Comodo IT and Security Manager Software Version 6.6

Similar documents
Comodo IT and Security Manager Software Version 6.4

Comodo IT and Security Manager Software Version 6.9

Comodo IT and Security Manager Software Version 5.4

Comodo Device Manager Software Version 4.0

Comodo Endpoint Manager Software Version 6.25

Comodo Endpoint Manager Software Version 6.25

Comodo Endpoint Manager Software Version 6.26

Comodo SecureBox Management Console Software Version 1.9

Comodo One Software Version 3.16

Comodo One Home Edition - FAQ

Comodo One Software Version 3.3

Comodo Certificate Manager Version 5.7

Comodo IT and Security Manager Software Version 6.9

rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo Certificate Manager

Comodo Certificate Manager

Comodo ONE Software Version 1.8

Comodo Certificate Manager

Comodo Certificate Manager Version 5.7

Comodo cwatch Web Security Software Version 1.1

Comodo ONE Software Version 3.3

Comodo One Software Version 3.3

Comodo APT Assessment Tool

Comodo Device Manager Software Version 4.0

1 Comodo One Home Edition - FAQ

Comodo One Home Edition - FAQ

Comodo One Mobile Software Version 1.16

Comodo One Software Version 3.16

Comodo One Home Edition - FAQ

Comodo Unknown File Hunter Software Version 2.1

Comodo Certificate Manager Version 5.4

Comodo Accounts Management Software Version 15.0

Comodo Certificate Manager Software Version 5.7

Comodo Certificate Manager

Comodo Unknown File Hunter Software Version 5.0

Comodo Certificate Manager

Comodo IT and Security Manager Software Version 6.4

Comodo cwatch Web Security Software Version 1.0

Comodo Dome Shield - Admin Guide

Comodo IT and Security Manager Software Version 6.5

Comodo SecureBox Management Console Software Version 1.8

Comodo Dome Data Protection Software Version 3.8

Comodo Certificate Manager

Comodo Endpoint Security Manager Professional Edition Software Version 3.5

Importing and exporting your or Personal Authentication certificate with Opera

Comodo SecureBox Management Console Software Version 1.9

Comodo Auto Discovery and Deployment Tool Software Version 1.0

Importing and exporting your or Personal Authentication certificate using Google Chrome

Comodo IT and Security Manager Software Version 6.4

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Comodo One Software Version 3.5

Importing and Using your or Personal Authentication certificate with Windows Live Mail

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Importing and exporting your or Personal Authentication certificate using Internet Explorer

Comodo ONE Software Version 3.2

Comodo Web Application Firewall for Plesk Software Version 2.11

CCloud for ios Devices

Comodo IT and Security Manager Software Version 5.5

Comodo One Software Version 3.26

Comodo Internet Security Software Version 11.0

Comodo Internet Security Software Version 10.1

Comodo Certificate Manager Software Version 5.0

Domain Control Validation in Comodo Certificate Manager

Comodo One Software Version 3.26

Comodo One Software Version 3.18

Domain Control Validation in Comodo Certificate Manager

Importing and Using your or Personal Authentication certificate with Mac OS X Mail / Apple Mail

nuwire - FAQ What is nuwire?

Auto Discovery and Deployment Tool Software Version 1.0

Comodo IT and Security Manager Software Version 6.19

Comodo Certificate Manager

Comodo One Software Version 3.20

Comodo LoginPro Software Version 1.0

nuwire Quick Start Guide

Comodo IT and Security Manager Software Version 6.15

Importing your or Personal Authentication certificate to Android Devices

Comodo IT and Security Manager Software Version 6.15

Comodo cwatch Office Software Version 1.0

Comodo One Software Version 3.18

Comodo Cloud Drive Software Version 1.0

Comodo Certificate Manager

Comodo One Software Version 3.16

Comodo SecureBox Management Console Software Version 1.9

rat ITarian Software Version 3.26 Network Assessment Tool Quick Start Guide Guide Version Broad Street Clifton, NJ 07013

Comodo Endpoint Manager Software Version 6.26

Comodo Certificate Manager Version 5.7

Comodo Internet Security Software Version 10.0

Comodo Certificate Manager

Importing and exporting your or Personal Authentication certificate using Mozilla Firefox

Comodo TrustConnect Software Version 1.72

Comodo cwatch Web Security Software Version 1.6

Service Desk Staff Guide. Software version 4.16 Guide version ITarian 1255 Broad Street Clifton, NJ 07013

Comodo Certificate Manager

Comodo One Software Version 3.26

Importing and Using your or Personal Authentication certificate with The Bat!

Remote Access Software Version 1.0

Importing and Using your or Personal Authentication certificate with Mozilla SeaMonkey Client (PC)

Comodo Endpoint Security Manager Software Version 3.4

Comodo Next Generation Security Information and Event Management Software Version 1.4

rat ITarian Service Desk End-User Guide Software version 4.16 Guide version ITarian 1255 Broad Street Clifton, NJ 07013

Transcription:

Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Table of Contents 1. Introduction to Comodo IT and Security Manager... 3 2. Create An Account... 3 3.Enroll Your Device... 4 3.1.Enrolling Android Devices...6 3.2.Enrolling ios Devices...13 3.3.Enrolling Windows Endpoints...20 3.4.Enrolling Mac OS Devices...22 4. Logging-in to the ITSM Console... 29 5. The Administrative Console... 31 5.1.The Dashboard...31 5.2.Viewing Version and Support Information...36 About Comodo... 39 2

1. Introduction to Comodo IT and Security Manager Comodo IT and Security Manager (ITSM) is a centralized device management system that allows network administrators to manage, monitor and secure devices which connect to enterprise networks. Once you have enrolled your Android, ios, Windows or Mac OS X device, it will have a security policy applied to it which will authenticate it to your company network and protect it from malware. This guide explains how to enroll your device and how to login to the ITSM user interface and view reports. Depending on your privileges, you may be able to control some other aspects of your device too. Create an Account Enroll your Device Android Devices ios Devices Windows Devices Mac OS X Devices Logging-in to the ITSM console The Administrative Console The Dashboard Viewing Version and Support Information 2. Create An Account After your ITSM administrator has created a user account for you, you will receive an activation mail at your registered email address. Click the link in the mail to activate your account. You will be taken to the account activation page. 3

Enter a new password for your account and re-enter it for confirmation in the respective text fields. Click the 'Activate' button. Your account will be activated and you will be taken to the login page of ITSM. See the section Logging-in to ITSM console for more details. Your administrator can now add your devices to ITSM. 3.Enroll Your Device After your administrator has added your device, you will receive a device enrollment mail. This will contain a link to device enrollment page, which will allow you to download and install the ios, Android, Windows or Mac OS X software appropriate for your device. An example enrollment page is shown below: 4

5

You can use the same enrollment email to enroll multiple devices. Please ensure you open the mail on the device you wish to enroll. The following sections provide detailed explanations on enrolling devices with different operating systems. Enrolling Android Devices Enrolling ios Devices 6

Enrolling Windows Endpoints Enrolling Mac OS X Devices 3.1.Enrolling Android Devices The enrollment page contains a link to download the android ITSM agent and another link to configure the agent. Step 1 Download and Install the agent Step 2 - Configuring the agent Step 1 - Download and Install the agent Open the mail on the device and tap the enrollment link in it to open the enrollment page. Click the application download link under 'For Android Devices'. You will be taken to the Google play store to download and install the agent. Step 2 - Configuring the agent The agent can be configured to connect to the ITSM management server in two ways: Automatic Configuration Manual Configuration Automatic Configuration Tap the enrollment link contained in the email after the completion of installation. 7

The agent will be automatically configured and the End User License Agreement screen will appear. Manual Configuration You can manually configure the agent to connect to ITSM server by entering the server settings and the token ID contained in the enrollment email. Open the agent by tapping the agent icon from your device. The agent configuration wizard will start enabling you to enroll the device by configuring the Server settings and unique PIN. Server Settings 8

Server Settings - Table of Parameters Form Element Type Description Server URL Text Field Enter the url of the ITSM server contained in the mail. Server port Text Field Enter the connection port of the server for your device to connect, as specified in the mail. (Default = 443) Tap the 'Connect' button. The 'Login' screen will open Logging-in to the Console You can login to the ITSM console in two ways: By entering the personal identification number (PIN) contained in the email By entering your username and password Entering PIN Tap the 'Pin Code' tab in the 'Login' screen 9

