US 12,244,643 B2
Software security agent updates via microcode
Thomas E. Keiser, Jr., Boston, MA (US)
Assigned to Zscaler, Inc., San Jose, CA (US)
Filed by Zscaler, Inc., San Jose, CA (US)
Filed on Jan. 26, 2022, as Appl. No. 17/584,523.
Prior Publication US 2023/0239325 A1, Jul. 27, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/20 (2013.01) 18 Claims
OG exemplary drawing
 
7. A method implemented by a host system, comprising steps of:
receiving security policies that define microsegments of a network;
executing a security agent that is configured to allow and block flows in the network, on the network interface based on the received security policies;
receiving a script and instructions from a command & control server, the instructions comprising instructions of which hook point of one or more hook points the script is to be bound to; and
executing the script via an interpreter associated with the security agent, wherein the script is configured to any of disable behavior and modify behavior of the security agent at one or more hook points in the security agent.