Endpoint Security Manager Professional Edition Software Version 3.5

Endpoint Security Manager Professional Edition Software Version 3.5

ai Comodo Endpoint Security Manager Professional Edition Software Version 3.5 Administrator Guide Guide Version 3.5.082919 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security Manager - Professional Edition - Administrator Guide Table of Contents 1.Introduction to Comodo Endpoint Security Manager - Professional Edition......................................................5 1.1.Software Components and System Requirements.............................................................................................7 1.2.Removing Incompatible Products.....................................................................................................................13 1.3.Installing and Configuring the Service..............................................................................................................15 1.4.Key Concepts....................................................................................................................................................25 1.5.Best Practices...................................................................................................................................................27 1.6.Quick Start Guide..............................................................................................................................................27 2.The Administrative Console...................................................................................................................................37 2.1.Logging-in to the Administrative Console..........................................................................................................39 2.2.Using Assistance Manager................................................................................................................................40 2.3.Using Task Manager.........................................................................................................................................42 3.The Dashboard.........................................................................................................................................................44 4.The Computers Area................................................................................................................................................50 4.1.Endpoint Groups...............................................................................................................................................58 4.1.1.Creating New Groups...............................................................................................................................60 4.1.2.Viewing and Managing Groups................................................................................................................67 4.2. Viewing Details and Managing Endpoints........................................................................................................73 4.2.1.Viewing General Properties......................................................................................................................74 4.2.2.Viewing and Managing Group, Security Policy and Warranty Details......................................................76 4.2.3.Viewing and Managing Endpoint Security Software.................................................................................77 4.2.4.Viewing and Managing Installed Applications..........................................................................................89 4.2.5.Viewing and Managing Currently Loaded Services or Daemons.............................................................90 4.2.6.Viewing and Managing Currently Loaded Processes...............................................................................92 4.2.7.Viewing System Monitoring Alerts............................................................................................................93 4.2.8.Viewing and Managing Drives and Storage.............................................................................................93 4.2.9.Viewing Event Log ...................................................................................................................................95 4.3.Adding Endpoint Computers to CESM..............................................................................................................98 4.3.1.Importing Computers by Automatic Installation of Agent..........................................................................98 4.3.2.Adding Computers by Manual Installation of Agent................................................................................114 4.3.3.Updating Comodo Software on Managed Computers............................................................................121 4.3.4.Importing Unmanaged Endpoints from Network....................................................................................128 4.3.4.1.Importing Unmanaged Windows Computers for Centralized Management and Protection..........129 4.3.4.2.Importing Unmanaged Mac OS X Computers for Centralized Management and Protection........136 4.3.4.3.Importing Unmanaged Linux based Endpoints for Centralized Management...............................141 4.4.Running On-Demand Scan on Endpoints or Groups......................................................................................147 4.5.Updating Virus Database on Individual Endpoints or Groups.........................................................................149 4.6.Generating Reports for Endpoints or Groups.................................................................................................150 4.7.Accessing Endpoints through Remote Desktop Sharing Session..................................................................152 4.8.Managing Power Options on Endpoints..........................................................................................................154 4.9.Reorganizing Groups and Sub Groups...........................................................................................................157 5.The Policies Area...................................................................................................................................................159 Comodo Endpoint Security Manager PE - Administrator Guide | © 2019 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Endpoint Security Manager - Professional Edition - Administrator Guide 5.1.Creating a New Security Policy.......................................................................................................................162 5.1.1.Creating a New Security Policy for Windows Based Endpoints.............................................................162 5.1.2.Creating a New Security Policy for Mac OS Based Endpoints...............................................................174 5.2.Editing a Security Policy..................................................................................................................................185 5.2.1.General Properties.................................................................................................................................189 5.2.2.Selecting Target Groups.........................................................................................................................191 5.2.3.Configuring Antivirus Settings................................................................................................................195 5.2.3.1.Antivirus Scans..............................................................................................................................196 5.2.3.1.1.Creating a Custom Scan Profile............................................................................................203 5.2.3.2.Exclusions......................................................................................................................................205 5.2.4.Configuring Firewall Settings..................................................................................................................211 5.2.5.Configuring Website Filtering Settings...................................................................................................214 5.2.5.1.Adding and Managing Website Categories...................................................................................215 5.2.5.2.Adding and Managing Whitelisted Websites.................................................................................224 5.2.5.3.Adding and Managing Blacklisted Websites..................................................................................227 5.2.6.Configuring Defense+ Settings...............................................................................................................231 5.2.7.Configuring File Rating Settings ............................................................................................................257 5.2.8.Configuring General Security Product Settings......................................................................................272 5.2.9.Configuring Agent Settings.....................................................................................................................282 5.2.10.Configuring System Settings................................................................................................................285 5.3.Re-applying Security Policies to Endpoint Groups.........................................................................................289 6.Viewing and Managing Quarantined Items.........................................................................................................289

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    471 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us