System and method for providing security profile information to a user of a computer system
First Claim
1. A computer system, comprising:
- memory; and
a security application configured to display a list of security rules for locking down resources of said computer system, said security application configured to enable a set of said security rules, based on inputs from a user, and to cause said computer system to enforce said enabled set of security rules by modifying a machine state of said computer system, said security application further configured to enable said user to select one of said security rules and to display information describing said selected rule in response to a selection of said one rule by said user, said information based on data stored in said memory.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for providing security profile information to a user of a computer system utilizes memory and a security application. The security application displays a list of security rules for locking down resources of a computer system. A user then defines a security profile of the computer system by identifying which of the security rules should be enabled. If desired, the user may select any one of the displayed rules in order to obtain more information pertaining to the selected rule. In response, the security application displays more information describing the selected rule so that the user can make a better decision about whether the selected security rule should be enabled. Upon activation of the security profile, the security application modifies a machine state of the computer system to cause the computer system to begin enforcing the enabled security rules.
34 Citations
15 Claims
-
1. A computer system, comprising:
-
memory; and
a security application configured to display a list of security rules for locking down resources of said computer system, said security application configured to enable a set of said security rules, based on inputs from a user, and to cause said computer system to enforce said enabled set of security rules by modifying a machine state of said computer system, said security application further configured to enable said user to select one of said security rules and to display information describing said selected rule in response to a selection of said one rule by said user, said information based on data stored in said memory. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system, comprising:
-
means fordisplaying a list of security rules for locking down resources of said computer system;
means for receiving inputs from a user of said computer system;
means for enabling a set of said security rules based on said inputs from said user;
means for enforcing said enabled set of security rules;
means for selecting one of said security rules from said displayed list; and
means for displaying information describing said selected rule in response to a selection of said one rule by said selecting means.
-
-
9. A method for locking down resources of computer systems, comprising the steps of:
-
displaying a list of security rules for locking down resources of a computer system;
receiving inputs from a user of said computer system;
enabling a set of said security rules based on said inputs from said user;
enforcing said enabled set of security rules;
selecting one of said security rules from said displayed list; and
displaying information describing said selected rule in response to said selecting step. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification