SYSTEMS AND METHODS FOR DEPLOYING CONFIGURATIONS ON COMPUTING DEVICES AND VALIDATING COMPLIANCE WITH THE CONFIGURATIONS DURING SCHEDULED INTERVALS

    公开(公告)号:US20210385254A1

    公开(公告)日:2021-12-09

    申请号:US17445473

    申请日:2021-08-19

    Applicant: Kandji, Inc.

    Abstract: Deploying configurations on computing devices and validating compliance with the configurations during scheduled intervals. Particular embodiments described herein include computing devices that send a requests to a management platform at different time periods for lists of configurations that are assigned to those computing devices at those different time periods. Received lists include identifiers of the configurations that are assigned to the those computing devices during the different time periods. Local agents on the computing devices use the received lists to determine if each of the configurations in that list are implemented. If a configuration is not implemented on a computing device, the local agent on that computing device implements that configuration or alerts the management platform that the configuration could not be implemented.

    Customizable initialization orchestration module providing a graphical preview of a graphical status screen user interface

    公开(公告)号:US12045630B2

    公开(公告)日:2024-07-23

    申请号:US17663112

    申请日:2022-05-12

    Applicant: Kandji, Inc.

    CPC classification number: G06F9/44505 G06F3/04847

    Abstract: A method involves instantiating a device agent at a computing device. The device agent receives initialization orchestration module configuration data from a management platform operating at a server. The device agent instantiates an initialization orchestration module at the computing device in accordance with the initialization orchestration module configuration data. The device agent transmits the configuration data to the initialization orchestration module. The initialization orchestration module displays a user interface in accordance with the initialization orchestration module configuration data. The device agent transmits a list of configuration items to the initialization orchestration module. The device agent processes a first configuration item of the list of configuration items. The initialization orchestration module receives status messages from the device agent regarding the first configuration item as the device agent processes the first configuration item. The initialization orchestration module displays a status of the first configuration item in accordance with the status messages.

    User device authentication gateway module

    公开(公告)号:US11461459B1

    公开(公告)日:2022-10-04

    申请号:US17453219

    申请日:2021-11-02

    Applicant: Kandji, Inc.

    Abstract: A method involves receiving authentication module configuration data at a user device from a remote management platform. User credentials are received at the authentication module of the user device using a graphical user interface. The user credentials are transmitted to a remote identity provider service. Upon receiving a response indicating that the user credentials are authenticated by the remote identity provider service, the user credentials are transmitted to an operating system authentication module at the user device. Upon receiving a response indicating that the user credentials are not authenticated by the operating system authentication module, previously-stored user credentials are retrieved from an encrypted credential database at the user device. The user credentials are stored at an operating system credential database using the previously-stored user credentials. The user credentials are retransmitted to the operating system authentication module to authenticate the user at the user device.

    Systems and methods for deploying configurations on computing devices and validating compliance with the configurations during scheduled intervals

    公开(公告)号:US11102251B1

    公开(公告)日:2021-08-24

    申请号:US16530290

    申请日:2019-08-02

    Applicant: Kandji, Inc.

    Abstract: Deploying configurations on computing devices and validating compliance with the configurations during scheduled intervals. Particular embodiments described herein include computing devices that send a requests to a management platform at different time periods for lists of configurations that are assigned to those computing devices at those different time periods. Received lists include identifiers of the configurations that are assigned to the those computing devices during the different time periods. Local agents on the computing devices use the received lists to determine if each of the configurations in that list are implemented. If a configuration is not implemented on a computing device, the local agent on that computing device implements that configuration or alerts the management platform that the configuration could not be implemented.

    User Device Agent Event Detection and Recovery

    公开(公告)号:US20250007929A1

    公开(公告)日:2025-01-02

    申请号:US18883054

    申请日:2024-09-12

    Applicant: Kandji, Inc.

