Slider Control for Security Grouping and Enforcement
First Claim
Patent Images
1. A method for managing a plurality of security components, said method comprising:
- identifying said plurality of security components;
defining a plurality of security levels, each of said security levels comprising a configuration for each of said security components, said security levels being organized on a progressive scale;
analyzing each of said security components to determine a current state for said security components;
determining a first security level based on a security level for which all of said security components are currently configured; and
presenting said first security level on a user interface.
2 Assignments
0 Petitions
Accused Products
Abstract
A group of security functions may be configured and managed by organizing the security functions and their features into a ranked list and made available through an administrative console. The ranked list may represent various levels of security from which a user may select. Once selected, the security functions may be configured according to the selected level. The console may determine a current security level by analyzing the configuration or status of each of the security functions and presenting a single status level from the ranked list determined by the least secure setting of the various security functions.
-
Citations
20 Claims
-
1. A method for managing a plurality of security components, said method comprising:
-
identifying said plurality of security components; defining a plurality of security levels, each of said security levels comprising a configuration for each of said security components, said security levels being organized on a progressive scale; analyzing each of said security components to determine a current state for said security components; determining a first security level based on a security level for which all of said security components are currently configured; and presenting said first security level on a user interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a processor; a network interface; a user interface device; a predefined security configuration definition for a set of security components comprising; a plurality of security levels, each of said security levels being defined by a security function, said security function being performed by at least one security component; and for each of said security components in said set, a configuration setting for each of said plurality of security functions; a security collector that determines a current configuration setting for each of said plurality of security levels; a security manager that communicates with each of said security components and determines a current security level from said current configuration setting for each of said plurality of security levels, said current security level being one of said security levels for which every one of said security components is configured; and a security console that presents said current security level on said user interface, receives a user input from said user interface to change from said current security level to a second security level, and causes said security manager to change a configuration for each of said plurality of security components to meet said second security level. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A security management system operable on a computer processor of a device connected to a local area network, said security management system comprising:
-
a predefined security configuration definition for a set of security components comprising; a plurality of security levels; and for each of said security component in said set, a configuration setting for each of said plurality of security levels; for each of said security components, an active connector that reads and sets configuration settings for said security components, said security components comprising; an email monitoring application operating on an email server that receives email messages and stores said email messages in mailboxes; a logging application operating on a gateway device through which communications are routed between said local area network and a wide area network; and a web browser setting for a web browser operating on a client device, said web browser setting defining a set of security settings for said web browser; a security collector that determines a current configuration setting for each of said plurality of security levels using said active connectors; a security manager that communicates with each of said security components through said active connectors and determines a current security level from said current configuration setting for each of said plurality of security levels, said current security level being one of said security levels for which every one of said security components is configured; and a security console that; presents said current security level on said user interface by positioning a slider indicator on said user interface; receives a user input from said user interface to change from said current security level to a second security level; and causes said security manager to change a configuration for each of said plurality of security components to meet said second security level. - View Dependent Claims (18, 19, 20)
-
Specification