Palo Alto Networks, Inc.
PRIVILEGE ESCALATION PROTECTION
Last updated:
Abstract:
Techniques for privilege escalation protection are disclosed. In some embodiments, a system/process/computer program product for privilege escalation protection includes monitoring a process executed on a computing device, detecting an unauthorized change in a token value associated with the process, and performing an action based on a policy (e.g., a kernel protection security policy/rule(s), which can include a whitelisted set of processes and/or configured actions/responses to perform for other/non-whitelisted processes) in response to an unauthorized change in the token value associated with the process.
Status:
Application
Type:
Utility
Filling date:
30 Apr 2018
Issue date:
10 Oct 2019