【24h】

External monitoring of endpoint configuration compliance

机译:外部监视端点配置符合性

获取原文

摘要

We describe a system for externally monitoring endpoint configuration compliance of an end user system that provides a high assurance monitoring function and data. Typical approaches to monitoring for endpoint configuration compliance rely on the integrity of the endpoint's operating system and do not protect the monitoring function from subversion or spoofing by threats from within the monitored system. Our approach utilizes (1) a virtual machine architecture on the endpoint system to protect the monitoring function and (2) virtual machine introspection of the end user's environment. In this paper we describe our approach to external monitoring of endpoint configuration compliance, present the technical details of our monitoring system, and discuss some of the issues associated with external monitoring.
机译:我们描述了一种用于从外部监视最终用户系统的端点配置遵从性的系统,该系统可提供高度保证的监视功能和数据。监视终结点计算机配置遵从性的典型方法依赖于终结点计算机操作系统的完整性,并且不能保护监视功能免受来自被监视系统内部的威胁的颠覆或欺骗。我们的方法利用(1)端点系统上的虚拟机体系结构来保护监视功能,以及(2)对最终用户环境进行虚拟机内省。在本文中,我们描述了对端点配置符合性进行外部监视的方法,介绍了监视系统的技术细节,并讨论了与外部监视相关的一些问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号