FIELD: information technology.
SUBSTANCE: system for setting up a computer system according to a security policy comprises policy application means for determining computer system configuration data and subsequent transmission thereof to instruction generating means, setting up the computer system according to a selected security policy, checking the proper operation of the computer system after the setup; a security policy database; instruction generating means for selecting a security policy according to the defined computer system configuration and existing security policies from the security policy database, generating an instruction upon the change of the defined computer system configuration, where at least one executable instruction is generated in the form of a self-launching file; files and distribution packages are added to the generated instruction for the correct execution of the generated executable instruction.
EFFECT: corporate network security.
10 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR AUTOMATIC REGULATION OF RULES FOR CONTROLLING APPLICATIONS | 2013 |
|
RU2589852C2 |
SYSTEM AND METHOD FOR DEPLOYING PRECONFIGURED SOFTWARE | 2012 |
|
RU2541935C2 |
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE | 2012 |
|
RU2523113C1 |
METHOD OF CONTROLLING APPLICATIONS | 2015 |
|
RU2587424C1 |
SYSTEM AND METHOD FOR FORMING A SECURITY MONITOR | 2021 |
|
RU2773108C1 |
SYSTEM AND METHOD OF DETECTING DIRECTED ATTACK ON CORPORATE INFRASTRUCTURE | 2013 |
|
RU2587426C2 |
SYSTEM AND METHOD FOR ASSESSING RESOURCES IN COMPUTER NETWORK WITH POSITION OF OBJECTS OF INTEREST | 2013 |
|
RU2589863C2 |
METHOD OF PROVIDING SAFE EXECUTION OF SCRIPT FILE | 2014 |
|
RU2584507C1 |
SYSTEM AND METHOD FOR APPLYING FILE ACCESS RULES DURING TRANSFER THEREOF BETWEEN COMPUTERS | 2013 |
|
RU2573785C2 |
SYSTEM AND METHOD OF ENCODING FILES FROM ENCRYPTED DRIVE | 2013 |
|
RU2559728C2 |
Authors
Dates
2016-01-27—Published
2014-07-25—Filed