Comodo ESM Admin Guide
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Endpoint Security Manager SME Edition Software Version 2.1 Administrator Guide Guide Version 2.1.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security Manager - SME - Administrator Guide Table of Contents 1.Introduction to Endpoint Security Manager - SME 1.1.Software Components and System Requirements..............................................................................................................6 1.2.Removing Incompatible Products........................................................................................................................................ 8 1.3.Installing and Configuring the Service ..............................................................................................................................10 1.4.Key Concepts.................................................................................................................................................................... 16 1.5.Best Practices................................................................................................................................................................... 17 1.6.Quick Start Guide.............................................................................................................................................................. 18 2.The Administrative Console.................................................................................................................................................... 26 2.1.Logging-in to the Administrative Console.......................................................................................................................... 27 2.2.The Dashboard Area......................................................................................................................................................... 28 2.2.1.Adding and Re-configuring Tiles..............................................................................................................................30 2.2.1.1.Quick Actions Tiles.......................................................................................................................................... 31 2.2.1.2.Policy Status Tile............................................................................................................................................. 35 2.2.1.3.Endpoint Updates Tile..................................................................................................................................... 37 2.2.1.4.Endpoint Infections Tile................................................................................................................................... 38 2.2.1.5.Connectivity Tile.............................................................................................................................................. 40 2.2.1.6.Getting Started Tile......................................................................................................................................... 41 2.2.1.7.System Status Tile.......................................................................................................................................... 42 2.2.1.8.License Status Tile.......................................................................................................................................... 46 2.2.1.9.Software Tile................................................................................................................................................... 49 2.3.The Computers Area......................................................................................................................................................... 51 2.3.1.Adding Endpoint Computers to ESM........................................................................................................................ 52 2.3.1.1.Importing Computers by Automatic Installation of Agent.................................................................................52 2.3.1.2.Adding Computers by Manual Installation of Agent and CIS...........................................................................67 2.3.1.3.Updating Comodo Software on Managed Computers.....................................................................................72 2.3.2.Creating Endpoint Groups........................................................................................................................................ 80 2.3.3.Viewing Endpoints.................................................................................................................................................... 84 2.3.4.Updating Endpoints.................................................................................................................................................. 96 2.4.The Policies Area............................................................................................................................................................ 102 2.4.1.Viewing Policies..................................................................................................................................................... 104 2.4.2.Creating a New Policy............................................................................................................................................ 126 2.5.The Reports Area............................................................................................................................................................ 133 2.5.1.Reports Gallery...................................................................................................................................................... 134 2.5.1.1.Computer Details Report............................................................................................................................... 137 2.5.1.2.CIS Configuration Report.............................................................................................................................. 142 2.5.1.3.Computer Infections Report..........................................................................................................................146 2.5.1.4.Quarantined Items Report.............................................................................................................................148 2.5.1.5.Antivirus Updates Report..............................................................................................................................152 2.5.1.6.CIS Log Report............................................................................................................................................. 156 2.5.1.7.Policy Compliance Report............................................................................................................................. 164 2.5.1.8.Policy Delta Report....................................................................................................................................... 168 2.5.1.9.Malware Statistics Report.............................................................................................................................172 2.5.1.10.Top Ten Malware Report.............................................................................................................................179 2.5.2.Report Explorer...................................................................................................................................................... 184 2.5.3.Report Settings...................................................................................................................................................... 185 Endpoint Security Manager - SME Administrator Guide | © 2015 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Endpoint Security Manager - SME - Administrator Guide 2.6.About............................................................................................................................................................................... 185 2.7.Logging out of ESM Console........................................................................................................................................... 188 3.How To... Tutorials.................................................................................................................................................................. 189 3.1.How to Connect CIS to ESM at the Local Endpoint.........................................................................................................189 3.2.How to configure CIS Policies - An Introduction..............................................................................................................191 3.3.How to Setup External Access from Internet...................................................................................................................195 3.4.How to Install CIS............................................................................................................................................................ 198 Appendix 1 The Service Configuration Tool........................................................................................................................... 202 Start and Stop the ESM Service............................................................................................................................................ 203 Main Settings.......................................................................................................................................................................