Comodo ESM Admin Guide

Comodo ESM Admin Guide

Comodo Endpoint Security Manager SME Edition Software Version 2.1 Administrator Guide Guide Version 2.1.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security Manager - SME - Administrator Guide Table of Contents 1.Introduction to Endpoint Security Manager - SME 1.1.Software Components and System Requirements..............................................................................................................6 1.2.Removing Incompatible Products........................................................................................................................................ 8 1.3.Installing and Configuring the Service ..............................................................................................................................10 1.4.Key Concepts.................................................................................................................................................................... 16 1.5.Best Practices................................................................................................................................................................... 17 1.6.Quick Start Guide.............................................................................................................................................................. 18 2.The Administrative Console.................................................................................................................................................... 26 2.1.Logging-in to the Administrative Console.......................................................................................................................... 27 2.2.The Dashboard Area......................................................................................................................................................... 28 2.2.1.Adding and Re-configuring Tiles..............................................................................................................................30 2.2.1.1.Quick Actions Tiles.......................................................................................................................................... 31 2.2.1.2.Policy Status Tile............................................................................................................................................. 35 2.2.1.3.Endpoint Updates Tile..................................................................................................................................... 37 2.2.1.4.Endpoint Infections Tile................................................................................................................................... 38 2.2.1.5.Connectivity Tile.............................................................................................................................................. 40 2.2.1.6.Getting Started Tile......................................................................................................................................... 41 2.2.1.7.System Status Tile.......................................................................................................................................... 42 2.2.1.8.License Status Tile.......................................................................................................................................... 46 2.2.1.9.Software Tile................................................................................................................................................... 49 2.3.The Computers Area......................................................................................................................................................... 51 2.3.1.Adding Endpoint Computers to ESM........................................................................................................................ 52 2.3.1.1.Importing Computers by Automatic Installation of Agent.................................................................................52 2.3.1.2.Adding Computers by Manual Installation of Agent and CIS...........................................................................67 2.3.1.3.Updating Comodo Software on Managed Computers.....................................................................................72 2.3.2.Creating Endpoint Groups........................................................................................................................................ 80 2.3.3.Viewing Endpoints.................................................................................................................................................... 84 2.3.4.Updating Endpoints.................................................................................................................................................. 96 2.4.The Policies Area............................................................................................................................................................ 102 2.4.1.Viewing Policies..................................................................................................................................................... 104 2.4.2.Creating a New Policy............................................................................................................................................ 126 2.5.The Reports Area............................................................................................................................................................ 133 2.5.1.Reports Gallery...................................................................................................................................................... 134 2.5.1.1.Computer Details Report............................................................................................................................... 137 2.5.1.2.CIS Configuration Report.............................................................................................................................. 142 2.5.1.3.Computer Infections Report..........................................................................................................................146 2.5.1.4.Quarantined Items Report.............................................................................................................................148 2.5.1.5.Antivirus Updates Report..............................................................................................................................152 2.5.1.6.CIS Log Report............................................................................................................................................. 156 2.5.1.7.Policy Compliance Report............................................................................................................................. 164 2.5.1.8.Policy Delta Report....................................................................................................................................... 168 2.5.1.9.Malware Statistics Report.............................................................................................................................172 2.5.1.10.Top Ten Malware Report.............................................................................................................................179 2.5.2.Report Explorer...................................................................................................................................................... 184 2.5.3.Report Settings...................................................................................................................................................... 185 Endpoint Security Manager - SME Administrator Guide | © 2015 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Endpoint Security Manager - SME - Administrator Guide 2.6.About............................................................................................................................................................................... 185 2.7.Logging out of ESM Console........................................................................................................................................... 188 3.How To... Tutorials.................................................................................................................................................................. 189 3.1.How to Connect CIS to ESM at the Local Endpoint.........................................................................................................189 3.2.How to configure CIS Policies - An Introduction..............................................................................................................191 3.3.How to Setup External Access from Internet...................................................................................................................195 3.4.How to Install CIS............................................................................................................................................................ 198 Appendix 1 The Service Configuration Tool........................................................................................................................... 202 Start and Stop the ESM Service............................................................................................................................................ 203 Main Settings.......................................................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    212 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us