SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY SCANS ON VIRTUAL MACHINES
First Claim
1. A method of vulnerability scanning in a group of virtual machines hosted by a plurality of physical machines, comprising:
- identifying a physical machine from the plurality of physical machines hosting at least one virtual machine in the group of virtual machines;
providing, by a processor to the physical machine, a vulnerability scanner, wherein the vulnerability scanner is configured to scan the at least one virtual machine utilizing a hypervisor associated with the at least one virtual machine;
receiving, from the vulnerability scanner, a result of a vulnerability scan performed on the at least one virtual machine; and
identifying a vulnerability in the at least one virtual machine based on the result of the vulnerability scan.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein relate to systems and methods for performing vulnerability scans on virtual machines. The systems and methods comprise a virtual asset tool that can instantiate a vulnerability scanner on a physical machine hosting a set of virtual machines. The vulnerability scanner can scan the virtual machines to identify any vulnerabilities, security flaws, or other risks, and can provide a result of the scan to the virtual asset tool. In embodiments, the virtual asset tool can examine the result of the scan to identify any vulnerabilities resulting from the scan.
-
Citations
30 Claims
-
1. A method of vulnerability scanning in a group of virtual machines hosted by a plurality of physical machines, comprising:
-
identifying a physical machine from the plurality of physical machines hosting at least one virtual machine in the group of virtual machines; providing, by a processor to the physical machine, a vulnerability scanner, wherein the vulnerability scanner is configured to scan the at least one virtual machine utilizing a hypervisor associated with the at least one virtual machine; receiving, from the vulnerability scanner, a result of a vulnerability scan performed on the at least one virtual machine; and identifying a vulnerability in the at least one virtual machine based on the result of the vulnerability scan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for vulnerability scanning in a group of virtual machines hosted by a plurality of physical machines, comprising:
-
a processor; and a computer readable storage medium coupled to the processor and comprising instructions for causing the processor to perform the method comprising; identifying a physical machine from the plurality of physical machines hosting at least one virtual machine in the group of virtual machines; providing, to the physical machine, a vulnerability scanner, wherein the vulnerability scanner is configured to scan the at least one virtual machine utilizing a hypervisor associated with the at least one virtual machine; receiving, from the vulnerability scanner, a result of a vulnerability scan performed on the at least one virtual machine; and identifying a vulnerability in the at least one virtual machine based on the result of the vulnerability scan. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer readable storage medium embodying instructions for causing a processor to perform the method comprising:
-
identifying a physical machine from a plurality of physical machines hosting at least one virtual machine in a group of virtual machines; providing, to the physical machine, a vulnerability scanner, wherein the vulnerability scanner is configured to scan the at least one virtual machine utilizing a hypervisor associated with the at least one virtual machine; receiving, from the vulnerability scanner, a result of a vulnerability scan performed on the at least one virtual machine; and identifying a vulnerability in the at least one virtual machine based on the result of the vulnerability scan. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification