Back

Remedial Action Against Malicious Code at a Client Facility


Drawings

Brief Description:

illustrates an item 100 (deleted) in accordance with one embodiment.

Detailed Description:

Parts List

102

client facility

104

gateway facility

106

network

108

security facility

110

network control facility

112

application

114

116

database

118

policy facility

120

remedial action facility

122

network access control

124

network access rules

126

server

128

laptop computer

130

smart device


Terms/Definitions

IDE files

reported information

supplemental file

threat notice

block list

commands, definitions, or instructions

associated malicious code files

plurality

established rules

network resources

rules or policies

network access locations

desktop computer

user type

gateway facility

known malicious code

computing device

test file

particular enterprise

firmware

intranet

communication

combination

most recent malicious code definitions

applications and files

same network location

second embodiment

update

all the rules

resides

streaming file

certain types

block

one network

actions

protection

level

preparedness

client computer facility

planned update

network

same network

new IDE file

desired network location

action upon

rules

web browser

user request

successful network access request

interpretation

network control facility

user network access request

recording facility

at least one command

demand basis

updated rules

remedial action request architecture

data file and command file

data file

policy facility

malicious file

rules provider

computer facility

IDE management facility

network computing device

allowed list

command

other activities

external network

control

malicious application

access databases

received malicious code alert

network site reputation database

remedial action facility

generic rule

black list

set time period

streaming file or portions

update facility

attempt

network access port

denied network access

other client computing facilities

acceptable network site database

at least one instruction

organization hierarchy

tablet computer

security management facility

database

testing facility

file information

network access capability

result

type

IDE management

hardware

unacceptable network site database

network access rules management facility

generic set

legitimate application

virus identities

requested network site

instant messenger access

streaming files

network access device

action

malicious code

ability

blocks

overall security

gateway

certain applications and files

malicious applications

denied network location

streaming file management

access rights

at least part

parsed instructions

list

parsed data

commands

policy database

access rules

example

outgoing files

stored streaming file

additional actions

requested access

periodic basis

new updates

network access requests

white list

direct control

application access request

capability

IDE information

network access rules

known malicious code information

testing information

malicious code scan

computing facility

number

security configurations

at least one protocol

network access

able discover malicious code

rapid updating

updating

location

network locations

computer facilities

malicious code infected

corrective action

instructions

enterprise wide access rules

management

fixed periodic basis

enterprise rules

management facility

access request denial

external networks

address information

network accesses

test management facility

subset

rule evaluation

received information

application

requested network location

rules data base

reaction

external computing facilities

text file

client computing facilities

allow list

policy

website

user

laptop computer

enterprise’s

data

internet

access request

resident network

sporting website

only the personnel

adequate protection

document application or document file

individual client computing facility

transmitted

updates

peer-to-peer access request

scanning files or applications

outgoing file

other network locations

distribution system

additional attempts

connectivity

new malicious code

existing IDE file

reporting facility

files

Peer-to-Peer network

automatic and manual methods

network location

checking streaming files

malicious application network access

IDE file

security management

wireless network

other computer facilities

various aspects

access rights and permissions

remedial actions

system administrator’s

distribution

incoming files

test files

entire enterprise

other rule evaluation method

network access rules management

blocked access

demand

malicious code descriptions

request

regular expression rule evaluation, virus description language

predefined rule sets

defense

rule

software, hardware

continual updating

IDE provider

access control

steps

protocol

software file

access

auto-requested network request

application capabilities

computer facility type

network access request

wired network

first command

external client computing facilities

requested website

FTP access

databases

only support personnel

bandwidth

threats

malicious application information

denied network access request

parsed information

isolation

requested network site interaction

altered malicious code

additional malicious code

continual defense

other security measures

outcome

IDE definitions

determination

policy management facility

command file

alert

more than one command

information file

firmware application

network administrator

other client computing facilities and networks

smart phone computing device

external computer devices

second network location

sporting websites

quarantine

support

second level

network access control

databases and access rules

client facility

applications

similar manner

deny access rules

enterprise

network access policies

websites

identified application

incoming file

information

definitions

contents

certain actions

alert basis

networks

different network locations

predefined rules

external computing facility

known or potential malicious code

search

source

embodiment

possibility

timely updates

data or commands

malicious code information

departments

file

facilities

more than one level

software application

customers

virus identity file

first embodiment

various actions

computing facilities

internal client computing facility

other networks

smart device

command or command file

security facility

sending

denied network application request

indication

handheld computer

rules evaluation

IM activity

application type

defined access rules

source application

client computing facility

known malicious code file

network access permissions

server

acceptability

policies

work

facility

different access location

second command

information store

executing applications

associated client facilities

rules evaluation request

embodiments

testing

malicious application protection

denied access

provider

scanning

system administrator

databases and text files

remedial action architecture

latest malicious code

client computer facilities

file or application