VMware, Inc.
DYNAMICALLY UPDATING RULES FOR DETECTING COMPROMISED DEVICES
Last updated:
Abstract:
Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
Status:
Application
Type:
Utility
Filling date:
9 Sep 2021
Issue date:
30 Dec 2021