Endpoint Security Manager Professional Edition Software Version 3.5

Total Page:16

File Type:pdf, Size:1020Kb

Endpoint Security Manager Professional Edition Software Version 3.5 ai Comodo Endpoint Security Manager Professional Edition Software Version 3.5 Administrator Guide Guide Version 3.5.082919 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security Manager - Professional Edition - Administrator Guide Table of Contents 1.Introduction to Comodo Endpoint Security Manager - Professional Edition......................................................5 1.1.Software Components and System Requirements.............................................................................................7 1.2.Removing Incompatible Products.....................................................................................................................13 1.3.Installing and Configuring the Service..............................................................................................................15 1.4.Key Concepts....................................................................................................................................................25 1.5.Best Practices...................................................................................................................................................27 1.6.Quick Start Guide..............................................................................................................................................27 2.The Administrative Console...................................................................................................................................37 2.1.Logging-in to the Administrative Console..........................................................................................................39 2.2.Using Assistance Manager................................................................................................................................40 2.3.Using Task Manager.........................................................................................................................................42 3.The Dashboard.........................................................................................................................................................44 4.The Computers Area................................................................................................................................................50 4.1.Endpoint Groups...............................................................................................................................................58 4.1.1.Creating New Groups...............................................................................................................................60 4.1.2.Viewing and Managing Groups................................................................................................................67 4.2. Viewing Details and Managing Endpoints........................................................................................................73 4.2.1.Viewing General Properties......................................................................................................................74 4.2.2.Viewing and Managing Group, Security Policy and Warranty Details......................................................76 4.2.3.Viewing and Managing Endpoint Security Software.................................................................................77 4.2.4.Viewing and Managing Installed Applications..........................................................................................89 4.2.5.Viewing and Managing Currently Loaded Services or Daemons.............................................................90 4.2.6.Viewing and Managing Currently Loaded Processes...............................................................................92 4.2.7.Viewing System Monitoring Alerts............................................................................................................93 4.2.8.Viewing and Managing Drives and Storage.............................................................................................93 4.2.9.Viewing Event Log ...................................................................................................................................95 4.3.Adding Endpoint Computers to CESM..............................................................................................................98 4.3.1.Importing Computers by Automatic Installation of Agent..........................................................................98 4.3.2.Adding Computers by Manual Installation of Agent................................................................................114 4.3.3.Updating Comodo Software on Managed Computers............................................................................121 4.3.4.Importing Unmanaged Endpoints from Network....................................................................................128 4.3.4.1.Importing Unmanaged Windows Computers for Centralized Management and Protection..........129 4.3.4.2.Importing Unmanaged Mac OS X Computers for Centralized Management and Protection........136 4.3.4.3.Importing Unmanaged Linux based Endpoints for Centralized Management...............................141 4.4.Running On-Demand Scan on Endpoints or Groups......................................................................................147 4.5.Updating Virus Database on Individual Endpoints or Groups.........................................................................149 4.6.Generating Reports for Endpoints or Groups.................................................................................................150 4.7.Accessing Endpoints through Remote Desktop Sharing Session..................................................................152 4.8.Managing Power Options on Endpoints..........................................................................................................154 4.9.Reorganizing Groups and Sub Groups...........................................................................................................157 5.The Policies Area...................................................................................................................................................159 Comodo Endpoint Security Manager PE - Administrator Guide | © 2019 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Endpoint Security Manager - Professional Edition - Administrator Guide 5.1.Creating a New Security Policy.......................................................................................................................162 5.1.1.Creating a New Security Policy for Windows Based Endpoints.............................................................162 5.1.2.Creating a New Security Policy for Mac OS Based Endpoints...............................................................174 5.2.Editing a Security Policy..................................................................................................................................185 5.2.1.General Properties.................................................................................................................................189 5.2.2.Selecting Target Groups.........................................................................................................................191 5.2.3.Configuring Antivirus Settings................................................................................................................195 5.2.3.1.Antivirus Scans..............................................................................................................................196 5.2.3.1.1.Creating a Custom Scan Profile............................................................................................203 5.2.3.2.Exclusions......................................................................................................................................205 5.2.4.Configuring Firewall Settings..................................................................................................................211 5.2.5.Configuring Website Filtering Settings...................................................................................................214 5.2.5.1.Adding and Managing Website Categories...................................................................................215 5.2.5.2.Adding and Managing Whitelisted Websites.................................................................................224 5.2.5.3.Adding and Managing Blacklisted Websites..................................................................................227 5.2.6.Configuring Defense+ Settings...............................................................................................................231 5.2.7.Configuring File Rating Settings ............................................................................................................257 5.2.8.Configuring General Security Product Settings......................................................................................272 5.2.9.Configuring Agent Settings.....................................................................................................................282 5.2.10.Configuring System Settings................................................................................................................285 5.3.Re-applying Security Policies to Endpoint Groups.........................................................................................289 6.Viewing and Managing Quarantined Items.........................................................................................................289
Recommended publications
  • VYSOKÁ ŠKOLA POLYTECHNICKÁ JIHLAVA Katedra Technických Studií
    VYSOKÁ ŠKOLA POLYTECHNICKÁ JIHLAVA Katedra technických studií Návrh bezpečnostní politiky filtrování webového provozu ve školním prostředí bakalářská práce Autor práce: Radek Kudrna Vedoucí práce: Mgr. Antonín Přibyl Jihlava 2020 ZADÁNÍ BAKALÁŘSKÉ PRÁCE Autor práce: Radek Kudrna Studijní program: Elektrotechnika a informatika Obor: Aplikovaná informatika Název práce: Návrh bezpečnostní politiky filtrování webového provozu ve školním prostředí Cíl práce: V teoretické části diskutujte návrh bezpečného přístupu k Internetu pro žáky škol včetně návrhu monitoringu přístupů, na druhou stranu je potřeba zvážit politiku nefiltrovaného přístupu k Internetu. Diskutujte právní fakt nemožnosti delegace právní odpovědnosti na nezletilé žáky, která souvisí s provozem školních (bezdrátových) sítí. V praktické části bude provedeno nasazení Kerio Control s Active Directory pro filtrování provozu na MŠ a ZŠ Brtnice. Mgr. Antonín Přibyl doc. Ing. Zdeněk Horák, Ph.D. vedoucí bakalářské práce vedoucí katedry Katedra technických studií Abstrakt Tato bakalářská práce se zabývá problémem přístupu k internetu pro školy, zejména pro základní školy. Při nefiltrovaném obsahu jsou nezletilí žáci vystaveni určitým rizikům. Jedná se především o přístup na stránky se závadným obsahem, možností stát se kybernetickou obětí, nebo k samotné možnosti páchání trestné činnosti přes školní internet. Pro zamezení těchto činností je nutnost zavést určitou bezpečnostní politiku v podobě filtrování webových stránek. Právě jednotlivé možnosti blokování stránek jsou v práci popsány. Součástí je i ukázka a popis řešení v nástroji Kerio Control, který je nasazen na filtrování provozu na základní a mateřské škole Brtnice. Klíčová slova filtrování provozu; Kerio Control; monitoring; nezletilí žáci; webový filtr Abstract This bachelor thesis deals with the problem of Internet access for schools, especially for primary schools.
