Scanning and remediating configuration settings of a device using a policy-driven approach
a technology of configuration settings and policy, applied in the direction of digital transmission, securing communication, electrical equipment, etc., can solve the problems of becoming increasingly difficult to effectively secure information contained on electronic devices as well as information transmitted to and from electronic devices, and conventional cybersecurity systems often fail to adequately address potential security issues, and conventional diagnostic tools are limited to providing a report of settings or configurations on a device that are out of compliance with a known set of standards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019]One or more embodiments of the present disclosure include a configuration management system and configuration management agents that facilitate effective and flexible enforcement of security policies on a client device (or other computing device). For example, in one or more embodiments, a configuration management agent (or simply “agent”) can identify a plurality of security policies including configuration states associated with configuration settings of the client device. Upon receiving a request to implement the security policies on the client device, the agent can perform operations to enforce the configuration states defined by the security policies. In particular, the agent can enforce the configuration states defined by the security policies by checking and fixing a configuration setting associated with the configuration state. Indeed, the agent can enforce security policies by performing idempotent operations in which a check and a fix of a configuration setting are t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


