Comodo IT and Security Manager Software Version 5.4

Similar documents
Comodo IT and Security Manager Software Version 6.4

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.9

Comodo Device Manager Software Version 4.0

rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo Device Manager Software Version 4.0

Importing and exporting your or Personal Authentication certificate with Opera

Importing and exporting your or Personal Authentication certificate using Google Chrome

Importing and exporting your or Personal Authentication certificate using Internet Explorer

Importing and Using your or Personal Authentication certificate with Windows Live Mail

Comodo SecureBox Management Console Software Version 1.8

Comodo Certificate Manager Version 5.4

1 Comodo One Home Edition - FAQ

Importing and Using your or Personal Authentication certificate with Mac OS X Mail / Apple Mail

Comodo APT Assessment Tool

Comodo Web Application Firewall for Plesk Software Version 2.11

Comodo cwatch Web Security Software Version 1.0

Comodo Endpoint Manager Software Version 6.25

Importing and exporting your or Personal Authentication certificate using Mozilla Firefox

Importing your or Personal Authentication certificate to Android Devices

Comodo Endpoint Manager Software Version 6.25

Comodo Endpoint Manager Software Version 6.26

Comodo Endpoint Security Manager Professional Edition Software Version 3.5

Importing and Using your or Personal Authentication certificate with The Bat!

Importing and Using your or Personal Authentication certificate with Mozilla SeaMonkey Client (PC)

Comodo SecureBox Management Console Software Version 1.9

Comodo ONE Software Version 3.2

Importing and Using your or Personal Authentication Certificate with Outlook 2010 / 2013

Comodo One Home Edition - FAQ

Comodo One Software Version 3.5

Comodo Cloud Drive Software Version 1.0

Comodo Certificate Manager Version 5.7

Comodo One Home Edition - FAQ

Comodo Certificate Manager Version 5.5

Comodo Dome Shield - Admin Guide

Comodo Certificate Manager

Comodo One Home Edition - FAQ

Comodo Certificate Manager Software Version 5.6

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Comodo IT and Security Manager Software Version 5.5

Comodo One Software Version 3.3

Comodo Unknown File Hunter Software Version 5.0

Comodo IT and Security Manager Software Version 6.9

Comodo cwatch Web Security Software Version 1.1

Comodo Unknown File Hunter Software Version 2.1

CCloud for ios Devices

Comodo One Software Version 3.16

Comodo IT and Security Manager Software Version 6.4

Comodo SecureBox Management Console Software Version 1.9

Comodo Auto Discovery and Deployment Tool Software Version 1.0

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo Certificate Manager Software Version 5.0

Comodo cwatch Office Software Version 1.0

Comodo Internet Security Software Version 10.1

Comodo IT and Security Manager Software Version 6.5

Comodo One Software Version 3.3

Comodo Certificate Manager

Comodo ONE Software Version 3.3

Comodo Certificate Manager

Comodo Internet Security Software Version 11.0

Comodo Accounts Management Software Version 15.0

Comodo ONE Software Version 1.8

Comodo SecureBox Management Console Software Version 1.9

Comodo LoginPro Software Version 1.0

Comodo IT and Security Manager Software Version 6.15

nuwire Quick Start Guide

nuwire - FAQ What is nuwire?

Comodo Endpoint Security Manager Software Version 3.4

Comodo One Mobile Software Version 1.16

Comodo IT and Security Manager Software Version 6.15

Comodo Certificate Manager

Comodo cwatch Web Security Software Version 1.6

Comodo IT and Security Manager Software Version 6.4

Comodo Certificate Manager Software Version 5.7

Comodo Certificate Manager

Comodo Accounts Management Software Version 17.0

Comodo IT and Security Manager Software Version 6.19

Comodo Certificate Manager Version 5.5

Comodo Dome Shield - Admin Guide

Comodo One Software Version 3.26

Comodo Certificate Manager Version 5.7

Comodo One Software Version 3.18

Comodo Internet Security Software Version 10.0

Auto Discovery and Deployment Tool Software Version 1.0

Comodo SiteInspector Software Version 3.3

Comodo Internet Security Essentials Software Version 1.3

Comodo Endpoint Manager Software Version 6.26

Comodo Dome Data Protection Software Version 3.8

Comodo TrustConnect Software Version 1.72

Comodo Certificate Manager Version 5.6

Hi rat. Comodo Valkyrie. Software Version User Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo One Software Version 3.16

Comodo Next Generation Security Information and Event Management Software Version 1.4

Comodo One Software Version 3.16

rat ITarian Software Version 3.26 Network Assessment Tool Quick Start Guide Guide Version Broad Street Clifton, NJ 07013

Comodo One Software Version 3.26

Abila Nonprofit Online. Connection Guide

Comodo TrustConnect Software Version 1.72

Comodo Accounts Management Software Version 23.0

Pulse Workspace Appliance. Administration Guide

Transcription:

Comodo IT and Security Manager Software Version 5.4 End User Guide Guide Version 5.4.090716 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Table of Contents 1. Introduction to Comodo IT and Security Manager... 3 2. Create An Account... 3 3. Enroll Your Device... 4 3.1.Enrolling Android Devices...4 3.2.Enrolling ios Devices...12 3.3.Enrolling Windows Endpoints...19 3.4.Enrolling Mac OS Devices...21 4. Logging-in to the ITSM Console... 28 5. The Administrative Console... 29 5.1.The Dashboard...30 5.2.Viewing Version Information...33 About Comodo... 35 2016 Comodo Security Solutions Inc. All rights reserved 2

1. Introduction to Comodo IT and Security Manager Comodo IT and Security Manager (ITSM) is a centralized device management system that allows network administrators to manage, monitor and secure mobile devices which connect to enterprise networks. Once you have enrolled your Android, ios, Windows or Mac OS X device, it will have a security policy applied to it which will authenticate it to your company network and protect it from malware. This guide explains how to enroll your device and how to login to the ITSM user interface and view reports. If given appropriate privileges, you may be able to control some other aspects of your device too. Create an Account Enroll your Device Android Devices ios Devices Windows Devices Mac OS X Devices Logging-in to the ITSM console The Administrative Console The Dashboard Viewing Version Information 2. Create An Account After your ITSM administrator has created a user account for you, you will receive an activation mail at your registered email address. Click the link in the mail to activate your account. You will be taken to the account activation page. 2016 Comodo Security Solutions Inc. All rights reserved 3

Enter a new password for your account and re-enter it for confirmation in the respective text fields. Click the 'Activate' button. Your account will be activated and you will be taken to the login page of ITSM. See the section Logging-in to ITSM console for more details. Your administrator can now add your devices to ITSM. 3. Enroll Your Device After your administrator has added your device, you will receive a device enrollment mail. This will contain links which will allow you to download and install the ios, Android or Windows software appropriate for your device. You can use the same enrollment email to enroll multiple devices. Please ensure you open the mail on the device you wish to enroll. The following sections provide detailed explanations on enrolling devices with different operating systems. Enrolling Android Devices Enrolling ios Devices Enrolling Windows Endpoints Enrolling Mac OS X Devices 3.1.Enrolling Android Devices The enrollment email contains a link to download the android ITSM agent and a link to configure the agent. The email will also contain instructions to and enroll the device in two steps. Step 1 Download and Install the agent Step 2 - Configuring the agent Step 1 - Download and Install the agent Open the mail in the device and tap the application download link under 'For Android Devices'. 2016 Comodo Security Solutions Inc. All rights reserved 4

You will be taken to the Google play store to download and install the agent. Step 2 - Configuring the agent The agent can be configured to connect to the ITSM management server in two ways: Automatic Configuration Manual Configuration Automatic Configuration Tap the enrollment link contained in the email after the completion of installation. 2016 Comodo Security Solutions Inc. All rights reserved 5

The agent will be automatically configured and the End User License Agreement screen will appear. Manual Configuration You can manually configure the agent to connect to ITSM server by entering the server settings and the token ID contained in the enrollment email. Open the agent by tapping the agent icon from your device. The agent configuration wizard will start enabling you to enroll the device by configuring the Server settings and unique PIN. Server Settings 2016 Comodo Security Solutions Inc. All rights reserved 6

Server Settings - Table of Parameters Form Element Type Description Server URL Text Field Enter the url of the ITSM server contained in the mail. Server port Text Field Enter the connection port of the server for your device to connect, as specified in the mail. (Default = 443) Tap the 'Connect' button. The 'Login' screen will open Logging-in to the Console You can make the app to login to the ITSM console in two ways: By entering the personal identification number (PIN) contained in the email By entering your username and password Entering PIN Tap the 'Pin Code' tab in the 'Login' screen 2016 Comodo Security Solutions Inc. All rights reserved 7

Enter the PIN (token) contained in the enrollment email Tap 'Login'. The End User License Agreement screen will appear. Entering your username and password Tap the 'AD Credentials' tab in the 'Login' screen 2016 Comodo Security Solutions Inc. All rights reserved 8

Enter your username contained in your account activation email and the password you set for your ITSM account. Tap the 'Login' button End User License Agreement The EULA screen will appear. 2016 Comodo Security Solutions Inc. All rights reserved 9

Scroll down the screen, read the EULA fully and click the 'I Accept' button at the bottom. The Agent activation screen will appear. 2016 Comodo Security Solutions Inc. All rights reserved 10

Tap 'Activate'. The ITSM agent home screen will appear. 2016 Comodo Security Solutions Inc. All rights reserved 11

The device is enrolled to ITSM and can be remotely managed from the ITSM console. 3.2.Enrolling ios Devices After the administrator has added devices for a user, the user will receive an enrollment email with a link to a page containing the enrollment instructions and links to download the ITSM profile and the server certificate. The user should open the email in the ios device to be enrolled and follow the instructions. Note: The user must keep their ios device switched on at all times during enrollment. Enrollment may fail if the device auto-locks/ enters standby mode during the certificate installation or enrollment procedures. To enroll an ios device Open the mail in the device and tap the enrollment link in it. You will be taken to the enrollment page through your browser in the device. Tap the enrollment link under "For Apple Devices" 2016 Comodo Security Solutions Inc. All rights reserved 12

The 'Install Profile' wizard will start. Tap 'Install'. A confirmation dialog will be displayed. 2016 Comodo Security Solutions Inc. All rights reserved 13

Tap 'Install'. The ITSM Profile installation progress will be displayed. A privacy warning screen with the privileges granted to the administrator by installing this profile will be displayed during the installation process. Read the warning fully and tap 'Install' to proceed. 2016 Comodo Security Solutions Inc. All rights reserved 14

Tap Install in the 'Warning' screen The installation process will continue and when completed the 'Profile Installed' screen will be displayed. Tap 'Done' to finish the ITSM profile installation wizard. Upon successful completion of profile installation, the ITSM client app installation will begin. The app is essential for supporting the features such as apps management, GPS location and messaging from the ITSM console. 2016 Comodo Security Solutions Inc. All rights reserved 15

The app will be downloaded from itunes store, using the user's itunes account. The app is free, hence you will not be charged for installing the app. You need to enter their Apple account password to access itunes store. The App will be installed. To complete the enrollment, tap the green 'Run After Install' icon from the Home screen 2016 Comodo Security Solutions Inc. All rights reserved 16

The EULA screen for device management app will be displayed. Read the End User License Agreement fully and tap 'Accept' Tap 'OK'. The device will be successfully enrolled. 2016 Comodo Security Solutions Inc. All rights reserved 17

Tapping 'App Catalog' will display the ios apps that are installed, required to be installed and available for installing. 2016 Comodo Security Solutions Inc. All rights reserved 18

3.3.Enrolling Windows Endpoints The enrollment email contains instructions and links to download the Windows ITSM agent. You should open the email at the Windows endpoint to be enrolled and follow the instructions. Upon successful enrollment, the ITSM agent will be installed on the endpoint and automatically configured to connect to the ITSM server. Also, the endpoint security software 'Comodo - Security (CCS)' will be installed with 'Sandbox', 'Antivirus' and 'Firewall' components as specified during device enrollment by the administrator. To auto-enroll a Windows device Open the device enrollment email at the endpoint Click on the enrollment link under 'For Windows Devices'. The ITSM agent setup file will be downloaded. Double click on the file to install the agent. On completion of installation, the device will be automatically enrolled o the ITSM server and a confirmation message will be displayed. 2016 Comodo Security Solutions Inc. All rights reserved 19

Once the device is enrolled, the ITSM agent will automatically download and install CCS at the background. On completion of CCS installation, the device will restart for the CCS installation to take effect. For a manual device enrollment type host, port and token ID specified in the device enrollment form. 2016 Comodo Security Solutions Inc. All rights reserved 20

3.4.Enrolling Mac OS Devices After a device has been added for a user, they will receive an email containing enrollment instructions and links to download the ITSM profile and agent for Mac OS devices. You should open the email on the target Mac OS device and follow the instructions. Enrolling a Mac OS device involves two steps: Step 1 - Installing the ITSM Configuration Profile Step 2 - Installing the ITSM Agent Step 1 - Installing the ITSM Configuration Profile To install the configuration profile Open the enrollment mail on the target device then tap the enrollment link. This will open the device enrollment page. Next, click the link under "For Apple Devices": The configuration file 'itsm.mobileconfig' will be downloaded and the 'Install Profile' wizard will be started. 2016 Comodo Security Solutions Inc. All rights reserved 21

Click 'Install'. You need to enter your password to install the profile. Enter your device username and password and click OK to continue the installation Confirmation dialog will appear for profile installation. To view the profile details, click 'Show Profile' 2016 Comodo Security Solutions Inc. All rights reserved 22

Click 'Continue' Click 'Install' The profile will be installed. Step 2 - Installing the ITSM Agent After installing the profile, the ITSM agent needs to be installed so the device can communicate with the ITSM server. To download and install the ITSM agent Open the device enrollment page and click the link to download the agent as shown below: 2016 Comodo Security Solutions Inc. All rights reserved 23

The agent setup package will be downloaded and the installation wizard will start. Click 'Continue' The End User License Agreement will be displayed. 2016 Comodo Security Solutions Inc. All rights reserved 24

Read the EULA and click 'Continue'. A confirmation dialog will appear. Click 'Agree' The next step allows you to choose the location at which the agent is to be installed. 2016 Comodo Security Solutions Inc. All rights reserved 25

To install the agent in the default location, click 'Continue'. To install the agent in a different location, click the disk icon, navigate to the new location and click 'Continue'. The next step allows you to choose the installation type and start the installation. 2016 Comodo Security Solutions Inc. All rights reserved 26

Click 'Install' You need to enter your device password to allow the installation: Enter your username and password and click 'Install Software' The installation will begin. Once installation is complete, the agent will start communicating with the ITSM server. 2016 Comodo Security Solutions Inc. All rights reserved 27

4. Logging-in to the ITSM Console Once your account is activated, you can login to the web based ITSM application using any Internet browser. If you do not know the URL of the login page, then please contact your administrator. Enter your username and password and click 'LOGIN' 2016 Comodo Security Solutions Inc. All rights reserved 28

Important Note: Password is case sensitive. Please make sure that you are entering it in proper case and Caps Lock is set OFF. If you have forgotten your password, click the 'I forgot my password' link below the Login button. In the 'Password recovery' page, complete the procedure. A mail will be sent to your registered email id, where by clicking the 'Reset password' link you can reset a new a password. After successful login, the ITSM welcome screen will be displayed. Depending on the role configured for you, the interface allows to manage profiles, associate profiles with device and add users in a few steps. Refer to the Administrator Guide at http://help.comodo.com/topic-399-1-786-10078introduction-to-comodo-it-and-security-manager.html for more details. 5. The Administrative Console The Administrative Console is the nerve center of ITSM allowing users to manage devices and users depending on the role assigned to them. Once logged-in, you can navigate to different areas of the console by clicking the tabs at the left hand side. The number of tabs available on the left hand side depends on the role permissions configured for you. To know more about settings and configurations, refer to the Administrator guide at http://help.comodo.com/topic-399-1-786-10078introduction-to-comodo-it-and-security-manager.html Dashboard Allows you to view snapshot summaries of details like operating systems, device types, AV scan status of devices enrolled to ITSM as pie-charts and more. See The Dashboard for more details. Settings - Allows you to view the software version details. See Viewing Version Information for more details. 2016 Comodo Security Solutions Inc. All rights reserved 29

5.1.The Dashboard The Dashboard displays a snapshot summary of all the devices enrolled to Comodo IT and Security Manager (ITSM), their types, ownership as pie charts. The dashboard also enables you to view the results of Valkyrie tests. To open the 'Dashboard', click the Dashboard tab from the left hand side. Audit - Displays statistical information of types of managed devices and ownership details as pie-charts. Refer to the Audit section for more details. Valkyrie - Displays the results of analysis of unknown files automatically uploaded from managed Windows devices from Valkyrie, as pie-chart. Refer to the section Valkyrie for more details. Audit The Audit screen provides a snapshot summary of devices enrolled to Comodo IT and Security Manager (ITSM), their types and ownership as pie charts. To set options for modules under the 'Audit' or 'Valkyrie', click the 'Customize' at top of the interface. The 'Options' interface will be displayed. 2016 Comodo Security Solutions Inc. All rights reserved 30

Choose 'On/Off' button to enable or disable the settings Click 'Back', to return to the main interface To refresh data in a tile, click the 'Refresh' icon at top right To swap tiles as per your preference, click the grid icon at top right Platform Details The 'Platform details' pie chart and legends provides ata-glance comparison of devices of different Operating Systems. Placing the mouse cursor over a sector or on the respective legend displays the details. Device Types The 'Device Types' pie chart and legends provides at-aglance comparison of devices of different types like smart phones, Windows server, PC and tablets. Placing the mouse cursor over a sector or on the respective legend displays the details. 2016 Comodo Security Solutions Inc. All rights reserved 31

BYOD Status The 'BYOD status' pie chart and legends provides at-aglance comparison of ownership of enrolled devices, like personal devices of the users, company owned devices lent to the users and so on. Placing the mouse cursor over a sector or on the respective legend displays the details. Valkyrie Valkyrie is a cloud-based file analysis service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. Unparalleled Protection by Comodo (Last Week) The 'Unparalleled protection by Comodo' pie-chart displays the number of threats identified with Valkyrie analysis versus the user 's previous vendor as per last week. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. Unparalleled Protection By Comodo (All Time) The 'Unparalleled protection by Comodo' pie-chart displays the number of threats identified with Valkyrie analysis versus the user 's previous vendor as per entire period. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. 2016 Comodo Security Solutions Inc. All rights reserved 32

File Statistics (Windows Devices) The 'File Statistics (Windows Devices)' pie-chart displays the number of files identified with different ratings as per local file rating analysis and Valkyrie analysis. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. Valkyrie File Verdicts (Last Week) The 'Valkyrie File Verdicts (Last Week)' pie-chart displays the number of files identified as malicious, or determined as 'Unknown' or that are whitelisted, total number of unknown files in the Valkyrie database as per last week. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. Valkyrie File Verdicts (All Time) The 'Valkyrie File Verdicts All Time)' pie-chart displays the number of files identified as malicious, or determined as 'Unknown' or that are whitelisted, total number of unknown files in the Valkyrie database as per entire period. Placing the mouse cursor over a sector or on the respective legend displays the percentage of number of files in that category among the total number of files analyzed. 5.2.Viewing Version Information The Version information pane displays the version numbers of Comodo IT and Security Manager s applications. To open the 'Support' pane, choose 'Settings' from the left and select 'Support'. 2016 Comodo Security Solutions Inc. All rights reserved 33

Contact Information - Displays the telephone numbers and email addresses for contacting Comodo for purchasing new licenses and contacting product support. Supported Device Platforms Displays the list of types of devices that can be managed by ITSM, with their supported OS versions. Summary Details Displays the version number of ITSM server. 2016 Comodo Security Solutions Inc. All rights reserved 34

About Comodo The Comodo organization is a global innovator and developer of cyber security solutions, founded on the belief that every single digital transaction deserves and requires a unique layer of trust and security. Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo s proven solutions to authenticate, validate and secure their most critical information. With data protection covering endpoint, network and mobile security, plus identity and access management, Comodo s proprietary technologies help solve the malware and cyber-attack challenges of today. Securing online transactions for thousands of businesses, and with more than 85 million desktop security software installations, Comodo is Creating Trust Online. With United States headquarters in Clifton, New Jersey, the Comodo organization has offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom. Comodo Security Solutions, Inc. 1255 Broad Street Clifton, NJ 07013 United States Tel : +1.877.712.1309 Email: EnterpriseSolutions@Comodo.com For additional information on Comodo - visit http://www.comodo.com. 2016 Comodo Security Solutions Inc. All rights reserved 35