Enter the PIN (token) contained in the enrollment email Tap 'Login'. The End User License Agreement screen will appear. Entering your username and password Tap the 'AD Credentials' tab in the 'Login' screen Prerequisite: Enrollment of your device using your Active Directory (AD) credentials requires: Your network's AD server to be integrated with ITSM All users to be imported from the AD to ITSM. Contact your administrator if you are having issues connecting. 10

Enter your username contained in your account activation email and the password you set for your ITSM account. Tap the 'Login' button End User License Agreement The EULA screen will appear. 11

Scroll down the screen, read the EULA fully and click the 'I Accept' button at the bottom. The agent activation screen will appear. 12

Tap 'Activate'. The ITSM agent home screen will appear. 13

The device is enrolled to ITSM and can be remotely managed from the ITSM console. 3.2.Enrolling ios Devices After the administrator has added devices for a user, you will receive an enrollment email with instructions and link to the enrollment page. Clicking the link will open the device enrollment page containing links to download the ITSM profile and the server certificate. You should open the email in the ios device to be enrolled and follow the instructions. Note: The user must keep their ios device switched on at all times during enrollment. Enrollment may fail if the device auto-locks/ enters standby mode during the certificate installation or enrollment procedures. To enroll an ios device Open the mail in the device and tap the enrollment link in it. You will be taken to the enrollment page through your browser in the device. Tap the enrollment link under "For Apple Devices" 14

The 'Install Profile' wizard will start. Tap 'Install'. A confirmation dialog will be displayed. 15

Tap 'Install'. The ITSM Profile installation progress will be displayed. Before installation commences, a privacy warning containing information about the privileges granted to the administrator by installing this profile will be displayed. Read the warning fully and tap 'Install' to proceed. 16

Tap Install in the 'Warning' screen The installation process will continue and when completed the 'Profile Installed' screen will be displayed. Tap 'Done' to finish the ITSM profile installation wizard. Upon successful completion of profile installation, the ITSM client app installation will begin. The app is essential for supporting features such as app management, GPS location and messaging from the ITSM console. 17

The app will be downloaded from the itunes store, using the user's itunes account. The app is free, hence you will not be charged for installing the app. You need to enter their Apple account password to access itunes store. The App will be installed. To complete the enrollment, tap the green 'Run After Install' icon on the Home screen 18

The EULA screen for device management app will be displayed. Read the End User License Agreement fully and tap 'Accept' Tap 'OK'. The device will be successfully enrolled. 19

Tapping 'App Catalog' will display the ios apps that are installed, required to be installed and available for installing. 20

3.3.Enrolling Windows Endpoints The enrollment email contains instructions and links to the ITSM enrollment page. Clicking the link will open the ITSM device enrollment page, containing a link to download the Windows ITSM agent. You should open the email at the Windows endpoint to be enrolled and follow the instructions. Upon successful enrollment, the ITSM agent will be installed on the endpoint and automatically configured to connect to the ITSM server. Also, the endpoint security software 'Comodo Client - Security (CCS)' will be installed with 'Containment', 'Antivirus' and 'Firewall' components as specified during device enrollment by the administrator. To auto-enroll a Windows device Open the device enrollment email at the endpoint Click on the enrollment link under 'For Windows Devices'. The ITSM agent setup file will be downloaded. Double click on the file to install the agent. The installation will run in the background. After installation the device will be automatically enrolled to ITSM. The ITSM system tray icon displayed: will appear at the bottom right of your desktop and a confirmation message will be 21

Once the device is enrolled, the ITSM agent will automatically download and install CCS at the background. On completion of CCS installation, the device will restart for the CCS installation to take effect. For a manual device enrollment type host, port and token ID specified in the device enrollment form. 22

3.4.Enrolling Mac OS Devices After a device has been added for a user, they will receive an email containing an enrollment link. Clicking the link will open the enrollment page containing enrollment instructions and links to download the ITSM profile and agent for Mac OS devices. You should open the email on the target Mac OS device and follow the instructions. Enrolling a Mac OS device involves two steps: Step 1 - Installing the ITSM Configuration Profile Step 2 - Installing the ITSM Agent Step 1 - Installing the ITSM Configuration Profile To install the configuration profile Open the enrollment mail on the target device then tap the enrollment link. This will open the device enrollment page. Next, click the link under "For Apple Devices": The configuration file 'itsm.mobileconfig' will be downloaded and the 'Install Profile' wizard will be started. 23

