Distribution of security policies for small to medium-sized organizations
First Claim
Patent Images
1. A method, comprising:
- providing a configuration procedure for an antivirus program to determine which parameters of a security policy have changed;
creating a self-contained configuration file based on the changed security policy parameters and underlying security programs that are affected by the changed security policy parameters;
determining which of the underlying security programs are affected based on the determined changed security policy parameters;
encapsulating the changed parameters and execution instructions associated with the affected programs to create the self-contained configuration file;
providing the self-contained configuration file in an e-mail to be communicated over a network from a server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and
receiving an error message if the self-contained configuration file is not installed on the client device.
13 Assignments
0 Petitions
Accused Products
Abstract
A security policy distribution system encapsulates parameters for a security policy and instructions for applying the parameters to a corresponding security program into a self-contained configuration file. When the self-contained configuration file is executed on behalf of a computer, the corresponding security program on the computer is updated with the parameters, thus distributing the security policy to the computer.
39 Citations
20 Claims
-
1. A method, comprising:
-
providing a configuration procedure for an antivirus program to determine which parameters of a security policy have changed; creating a self-contained configuration file based on the changed security policy parameters and underlying security programs that are affected by the changed security policy parameters; determining which of the underlying security programs are affected based on the determined changed security policy parameters; encapsulating the changed parameters and execution instructions associated with the affected programs to create the self-contained configuration file; providing the self-contained configuration file in an e-mail to be communicated over a network from a server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and receiving an error message if the self-contained configuration file is not installed on the client device. - View Dependent Claims (2, 3, 4, 5, 10, 11, 12, 13, 14, 15)
-
-
6. Computer executable instructions embodied in non-transitory computer readable media for execution in conjunction with a processor, the instructions being configured for performing operations, comprising:
-
providing a configuration procedure for an antivirus program to determine which parameters of a security policy have changed; creating a self-contained configuration file based on the changed security policy parameters and underlying security programs that are affected by the changed security policy parameters; determining which of the underlying security programs are affected based on the determined changed security policy parameters; encapsulating the changed parameters and execution instructions associated with the affected programs to create the self-contained configuration file; providing the self-contained configuration file in an e-mail to be communicated over a network from a server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and receiving an error message if the self-contained configuration file is not installed on the client device. - View Dependent Claims (7, 16, 17, 18, 19, 20)
-
-
8. A system comprising:
-
a processor; a memory coupled to the processor through a bus, wherein the system is configured to;
provide a configuration procedure for an antivirus program to determine which parameters of a security policy have changed;create a self-contained configuration file based on the changed security policy parameters and underlying security programs that are affected by the changed security policy parameters; determine which of the underlying security programs are affected based on the determined changed security policy parameters; encapsulate the changed parameters and execution instructions associated with the affected programs to create the self-contained configuration file; provide the self-contained configuration file in an e-mail to be communicated over a network from a server to a client device for subsequent installation at the client device, wherein a login script, which was previously modified on the client device, is provided to search for updated self-contained configuration files as part of a client login procedure, and wherein detection of the updated self-contained configuration files results in an application of particular parameters of the updated self-contained configuration files being applied against corresponding security software of the client device to replicate the security policy, and wherein the self-contained configuration file includes a first instruction that renders the self-contained configuration file unusable by the client device after a certain period of time, and wherein the self-contained configuration file includes a second instruction for deleting the self-contained configuration file once it is executed; and receive an error message if the self-contained configuration file is not installed on the client device. - View Dependent Claims (9)
-
Specification