    [Show full text]
  • Comodo Internet Security Essentials User Guide | © 2018 Comodo Security Solutions Inc
    Comodo Internet Security Essentials Software Version 1.3 User Guide Guide Version 1.3.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security Essentials- User Guide Table of Contents Comodo Internet Security Essentials.......................................................................................................................................... 3 What is Comodo Internet Security Essentials?.......................................................................................................................... 3 How do I install Comodo Internet Security Essentials?.............................................................................................................4 What is a man-in-the-middle attack?......................................................................................................................................... 6 How does Comodo Internet Security Essentials protect me from a man-in-the-middle attack?................................................7 What is the install location of Comodo Internet Security Essentials?........................................................................................8 How do I update CISE?............................................................................................................................................................. 8 Understanding alerts and configuring exceptions....................................................................................................................14
    [Show full text]
  • Comodo Internet Security Quick Start Guide | © 2020 Comodo Security Solutions Inc
    Comodo Internet Security Software Version 12.2 Quick Start Guide Guide Version 12.2.050520 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - Quick Start Guide Comodo Internet Security - Quick Start Guide This tutorial explains how to use Comodo Internet Security (CIS). Please use the following links to go straight to the section that you need help with: • Installation • The main interface • Scan and clean your computer • Run an instant antivirus scan on selected items • Set up the Firewall for maximum security and usability • Set up HIPS for maximum security and usability • Run untrusted programs in the container • Browse the internet and run untrusted programs inside the Virtual Desktop • Renew or upgrade licenses • More Help Installation • If you haven't done so already, please download the CIS setup file from https://www.comodo.com/home/internet-security/security-software.php • Before beginning installation, please ensure you have uninstalled any other antivirus and firewall products that are on your computer. More specifically, remove any other products of the same type as those Comodo products you plan to install. • Double click the CIS setup file to start the installation wizard. • Click 'Options' if you wish to configure advanced options. • After finishing the wizard, CIS runs an initial scan • You will be asked to choose your type of internet connection • On completion of scanning, the scan results are shown. You can choose the action to be taken on the threats found, if any. • You need to reboot your computer to complete installation. A more detailed description of the options available during installation can be found in the installation guide at https://help.comodo.com/topic-72-1-772-9552-CIS-Installation.html The Main Interface The CIS interface is designed to be as clean and informative as possible while letting you carry out tasks with the minimum of fuss.
    [Show full text]
  • A Large-Scale Empirical Study on Industrial Fake Apps
    A Large-Scale Empirical Study on Industrial Fake Apps Chongbin Tang∗, Sen Chen∗, Lingling Fan∗, Lihua Xuy, Yang Liuz, Zhushou Tangx, Liang Dou∗ ∗East China Normal University, China yNew York University Shanghai, China zNanyang Technological University, Singapore xPwnzen Infotech Inc., China Abstract—While there have been various studies towards of app searching and downloading is greatly affected by the Android apps and their development, there is limited discussion fake apps in real world. of the broader class of apps that fall in the fake area. Fake Even worse, as the doorsill to develop an app has been set apps and their development are distinct from official apps and belong to the mobile underground industry. Due to the lack of low, the cost to develop a fake app is much lower than what it knowledge of the mobile underground industry, fake apps, their takes to develop a desktop program, providing an ideal hotbed ecosystem and nature still remain in mystery. for the underground industry to thrive on [3]. Moreover, the To fill the blank, we conduct the first systematic and com- flexibility of Android app implementation [4] contributes the prehensive empirical study on a large-scale set of fake apps. fake apps’ complexity. Over 150,000 samples related to the top 50 popular apps are collected for extensive measurement. In this paper, we present Despite the ubiquity, little is known about fake apps and discoveries from three different perspectives, namely fake sample their ecosystem – their common characteristics, the number characteristics, quantitative study on fake samples and fake au- of fake apps at large, their production process and speed, thors’ developing trend.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Comodo Internet Security User Guide | © 2019 Comodo Security Solutions Inc
    Comodo Internet Security Software Version 6.3 User Guide Guide Version 6.3.082819 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ, 07013 United States Comodo Internet Security 6.3 - User Guide Table of Contents 1. Introduction to Comodo Internet Security.............................................................................................................................. 6 1.1.Special Features............................................................................................................................................................... 10 1.2.System Requirements....................................................................................................................................................... 13 1.3.Installation......................................................................................................................................................................... 13 1.3.1.CIS Premium - Installation........................................................................................................................................ 14 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................27 1.3.3.CIS Complete - Installation and Activation...............................................................................................................39 1.3.4.Activating CIS Pro/Complete Services after Installation...........................................................................................52
    [Show full text]
  • Security Operations Center-As-A-Service Date: November 2018 Author: Tony Palmer, Senior Validation Analyst; and Jack Poller, Senior Analyst
    Enterprise Strategy Group | Getting to the bigger truth.™ Technical Review Comodo MDR: Security Operations Center-as-a-service Date: November 2018 Author: Tony Palmer, Senior Validation Analyst; and Jack Poller, Senior Analyst Abstract This ESG Technical Review documents hands-on testing of the Comodo MDR security operations center (SOC)-as-a-service platform. We focus on how Comodo MDR provides defense-in-depth for organizations’ network, endpoints, web, and cloud infrastructure as a bundled, cost-efficient service. The Challenges As ESG’s annual IT spending intentions survey reveals, the global cybersecurity skills shortage continues unabated. In 2018, 51% of respondents state their organization has a problematic shortage (see Figure 1), up from 45% in 2017.1 IT and security staff face an ever-growing amount of internally and externally generated data, hindering their ability to uncover and resolve threats quickly, and preventing them from keeping skills sets up to date. The skills gap threatens the ability of organizations to maintain effective security controls and minimize risk. Figure 1. Top Ten Areas of IT Skills Shortage In which of the following areas do you believe your IT organization currently has a problematic shortage of existing skills? (Percent of respondents, N=620, multiple responses accepted) Cybersecurity 51% IT architecture/planning 33% Server/virtualization administration 26% Data protection (i.e., backup and recovery) 26% Application development 25% Compliance management, monitoring and reporting 25% Business intelligence/data analytics 25% Mobile application development 24% Network administration 23% Storage administration 22% Source: Enterprise Strategy Group Organizations need effective cybersecurity management—aggregating data, prioritizing action, and distributing work—to handle the ever-increasing velocity and volume of cyber-attacks.
