Off-line compliance security audit method of IT simulation infrastructure
A technology of security auditing and infrastructure, applied in the field of network security, to achieve high security and security effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0018] As shown in Figure 1, an IT simulation infrastructure off-line compliance security audit method described in the embodiment of the present invention includes the following steps
[0019] 1) Collection of configuration information: Before the offline physical examination, the configuration information of the detected device needs to be collected; the collected information includes the current configuration of the device and other status information about ports and routes. The collection method is to log in to the detected device and enter For the specified command, the configuration information is archived in the form of a txt text document or html to prepare for importing the device; when a special device type is encountered, after the information is collected, it needs to be converted into the command format of the supported device type;
[0020] 2) Import / create network topology: automatically import network topology through configuration commands, automatically genera...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com