Comodo IT and Security Manager Software Version 6.4

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Comodo IT and Security Manager Software Version 6.4"

Transcription

1 Comodo IT and Security Manager Software Version 6.4 End User Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

2 Table of Contents 1. Introduction to Comodo IT and Security Manager Create An Account Enroll Your Device Enrolling Android Devices Enrolling ios Devices Enrolling Windows Endpoints Enrolling Mac OS Devices Logging-in to the ITSM Console The Administrative Console The Dashboard Viewing Version and Support Information...33 About Comodo Comodo Security Solutions Inc. All rights reserved 2

3 1. Introduction to Comodo IT and Security Manager Comodo IT and Security Manager (ITSM) is a centralized device management system that allows network administrators to manage, monitor and secure devices which connect to enterprise networks. Once you have enrolled your Android, ios, Windows or Mac OS X device, it will have a security policy applied to it which will authenticate it to your company network and protect it from malware. This guide explains how to enroll your device and how to login to the ITSM user interface and view reports. Depending on your privileges, you may be able to control some other aspects of your device too. Create an Account Enroll your Device Android Devices ios Devices Windows Devices Mac OS X Devices Logging-in to the ITSM console The Administrative Console The Dashboard Viewing Version and Support Information 2. Create An Account After your ITSM administrator has created a user account for you, you will receive an activation mail at your registered address. Click the link in the mail to activate your account. You will be taken to the account activation page Comodo Security Solutions Inc. All rights reserved 3

4 Enter a new password for your account and re-enter it for confirmation in the respective text fields. Click the 'Activate' button. Your account will be activated and you will be taken to the login page of ITSM. See the section Logging-in to ITSM console for more details. Your administrator can now add your devices to ITSM. 3.Enroll Your Device After your administrator has added your device, you will receive a device enrollment mail. This will contain a link to device enrollment page, which will allow you to download and install the ios, Android, Windows or Mac OS X software appropriate for your device. An example enrollment page is shown below: 2017 Comodo Security Solutions Inc. All rights reserved 4

5 You can use the same enrollment to enroll multiple devices. Please ensure you open the mail on the device you wish to enroll. The following sections provide detailed explanations on enrolling devices with different operating systems. Enrolling Android Devices Enrolling ios Devices 2017 Comodo Security Solutions Inc. All rights reserved 5

6 Enrolling Windows Endpoints Enrolling Mac OS X Devices 3.1.Enrolling Android Devices The enrollment page contains a link to download the android ITSM agent and another link to configure the agent. Step 1 Download and Install the agent Step 2 - Configuring the agent Step 1 - Download and Install the agent Open the mail on the device and tap the enrollment link in it to open the enrollment page. Click the application download link under 'For Android Devices'. You will be taken to the Google play store to download and install the agent. Step 2 - Configuring the agent The agent can be configured to connect to the ITSM management server in two ways: Automatic Configuration Manual Configuration Automatic Configuration Tap the enrollment link contained in the after the completion of installation Comodo Security Solutions Inc. All rights reserved 6

7 The agent will be automatically configured and the End User License Agreement screen will appear. Manual Configuration You can manually configure the agent to connect to ITSM server by entering the server settings and the token ID contained in the enrollment . Open the agent by tapping the agent icon from your device. The agent configuration wizard will start enabling you to enroll the device by configuring the Server settings and unique PIN. Server Settings 2017 Comodo Security Solutions Inc. All rights reserved 7

8 Server Settings - Table of Parameters Form Element Type Description Server URL Text Field Enter the url of the ITSM server contained in the mail. Server port Text Field Enter the connection port of the server for your device to connect, as specified in the mail. (Default = 443) Tap the 'Connect' button. The 'Login' screen will open Logging-in to the Console You can login to the ITSM console in two ways: By entering the personal identification number (PIN) contained in the By entering your username and password Entering PIN Tap the 'Pin Code' tab in the 'Login' screen 2017 Comodo Security Solutions Inc. All rights reserved 8

9 Enter the PIN (token) contained in the enrollment Tap 'Login'. The End User License Agreement screen will appear. Entering your username and password Tap the 'AD Credentials' tab in the 'Login' screen Prerequisite: Enrollment of your device using your Active Directory (AD) credentials requires: Your network's AD server to be integrated with ITSM All users to be imported from the AD to ITSM. Contact your administrator if you are having issues connecting Comodo Security Solutions Inc. All rights reserved 9

10 Enter your username contained in your account activation and the password you set for your ITSM account. Tap the 'Login' button End User License Agreement The EULA screen will appear Comodo Security Solutions Inc. All rights reserved 10

11 Scroll down the screen, read the EULA fully and click the 'I Accept' button at the bottom. The agent activation screen will appear Comodo Security Solutions Inc. All rights reserved 11

12 Tap 'Activate'. The ITSM agent home screen will appear Comodo Security Solutions Inc. All rights reserved 12

13 The device is enrolled to ITSM and can be remotely managed from the ITSM console. 3.2.Enrolling ios Devices After the administrator has added devices for a user, you will receive an enrollment with instructions and link to the enrollment page. Clicking the link will open the device enrollment page containing links to download the ITSM profile and the server certificate. You should open the in the ios device to be enrolled and follow the instructions. Note: The user must keep their ios device switched on at all times during enrollment. Enrollment may fail if the device auto-locks/ enters standby mode during the certificate installation or enrollment procedures. To enroll an ios device Open the mail in the device and tap the enrollment link in it. You will be taken to the enrollment page through your browser in the device. Tap the enrollment link under "For Apple Devices" 2017 Comodo Security Solutions Inc. All rights reserved 13

14 The 'Install Profile' wizard will start. Tap 'Install'. A confirmation dialog will be displayed Comodo Security Solutions Inc. All rights reserved 14

15 Tap 'Install'. The ITSM Profile installation progress will be displayed. Before installation commences, a privacy warning containing information about the privileges granted to the administrator by installing this profile will be displayed. Read the warning fully and tap 'Install' to proceed Comodo Security Solutions Inc. All rights reserved 15

16 Tap Install in the 'Warning' screen The installation process will continue and when completed the 'Profile Installed' screen will be displayed. Tap 'Done' to finish the ITSM profile installation wizard. Upon successful completion of profile installation, the ITSM client app installation will begin. The app is essential for supporting features such as app management, GPS location and messaging from the ITSM console Comodo Security Solutions Inc. All rights reserved 16

17 The app will be downloaded from the itunes store, using the user's itunes account. The app is free, hence you will not be charged for installing the app. You need to enter their Apple account password to access itunes store. The App will be installed. To complete the enrollment, tap the green 'Run After Install' icon on the Home screen 2017 Comodo Security Solutions Inc. All rights reserved 17

18 The EULA screen for device management app will be displayed. Read the End User License Agreement fully and tap 'Accept' Tap 'OK'. The device will be successfully enrolled Comodo Security Solutions Inc. All rights reserved 18

19 Tapping 'App Catalog' will display the ios apps that are installed, required to be installed and available for installing Comodo Security Solutions Inc. All rights reserved 19

20 3.3.Enrolling Windows Endpoints The enrollment contains instructions and links to the ITSM enrollment page. Clicking the link will open the ITSM device enrollment page, containing a link to download the Windows ITSM agent. You should open the at the Windows endpoint to be enrolled and follow the instructions. Upon successful enrollment, the ITSM agent will be installed on the endpoint and automatically configured to connect to the ITSM server. Also, the endpoint security software 'Comodo Client - Security (CCS)' will be installed with 'Containment', 'Antivirus' and 'Firewall' components as specified during device enrollment by the administrator. To auto-enroll a Windows device Open the device enrollment at the endpoint Click on the enrollment link under 'For Windows Devices'. The ITSM agent setup file will be downloaded. Double click on the file to install the agent. The installation will run in the background. After installation the device will be automatically enrolled to ITSM. The ITSM system tray icon displayed: will appear at the bottom right of your desktop and a confirmation message will be 2017 Comodo Security Solutions Inc. All rights reserved 20

21 Once the device is enrolled, the ITSM agent will automatically download and install CCS at the background. On completion of CCS installation, the device will restart for the CCS installation to take effect. For a manual device enrollment type host, port and token ID specified in the device enrollment form Comodo Security Solutions Inc. All rights reserved 21

22 3.4.Enrolling Mac OS Devices After a device has been added for a user, they will receive an containing an enrollment link. Clicking the link will open the enrollment page containing enrollment instructions and links to download the ITSM profile and agent for Mac OS devices. You should open the on the target Mac OS device and follow the instructions. Enrolling a Mac OS device involves two steps: Step 1 - Installing the ITSM Configuration Profile Step 2 - Installing the ITSM Agent Step 1 - Installing the ITSM Configuration Profile To install the configuration profile Open the enrollment mail on the target device then tap the enrollment link. This will open the device enrollment page. Next, click the link under "For Apple Devices": The configuration file 'itsm.mobileconfig' will be downloaded and the 'Install Profile' wizard will be started Comodo Security Solutions Inc. All rights reserved 22

23 Click 'Install'. You need to enter your password to install the profile. Enter your device username and password and click OK to continue the installation Confirmation dialog will appear for profile installation. To view the profile details, click 'Show Profile' 2017 Comodo Security Solutions Inc. All rights reserved 23

24 Click 'Continue' Click 'Install' The profile will be installed. Step 2 - Installing the ITSM Agent After installing the profile, the ITSM agent needs to be installed so the device can communicate with the ITSM server. To download and install the ITSM agent Open the device enrollment page and click the link to download the agent as shown below: 2017 Comodo Security Solutions Inc. All rights reserved 24

25 The agent setup package will be downloaded and the installation wizard will start. Click 'Continue' The End User License Agreement will be displayed Comodo Security Solutions Inc. All rights reserved 25

26 Read the EULA and click 'Continue'. A confirmation dialog will appear. Click 'Agree' The next step allows you to choose the location at which the agent is to be installed Comodo Security Solutions Inc. All rights reserved 26

27 To install the agent in the default location, click 'Continue'. To install the agent in a different location, click the disk icon, navigate to the new location and click 'Continue'. The next step allows you to choose the installation type and start the installation Comodo Security Solutions Inc. All rights reserved 27

28 Click 'Install' You need to enter your device password to allow the installation: Enter your username and password and click 'Install Software' The installation will begin. Once installation is complete, the agent will start communicating with the ITSM server Comodo Security Solutions Inc. All rights reserved 28

29 4. Logging-in to the ITSM Console Once your account is activated, you can login to the web based ITSM application using any Internet browser. If you do not know the URL of the login page, then please contact your administrator. Enter your username and password and click 'LOGIN' Important Note: Password is case sensitive. Please make sure that you are entering it in proper case and Caps Lock is set OFF Comodo Security Solutions Inc. All rights reserved 29

30 If you have forgotten your password, click the 'I forgot my password' link below the Login button. In the 'Password recovery' page, complete the procedure. A mail will be sent to your registered id, where by clicking the 'Reset password' link you can reset a new a password. After successful login, the ITSM welcome screen will be displayed. Depending on the role configured for you, the interface allows to manage profiles, associate profiles with device and add users in a few steps. Refer to the Administrator Guide at for more details. 5. The Administrative Console The Administrative Console is the nerve center of ITSM allowing users to manage devices and users depending on the role assigned to them. Once logged-in, you can navigate to different areas of the console by clicking the tabs at the left hand side. The number of tabs available on the left hand side depends on the role permissions configured for you. To know more about settings and configurations, refer to the Administrator guide at Dashboard Allows you to view snapshot summaries of details like operating systems, device types, AV scan status of devices enrolled to ITSM as pie-charts and more. See The Dashboard for more details. Settings - Allows you to view the software version details. See Viewing Version Information for more details. 5.1.The Dashboard The Dashboard displays a snapshot summary of all the devices enrolled to Comodo IT and Security Manager (ITSM), their types, ownership as pie charts. The dashboard also enables you to view the results of Valkyrie tests. To open the 'Dashboard', click the Dashboard tab from the left hand side. Audit - Displays statistical information of types of managed devices and ownership details as pie-charts. Refer to the Audit section for more details. Valkyrie - Displays the results of analysis of unknown files automatically uploaded from managed Windows devices from Valkyrie, as pie-chart. Refer to the section Valkyrie for more details Comodo Security Solutions Inc. All rights reserved 30

31 Audit The Audit screen provides a snapshot summary of devices enrolled to Comodo IT and Security Manager (ITSM), their types and ownership as pie charts. To set which charts are shown, first open either the 'Audit', 'Compliance' or 'Valkyrie' dashboard using the links on the left then click 'Customize' at top of the interface. The 'Options' interface will be displayed. Use the 'On/Off' switches to add or remove a specific chart from the dashboard Click 'Back', to return to the main interface To refresh data in a tile, click the 'Refresh' icon at top right To swap tiles as per your preference, click and hold the grid icon at top right and move it Comodo Security Solutions Inc. All rights reserved 31

