Distribution of security policies for small to medium-sized organizations
First Claim
Patent Images
1. A method, comprising:
- providing a configuration procedure for an antivirus program to determine which parameters of a security policy have changed;
creating a self-contained configuration file corresponding to the security policy, the self-contained configuration file comprising instructions for applying the parameters of the security policy;
storing the self-contained configuration file on a server for subsequent downloading by a plurality of devices;
providing the self-contained configuration file in an e-mail to be communicated over a network from the server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and
receiving an error message if the self-contained configuration file is not installed on the client device, wherein the self-contained configuration file can be propagated between the client device and a peer node in order to replicate the security policy at the peer node.
13 Assignments
0 Petitions
Accused Products
Abstract
A security policy distribution system encapsulates parameters for a security policy and instructions for applying the parameters to a corresponding security program into a self-contained configuration file. When the self-contained configuration file is executed on behalf of a computer, the corresponding security program on the computer is updated with the parameters, thus distributing the security policy to the computer.
19 Citations
21 Claims
-
1. A method, comprising:
-
providing a configuration procedure for an antivirus program to determine which parameters of a security policy have changed; creating a self-contained configuration file corresponding to the security policy, the self-contained configuration file comprising instructions for applying the parameters of the security policy; storing the self-contained configuration file on a server for subsequent downloading by a plurality of devices; providing the self-contained configuration file in an e-mail to be communicated over a network from the server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and receiving an error message if the self-contained configuration file is not installed on the client device, wherein the self-contained configuration file can be propagated between the client device and a peer node in order to replicate the security policy at the peer node. - View Dependent Claims (4, 5, 6, 7, 15, 19, 20, 21)
-
-
2-3. -3. (canceled)
-
8. Computer executable instructions embodied in non-transitory computer readable media for execution in conjunction with a processor, the instructions being configured for performing operations, comprising:
-
providing a configuration procedure for an antivirus program to determine which parameters of a security policy have changed; creating a self-contained configuration file corresponding to the security policy, the self-contained configuration file comprising instructions for applying the parameters of the security policy; storing the self-contained configuration file on a server for subsequent downloading by a plurality of devices; providing the self-contained configuration file in an e-mail to be communicated over a network from the server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and receiving an error message if the self-contained configuration file is not installed on the client device, wherein the self-contained configuration file can be propagated between the client device and a peer node in order to replicate the security policy at the peer node. - View Dependent Claims (10)
-
-
9. (canceled)
-
11. (canceled)
-
12. A system comprising:
-
a processor; a memory coupled to the processor through a bus, wherein the system is configured to;
providing a configuration procedure for an antivirus program to determine which parameters of a security policy have changed;create a self-contained configuration file corresponding to the security policy, the self-contained configuration file comprising instructions for applying the parameters of the security policy; store the self-contained configuration file on a server for subsequent downloading by a plurality of devices; provide the self-contained configuration file in an e-mail to be communicated over a network from the server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and receive an error message if the self-contained configuration file is not installed on the client device, wherein the self-contained configuration file can be propagated between the client device and a peer node in order to replicate the security policy at the peer node. - View Dependent Claims (14)
-
-
13. (canceled)
-
16. (canceled)
-
17. (canceled)
-
18. (canceled)
Specification