Method and system for merging security policies
A security policy and security event technology, applied in the field of security systems, can solve the problems of complex security policy interaction, error-prone, time-consuming security policy, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] A method and system for composing and enforcing security policies is provided. The collection of security policies to enforce represents the overall security policy of the organization. In one embodiment, a security policy with process set criteria and associated rules is provided to the security system. A process set criterion defines the properties of the process or application to which the associated rule applies. For example, a process set criterion can be a list of application names, or a regular expression defining matching application names. Other attributes of the application that can be used for process set criteria include the name of the directory containing the executable, the developer of the application (eg, Microsoft), registry entries associated with the application, and the like. If a process is executing an application that matches the process set criteria, the associated rule applies to that process. Each rule can have a rule type, condition and ac...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 