×

Discovery and classification of enterprise assets via host characteristics

  • US 9,830,458 B2
  • Filed: 04/25/2014
  • Issued: 11/28/2017
  • Est. Priority Date: 04/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for managing a plurality of computing assets, the method comprising:

  • identifying a plurality of computing assets of an enterprise network from a list of network addresses associated with each respective computing asset by probing each network address for digital certificate information presented by the respective computing asset in response to the probing;

    for at least a first computing asset of the one or more of the computing assets;

    identifying, by operation of at least one computer processor, one or more attributes associated with a digital certificate installed on the first computing asset,identifying one or more configuration attributes of the first computing asset, wherein the one or more configuration attributes include a plurality of network addresses configured on the first computing asset, an indication of whether the plurality of network addresses are reachable outside of the enterprise network, an indication of applications and operating systems installed on the first computing asset, and naming conventions associated with the first asset, andassigning a classification to the first computing asset based on the attributes of the identified digital certificate and based on the configuration attributes of the computing asset, wherein the classification is used to prioritize security incidents occurring on the plurality of computing assets;

    receiving one or more security incidents for a set of the one or more computing assets, wherein the set is restricted to a first assigned classification of the one or more computing assets, and wherein the one or more security incidents occurred over a specified time period; and

    prioritizing the one or more security incidents based on the first assigned classification and an underlying event associated with each of the one or more security incidents.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×