System and method for resolving conflicts between application control rules
First Claim
1. A computer-implemented method for configuring application control rules, comprising:
- installing security software on a plurality of computing devices in a network, wherein the security software is configured to control execution of applications on the computing devices using a plurality of application control rules, each computing device being associated with one or more user accounts, each user account having a first unique identifier, and each application having a second unique identifier;
during launching of at least one application on at least one of the plurality of computing devices for testing a new application control rule, transmitting, by the security software from each of the plurality of computing devices in the network, to an administrative server, information relating to one or more user account records and software applications deployed on each computing device for the identification and resolution of conflicts between the new application control rule and one or more existing application control rules, wherein the one or more existing application control rules comprise information linking at least one or more applications each having the second unique identifier with each user account having the first unique identifier, and the conflict is resolved by assigning different priorities to the conflicting rules;
based at least upon the second unique identifier corresponding to the at least one application launched, receiving from the administrative server, by the security software on the at least one of the plurality of computing devices, an application control rule reconfigured with a lower or higher priority than one or more conflicting application control rules to eliminate a conflict between the new application control rule and the one or more existing application control rules; and
applying, by the security software, the one or more application control rules to the applications on the computing devices based on the priorities of said application control rules.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems, methods and computer program products for configuring application control rules. An example method includes, in response to testing a new application control rule, transmitting, from each of a plurality of computing devices in a network, information relating to software applications deployed on each computing device and one or more application control rules including the new application control rule associated with the software applications, each of the one or more application control rules having a priority, the collected information identifying at least one conflict between at least one application control rule and the new application control rule in executing one of the software applications; and receiving, by at least one of the plurality of computing devices, the new application control rule reconfigured with a lower priority to eliminate the at least one conflict.
17 Citations
20 Claims
-
1. A computer-implemented method for configuring application control rules, comprising:
-
installing security software on a plurality of computing devices in a network, wherein the security software is configured to control execution of applications on the computing devices using a plurality of application control rules, each computing device being associated with one or more user accounts, each user account having a first unique identifier, and each application having a second unique identifier; during launching of at least one application on at least one of the plurality of computing devices for testing a new application control rule, transmitting, by the security software from each of the plurality of computing devices in the network, to an administrative server, information relating to one or more user account records and software applications deployed on each computing device for the identification and resolution of conflicts between the new application control rule and one or more existing application control rules, wherein the one or more existing application control rules comprise information linking at least one or more applications each having the second unique identifier with each user account having the first unique identifier, and the conflict is resolved by assigning different priorities to the conflicting rules; based at least upon the second unique identifier corresponding to the at least one application launched, receiving from the administrative server, by the security software on the at least one of the plurality of computing devices, an application control rule reconfigured with a lower or higher priority than one or more conflicting application control rules to eliminate a conflict between the new application control rule and the one or more existing application control rules; and applying, by the security software, the one or more application control rules to the applications on the computing devices based on the priorities of said application control rules. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for configuring application control rules, the system comprising:
-
a hardware processor configured to; install security software on a plurality of computing devices in a network, wherein the security software is configured to control execution of applications on the computing devices using a plurality of application control rules, each computing device being associated with one or more user accounts, each user account having a first unique identifier, and each application having a second unique identifier; during launching of at least one application on at least one of the plurality of computing devices for testing a new application control rule, transmit, by the security software from each of the plurality of computing devices in the network, to an administrative server, information relating to one or more user account records and software applications deployed on each computing device for the identification and resolution of conflicts between the new application control rule and one or more existing application control rules, wherein the one or more existing application control rules comprise information linking at least one or more applications each having the second unique identifier with each user account having the first unique identifier, and the conflict is resolved by assigning different priorities to the conflicting rules; based at least upon the second unique identifier corresponding to the at least one application launched, receive from the administrative server, by the security software on the at least one of the plurality of computing devices, an application control rule reconfigured with a lower or higher priority than one or more conflicting application control rules to eliminate a conflict between the new application control rule and the one or more existing application control rules; and apply, by the security software, the one or more application control rules to the applications on the computing devices based on the priorities of said application control rules. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having a computer program product stored thereon, the computer-readable storage medium comprising computer-executable instructions for configuring application control rules, the instructions comprising:
-
installing security software on a plurality of computing devices in a network, wherein the security software is configured to control execution of applications on the computing devices using a plurality of application control rules, each computing device being associated with one or more user accounts, each user account having a first unique identifier, and each application having a second unique identifier; during launching of at least one application on at least one of the plurality of computing devices for testing a new application control rule, transmitting, by the security software from each of the plurality of computing devices in the network, to an administrative server, information relating to one or more user account records and software applications deployed on each computing device for the identification and resolution of conflicts between the new application control rule and one or more existing application control rules, wherein the one or more existing application control rules comprise information linking at least one or more applications each having the second unique identifier with each user account having the first unique identifier, and the conflict is resolved by assigning different priorities to the conflicting rules; based at least upon the second unique identifier corresponding to the at least one application launched, receiving from the administrative server, by the security software on the at least one of the plurality of computing devices, an application control rule reconfigured with a lower or higher priority than one or more conflicting application control rules to eliminate a conflict between the new application control rule and the one or more existing application control rules; and applying, by the security software, the one or more application control rules to the applications on the computing devices based on the priorities of said application control rules. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification