作者: Teal Richard S
DOI:
关键词:
摘要: The configuration of a firewall on an endpoint is secured to prevent changes by unauthorized processes, while permitting that are requested authorized processes. Authorized processes can be stored in tamper protection cache within kernel the operating system and with reference trust authority external system. When process requests change configuration, requesting checked against listed cache, any suitable rules applied limit or configuration.