Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for setting audit configuration items

A technology of configuration items and items, which is applied in the direction of program control design, calculation, program control devices, etc., can solve the problems of cumbersome setting process and low setting efficiency of audit-type configuration items, so as to improve setting efficiency, improve efficiency, improve efficiency and The effect of accuracy

Active Publication Date: 2021-05-25
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a method and system for setting audit-type configuration items to solve the problems of cumbersome setting process and low setting efficiency of audit-type configuration items in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for setting audit configuration items
  • A method and system for setting audit configuration items
  • A method and system for setting audit configuration items

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] see figure 1 , figure 1 It is a schematic flowchart of a method for setting audit-type configuration items provided in the embodiment of the present application. Depend on figure 1 It can be seen that the setting method of the audit configuration item in this embodiment mainly includes the following process:

[0053] S1: Obtain the mapping relationship between audit-type configuration items and advanced audit policies in the Windows system.

[0054] For advanced audit policies in Windows systems, see figure 2 ,Depend on figure 2 It can be seen that the advanced audit policy includes multiple types: account login, account management, detailed tracking, DS access, login / logout, etc.

[0055] The audit configuration item in the Windows system, that is, the audit policy in the group policy, the schematic diagram of the audit configuration item in this embodiment can be found in image 3 shown.

[0056] Through repeated black-box tests, it can be seen that one audit...

Embodiment 2

[0086] exist Figure 1-Figure 3 On the basis of the illustrated embodiment see Figure 4 , Figure 4 It is a schematic structural diagram of a system for setting audit configuration items provided by the embodiment of this application. Depend on Figure 4 It can be seen that the system for setting audit-type configuration items in this application mainly includes four parts: a mapping relationship acquisition module, an advanced audit policy acquisition module, an advanced audit policy configuration item setting module, and an audit-type configuration item setting module.

[0087] Among them, the mapping relationship acquisition module is used to obtain the mapping relationship between the audit configuration item and the advanced audit policy in the Windows system; the advanced audit policy acquisition module is used to obtain multiple advanced audit configuration items matching the target audit configuration item according to the mapping relationship. The audit strategy; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method and system for setting audit-type configuration items. The method includes: obtaining the mapping relationship between the audit-type configuration items and advanced audit policies in the Windows system; obtaining the matching with the target audit-type configuration items according to the mapping relationship multiple advanced audit policies; set the values ​​of the configuration items in the multiple advanced audit policies that match the target audit configuration items to the first set value; according to the mapping relationship and the first set value, set the target audit The value of the type configuration item is set to the second set value, and the second set value is the same as the first set value. The system includes four parts: mapping relationship acquisition module, advanced audit policy acquisition module, advanced audit policy configuration item setting module and audit configuration item setting module. Through the method and system in this application, the use of SYSTEM authority can be avoided, which is conducive to improving the efficiency and accuracy of setting configuration items.

Description

technical field [0001] The present application relates to the technical field of computer security, in particular to a method and system for setting audit-type configuration items. Background technique [0002] In the field of computer security technology, security baseline inspection and security baseline repair are usually required. The so-called security baseline can be understood as the minimum security requirements. The security baseline in the computer is the detailed description of how to configure and manage the computer in the Microsoft security system, windows server2003 and ISA server 2004. A security baseline in a computer implements trusted computer components on a computer and describes all relevant configuration settings to enable secure operation. Elements of a security baseline typically include: server and application settings, configuration of operating system components, permissions and entitlement assignments, and management rules. In security baseline...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/445G06F9/4401
CPCG06F9/4406G06F9/44505
Inventor 王唯融
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD