Generating a configuration file based upon an application registry
First Claim
Patent Images
1. A computer executed method for generating a configuration file on a server, comprising:
- determining, by a processor, which users associated with a predetermined group are logged into the server;
determining, by the processor, for each user logged into the server associated with the predetermined group, which applications each user is running by;
searching, by the processor, for a registry directory associated with each user, anddetermining, by the processor, which applications each user is running based upon registry files associated with the registry directory,generating, by the processor, the configuration file based upon which applications each user is running, the configuration file indicating at least one monitoring target selected from at least one of a data entry in a database system, a network infrastructure element and a network security process according to a lookup table associating the applications each user is running with one of the monitoring targets;
storing the configuration file at a predefined location in a memory; and
configuring a monitoring application to monitor one or more monitoring targets based upon which applications each user is running by accessing the configuration file at the predefined location in the memory upon initiating the monitoring application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are provided for generating a configuration file based upon an application registry. The method, for example, includes, but is not limited to, determining, by a processor, which users are logged into the server that are associated with a predetermined group, determining, by the processor, for each user logged into the server associated with the predetermined group, which applications each user is running, and generating, by the processor, the configuration file based upon which applications each user is running and storing the registry file in a memory.
-
Citations
16 Claims
-
1. A computer executed method for generating a configuration file on a server, comprising:
-
determining, by a processor, which users associated with a predetermined group are logged into the server; determining, by the processor, for each user logged into the server associated with the predetermined group, which applications each user is running by; searching, by the processor, for a registry directory associated with each user, and determining, by the processor, which applications each user is running based upon registry files associated with the registry directory, generating, by the processor, the configuration file based upon which applications each user is running, the configuration file indicating at least one monitoring target selected from at least one of a data entry in a database system, a network infrastructure element and a network security process according to a lookup table associating the applications each user is running with one of the monitoring targets; storing the configuration file at a predefined location in a memory; and configuring a monitoring application to monitor one or more monitoring targets based upon which applications each user is running by accessing the configuration file at the predefined location in the memory upon initiating the monitoring application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for generating a configuration file, comprising:
a server, comprising; a memory; and a processor communicatively coupled to the memory, the processor configured to; determine which of one or more users logged into the system to monitor; determine which applications the determined one or more users are running by; locating a registry directory associated with each of the determined one or more users; and determining which applications the determined one or more users are running based upon registry files located in the registry directory; generate the configuration file based upon the determined applications, the configuration file indicating at least one monitoring target selected from at least one of a data entry in a database system, a network infrastructure element and a network security process according to a lookup table associating the applications each user is running with one of the monitoring targets; store the configuration file at a predefined location in the memory; and initiate a monitoring application to monitor the applications the determined one or more users are running by accessing the configuration file at the predefined location in the memory upon initiating the monitoring application. - View Dependent Claims (7, 8, 9, 10)
-
11. A server comprising a processor and a memory, the processor configured to execute a monitoring application, the processor further configured to:
-
determine a group of users logged into the server; locate a registry directory for each user in the group; determine one or more processes each user in the group is running on the server based upon registry files located in the respective registry directories; determine one or more monitoring targets based upon the one or more processes each user in the group is running; generate a configuration file based upon the one or more monitoring targets, the configuration file indicating at least one monitoring target selected from at least one of a data entry in a database system, a network infrastructure element and a network security process according to a lookup table associating the applications each user is running with one of the monitoring targets; storing the configuration file at a predefined location in the memory; and
initiate the monitoring application by accessing the configuration file at the predefined location in the memory upon initiating the monitoring application. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification