Method and system for scanning network devices
First Claim
Patent Images
1. A method for scanning network devices connected to a network, comprising:
- (a) detecting when a first network device connects to the network at the time that the first network device connects to the network by polling a database about connections to the network and identifying the connection of the first network device to the network in response to the polling of the database; and
(b) performing remote agentless scanning of the first network device in response to detecting when the first network device connects to the network by;
taking an inventory of software and/or settings on the first network device;
comparing the inventory to a security policy.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention includes a method and system for scanning network devices connected to a network by detecting connection of a first network device to the network and performing remote scanning of the first network device in response to detection of the first network device.
-
Citations
25 Claims
-
1. A method for scanning network devices connected to a network, comprising:
-
(a) detecting when a first network device connects to the network at the time that the first network device connects to the network by polling a database about connections to the network and identifying the connection of the first network device to the network in response to the polling of the database; and (b) performing remote agentless scanning of the first network device in response to detecting when the first network device connects to the network by; taking an inventory of software and/or settings on the first network device; comparing the inventory to a security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus for remote agentless scanning of network devices on a network comprising:
-
(a) a detecting module that detects when a first network device connects to the network at the time that the first network device connects to the network by polling a database about connections to the network and identifying the connection of the first network device to the network in response to the polling of the database; and (b) a scanning module that performs remote agentless scanning of the first network device in response to detecting when the first network device connects to the network by; taking an inventory of software and/or settings on the first network device; comparing the inventory to a security policy. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method for examining a first network device connected to a network, comprising:
-
(a) querying a database for data representing connection of network devices to a network; (b) determining when a first network device connects to the network at the time that the first network device connects to the network by locating data about the first network device in the database in response to the querying of the database; (c) determining properties associated with the first network device to determine the identity of the first network device; (d) determining items to scan based on at least one of the properties; and (e) performing remote scanning of the first network device to take an inventory of software and/or settings on the first network device in response to the determination of the connection of the first network device to the network. - View Dependent Claims (22, 23, 24)
-
-
25. A method for scanning network devices connected to a network, comprising:
-
(a) detecting when a first network device connects to the network at the time that the first network device connects to the network by continuously polling a database about connections to the network and identifying the connection of the first network device to the network in response to the polling of the database; and (b) performing remote scanning of the first network device in response to detection of the first network device by; taking an inventory of software and/or settings on the first network device; comparing the inventory to a security policy.
-
Specification