摘要:
Techniques for discovering, connecting to, disconnecting from, reconnecting to, updating, and removing workspaces are described. In one embodiment, a list of discovered workspaces is maintained on a user device. Shortcuts for resources corresponding to each respective one of the discovered workspaces are integrated into a user interface of the user device. A request to access one of the resources contained in one of the discovered workspaces is received. Responsive to receiving the request, a connection from the user device to one or more resource hosts containing the resources corresponding to the indicated one of the discovered workspaces is opened. Access from the user device to the resources stored on the resource host(s) corresponding to the indicated one of the discovered workspaces is enabled by presenting shortcuts for resources corresponding to the discovered workspaces as though they were local resources.
摘要:
Techniques for discovering, connecting to, disconnecting from, reconnecting to, updating, and removing workspaces are described. In one embodiment, a list of discovered workspaces is maintained on a user device. Shortcuts for resources corresponding to each respective one of the discovered workspaces are integrated into a user interface of the user device. A request to access one of the resources contained in one of the discovered workspaces is received. Responsive to receiving the request, a connection from the user device to one or more resource hosts containing the resources corresponding to the indicated one of the discovered workspaces is opened. Access from the user device to the resources stored on the resource host(s) corresponding to the indicated one of the discovered workspaces is enabled by presenting shortcuts for resources corresponding to the discovered workspaces as though they were local resources.
摘要:
A method and system that enables a security policy to separate developer-provided detection criteria from an administrator-provided custom policy is provided. The security system allows a developer of detection criteria to provide a signature file containing the signatures that are available for use by a security policy. The security system also allows an administrator of a computer system to specify a custom policy that uses the signatures of the signature file. The developer may distribute the signature file to host computer systems independently of the administrator's distribution of the rules of the custom policy to the host computer systems. When a security enforcement event occurs at the host computer system, the security system applies the rules of the security policy to the event.
摘要:
A method and system that enables a security policy to separate developer-provided detection criteria from an administrator-provided custom policy is provided. The security system allows a developer of detection criteria to provide a signature file containing the signatures that are available for use by a security policy. The security system also allows an administrator of a computer system to specify a custom policy that uses the signatures of the signature file. The developer may distribute the signature file to host computer systems independently of the administrator's distribution of the rules of the custom policy to the host computer systems. When a security enforcement event occurs at the host computer system, the security system applies the rules of the security policy to the event.