×

Systems and methods for predicting the impact of security-policy changes on users

  • US 9,246,941 B1
  • Filed: 02/27/2013
  • Issued: 01/26/2016
  • Est. Priority Date: 02/27/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for predicting the impact of security-policy changes on users, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying at least one end-user computing system that is potentially to be regulated using a new security policy potentially to be activated by an administrator of the end-user computing system;

    predicting, prior to activating the new security policy on the end-user computing system, how activating the new security policy will impact at least one user of the end-user computing system by;

    deploying the new security policy to the end-user computing system;

    monitoring, over a time period of live user activity on the end-user computing system, at least one behavior of the user on the end-user computing system for evaluation against the new security policy responsive to determining that the new security policy is potentially to be activated;

    determining, without notifying the user of the new security policy and without having first activated the new security policy, how activating the new security policy on the end-user computing system would have impacted the behavior by;

    detecting, at the end-user computing system, a condition that would have triggered enforcement of the new security policy on the end-user computing system;

    determining that the behavior comprised the condition, caused the condition, and/or occurred simultaneously with the condition;

    determining, in response to detecting the condition that would have triggered enforcement of the new security policy, that enforcement of the new security policy on the end-user computing system would have impacted the behavior;

    notifying, based at least in part on predicting how activating the new security policy will impact the user, the administrator of the end-user computing system with information that indicates how activating the new security policy will impact future user behavior.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×