Endpoint Security Manager Professional Edition Software Version 3.5
Total Page:16
File Type:pdf, Size:1020Kb
ai Comodo Endpoint Security Manager Professional Edition Software Version 3.5 Administrator Guide Guide Version 3.5.082919 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security Manager - Professional Edition - Administrator Guide Table of Contents 1.Introduction to Comodo Endpoint Security Manager - Professional Edition......................................................5 1.1.Software Components and System Requirements.............................................................................................7 1.2.Removing Incompatible Products.....................................................................................................................13 1.3.Installing and Configuring the Service..............................................................................................................15 1.4.Key Concepts....................................................................................................................................................25 1.5.Best Practices...................................................................................................................................................27 1.6.Quick Start Guide..............................................................................................................................................27 2.The Administrative Console...................................................................................................................................37 2.1.Logging-in to the Administrative Console..........................................................................................................39 2.2.Using Assistance Manager................................................................................................................................40 2.3.Using Task Manager.........................................................................................................................................42 3.The Dashboard.........................................................................................................................................................44 4.The Computers Area................................................................................................................................................50 4.1.Endpoint Groups...............................................................................................................................................58 4.1.1.Creating New Groups...............................................................................................................................60 4.1.2.Viewing and Managing Groups................................................................................................................67 4.2. Viewing Details and Managing Endpoints........................................................................................................73 4.2.1.Viewing General Properties......................................................................................................................74 4.2.2.Viewing and Managing Group, Security Policy and Warranty Details......................................................76 4.2.3.Viewing and Managing Endpoint Security Software.................................................................................77 4.2.4.Viewing and Managing Installed Applications..........................................................................................89 4.2.5.Viewing and Managing Currently Loaded Services or Daemons.............................................................90 4.2.6.Viewing and Managing Currently Loaded Processes...............................................................................92 4.2.7.Viewing System Monitoring Alerts............................................................................................................93 4.2.8.Viewing and Managing Drives and Storage.............................................................................................93 4.2.9.Viewing Event Log ...................................................................................................................................95 4.3.Adding Endpoint Computers to CESM..............................................................................................................98 4.3.1.Importing Computers by Automatic Installation of Agent..........................................................................98 4.3.2.Adding Computers by Manual Installation of Agent................................................................................114 4.3.3.Updating Comodo Software on Managed Computers............................................................................121 4.3.4.Importing Unmanaged Endpoints from Network....................................................................................128 4.3.4.1.Importing Unmanaged Windows Computers for Centralized Management and Protection..........129 4.3.4.2.Importing Unmanaged Mac OS X Computers for Centralized Management and Protection........136 4.3.4.3.Importing Unmanaged Linux based Endpoints for Centralized Management...............................141 4.4.Running On-Demand Scan on Endpoints or Groups......................................................................................147 4.5.Updating Virus Database on Individual Endpoints or Groups.........................................................................149 4.6.Generating Reports for Endpoints or Groups.................................................................................................150 4.7.Accessing Endpoints through Remote Desktop Sharing Session..................................................................152 4.8.Managing Power Options on Endpoints..........................................................................................................154 4.9.Reorganizing Groups and Sub Groups...........................................................................................................157 5.The Policies Area...................................................................................................................................................159 Comodo Endpoint Security Manager PE - Administrator Guide | © 2019 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Endpoint Security Manager - Professional Edition - Administrator Guide 5.1.Creating a New Security Policy.......................................................................................................................162 5.1.1.Creating a New Security Policy for Windows Based Endpoints.............................................................162 5.1.2.Creating a New Security Policy for Mac OS Based Endpoints...............................................................174 5.2.Editing a Security Policy..................................................................................................................................185 5.2.1.General Properties.................................................................................................................................189 5.2.2.Selecting Target Groups.........................................................................................................................191 5.2.3.Configuring Antivirus Settings................................................................................................................195 5.2.3.1.Antivirus Scans..............................................................................................................................196 5.2.3.1.1.Creating a Custom Scan Profile............................................................................................203 5.2.3.2.Exclusions......................................................................................................................................205 5.2.4.Configuring Firewall Settings..................................................................................................................211 5.2.5.Configuring Website Filtering Settings...................................................................................................214 5.2.5.1.Adding and Managing Website Categories...................................................................................215 5.2.5.2.Adding and Managing Whitelisted Websites.................................................................................224 5.2.5.3.Adding and Managing Blacklisted Websites..................................................................................227 5.2.6.Configuring Defense+ Settings...............................................................................................................231 5.2.7.Configuring File Rating Settings ............................................................................................................257 5.2.8.Configuring General Security Product Settings......................................................................................272 5.2.9.Configuring Agent Settings.....................................................................................................................282 5.2.10.Configuring System Settings................................................................................................................285 5.3.Re-applying Security Policies to Endpoint Groups.........................................................................................289 6.Viewing and Managing Quarantined Items.........................................................................................................289