APPLICATION MONITORING PRIORITIZATION
First Claim
1. A computer-implemented method comprising:
- determining a criticality ranking for a first endpoint in a datacenter;
determining a criticality ranking for a second endpoint;
determining that the criticality ranking of the first endpoint equals the criticality ranking of the second endpoint;
determining a secondary value for the first endpoint;
determining a secondary value for the second endpoint;
determining, based on the secondary value for the first endpoint and the secondary value for the second endpoint, that the first endpoint is a higher priority than the second endpoint; and
triaging the first endpoint.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
determining a criticality ranking for a first endpoint in a datacenter; determining a criticality ranking for a second endpoint; determining that the criticality ranking of the first endpoint equals the criticality ranking of the second endpoint; determining a secondary value for the first endpoint; determining a secondary value for the second endpoint; determining, based on the secondary value for the first endpoint and the secondary value for the second endpoint, that the first endpoint is a higher priority than the second endpoint; and triaging the first endpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium having computer readable instructions that, when executed by a processor of a computer, cause the computer to:
-
determine a criticality ranking for a first endpoint in a datacenter; determine a criticality ranking for a second endpoint; determine that the criticality ranking of the first endpoint equals the criticality ranking of the second endpoint; determine a secondary value for the first endpoint; determine a secondary value for the second endpoint; determine, based on the secondary value for the first endpoint and the secondary value for the second endpoint, that the first endpoint is a higher priority than the second endpoint; and triage the first endpoint. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a processor; memory including instructions that when executed by the processor, cause the system to; determine a criticality ranking for a first endpoint in a datacenter; determine a criticality ranking for a second endpoint; determine that the criticality ranking of the first endpoint equals the criticality ranking of the second endpoint; determine a secondary value for the first endpoint; determine a secondary value for the second endpoint; determine, based on the secondary value for the first endpoint and the secondary value for the second endpoint, that the first endpoint is a higher priority than the second endpoint; and triage the first endpoint. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification