Abstract:
Described is a technology for managing network security by having network clients that are capable of self-assessment assess themselves for security risks and/or security vulnerabilities. Other clients may be remotely assessed for security risks and/or security vulnerabilities. Assessments may include antimalware scans, vulnerability assessment, and/or port scans. The results of the self-assessments and remote assessments are combined into a data set (e.g., a view) indicative of the network security state. In this manner, for example, significant network resources are conserved by allowing those clients capable of self-assessment to assess themselves and thereafter only provide their self-assessment results. Clients capable of self-assessment may also be remotely assessed, to determine whether any discrepancies exist between their remote assessments and self-assessments. Clients may be discovered, along with their self-assessment capabilities, by network communication.
Abstract:
Described is a technology for managing network security by having network clients that are capable of self-assessment assess themselves for security risks and/or security vulnerabilities. Other clients may be remotely assessed for security risks and/or security vulnerabilities. Assessments may include antimalware scans, vulnerability assessment, and/or port scans. The results of the self-assessments and remote assessments are combined into a data set (e.g., a view) indicative of the network security state. In this manner, for example, significant network resources are conserved by allowing those clients capable of self-assessment to assess themselves and thereafter only provide their self-assessment results. Clients capable of self-assessment may also be remotely assessed, to determine whether any discrepancies exist between their remote assessments and self-assessments. Clients may be discovered, along with their self-assessment capabilities, by network communication.
Abstract:
Various embodiments of the invention are directed to closely integrating functionality between an internet server and a WebDAV tool. Areas of specific focus in this document include delegation of duties between the internet server and the WebDAV tool, efficient management of a resource's content-type, support for segregation of a namespace into separate virtual roots, and determinations of whether to invoke certain processing extensions to handle requests for a given HTTP verb.
Abstract:
Various embodiments of the invention are directed to closely integrating functionality between an internet server and a WebDAV tool. Areas of specific focus in this document include delegation of duties between the internet server and the WebDAV tool, efficient management of a resource's content-type, support for segregation of a namespace into separate virtual roots, and determinations of whether to invoke certain processing extensions to handle requests for a given HTTP verb.
Abstract:
Techniques for secure software deployments are described. In one implementation, a software package is published to an installation portion of a networked environment and stored. Similarly, an applicability rule (or policy) associated with the software package is published to the installation portion and stored. During a periodic synchronization between a host device and the installation portion, the applicability rule is communicated, and a determination is made whether the host device is intended to receive the software package based on the applicability rule communicated during the periodic synchronization. If the applicability rule is satisfied, the software package is installed on the host device. In a further implementation, the software package may be installed on the host device via a communication channel that is normally designated for non-routine communications, such as security packet updates and other administrative functions.
Abstract:
Various embodiments of the invention are directed to closely integrating functionality between an internet server and a WebDAV tool. Areas of specific focus in this document include delegation of duties between the internet server and the WebDAV tool, efficient management of a resource's content-type, support for segregation of a namespace into separate virtual roots, and determinations of whether to invoke certain processing extensions to handle requests for a given HTTP verb.
Abstract:
Methods and systems for generating and sending an XML document are described. In a specific implementation, methods and systems for responding to an XML client request utilize an XML response generator that includes one or more request method objects. There is one object for each particular type of client request that might be received. Each request method object knows and gathers the data that is needed to respond to its particular associated client request. An emitter object receives calls from the request method object and translates the data that it receives into response portions that are in proper XML syntactic form.
Abstract:
A method is described of converting a file system path corresponding to a resource to a uniform resource locator (URL) corresponding to the resource. After receiving the file system path, the following information is obtained related to the resource located in the inputted file system path: the protocol prefix, domain name, the port number if different than default, and the URL fixed subdirectory structure if any. This information may be obtained, for example, by reference to a URL provided to a conversion module. The URL is then manufactured by first assigning the protocol prefix as the left-most characters of the URL. Then, the domain name, a colon “:” and port number if different than default, any subdirectory structure, and a latter portion of the file system path are added to the protocol prefix. Finally, any back slashes “\” are converted to forward slashes “/” to complete the conversion to the URL.
Abstract:
XML Schema Designs for environment-specific types based on XML base types are disclosed. The invention provides a series of “base types” in the XML Schema. Each base type is in an environment-specific XML Schema namespace that disambiguates the environment's types from all other types defined by any other environment. The XML Schema Design then defines the final type as an anonymous type, derived from the environment-specific base type. The base type is defined with any XML Schema type facets that apply to all derivatives of the base type, and the anonymous final type is defined with additional XML Schema type facets to fully describe the type.
Abstract:
Methods for generating WSDL (“Web Services Description Language”) documents to describe types and function entry points based on database metadata are disclosed. Such a method may include resolving the endpoint metadata by querying based on parameters about the request collected by the HTTP stack. From the endpoint metadata, the list of entry points which have been mapped may be collected. For each entry point, attributes about the entry point may be collected, and metadata for the types of parameters to the entry point may be looked up. A first collection of unique XML schema namespaces may be created, with one entry corresponding to each unique XML schema namespace for any arbitrary user-defined XML Schema definitions required by a parameter to an entry point. A second collection of unique XML schema namespaces may be created, with one entry corresponding to each unique XML schema namespace for an entry point. The wrapper elements for the WSDL document and any global XML schema definitions may be emitted. The first collection of unique XML schema namespaces may be iterated through, and the XML schema definitions may be emitted. The second collection of unique XML schema namespaces may be iterated through. For each entry point in the second collection, the XML schema definition for the entry point may be emitted, including any XML schema definitions for parameters to the entry point. After emitting all of the XML schema definitions, the entry points may be iterated through, and WSDL document definitions for messages, port types, and bindings for each entry point may be emitted. After emitting all of the message definitions, the WSDL document may be completed by emitting service entry definitions for the endpoint.