Click 'Install'. You need to enter your password to install the profile. Enter your device username and password and click OK to continue the installation Confirmation dialog will appear for profile installation. To view the profile details, click 'Show Profile' 24

Click 'Continue' Click 'Install' The profile will be installed. Step 2 - Installing the ITSM Agent After installing the profile, the ITSM agent needs to be installed so the device can communicate with the ITSM server. To download and install the ITSM agent Open the device enrollment page and click the link to download the agent as shown below: 25

The agent setup package will be downloaded and the installation wizard will start. Click 'Continue' The End User License Agreement will be displayed. 26

Read the EULA and click 'Continue'. A confirmation dialog will appear. Click 'Agree' The next step allows you to choose the location at which the agent is to be installed. 27

To install the agent in the default location, click 'Continue'. To install the agent in a different location, click the disk icon, navigate to the new location and click 'Continue'. The next step allows you to choose the installation type and start the installation. 28

Click 'Install' You need to enter your device password to allow the installation: Enter your username and password and click 'Install Software' The installation will begin. Once installation is complete, the agent will start communicating with the ITSM server. 29

4. Logging-in to the ITSM Console Once your account is activated, you can login to the web based ITSM application using any Internet browser. If you do not know the URL of the login page, then please contact your administrator. Enter your username and password and click 'LOGIN' 30

Important Note: Password is case sensitive. Please make sure that you are entering it in proper case and Caps Lock is set OFF. If you have forgotten your password, click the 'I forgot my password' link below the Login button. In the 'Password recovery' page, complete the procedure. A mail will be sent to your registered email id, where by clicking the 'Reset password' link you can reset a new a password. After successful login, the ITSM welcome screen will be displayed. Depending on the role configured for you, the interface allows to manage profiles, associate profiles with device and add users in a few steps. Refer to the Administrator Guide at http://help.comodo.com/topic-399-1-786-10078introduction-to-comodo-it-and-security-manager.html for more details. 5. The Administrative Console The Administrative Console is the nerve center of ITSM allowing users to manage devices and users depending on the role assigned to them. Once logged-in, you can navigate to different areas of the console by clicking the tabs at the left hand side. The number of tabs available on the left hand side depends on the role permissions configured for you. To know more about settings and configurations, refer to the Administrator guide at http://help.comodo.com/topic-399-1-786-10078introduction-to-comodo-it-and-security-manager.html Dashboard Allows you to view snapshot summaries of details like operating systems, device types, AV scan status of devices enrolled to ITSM as pie-charts and more. Settings - Allows you to view the software version details. 5.1.The Dashboard The dashboard shows a graphical summary of all devices enrolled to ITSM grouped by type, ownership, operating system and other criteria. The dashboard also enables you to view the results of Valkyrie tests. To open the dashboard, click the 'Dashboard' link on the left. Audit - Displays statistical information of types of managed devices and ownership details as pie-charts. Refer to the Audit section for more details. Valkyrie - Displays the results of analysis of unknown files automatically uploaded from managed Windows devices from Valkyrie, as pie-chart. Refer to the section Valkyrie for more details. Audit The Audit screen provides a snapshot summary of devices enrolled to Comodo IT and Security Manager (ITSM), their types and ownership as pie charts. 31

To set which charts are shown, first open either the 'Audit', 'Compliance' or 'Valkyrie' dashboard using the links on the left then click 'Customize' at top of the interface. The 'Options' interface will be displayed. Use the 'On/Off' switches to add or remove a specific chart from the dashboard Click 'Back', to return to the main interface To refresh data in a tile, click the 'Refresh' icon at top right To swap tiles as per your preference, click and hold the grid icon at top right and move it. 32

