US 12,170,686 B2
Fleet remediation of compromised workspaces
Nicholas D. Grobelny, Austin, TX (US); Charles D. Robison, Buford, GA (US); and Ricardo L. Martinez, Leander, TX (US)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Dec. 16, 2020, as Appl. No. 17/124,324.
Prior Publication US 2022/0191239 A1, Jun. 16, 2022
Int. Cl. H04L 9/40 (2022.01); G06Q 10/0631 (2023.01); G06Q 10/10 (2023.01)
CPC H04L 63/1441 (2013.01) [G06Q 10/06315 (2013.01); G06Q 10/10 (2013.01); H04L 63/1416 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An Information Handling System (IHS), the IHS comprising:
a processor; and
a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to:
receive, at a workspace orchestration service and from a first local management agent configured to provide a first workspace in a fleet of workspaces, an indication that the first workspace has suffered a security compromise, wherein the first workspace is instantiated based upon a first workspace definition; and
in response to the indication received from the first local management agent that the first workspace has suffered the security compromise, transmit, by the workspace orchestration service, a second workspace definition, with a different attack surface than the first workspace definition, to a second local management agent configured to provide a second workspace in the fleet of workspaces, wherein the second workspace is instantiated based upon the first workspace definition, wherein the second local management agent is configured to instantiate a third workspace based upon the second workspace definition, with the different attack surface, that was transmitted by the workspace orchestration service, and wherein the second local management agent is further configured to instantiate the third workspace without an indication that the second workspace has suffered the security compromise.