Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
First Claim
Patent Images
1. A method, comprising:
- receiving commands for executing a risk-assessment scan from a remote computer utilizing a network;
processing the commands on a local computer utilizing an agent; and
performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer;
wherein the agent includes a plurality of risk-assessment modules;
wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer;
wherein the commands each indicate at least one of the risk-assessment modules.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided. Commands are received for executing a risk-assessment scan from a remote computer utilizing a network. The commands are processed on a local computer utilizing an agent. Further, the risk-assessment scan is performed on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer. Such agent includes a plurality of risk-assessment modules. Further, the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer.
53 Citations
19 Claims
-
1. A method, comprising:
-
receiving commands for executing a risk-assessment scan from a remote computer utilizing a network; processing the commands on a local computer utilizing an agent; and performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product embodied on a computer readable medium, comprising:
-
computer code for receiving commands for executing a scan from a remote computer utilizing a network; computer code for processing the commands on a local computer utilizing an agent; and computer code for performing the scan on the local computer in accordance with the processed commands to remotely scan the local computer; wherein the agent includes a plurality of scan modules; wherein the commands execute the scan modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the scan modules.
-
-
19. A system including a tangible computer readable medium, comprising:
-
logic for receiving commands for executing a risk-assessment scan from a remote computer utilizing a network; logic for processing the commands on a local computer utilizing an agent; and logic for performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules.
-
Specification