Endpoint management using trust rating data
First Claim
1. A non-transitory machine-readable medium encoded with instructions, that when executed by one or more processors, cause the processor to carry out a process for endpoint management, the process comprising:
- receiving from an endpoint an endpoint request to join a managed network, the endpoint identifying to a server in the request one or more applications currently on the endpoint;
determining if the identified applications are represented in a compliance policy database, wherein the compliance policy database comprises a list of applications and one or more security policy rules associated with each application in the list of applications that impose required settings for the application that must be met for providing access to the managed network;
in response to a determination that an identified application is not represented in the compliance policy database;
querying a content provider service to obtain one or more factors for the application not represented in the compliance policy database for use in computing a trust rating for the application not represented in the compliance policy database, or a pre-computed trust rating for the application not represented in the compliance policy database;
determining a trust rating for the application not represented in the compliance policy database based on the one or more factors for the application not represented in the compliance policy database or the pre-computed trust rating; and
dynamically generating one or more security policy rules for the application represented in the compliance policy database based on the determined trust rating, the one or more security policy rules for use in a managed endpoint compliance scheme; and
in response to a determination that an identified application is represented in the compliance policy database;
retrieving the one or more security policy rules associated with the represented application from the compliance policy database.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for implementing dynamic endpoint management. In accordance with one embodiment, whenever an endpoint joins a managed network for the first time, or rejoins that network, a local security module submits a list of applications (e.g., all or incremental) to a security server. The server validates the list and sends back a rule set (e.g., allow/block rules and/or required application security settings) for those applications. If the server has no information for a given application, it may further subscribe to content from a content provider or service. When the server is queried regarding an unknown application, the server sends a query to the service provider to obtain a trust rating for that unknown application. The trust rating can then be used to generate a rule set for the unknown application. Functionality can be shifted from server to client, and vice-versa if so desired.
-
Citations
18 Claims
-
1. A non-transitory machine-readable medium encoded with instructions, that when executed by one or more processors, cause the processor to carry out a process for endpoint management, the process comprising:
-
receiving from an endpoint an endpoint request to join a managed network, the endpoint identifying to a server in the request one or more applications currently on the endpoint; determining if the identified applications are represented in a compliance policy database, wherein the compliance policy database comprises a list of applications and one or more security policy rules associated with each application in the list of applications that impose required settings for the application that must be met for providing access to the managed network; in response to a determination that an identified application is not represented in the compliance policy database; querying a content provider service to obtain one or more factors for the application not represented in the compliance policy database for use in computing a trust rating for the application not represented in the compliance policy database, or a pre-computed trust rating for the application not represented in the compliance policy database; determining a trust rating for the application not represented in the compliance policy database based on the one or more factors for the application not represented in the compliance policy database or the pre-computed trust rating; and dynamically generating one or more security policy rules for the application represented in the compliance policy database based on the determined trust rating, the one or more security policy rules for use in a managed endpoint compliance scheme; and in response to a determination that an identified application is represented in the compliance policy database; retrieving the one or more security policy rules associated with the represented application from the compliance policy database. - View Dependent Claims (2, 3, 4, 5, 6, 16)
-
-
7. A non-transitory machine-readable medium encoded with instructions, that when executed by one or more processors, cause the processor to carry out a process for endpoint management, the process comprising:
-
detecting a one or more applications on an endpoint; generating an endpoint request to join a managed network, the request identifying the one or more applications on the endpoint; sending the endpoint request from the endpoint to the managed network for analysis, the managed network configured to; determine if the identified applications are represented in a compliance policy database comprising a list of applications and one or more security policy rules associated with each application in the list of applications; responsive to a determination that an identified application is not represented in the compliance policy database, query a content provider service to obtain one or more factors for the application not represented in the compliance policy database used to compute a trust rating for the application not represented in the compliance policy database, or to obtain a pre-computed trust rating for the application not represented in the compliance policy database; determine a trust rating for the application not represented in the compliance policy database based on the one or more factors for the application not represented in the compliance policy database or the pre-computed trust rating; and dynamically generate one or more security policy rules for the application not represented in the compliance policy database based on the determined trust rating, the one or more security policy rules for use in a managed endpoint compliance scheme; and receiving from the managed network one or more security policy rules for each of the identified applications responsive to the endpoint request, with at least one of the security policy rules having been dynamically generated. - View Dependent Claims (8, 9, 10, 11, 17)
-
-
12. A system for endpoint management, comprising:
a server comprising a non-transitory machine-readable medium encoded with instructions and a processor configured to execute the instructions, the instructions configured to cause the server to; receive from an endpoint an endpoint request to join a managed network, the endpoint identifying to the server in the request one or more applications currently on the endpoint; determine if the identified applications are represented in a compliance policy database, wherein the compliance policy database comprises a list of applications and one or more security policy rules associated with each application in the list of applications that impose required settings for the application that must be met for providing access to the managed network; in response to a determination that an identified application is not represented in the compliance policy database; query a content provider service to obtain one or more factors for the application not represented in the compliance policy database for use in computing a trust rating for the application not represented in the compliance policy database or a pre-computed trust rating for the application not represented in the compliance policy database; determine a trust rating for the application not represented in the compliance policy database based on the one or more factors for the application not represented in the compliance policy database or the pre-computed trust rating; and dynamically generate one or more security policy rules for the application not represented in the compliance policy database based on the determined trust rating, the one or more security policy rules for use in a managed endpoint compliance scheme; and in response to a determination that an identified application is represented in the compliance policy database; retrieve the one or more security policy rules associated with the represented application from the compliance policy database. - View Dependent Claims (13, 14, 15, 18)
Specification