Operating System Shows enrolled devices by operating system. Place your mouse cursor over a sector or the legend to see further details. Clicking on an item in the legend will open the respective 'Device List' page. For example, clicking on 'Android' in the legend will open the 'Device List' page displaying the list of Android devices. Device Types Shows the composition of your device fleet by device type. Place your mouse cursor over a sector or the legend to see further details. Clicking on an item in the legend will open the respective 'Device List' page. For example, clicking on 'Tablet' in the legend will open the 'Device List' page displaying the list of tablet devices. Ownership Types Shows devices by ownership type. This can be 'Corporate', 'Personal' or 'Not Specified'. Place your mouse cursor over a sector or the legend to see further details.. Clicking on an item in the legend will open the respective 'Device List' page. For example, clicking on 'Personal' in the legend will open the 'Device List' page displaying the list of devices that are categorized as personal. Note: The device ownership type can be changed by administrators from the device details screen > Change ownership and then selecting the ownership type from the options. Valkyrie Valkyrie is a cloud-based file analysis service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. Administrators can take advantage of this service by applying a configuration profile to Comodo Client Security which will automatically schedule unknown files for upload. All results will be displayed in the Valkyrie dashboard. For new ITSM customers, the license for Valkyrie comes activated. Note: The version of Valkyrie that comes with the free version of ITSM is limited to the online testing service. The Premium version of ITSM also includes manual testing of files by Comodo research labs, helping enterprises quickly create definitive whitelists of trusted files. Valkyrie is also available as a standalone service. Contact your Comodo Account manager for further details. 33

Unparalleled Protection by Comodo (Last Week) Shows the number of threats identified by Valkyrie over the past week versus the user 's previous vendor and the antivirus industry as a whole. Place the mouse cursor over a sector or the legend to see the percentage of number of files in a particular category. Unparalleled Protection By Comodo (All Time) Shows the number of threats identified by Valkyrie since installation versus the user's previous vendor and the antivirus industry as a whole. Place the mouse cursor over a sector or the legend to 34

see the percentage of number of files in a particular category. File Statistics (Windows Devices) Shows the trust rating and status of files on your network. Click any item in the legend will to open the respective 'File List' page. For example, clicking on 'Unrecognized' will open the 'Application Control' > 'Unrecognized' page displaying the list of unrecognized files detected from enrolled devices. Valkyrie File Verdicts (Last Week) Displays Valkyrie trust verdicts on unknown files for the previous 7 days. This includes the number of unknown files identified as malicious, those that remain unknown, and those that were white-listed (trusted). The total amount of unknown files analyzed is shown at the bottom. Place your mouse cursor over a sector or the legend to view the percentage of files in that category. Valkyrie File Verdicts (All Time) Displays Valkyrie trust verdicts on unknown files for the lifetime of your account. This includes the number of unknown files identified as malicious, those that remain unknown, and those that were white-listed (trusted). The total amount of unknown files analyzed is shown at the bottom. Place your mouse cursor over a sector or the legend to view the percentage of files in that category. 5.2.Viewing Version and Support Information The 'Support' panel displays support contact information, the current product version number, and contains a list of 35

platforms supported by this version of ITSM. To open the 'Support' pane, choose 'Settings' from the left and select 'Support'. Contact Information - Displays the telephone numbers and email addresses for contacting Comodo for purchasing new licenses and contacting product support. Supported Device Platforms Displays the list of types of devices that can be managed by ITSM, with their supported OS versions. Summary Details Displays the version number of ITSM server. Users also can create a support ticket from the Comodo Client - Communication (ITSM agent) tray icon on Windows and Mac OS X devices. A ticket will be created in Service Desk and assigned to the selected department. To submit a support ticket, right click the ITSM agent tray icon and click 'Submit ticket...' 36

The 'Submit ticket' dialog will be displayed. Issue Summary Provide a short description of the issue. Department Select the department to whom the ticket should be assigned. Priority Level Select the priority from the drop-down. The levels are: Low, Normal, High and Critical. Issue Details Provide detailed description of the issue. Click 'Submit'. A support ticket will be created in the Service Desk module of the C1 account and assigned to the selected department. 37

About Comodo The Comodo organization is a global innovator of cybersecurity solutions, protecting critical information across the digital landscape. Building on its unique position as the world's largest certificate authority, Comodo authenticates, validates and secures networks and infrastructures from individuals to mid-sized companies to the world's largest enterprises. Comodo provides complete end-to-end security solutions across the boundary, internal network and endpoint with innovative technologies solving the most advanced malware threats, both known and unknown. With global headquarters in Clifton, New Jersey, and branch offices in Silicon Valley, Comodo has international offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom. For more information, visit comodo.com. Comodo Security Solutions, Inc. 1255 Broad Street Clifton, NJ 07013 United States Tel : +1.877.712.1309 Email: EnterpriseSolutions@Comodo.com For additional information on Comodo - visit http://www.comodo.com. 38