32 Platform Details The 'Platform details' chart shows devices by operating system. Placing the mouse cursor over a sector or on the respective legend displays the details. Clicking on any of the legend will open the respective 'Device List' page. For example, clicking on 'Android' in the legend will open the 'Device List' page displaying the list of Android devices. Refer to the section 'Devices' for more details. Device Types The 'Device Types' pie chart shows the composition of your device fleet by device type. Placing the mouse cursor over a sector or on the respective legend displays the details. Clicking on any of the legend will open the respective 'Device List' page. For example, clicking on 'Tablet' in the legend will open the 'Device List' page displaying the list of tablet devices. Refer to the section 'Devices' for more details. BYOD Status The 'BYOD status' pie chart shows devices by ownership type. This can be 'Corporate', 'Personal' or 'Not Specified'. Placing the mouse cursor over a sector or on the respective legend displays the details. Clicking on any of the legend will open the respective 'Device List' page. For example, clicking on 'Personal' in the legend will open the 'Device List' page displaying the list of devices that are categorized as personal. Refer to the section 'Devices' for more details. Note: The device ownership type can be changed by administrators from the device details screen > Change BYOD and then selecting the ownership type from the options. Valkyrie Valkyrie is a cloud-based file analysis service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious Comodo Security Solutions Inc. All rights reserved 32

33 Unparalleled Protection by Comodo (Last Week) The 'Unparalleled protection by Comodo' pie-chart displays the number of threats identified by Valkyrie over the past week versus the user 's previous vendor and the antivirus industry as a whole. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. Unparalleled Protection By Comodo (All Time) The 'Unparalleled protection by Comodo' pie-chart displays the number of threats identified by Valkyrie since installation versus the user 's previous vendor and the antivirus industry as a whole. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. File Statistics (Windows Devices) The 'File Statistics (Windows Devices)' pie-chart displays the number of files identified with different ratings as per local file rating analysis and Valkyrie analysis. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. Clicking on any item in the legend will open the respective 'File List' page. For example, clicking on 'Unrecognized' will open the 'Application Control' > 'Unrecognized' page displaying the list of unrecognized files detected from enrolled devices. Refer to the section 'Viewing Applications Installed on Windows Devices' for more details Comodo Security Solutions Inc. All rights reserved 33

34 Valkyrie File Verdicts (Last Week) The 'Valkyrie File Verdicts (Last Week)' pie-chart displays the number of files identified as malicious, or determined as 'Unknown' or that are whitelisted, total number of unknown files in the Valkyrie database as per last week. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. Valkyrie File Verdicts (All Time) The 'Valkyrie File Verdicts All Time)' pie-chart displays the number of files identified as malicious, or determined as 'Unknown' or that are whitelisted, total number of unknown files in the Valkyrie database as per entire period. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. 5.2.Viewing Version and Support Information The 'Support' panel displays support contact information, the current product version number, and contains a list of platforms supported by this version of ITSM. To open the 'Support' pane, choose 'Settings' from the left and select 'Support' Comodo Security Solutions Inc. All rights reserved 34

35 Contact Information - Displays the telephone numbers and addresses for contacting Comodo for purchasing new licenses and contacting product support. Supported Device Platforms Displays the list of types of devices that can be managed by ITSM, with their supported OS versions. Summary Details Displays the version number of ITSM server. Users also can create a support ticket from the Comodo Client - Communication (ITSM agent) tray icon on Windows and Mac OS X devices. A ticket will be created in Service Desk and assigned to the selected department. To submit a support ticket, right click the ITSM agent tray icon and click 'Submit ticket...' The 'Submit ticket' dialog will be displayed Comodo Security Solutions Inc. All rights reserved 35

36 Issue Summary Provide a short description of the issue. Department Select the department to whom the ticket should be assigned. Priority Level Select the priority from the drop-down. The levels are: Low, Normal, High and Critical. Issue Details Provide detailed description of the issue. Click 'Submit'. A support ticket will be created in the Service Desk module of the C1 account and assigned to the selected department Comodo Security Solutions Inc. All rights reserved 36

37 About Comodo The Comodo organization is a global innovator of cybersecurity solutions, protecting critical information across the digital landscape. Building on its unique position as the world's largest certificate authority, Comodo authenticates, validates and secures networks and infrastructures from individuals to mid-sized companies to the world's largest enterprises. Comodo provides complete end-to-end security solutions across the boundary, internal network and endpoint with innovative technologies solving the most advanced malware threats, both known and unknown. With global headquarters in Clifton, New Jersey, and branch offices in Silicon Valley, Comodo has international offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom. For more information, visit comodo.com. Comodo Security Solutions, Inc Broad Street Clifton, NJ United States Tel : For additional information on Comodo - visit Comodo Security Solutions Inc. All rights reserved 37