    [Show full text]
  • Comodo Cloud Antivirus User Guide | © 2019 Comodo Security Solutions Inc
    Comodo Cloud Antivirus Software Version 1.20 User Guide Guide Version 1.20.082919 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Cloud Antivirus - User Guide Table of Contents 1. Introduction to Comodo Cloud Antivirus................................................................................................................5 1.1.System Requirements..........................................................................................................................................6 1.2.Installation ...........................................................................................................................................................7 1.3.Start Comodo Cloud Antivirus............................................................................................................................16 1.3.1.The Main Interface....................................................................................................................................18 1.3.2.The Widget................................................................................................................................................22 1.3.3.The System Tray Icon...............................................................................................................................24 1.4.'Lucky You' Statistics..........................................................................................................................................25 1.5.Understand CCAV Alerts....................................................................................................................................29
    [Show full text]
  • Comodo Internet Security Installation Guide | © 2018 Comodo Security Solutions Inc
    Comodo Internet Security Software Version 11.0 Installation Guide Guide Version 11.0.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - Installation Guide 1. CIS Installation Please read the installation instructions carefully and review the system requirements before installing Comodo Internet Security. The CIS software itself is identical for all customers regardless of the package type. All versions (including free) include all security features, technologies and updates. The difference between the package types lies in the availability of additional services such as TrustConnect, Cloud Backup and the Comodo Guarantee. Activation of additional services is carried out after the base installation has been completed. Note - Before beginning installation, please ensure you have uninstalled any other antivirus and firewall products, including Comodo AV/FW/CES. Failure to remove other AV and FW products could lead to conflicts which cause CIS to function incorrectly. We advise users consult their vendor documentation for help to remove specific programs. However, the following steps should help most Windows users: • Click the 'Start' button to open the 'Windows Start' menu • Select Control Panel > Programs and Features (Win 10, Win 8/8.1, Win 7, Vista); Control Panel > Add or Remove Programs (XP) • Select your current antivirus or firewall program(s) from the list • Click 'Remove'/'Uninstall' button • Repeat process until all required programs have been removed Click the links below for detailed explanations: • CIS Premium - Installation • CIS Pro - Installation • CIS Complete - Installation 1.1.CIS Premium - Installation • Before beginning installation, please ensure you have removed any other antivirus and firewall products that are on your computer.
