Parametric content control in a network security system
First Claim
1. A method for use with a computer system having a plurality of host computers (hosts) and a server associated with the hosts comprising:
- the server propagating to the hosts a master set of policies relating to file operations, and policy options indicating at least whether and with what conditions such operations are allowed or banned, and the server propagating a value to the hosts;
the value stored on the host indicating which subset of policies and policy options to implement on the host from the master set of policies and policy options;
the host implementing the file operation policies indicated by the value.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and social engineering attacks. The system can implement centralized policies that allow an administrator to approve, block, quarantine, or log file activities. The system can provide and update a security value that causes host computers to change security levels for a number of different policies. The policies are grouped into a master set of policies and options which are propagated to the hosts from a centralized server. The security value is stored on the hosts and the server, and changes of the value on the server are propagated to the hosts.
-
Citations
45 Claims
-
1. A method for use with a computer system having a plurality of host computers (hosts) and a server associated with the hosts comprising:
-
the server propagating to the hosts a master set of policies relating to file operations, and policy options indicating at least whether and with what conditions such operations are allowed or banned, and the server propagating a value to the hosts;
the value stored on the host indicating which subset of policies and policy options to implement on the host from the master set of policies and policy options;
the host implementing the file operation policies indicated by the value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A computer system comprising:
-
a plurality of host computers (hosts); and
a server for propagating to the hosts a master set of policies relating to file operations, and policy options indicating at least whether and with what conditions such operations are allowed or banned, and the server further for propagating a value to the hosts for storage on the hosts;
the value stored on the host indicating which subset of policies and policy options to implement on the host from the master set of policies and policy options;
the host for implementing the file operation policies indicated by the value. - View Dependent Claims (41, 42, 43, 44, 45)
-
Specification