Application monitoring prioritization
First Claim
1. A computer-implemented method comprising:
- determining a first criticality ranking for a first endpoint in a datacenter;
determining a second criticality ranking for a second endpoint; and
when the first criticality ranking and the second criticality ranking are determined to be a same criticality ranking, executing a tie-breaker process by;
determining a first secondary value for the first endpoint;
determining a second secondary value for the second endpoint;
determining, based on the first criticality ranking, the first secondary value, the second criticality ranking, and the second secondary value, that one of the first endpoint and the second endpoint is a higher priority endpoint; and
triaging the higher priority endpoint before the other of the first endpoint and the second endpoint to mitigate endpoint damage to the datacenter if the datacenter becomes compromised.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
2 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
determining a first criticality ranking for a first endpoint in a datacenter; determining a second criticality ranking for a second endpoint; and when the first criticality ranking and the second criticality ranking are determined to be a same criticality ranking, executing a tie-breaker process by; determining a first secondary value for the first endpoint; determining a second secondary value for the second endpoint; determining, based on the first criticality ranking, the first secondary value, the second criticality ranking, and the second secondary value, that one of the first endpoint and the second endpoint is a higher priority endpoint; and triaging the higher priority endpoint before the other of the first endpoint and the second endpoint to mitigate endpoint damage to the datacenter if the datacenter becomes compromised. - View Dependent Claims (2, 3, 4, 5, 6, 18)
-
-
7. A non-transitory computer-readable medium having computer readable instructions that, when executed by a processor of a computer, cause the computer to:
-
determine a first criticality ranking for a first endpoint in a datacenter; determine a second criticality ranking for a second endpoint; and when the first criticality ranking and the second criticality ranking are determined to be a same criticality ranking, execute a tie-breaker process by; determining a first secondary value for the first endpoint; determining a second secondary value for the second endpoint; determining, based on the first criticality ranking, the first secondary value, the first criticality ranking, and the second secondary value, that one of the first endpoint and the second endpoint is a higher priority endpoint; and triaging the higher priority endpoint before the other of the first endpoint and the second endpoint to mitigate endpoint damage to the datacenter if the datacenter becomes compromised. - View Dependent Claims (8, 9, 10, 11, 12, 19)
-
-
13. A system comprising:
-
a processor; memory including instructions that when executed by the processor, cause the system to; determine a first criticality ranking for a first endpoint in a datacenter; determine a second criticality ranking for a second endpoint; and when the first criticality ranking and the second criticality ranking are determined to be a same criticality ranking, execute a tie-breaker process by; determining a first secondary value for the first endpoint; determining a second secondary value for the second endpoint; determining, based on the first criticality ranking, the first secondary value, the second criticality ranking, and the second secondary value, that one of the first endpoint and the second endpoint is a higher priority endpoint; and triaging the higher priority endpoint before the other of the first endpoint and the second endpoint to mitigate endpoint damage to the datacenter if the datacenter becomes compromised. - View Dependent Claims (14, 15, 16, 17, 20)
-
Specification