    [Show full text]
  • SEC RITY Is Without Nothing - 000 (SP)São Paulo BRASIL E “ U ” - Mail:[email protected]
    CYBERSECURITY NEWS CYBERSECURITY “SEC RITY” is nothing 2018 without APRIL APRIL “U” TOP STORIES OF STORIES TOP OngoingSecurity Av. Paulista 171, Andar 4 CEP 01.311-000 São Paulo (SP) BRASIL E-mail: [email protected] ▪ Cryptocurrency Leaks Personal Information for Thousands of Investors ▪ NATO Won Cyber Defence Exercise Locked Shields 2018 ▪ Oracle Weblogic Server POC(CVE-2018-2628) NEWS CYBERSECURITY ▪ Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide ▪ Facebook Tracking PoC via Faasos ▪ Uber's Bug Bounty Program ▪ Telegram DOWN - Popular messaging app not working as major outage confirmed ▪ Long Prison Sentence for Man Who Hacked Jail Computer System to Bust Out Friend ▪ Supporting Same-Site Cookies in Firefox 60 ▪ Two security experts discovered that the control panel of a Ski lift in Austria was exposed online without any protection ▪ PoC for a NTFS crash Windows7 & Windows10 versions ▪ NTLM Credentials Theft via PDF Files ▪ ISLAMIC STATE PROPAGANDA MACHINE HIT BY LAW ENFORCEMENT IN COORDINATED TAKEDOWN ACTION ▪ PoC Code Published for Triggering an Instant BSOD on All Recent Windows Versions ▪ Metamorfo Campaigns Targeting Brazilian Users 2018 ▪ Python-Based Malware Uses NSA Exploit to Propagate Monero (XMR) Miner ▪ "Rubella Macro Builder" Crimeware Kit Emerges on Underground APRIL APRIL ▪ Update to enable mitigation against Spectre, Variant 2 ▪ Necurs Evolves to Evade Spam Detection via Internet Shortcut File ▪ WORLD'S BIGGEST MARKETPLACE SELLING INTERNET PARALYSING DDOS ATTACKS TAKEN DOWN ▪ Cyber Security Breaches Survey 2018 ▪ Researchers Find Way to Create Master Keys to Hotels ▪ DDoS attacks in Q1 2018 ▪ RESEARCHERS HACKED AMAZON'S ALEXA TO SPY ON USERS, AGAIN TOP STORIES OF STORIES TOP ▪ Ski lift shut down on the same day ▪ Hacker Hijacks DNS Server of MyEtherWallet to Steal $160,000 ▪ Altaba, Formerly Known as Yahoo!, Charged With Failing to Disclose Massive Cybersecurity Breach ▪ VPN Leaks Found on 3 Major VPNs ▪ Vulnerability Disclosure: Tegra SoCs ▪ Portugal Joins NATO Cyber-Defence Centre OngoingSecurity Av.
    [Show full text]
  • The Antivirus Industry and Its Virustotal Deception
    The Antivirus Industry and its VirusTotal Deception VirusTotal (www.virustotal.com) is a crowd-sourced virus scanning project sponsored by Google. VirusTotal solicits suspect files and URLs from users, subscribers and other site visitors and scans them with solutions from over 70 anti-virus (AV) tools suppliers. Basic results are shared with submitters and among participating commercial partners who, in theory, use results to improve their anti-virus software, collectively contributing to the improvement of global IT security. Key to VirusTotal’s ability to attract commercial participants is the project’s Terms of Service, wherein participants agree not to: …”use the Service in any way which could infringe the rights or interests of VirusTotal, the Community or any third party, including for example, to prove or disprove a concept or discredit, or bait any actor in the anti-malware space.” These innocuous terms, however, help AV vendors hide a multitude of inadequacies and downright deceptive practices. Participating AV suppliers often: 1. lack actual competence in virus detection, depending instead upon the detection capability of others, and without acknowledging that dependence; 2. overstate and distort the effectiveness of detection, hide misidentification and false positives, trumpet their embrace of AI as a bluff, and engage in tests with repacked viruses and fake malware; and, 3. abuse VirusTotal and other community resources for reporting the supposed efficacy of detection, leveraging a well-intentioned service to support deceptive practices. Parasitic Virus Detection Many AV companies have ridden piggyback on VirusTotal and other shared AV services as a means to improve their virus signature libraries.
    [Show full text]
  • Comodo Cybersecurity Threat Intelligence Lab ������������������������������������������������������������������������������ 66
    Comodo Cybersecurity Q1 2018 REPORT Table of Contents Highlights �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 4 Ransomware gives way to cryptominers �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 5 Monero is ahead of Bitcoin �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 5 Ransomware vs� cryptominers� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 5 Bitcoin mining malware �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 7 Bitcoins vs� other cryptocurrency miners �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 7 Monero mining malwares �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 8 GhostMiner � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 13 CoinMiner� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
    [Show full text]