×

System, method and computer program product for controlling network communications based on policy compliance

  • US 8,301,767 B1
  • Filed: 12/21/2005
  • Issued: 10/30/2012
  • Est. Priority Date: 12/21/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • assessing compliancy, based on one or more policies, of at least one subset of computers, each of which include an instance of a scanner, wherein said compliancy is assessed by the respective instance of a scanner;

    receiving, at a server, information over a communication network relating to the at least one subset of computers that are at least potentially out of compliance with the one or more policies, wherein the information is received from the respective instance of a scanner;

    compiling a blacklist utilizing the information, wherein the blacklist identifies the at least one subset of computers; and

    sending, by the server, via the communications network the blacklist to a plurality of other computers,wherein network communication involving the at least one subset of computers is controlled at plurality of other computers utilizing the blacklist,wherein a network communication involving the at least one subset of computers is controlled utilizing a respective firewall of the at least one subset of computers such that a two-way quarantining is established in order to isolate out of compliance computers, andwherein a plurality of different subsets of computers is quarantined as a function of the computers themselves, thereby creating multiple quarantine zones, andwherein each of the quarantine zones is defined by domain name and implemented such that one of the computers on the blacklist and included in one of the quarantine zones defined by a first domain is denied from communicating with other computers in the first domain and is allowed to communicate with other computers in a second domain that is different from the first domain, and wherein the information identifying the at least one at least potentially out of compliance computer includes an Internet protocol (IP) address, a description of a behavior, and a severity associated with a violation of the policy that resulted in the at least one subset of computers being at least potentially out of compliance with the policy,wherein a network communication involving the at least one subset of computers is capable of being controlled utilizing a white list, the white list compiled utilizing the information.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×