×

Endpoint management using trust rating data

  • US 8,239,915 B1
  • Filed: 06/30/2006
  • Issued: 08/07/2012
  • Est. Priority Date: 06/30/2006
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory machine-readable medium encoded with instructions, that when executed by one or more processors, cause the processor to carry out a process for endpoint management, the process comprising:

  • receiving from an endpoint an endpoint request to join a managed network, the endpoint identifying to a server in the request one or more applications currently on the endpoint;

    determining if the identified applications are represented in a compliance policy database, wherein the compliance policy database comprises a list of applications and one or more security policy rules associated with each application in the list of applications that impose required settings for the application that must be met for providing access to the managed network;

    in response to a determination that an identified application is not represented in the compliance policy database;

    querying a content provider service to obtain one or more factors for the application not represented in the compliance policy database for use in computing a trust rating for the application not represented in the compliance policy database, or a pre-computed trust rating for the application not represented in the compliance policy database;

    determining a trust rating for the application not represented in the compliance policy database based on the one or more factors for the application not represented in the compliance policy database or the pre-computed trust rating; and

    dynamically generating one or more security policy rules for the application represented in the compliance policy database based on the determined trust rating, the one or more security policy rules for use in a managed endpoint compliance scheme; and

    in response to a determination that an identified application is represented in the compliance policy database;

    retrieving the one or more security policy rules associated with the represented application from the compliance policy database.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×