifact on the endpoint computer system specified by the query and/or to the event of the plurality of events specified by the query, the generating further comprising mitigating an amount of the data returned as part of the responsive data, the mitigating comprising interpreting the query at the endpoint computer system and focusing on specific data of the responsive data that are most likely to be relevant to a subject of the query; and

    taking an action based on the detecting that the audit log has been compromised, the action comprising one or more of;

    quarantining a thread, process, and/or routine responsible for the compromising of the audit log; and

    protection and/or other prevention of corruption of the forensic data that are used to generate the audit log and local cache.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×