agent

module
v3.13.3 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 4, 2023 License: MIT

README

immune Guard Agent

This is the agent component of the immune Guard product. It used together with the immune Guard Platform.

How to build

The service is written on Go and needs version 1.20 or later to be built.

You need to have git lfs installed for windows builds. Install with "git lfs install" and run "git lfs pull" once and in future the next regular fetch and pull will do it.

Building the binary can be done with GNU Make:

make

Integration

Microsoft Windows
OS Version Architectures
Windows 10 Vista, 7, 8, 10, 11 x64
Windows Server 2012+ x64
Linux Distributions
OS Version Architectures
Generic 3.x+ x64
CentOS 7+ x64
Debian 10+ x64
Fedora 33+ x64
Red Hat Enterprise Linux 7+ x64
Ubuntu 18.04+ x64

immune Guard Platform

Immune Guard is a comprehensive cyber security solution that aims to protect devices and systems from various threats. It uses advanced technologies such as TPM (Trusted Platform Module) and attestation to ensure the security and integrity of devices and systems.

Features

Immune Guard provides a range of features to address common cyber security challenges:

  • Threat detection: Immune Guard uses advanced algorithms and heuristics to detect and prevent malware and other threats from entering the system.

  • Vulnerability management: Immune Guard helps identify and fix vulnerabilities in the system, improving its overall security posture.

  • Asset tracking: Immune Guard tracks and monitors assets in the system, helping to prevent unauthorized access and tampering.

  • Incident response: In the event of a security incident, Immune Guard provides tools and processes to respond quickly and effectively.

  • Compliance reporting: Immune Guard helps organizations meet compliance requirements by providing reports and documentation on security measures and controls.

Technical Overview

Immune Guard is implemented using a combination of hardware and software technologies.

At the hardware level, Immune Guard uses TPM to secure devices and systems. TPM is a hardware component that provides secure storage and cryptographic capabilities, helping to ensure the integrity and confidentiality of data and processes.

At the software level, Immune Guard uses attestation to verify the integrity of devices and systems. Attestation involves comparing the current state of a device or system with a trusted reference state, helping to ensure that the system has not been compromised.

Immune Guard also uses a range of other technologies and algorithms to provide additional security features, such as threat detection and vulnerability management.

Deployment

Immune Guard can be deployed on a variety of devices and systems, including servers, workstations, and mobile devices. It can be installed as a standalone solution or integrated with other security tools and systems.

Support and Maintenance

Immune Guard includes ongoing support and maintenance to ensure that the system stays up-to-date and effective. This includes updates to fix vulnerabilities and improve performance, as well as access to technical support for any issues that may arise.

Conclusion

Immune Guard is a powerful and comprehensive cyber security solution that helps to protect devices and systems from threats. Its combination of hardware and software technologies, along with ongoing support and maintenance, make it a reliable choice for organizations looking to improve their security posture.

Further information can be found at the immune homepage.

Directories

Path Synopsis
internal
pkg
api
Keep in sync with agent/pkg/api/types.go
Keep in sync with agent/pkg/api/types.go
cli
firmware/heci
implement HECI using ME interface (mei) via official kernel drivers
implement HECI using ME interface (mei) via official kernel drivers
firmware/netif
Package netif lists NICs and their OS assigned addresses while trying to filter out virtual ones.
Package netif lists NICs and their OS assigned addresses while trying to filter out virtual ones.
ipc
must
Package must assists in calling functions that must succeed.
Package must assists in calling functions that must succeed.
tcg
tcg/sgxtpm
This package implements the Microsoft simulator TPM2 on SGX Transmission Interface
This package implements the Microsoft simulator TPM2 on SGX Transmission Interface
tui

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL