Comodo IT and Security Manager Software Version 6.4

Similar documents
Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.9

Comodo IT and Security Manager Software Version 5.4

Comodo Device Manager Software Version 4.0

Comodo Endpoint Manager Software Version 6.25

Comodo Endpoint Manager Software Version 6.25

Comodo Endpoint Manager Software Version 6.26

Comodo SecureBox Management Console Software Version 1.9

Comodo One Software Version 3.16

Comodo One Home Edition - FAQ

Comodo One Software Version 3.3

Comodo Certificate Manager Version 5.7

Comodo Certificate Manager

Comodo Certificate Manager

Comodo IT and Security Manager Software Version 6.9

rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo ONE Software Version 1.8

Comodo Certificate Manager Version 5.7

Comodo Certificate Manager

Comodo ONE Software Version 3.3

Comodo One Software Version 3.3

Comodo cwatch Web Security Software Version 1.1

1 Comodo One Home Edition - FAQ

Comodo One Home Edition - FAQ

Comodo Device Manager Software Version 4.0

Comodo One Home Edition - FAQ

Comodo One Mobile Software Version 1.16

Comodo One Software Version 3.16

Comodo APT Assessment Tool

Comodo Accounts Management Software Version 15.0

Comodo Certificate Manager Software Version 5.7

Comodo Certificate Manager

Comodo Certificate Manager Version 5.4

Comodo Unknown File Hunter Software Version 5.0

Comodo Unknown File Hunter Software Version 2.1

Comodo IT and Security Manager Software Version 6.4

Comodo Certificate Manager

Comodo Dome Shield - Admin Guide

Comodo Certificate Manager

Comodo SecureBox Management Console Software Version 1.8

Comodo IT and Security Manager Software Version 6.5

Comodo cwatch Web Security Software Version 1.0

Comodo Endpoint Security Manager Professional Edition Software Version 3.5

Comodo Auto Discovery and Deployment Tool Software Version 1.0

Comodo Dome Data Protection Software Version 3.8

Importing and exporting your or Personal Authentication certificate with Opera

Comodo SecureBox Management Console Software Version 1.9

Comodo IT and Security Manager Software Version 6.4

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Importing and exporting your or Personal Authentication certificate using Google Chrome

Comodo One Software Version 3.5

Comodo One Software Version 3.26

Importing and Using your or Personal Authentication certificate with Windows Live Mail

Comodo ONE Software Version 3.2

Importing and exporting your or Personal Authentication certificate using Internet Explorer

CCloud for ios Devices

Domain Control Validation in Comodo Certificate Manager

Comodo Web Application Firewall for Plesk Software Version 2.11

Domain Control Validation in Comodo Certificate Manager

Comodo IT and Security Manager Software Version 5.5

nuwire - FAQ What is nuwire?

Comodo One Software Version 3.26

Auto Discovery and Deployment Tool Software Version 1.0

Comodo One Software Version 3.18

Comodo Certificate Manager

Comodo Certificate Manager Software Version 5.0

nuwire Quick Start Guide

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo Internet Security Software Version 10.1

Comodo Internet Security Software Version 11.0

Importing and Using your or Personal Authentication certificate with Mac OS X Mail / Apple Mail

Comodo IT and Security Manager Software Version 6.19

Comodo LoginPro Software Version 1.0

Comodo IT and Security Manager Software Version 6.15

Comodo IT and Security Manager Software Version 6.15

Comodo cwatch Office Software Version 1.0

Comodo One Software Version 3.20

rat ITarian Software Version 3.26 Network Assessment Tool Quick Start Guide Guide Version Broad Street Clifton, NJ 07013

Comodo Endpoint Manager Software Version 6.26

Comodo Cloud Drive Software Version 1.0

Comodo One Software Version 3.16

Comodo Certificate Manager Version 5.7

Importing your or Personal Authentication certificate to Android Devices

Comodo Certificate Manager

Comodo SecureBox Management Console Software Version 1.9

Comodo Certificate Manager

Comodo One Software Version 3.18

Comodo One Software Version 3.26

Service Desk Staff Guide. Software version 4.16 Guide version ITarian 1255 Broad Street Clifton, NJ 07013

Remote Access Software Version 1.0

Comodo TrustConnect Software Version 1.72

Comodo Next Generation Security Information and Event Management Software Version 1.4

rat ITarian Service Desk End-User Guide Software version 4.16 Guide version ITarian 1255 Broad Street Clifton, NJ 07013

Comodo Internet Security Software Version 10.0

Importing and exporting your or Personal Authentication certificate using Mozilla Firefox

Comodo Certificate Manager

Comodo Accounts Management Software Version 17.0

Comodo One Software Version 3.23

Importing and Using your or Personal Authentication certificate with The Bat!

Importing and Using your or Personal Authentication certificate with Mozilla SeaMonkey Client (PC)

Transcription:

Comodo IT and Security Manager Software Version 6.4 End User Guide Guide Version 6.4.040417 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Table of Contents 1. Introduction to Comodo IT and Security Manager... 3 2. Create An Account... 3 3. Enroll Your Device... 4 3.1.Enrolling Android Devices...4 3.2.Enrolling ios Devices...12 3.3.Enrolling Windows Endpoints...19 3.4.Enrolling Mac OS Devices...21 4. Logging-in to the ITSM Console... 28 5. The Administrative Console... 29 5.1.The Dashboard...29 5.2.Viewing Version and Support Information...33 About Comodo... 36 2017 Comodo Security Solutions Inc. All rights reserved 2

1. Introduction to Comodo IT and Security Manager Comodo IT and Security Manager (ITSM) is a centralized device management system that allows network administrators to manage, monitor and secure devices which connect to enterprise networks. Once you have enrolled your Android, ios, Windows or Mac OS X device, it will have a security policy applied to it which will authenticate it to your company network and protect it from malware. This guide explains how to enroll your device and how to login to the ITSM user interface and view reports. Depending on your privileges, you may be able to control some other aspects of your device too. Create an Account Enroll your Device Android Devices ios Devices Windows Devices Mac OS X Devices Logging-in to the ITSM console The Administrative Console The Dashboard Viewing Version and Support Information 2. Create An Account After your ITSM administrator has created a user account for you, you will receive an activation mail at your registered email address. Click the link in the mail to activate your account. You will be taken to the account activation page. 2017 Comodo Security Solutions Inc. All rights reserved 3

Enter a new password for your account and re-enter it for confirmation in the respective text fields. Click the 'Activate' button. Your account will be activated and you will be taken to the login page of ITSM. See the section Logging-in to ITSM console for more details. Your administrator can now add your devices to ITSM. 3.Enroll Your Device After your administrator has added your device, you will receive a device enrollment mail. This will contain a link to device enrollment page, which will allow you to download and install the ios, Android, Windows or Mac OS X software appropriate for your device. An example enrollment page is shown below: 2017 Comodo Security Solutions Inc. All rights reserved 4

You can use the same enrollment email to enroll multiple devices. Please ensure you open the mail on the device you wish to enroll. The following sections provide detailed explanations on enrolling devices with different operating systems. Enrolling Android Devices Enrolling ios Devices 2017 Comodo Security Solutions Inc. All rights reserved 5

Enrolling Windows Endpoints Enrolling Mac OS X Devices 3.1.Enrolling Android Devices The enrollment page contains a link to download the android ITSM agent and another link to configure the agent. Step 1 Download and Install the agent Step 2 - Configuring the agent Step 1 - Download and Install the agent Open the mail on the device and tap the enrollment link in it to open the enrollment page. Click the application download link under 'For Android Devices'. You will be taken to the Google play store to download and install the agent. Step 2 - Configuring the agent The agent can be configured to connect to the ITSM management server in two ways: Automatic Configuration Manual Configuration Automatic Configuration Tap the enrollment link contained in the email after the completion of installation. 2017 Comodo Security Solutions Inc. All rights reserved 6

The agent will be automatically configured and the End User License Agreement screen will appear. Manual Configuration You can manually configure the agent to connect to ITSM server by entering the server settings and the token ID contained in the enrollment email. Open the agent by tapping the agent icon from your device. The agent configuration wizard will start enabling you to enroll the device by configuring the Server settings and unique PIN. Server Settings 2017 Comodo Security Solutions Inc. All rights reserved 7

Server Settings - Table of Parameters Form Element Type Description Server URL Text Field Enter the url of the ITSM server contained in the mail. Server port Text Field Enter the connection port of the server for your device to connect, as specified in the mail. (Default = 443) Tap the 'Connect' button. The 'Login' screen will open Logging-in to the Console You can login to the ITSM console in two ways: By entering the personal identification number (PIN) contained in the email By entering your username and password Entering PIN Tap the 'Pin Code' tab in the 'Login' screen 2017 Comodo Security Solutions Inc. All rights reserved 8

Enter the PIN (token) contained in the enrollment email Tap 'Login'. The End User License Agreement screen will appear. Entering your username and password Tap the 'AD Credentials' tab in the 'Login' screen Prerequisite: Enrollment of your device using your Active Directory (AD) credentials requires: Your network's AD server to be integrated with ITSM All users to be imported from the AD to ITSM. Contact your administrator if you are having issues connecting. 2017 Comodo Security Solutions Inc. All rights reserved 9

Enter your username contained in your account activation email and the password you set for your ITSM account. Tap the 'Login' button End User License Agreement The EULA screen will appear. 2017 Comodo Security Solutions Inc. All rights reserved 10

Scroll down the screen, read the EULA fully and click the 'I Accept' button at the bottom. The agent activation screen will appear. 2017 Comodo Security Solutions Inc. All rights reserved 11

Tap 'Activate'. The ITSM agent home screen will appear. 2017 Comodo Security Solutions Inc. All rights reserved 12

The device is enrolled to ITSM and can be remotely managed from the ITSM console. 3.2.Enrolling ios Devices After the administrator has added devices for a user, you will receive an enrollment email with instructions and link to the enrollment page. Clicking the link will open the device enrollment page containing links to download the ITSM profile and the server certificate. You should open the email in the ios device to be enrolled and follow the instructions. Note: The user must keep their ios device switched on at all times during enrollment. Enrollment may fail if the device auto-locks/ enters standby mode during the certificate installation or enrollment procedures. To enroll an ios device Open the mail in the device and tap the enrollment link in it. You will be taken to the enrollment page through your browser in the device. Tap the enrollment link under "For Apple Devices" 2017 Comodo Security Solutions Inc. All rights reserved 13

The 'Install Profile' wizard will start. Tap 'Install'. A confirmation dialog will be displayed. 2017 Comodo Security Solutions Inc. All rights reserved 14

Tap 'Install'. The ITSM Profile installation progress will be displayed. Before installation commences, a privacy warning containing information about the privileges granted to the administrator by installing this profile will be displayed. Read the warning fully and tap 'Install' to proceed. 2017 Comodo Security Solutions Inc. All rights reserved 15

Tap Install in the 'Warning' screen The installation process will continue and when completed the 'Profile Installed' screen will be displayed. Tap 'Done' to finish the ITSM profile installation wizard. Upon successful completion of profile installation, the ITSM client app installation will begin. The app is essential for supporting features such as app management, GPS location and messaging from the ITSM console. 2017 Comodo Security Solutions Inc. All rights reserved 16

The app will be downloaded from the itunes store, using the user's itunes account. The app is free, hence you will not be charged for installing the app. You need to enter their Apple account password to access itunes store. The App will be installed. To complete the enrollment, tap the green 'Run After Install' icon on the Home screen 2017 Comodo Security Solutions Inc. All rights reserved 17

The EULA screen for device management app will be displayed. Read the End User License Agreement fully and tap 'Accept' Tap 'OK'. The device will be successfully enrolled. 2017 Comodo Security Solutions Inc. All rights reserved 18

Tapping 'App Catalog' will display the ios apps that are installed, required to be installed and available for installing. 2017 Comodo Security Solutions Inc. All rights reserved 19

3.3.Enrolling Windows Endpoints The enrollment email contains instructions and links to the ITSM enrollment page. Clicking the link will open the ITSM device enrollment page, containing a link to download the Windows ITSM agent. You should open the email at the Windows endpoint to be enrolled and follow the instructions. Upon successful enrollment, the ITSM agent will be installed on the endpoint and automatically configured to connect to the ITSM server. Also, the endpoint security software 'Comodo Client - Security (CCS)' will be installed with 'Containment', 'Antivirus' and 'Firewall' components as specified during device enrollment by the administrator. To auto-enroll a Windows device Open the device enrollment email at the endpoint Click on the enrollment link under 'For Windows Devices'. The ITSM agent setup file will be downloaded. Double click on the file to install the agent. The installation will run in the background. After installation the device will be automatically enrolled to ITSM. The ITSM system tray icon displayed: will appear at the bottom right of your desktop and a confirmation message will be 2017 Comodo Security Solutions Inc. All rights reserved 20

Once the device is enrolled, the ITSM agent will automatically download and install CCS at the background. On completion of CCS installation, the device will restart for the CCS installation to take effect. For a manual device enrollment type host, port and token ID specified in the device enrollment form. 2017 Comodo Security Solutions Inc. All rights reserved 21

3.4.Enrolling Mac OS Devices After a device has been added for a user, they will receive an email containing an enrollment link. Clicking the link will open the enrollment page containing enrollment instructions and links to download the ITSM profile and agent for Mac OS devices. You should open the email on the target Mac OS device and follow the instructions. Enrolling a Mac OS device involves two steps: Step 1 - Installing the ITSM Configuration Profile Step 2 - Installing the ITSM Agent Step 1 - Installing the ITSM Configuration Profile To install the configuration profile Open the enrollment mail on the target device then tap the enrollment link. This will open the device enrollment page. Next, click the link under "For Apple Devices": The configuration file 'itsm.mobileconfig' will be downloaded and the 'Install Profile' wizard will be started. 2017 Comodo Security Solutions Inc. All rights reserved 22

Click 'Install'. You need to enter your password to install the profile. Enter your device username and password and click OK to continue the installation Confirmation dialog will appear for profile installation. To view the profile details, click 'Show Profile' 2017 Comodo Security Solutions Inc. All rights reserved 23

Click 'Continue' Click 'Install' The profile will be installed. Step 2 - Installing the ITSM Agent After installing the profile, the ITSM agent needs to be installed so the device can communicate with the ITSM server. To download and install the ITSM agent Open the device enrollment page and click the link to download the agent as shown below: 2017 Comodo Security Solutions Inc. All rights reserved 24

The agent setup package will be downloaded and the installation wizard will start. Click 'Continue' The End User License Agreement will be displayed. 2017 Comodo Security Solutions Inc. All rights reserved 25

Read the EULA and click 'Continue'. A confirmation dialog will appear. Click 'Agree' The next step allows you to choose the location at which the agent is to be installed. 2017 Comodo Security Solutions Inc. All rights reserved 26

To install the agent in the default location, click 'Continue'. To install the agent in a different location, click the disk icon, navigate to the new location and click 'Continue'. The next step allows you to choose the installation type and start the installation. 2017 Comodo Security Solutions Inc. All rights reserved 27

Click 'Install' You need to enter your device password to allow the installation: Enter your username and password and click 'Install Software' The installation will begin. Once installation is complete, the agent will start communicating with the ITSM server. 2017 Comodo Security Solutions Inc. All rights reserved 28

4. Logging-in to the ITSM Console Once your account is activated, you can login to the web based ITSM application using any Internet browser. If you do not know the URL of the login page, then please contact your administrator. Enter your username and password and click 'LOGIN' Important Note: Password is case sensitive. Please make sure that you are entering it in proper case and Caps Lock is set OFF. 2017 Comodo Security Solutions Inc. All rights reserved 29

If you have forgotten your password, click the 'I forgot my password' link below the Login button. In the 'Password recovery' page, complete the procedure. A mail will be sent to your registered email id, where by clicking the 'Reset password' link you can reset a new a password. After successful login, the ITSM welcome screen will be displayed. Depending on the role configured for you, the interface allows to manage profiles, associate profiles with device and add users in a few steps. Refer to the Administrator Guide at http://help.comodo.com/topic-399-1-786-10078introduction-to-comodo-it-and-security-manager.html for more details. 5. The Administrative Console The Administrative Console is the nerve center of ITSM allowing users to manage devices and users depending on the role assigned to them. Once logged-in, you can navigate to different areas of the console by clicking the tabs at the left hand side. The number of tabs available on the left hand side depends on the role permissions configured for you. To know more about settings and configurations, refer to the Administrator guide at http://help.comodo.com/topic-399-1-786-10078introduction-to-comodo-it-and-security-manager.html Dashboard Allows you to view snapshot summaries of details like operating systems, device types, AV scan status of devices enrolled to ITSM as pie-charts and more. See The Dashboard for more details. Settings - Allows you to view the software version details. See Viewing Version Information for more details. 5.1.The Dashboard The Dashboard displays a snapshot summary of all the devices enrolled to Comodo IT and Security Manager (ITSM), their types, ownership as pie charts. The dashboard also enables you to view the results of Valkyrie tests. To open the 'Dashboard', click the Dashboard tab from the left hand side. Audit - Displays statistical information of types of managed devices and ownership details as pie-charts. Refer to the Audit section for more details. Valkyrie - Displays the results of analysis of unknown files automatically uploaded from managed Windows devices from Valkyrie, as pie-chart. Refer to the section Valkyrie for more details. 2017 Comodo Security Solutions Inc. All rights reserved 30

Audit The Audit screen provides a snapshot summary of devices enrolled to Comodo IT and Security Manager (ITSM), their types and ownership as pie charts. To set which charts are shown, first open either the 'Audit', 'Compliance' or 'Valkyrie' dashboard using the links on the left then click 'Customize' at top of the interface. The 'Options' interface will be displayed. Use the 'On/Off' switches to add or remove a specific chart from the dashboard Click 'Back', to return to the main interface To refresh data in a tile, click the 'Refresh' icon at top right To swap tiles as per your preference, click and hold the grid icon at top right and move it. 2017 Comodo Security Solutions Inc. All rights reserved 31

Platform Details The 'Platform details' chart shows devices by operating system. Placing the mouse cursor over a sector or on the respective legend displays the details. Clicking on any of the legend will open the respective 'Device List' page. For example, clicking on 'Android' in the legend will open the 'Device List' page displaying the list of Android devices. Refer to the section 'Devices' for more details. Device Types The 'Device Types' pie chart shows the composition of your device fleet by device type. Placing the mouse cursor over a sector or on the respective legend displays the details. Clicking on any of the legend will open the respective 'Device List' page. For example, clicking on 'Tablet' in the legend will open the 'Device List' page displaying the list of tablet devices. Refer to the section 'Devices' for more details. BYOD Status The 'BYOD status' pie chart shows devices by ownership type. This can be 'Corporate', 'Personal' or 'Not Specified'. Placing the mouse cursor over a sector or on the respective legend displays the details. Clicking on any of the legend will open the respective 'Device List' page. For example, clicking on 'Personal' in the legend will open the 'Device List' page displaying the list of devices that are categorized as personal. Refer to the section 'Devices' for more details. Note: The device ownership type can be changed by administrators from the device details screen > Change BYOD and then selecting the ownership type from the options. Valkyrie Valkyrie is a cloud-based file analysis service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. 2017 Comodo Security Solutions Inc. All rights reserved 32

Unparalleled Protection by Comodo (Last Week) The 'Unparalleled protection by Comodo' pie-chart displays the number of threats identified by Valkyrie over the past week versus the user 's previous vendor and the antivirus industry as a whole. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. Unparalleled Protection By Comodo (All Time) The 'Unparalleled protection by Comodo' pie-chart displays the number of threats identified by Valkyrie since installation versus the user 's previous vendor and the antivirus industry as a whole. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. File Statistics (Windows Devices) The 'File Statistics (Windows Devices)' pie-chart displays the number of files identified with different ratings as per local file rating analysis and Valkyrie analysis. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. Clicking on any item in the legend will open the respective 'File List' page. For example, clicking on 'Unrecognized' will open the 'Application Control' > 'Unrecognized' page displaying the list of unrecognized files detected from enrolled devices. Refer to the section 'Viewing Applications Installed on Windows Devices' for more details. 2017 Comodo Security Solutions Inc. All rights reserved 33

Valkyrie File Verdicts (Last Week) The 'Valkyrie File Verdicts (Last Week)' pie-chart displays the number of files identified as malicious, or determined as 'Unknown' or that are whitelisted, total number of unknown files in the Valkyrie database as per last week. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. Valkyrie File Verdicts (All Time) The 'Valkyrie File Verdicts All Time)' pie-chart displays the number of files identified as malicious, or determined as 'Unknown' or that are whitelisted, total number of unknown files in the Valkyrie database as per entire period. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. For more details on Windows File List screen, refer to the section Viewing Applications Installed on Windows Devices. 5.2.Viewing Version and Support Information The 'Support' panel displays support contact information, the current product version number, and contains a list of platforms supported by this version of ITSM. To open the 'Support' pane, choose 'Settings' from the left and select 'Support'. 2017 Comodo Security Solutions Inc. All rights reserved 34

Contact Information - Displays the telephone numbers and email addresses for contacting Comodo for purchasing new licenses and contacting product support. Supported Device Platforms Displays the list of types of devices that can be managed by ITSM, with their supported OS versions. Summary Details Displays the version number of ITSM server. Users also can create a support ticket from the Comodo Client - Communication (ITSM agent) tray icon on Windows and Mac OS X devices. A ticket will be created in Service Desk and assigned to the selected department. To submit a support ticket, right click the ITSM agent tray icon and click 'Submit ticket...' The 'Submit ticket' dialog will be displayed. 2017 Comodo Security Solutions Inc. All rights reserved 35

Issue Summary Provide a short description of the issue. Department Select the department to whom the ticket should be assigned. Priority Level Select the priority from the drop-down. The levels are: Low, Normal, High and Critical. Issue Details Provide detailed description of the issue. Click 'Submit'. A support ticket will be created in the Service Desk module of the C1 account and assigned to the selected department. 2017 Comodo Security Solutions Inc. All rights reserved 36

About Comodo The Comodo organization is a global innovator of cybersecurity solutions, protecting critical information across the digital landscape. Building on its unique position as the world's largest certificate authority, Comodo authenticates, validates and secures networks and infrastructures from individuals to mid-sized companies to the world's largest enterprises. Comodo provides complete end-to-end security solutions across the boundary, internal network and endpoint with innovative technologies solving the most advanced malware threats, both known and unknown. With global headquarters in Clifton, New Jersey, and branch offices in Silicon Valley, Comodo has international offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom. For more information, visit comodo.com. Comodo Security Solutions, Inc. 1255 Broad Street Clifton, NJ 07013 United States Tel : +1.877.712.1309 Email: EnterpriseSolutions@Comodo.com For additional information on Comodo - visit http://www.comodo.com. 2017 Comodo Security Solutions Inc. All rights reserved 37