Rapid7, Inc.
Honeypot asset cloning

Last updated:

Abstract:

Approaches provide for a management component to manage distribution of configuration information or other information in a network environment. For example, a request to deploy a security appliance configured to replicate functionality, behavior, and/or an identity of a computing device is received. The request includes selection criteria specifying one or more computing devices to replicate. Using the selection criteria, a computing device is identified as well as information associated with the computing device. The identified information is modified based on configuration requirements for a security appliance. The modified information is used to generate configuration information which is used to perform one of a number of actions, including, for example, configuring the security appliance or generating a new security appliance, among other such actions, where at least a portion of the operating behavior, functionality, or identification information of the security appliance substantially matches that of the identified computing device.

Status:
Grant
Type:

Utility

Filling date:

14 Sep 2018

Issue date:

30 Mar 2021