Drawings
illustrates an item 100 (deleted) in accordance with one embodiment.
Parts List
102
client facility
104
gateway facility
106
network
108
security facility
110
network control facility
112
application
114
116
database
118
policy facility
120
remedial action facility
122
network access control
124
network access rules
126
server
128
laptop computer
130
smart device
Terms/Definitions
IDE files
reported information
supplemental file
threat notice
block list
commands, definitions, or instructions
associated malicious code files
plurality
established rules
network resources
rules or policies
network access locations
desktop computer
user type
gateway facility
known malicious code
computing device
test file
particular enterprise
firmware
intranet
communication
combination
most recent malicious code definitions
applications and files
same network location
second embodiment
update
all the rules
resides
streaming file
certain types
block
one network
actions
protection
level
preparedness
client computer facility
planned update
network
same network
new IDE file
desired network location
action upon
rules
web browser
user request
successful network access request
interpretation
network control facility
user network access request
recording facility
at least one command
demand basis
updated rules
remedial action request architecture
data file and command file
data file
policy facility
malicious file
rules provider
computer facility
IDE management facility
network computing device
allowed list
command
other activities
external network
control
malicious application
access databases
received malicious code alert
network site reputation database
remedial action facility
generic rule
black list
set time period
streaming file or portions
update facility
attempt
network access port
denied network access
other client computing facilities
acceptable network site database
at least one instruction
organization hierarchy
tablet computer
security management facility
database
testing facility
file information
network access capability
result
type
IDE management
hardware
unacceptable network site database
network access rules management facility
generic set
legitimate application
virus identities
requested network site
instant messenger access
streaming files
network access device
action
malicious code
ability
blocks
overall security
gateway
certain applications and files
malicious applications
denied network location
streaming file management
access rights
at least part
parsed instructions
list
parsed data
commands
policy database
access rules
example
outgoing files
stored streaming file
additional actions
requested access
periodic basis
new updates
network access requests
white list
direct control
application access request
capability
IDE information
network access rules
known malicious code information
testing information
malicious code scan
computing facility
number
security configurations
at least one protocol
network access
able discover malicious code
rapid updating
updating
location
network locations
computer facilities
malicious code infected
corrective action
instructions
enterprise wide access rules
management
fixed periodic basis
enterprise rules
management facility
access request denial
external networks
address information
network accesses
test management facility
subset
rule evaluation
received information
application
requested network location
rules data base
reaction
external computing facilities
text file
client computing facilities
allow list
policy
website
user
laptop computer
enterprise’s
data
internet
access request
resident network
sporting website
only the personnel
adequate protection
document application or document file
individual client computing facility
transmitted
updates
peer-to-peer access request
scanning files or applications
outgoing file
other network locations
distribution system
additional attempts
connectivity
new malicious code
existing IDE file
reporting facility
files
Peer-to-Peer network
automatic and manual methods
network location
checking streaming files
malicious application network access
IDE file
security management
wireless network
other computer facilities
various aspects
access rights and permissions
remedial actions
system administrator’s
distribution
incoming files
test files
entire enterprise
other rule evaluation method
network access rules management
blocked access
demand
malicious code descriptions
request
regular expression rule evaluation, virus description language
predefined rule sets
defense
rule
software, hardware
continual updating
IDE provider
access control
steps
protocol
software file
access
auto-requested network request
application capabilities
computer facility type
network access request
wired network
first command
external client computing facilities
requested website
FTP access
databases
only support personnel
bandwidth
threats
malicious application information
denied network access request
parsed information
isolation
requested network site interaction
altered malicious code
additional malicious code
continual defense
other security measures
outcome
IDE definitions
determination
policy management facility
command file
alert
more than one command
information file
firmware application
network administrator
other client computing facilities and networks
smart phone computing device
external computer devices
second network location
sporting websites
quarantine
support
second level
network access control
databases and access rules
client facility
applications
similar manner
deny access rules
enterprise
network access policies
websites
identified application
incoming file
information
definitions
contents
certain actions
alert basis
networks
different network locations
predefined rules
external computing facility
known or potential malicious code
search
source
embodiment
possibility
timely updates
data or commands
malicious code information
departments
file
facilities
more than one level
software application
customers
virus identity file
first embodiment
various actions
computing facilities
internal client computing facility
other networks
smart device
command or command file
security facility
sending
denied network application request
indication
handheld computer
rules evaluation
IM activity
application type
defined access rules
source application
client computing facility
known malicious code file
network access permissions
server
acceptability
policies
work
facility
different access location
second command
information store
executing applications
associated client facilities
rules evaluation request
embodiments
testing
malicious application protection
denied access
provider
scanning
system administrator
databases and text files
remedial action architecture
latest malicious code
client computer facilities
file or application