Client compliancy with self-policing clients
First Claim
1. A method for enforcing client compliance on a network, comprising:
- transmitting, over the network, a query from a software agent executing on a target device to a non-compliance database that stores identifiers of non-compliant devices on the network, the query requesting compliance status of the target device and including an identifier of the target device;
receiving, over the network, by the software agent executing on the target device a response to the query indicating the compliance status of the target device, the compliance status indicating whether or not the identifier of the target device is present in the database of non-compliant devices on the network; and
in response to the compliance status indicating that the identifier of the target device is present in the database of non-compliant devices, initiating, by the software agent executing on the target device, a remedial action to put the target device in compliance with network security policies.
2 Assignments
0 Petitions
Accused Products
Abstract
Security sensor data from intrusion detection system (IDS) sensors, vulnerability assessment (VA) sensors, and/or other security sensors is used to enhance the compliancy determination in a client compliancy system. A database is used to store the security sensor data. In one particular embodiment, a list of device compliance statuses indexed by corresponding identifiers (e.g., IP/MAC addresses) combined from IDS, VA, and/or other security sensing technologies is made available as a non-compliance database for query, so that clients and other compliancy authentication elements can tell that a particular client appears to be out of compliance. A client-side self-policing compliance system is enabled, and can be used in conjunction with automated endpoint compliance policy configuration to reduce system administrator burden.
85 Citations
20 Claims
-
1. A method for enforcing client compliance on a network, comprising:
-
transmitting, over the network, a query from a software agent executing on a target device to a non-compliance database that stores identifiers of non-compliant devices on the network, the query requesting compliance status of the target device and including an identifier of the target device; receiving, over the network, by the software agent executing on the target device a response to the query indicating the compliance status of the target device, the compliance status indicating whether or not the identifier of the target device is present in the database of non-compliant devices on the network; and in response to the compliance status indicating that the identifier of the target device is present in the database of non-compliant devices, initiating, by the software agent executing on the target device, a remedial action to put the target device in compliance with network security policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A machine-readable storage medium encoded with instructions, that when executed by a processor, cause the processor to carry out a process for enforcing client compliance on a network, the process comprising:
-
transmitting, over the network, a query from a software agent executing on a target device to a non-compliance database that stores identifiers of non-compliant devices on the network, the query requesting compliance status of the target device and including an identifier of the target device; receiving, over the network, by the software agent executing on the target device a response to the query indicating the compliance status of the target device, the compliance status indicating whether or not the identifier of the target device is present in the database of non-compliant devices on the network; and in response to the compliance status indicating that the identifier of the target device is present in the database of non-compliant devices, initiating, by the software agent executing on the target device, a remedial action to put the target device in compliance with network security policies. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for enforcing client compliance on a network, comprising:
-
a self-policing target device that initiates a remedial action to put itself in compliance with network security policies responsive to receiving a compliance status indicating that an identifier of the self-policing target device is present in a database of non-compliant devices on the network; and a compliance verification component executing on the target device, the compliance verification component for transmitting, over the network, a query to the database of non-compliant devices on the network, the query requesting the compliance status of the target device and including the identifier of the target device, and for receiving, over the network, a response to the query indicating the compliance status of the target device, the compliance status indicating whether or not the identifier of the target device is present in the database of non-compliant devices on the network. - View Dependent Claims (17, 18)
-
-
19. A system for enforcing client compliance on a network, comprising:
-
a processor; and a computer readable storage medium storing computer-executable program instructions that when executed cause a processor to perform steps including; transmitting, over the network, a query from a target device to a database storing identifiers of non-compliant devices on the network, the query requesting compliance status of the target device and including an identifier of the target device; receiving, over the network, by the target device a response to the query indicating the compliance status of the target device, the compliance status indicating whether or not the identifier of the target device is present in the database of non-compliant devices on the network; and initiating by the target device in response to, the compliance status indicating that the identifier of the target device is present in the database of non-compliant devices, a remedial action to put the target device in compliance with network security policies. - View Dependent Claims (20)
-
Specification