    Abstract: A method involves receiving a plurality of security rules from a remote management platform at an endpoint detection and response (EDR) module at a user device. The EDR module subscribes to one or more event types at the user device. The EDR module receives a notification of an event corresponding to one of the subscribed event types. Upon determining that the event is associated with a file stored at the user device, the EDR module instantiates an event tracer tree that is associated with the file. The EDR module generates a file hash value for the file using the event tracer tree. Upon determining that the file hash value satisfies a security rule, the EDR module quarantines the file and reports that the file has been quarantined.

    User device agent event detection and recovery

    公开(公告)号:US12113814B2

    公开(公告)日:2024-10-08

    申请号:US18520806

    申请日:2023-11-28

    Applicant: Kandji, Inc.

    CPC classification number: H04L63/1416 H04L63/145

    Abstract: A method involves receiving a plurality of security rules from a remote management platform at an endpoint detection and response (EDR) module at a user device. The EDR module subscribes to one or more event types at the user device. The EDR module receives a notification of an event corresponding to one of the subscribed event types. Upon determining that the event is associated with a file stored at the user device, the EDR module instantiates an event tracer tree that is associated with the file. The EDR module generates a file hash value for the file using the event tracer tree. Upon determining that the file hash value satisfies a security rule, the EDR module quarantines the file and reports that the file has been quarantined.

    User device authentication gateway module

    公开(公告)号:US11874916B2

    公开(公告)日:2024-01-16

    申请号:US17931927

    申请日:2022-09-14

    Applicant: Kandji, Inc.

    CPC classification number: G06F21/45 G06F21/31 H04L1/08 H04L63/0884

    Abstract: A method involves receiving authentication module configuration data at a user device from a remote management platform. User credentials are received at the authentication module of the user device using a graphical user interface. The user credentials are transmitted to a remote identity provider service. Upon receiving a response indicating that the user credentials are authenticated by the remote identity provider service, the user credentials are transmitted to an operating system authentication module at the user device. Upon receiving a response indicating that the user credentials are not authenticated by the operating system authentication module, previously-stored user credentials are retrieved from an encrypted credential database at the user device. The user credentials are stored at an operating system credential database using the previously-stored user credentials. The user credentials are retransmitted to the operating system authentication module to authenticate the user at the user device.

    CUSTOMIZABLE INITIALIZATION ORCHESTRATION MODULE PROVIDING A GRAPHICAL PREVIEW OF A GRAPHICAL STATUS SCREEN USER INTERFACE

    公开(公告)号:US20240330015A1

    公开(公告)日:2024-10-03

    申请号:US18742716

    申请日:2024-06-13

    Applicant: Kandji, Inc.

    CPC classification number: G06F9/44505 G06F3/04847

    Abstract: A method involves generating, using a web-portal provided by a management platform operating at a server, initialization orchestration module configuration data using a graphical customization user interface. The graphical customization user interface provides a graphical preview of a graphical status screen user interface. An initialization orchestration module instantiated at a computing device displays the graphical status screen user interface in accordance with the initialization orchestration module configuration data. A device agent instantiated at the computing device processes a first configuration item of a list of configuration items. The initialization orchestration module using the graphical status screen user interface, displays a status of the first configuration item in accordance with first status messages regarding the first configuration item as the device agent processes the first configuration item.

    User Device Agent Event Detection and Recovery

    公开(公告)号:US20240187427A1

    公开(公告)日:2024-06-06

    申请号:US18520806

    申请日:2023-11-28

    Applicant: Kandji, Inc.

    CPC classification number: H04L63/1416 H04L63/145

    Abstract: A method involves receiving a plurality of security rules from a remote management platform at an endpoint detection and response (EDR) module at a user device. The EDR module subscribes to one or more event types at the user device. The EDR module receives a notification of an event corresponding to one of the subscribed event types. Upon determining that the event is associated with a file stored at the user device, the EDR module instantiates an event tracer tree that is associated with the file. The EDR module generates a file hash value for the file using the event tracer tree. Upon determining that the file hash value satisfies a security rule, the EDR module quarantines the file and reports that the file has been quarantined.

Patent Agency Ranking