ITarian Help

Find the desired product help

ITarian

ITarian

ITarian Admin Guide

English

Print Help Download Help
Tool Set
  • Introduction To ITarian
  • Sign Up For An ITarian Account
    • Login To Your Account
  • The Admin Console
  • The Dashboard
  • Manage Admins, Staff And Roles
    • Manage Admins And Staff
    • Manage Roles
    • Admin Privilege Levels
  • Manage Companies
  • Manage Partners
  • Access ITarian Modules
  • App Store
    • Add Acronis Backup
    • Add Quote Manager
    • Add CWatch
    • Upgrade Endpoint Manager
    • Add Comodo Secure Web Gateway
    • Upgrade Secure Internet Gateway
    • Add Customer Relationship Management
    • Add Comodo Dome Cloud Firewall
    • Add Comodo Data Loss Prevention
    • Add Comodo Secure Email Gateway Enterprise
    • Add Comodo Secure Email Gateway - MSP
    • Add Comodo Dome Firewall Virtual Appliance
    • Add Comodo Dome Firewall Central Manager
    • Add CWatch EDR
    • Add Service Desk
    • Add MDR
  • Quick Actions
  • Tool Set
  • Manage Your Account
    • Update Your Account Details And Customize Reports
    • ITarian License Account Details
    • Account Security Settings
    • Remote Access Support
  • Manage Subscriptions, Usage, Billing And Settings
    • Manage Subscriptions
    • View Usage Details
    • View Billing Details
    • Configure App Settings And Service URL
  • Reports
  • Notifications
  • View Audit Logs
  • Configure ITarian Settings
  • ITarian Support
  • View Release Notes
  • Appendix 1 - ITarian Versions
  • Appendix 2 - Charging For Managed Devices
  • About ITarian

Tool Set


  • Click 'Tools' on the menu bar.

The tools area contains a suite of free productivity and security applications. Each tool is designed to help customers accomplish specific management and security tasks more efficiently.


Download ITarian tools

  • Click 'Tools' on the menu bar



The following are available:

  • Xcitium Cleaning Essentials - Security software for Windows which removes malware and kills unsafe processes on infected computers. Includes a fully customizable malware scanner and a tool which lets you identify and terminate unsafe processes with a single click. See 'Xcitium Cleaning Essentials' for more information.
    • Network Assessment Tool – Scan customer networks to identify a wide range of server, endpoint and network vulnerabilities. The tool also generates detailed reports and risk mitigation plans with actionable advice to address each issue. See 'Network Assessment Tool' to find out more.
      • Unknown File Hunter Tool - Unknown file hunter (UFH) is a lightweight scanner that identifies unknown and potentially malicious files residing on networks. Scanned files are categorized as 'safe', 'malicious' or 'unknown'. Unknown files are those that were not found on either the safe-list or the blacklist and could potentially contain zero-day threats. The UFH scanner allows you to upload such files to our Valkyrie servers where they will undergo a battery of run-time tests designed to reveal whether or not they are harmful. You can view the results of these tests in the UFH interface. See 'Unknown File Hunter Tool' to find out more.

      • Auto Discovery and Deployment Tool - Remotely deploy applications to multiple endpoints via Active Directory, Workgroup or IP address/IP range/host name. See 'Auto Discovery and Deployment Tool' to find out more.
      • Remote Control by ITarian - Remotely access Windows and Mac OS devices to solve issues, install third party software or run system maintenance. See 'Remote Control by ITarian' to find out more.
      • ITarian Remote Access Tool – Independent tool for system administrators to view and address issues instantly. See ITarian Remote Access Tool to know more details.
      • Agent  Removal Tool - Delete any files and registry keys that may remain on a Windows endpoint after a regular uninstall of Agents. See Agent Removal Tool for more details.

            Network Assessment Tool

            • Scan customer networks to identify all vulnerabilities and threats.
            • Detailed client risk report assigns a score to each threat found on an endpoint.
            • Risk mitigation plans contain advice to address every discovered issue.
            • Easy setup lets you import networks via Active Directory, Workgroup or IP range.

            Download NAT

            • Click 'Tools' in the top-menu
            • Locate the Network Assessment Tool' tile
            • Click the 'Download' button.
            • Select the operating system of the server on which you wish to install NAT.


            • Click 'Download' to get the tool

            Next, transfer the setup file to your server and install. For more details on how to install and use the application, see https://help.comodo.com/topic-452-1-953-13328-Introduction-to-Network-Assessment-Tool.html.


            Xcitium Cleaning Essentials


            Xcitium Cleaning Essentials (XCE) is a set of computer security tools designed to help users identify and remove malware and unsafe processes from infected Windows computers. XCE is a portable application which requires no installation.


            Major features include:

            • Malware scanner - Fully customizable scanner capable of unearthing and removing viruses, rootkits, hidden files and malicious registry keys hidden deep in your system.
            • KillSwitch - an advanced system monitoring tool that allows users to identify, monitor and stop any unsafe processes that are running on their system.
            • Autorun Analyzer - An advanced utility to view and handle services and programs that were loaded when your system booted-up.

            For more details on using the application, see https://help.comodo.com/topic-119-1-328-3516-Introduction-to-Comodo-Cleaning-Essentials.html.


            Download XCE

            • Click 'Tools' in the top-menu
            • Click the 'Info' button in the 'Xcitium Cleaning Essentials' tile to view a description of the product:




            • Click the 'Download' button.



            • Windows version - select the version appropriate to the endpoints on which you want to use XCE.
            • Click the 'End User License/Service Agreement' link, read the EULA fully and select the check box to agree to it. The 'Download' button will appear after you agree to the EULA.
            • Click 'Download' to get the tool.

            For more help to use XCE, see https://help.comodo.com/topic-119-1-328-3516-Introduction-to-Comodo-Cleaning-Essentials.html.

             

            Unknown File Hunter

            • Unknown File Hunter (UFH) is a lightweight scanner which identifies unknown, potentially malicious, files on your network.
            • After scanning your systems, it classifies all audited files as 'Safe', 'Malicious' or 'Unknown'.
            • 'Safe' files are OK and 'Malicious' files should be quarantined or deleted.
            • 'Unknown' files are those which cannot be classified as 'safe' or 'malicious'. All viruses and zero-day threats start life as an 'Unknown' file.
            • UFH lets you upload these files to our Valkyrie servers for analysis. Valkyrie tests unknown files with a battery of run-time tests to reveal whether or not they are harmful. You can view the results of these tests in the UFH interface.

            For more details on the application, see https://help.comodo.com/topic-400-1-794-10426-Introduction-to-Comodo-Unknown-File-Hunter.html


            Auto Discovery and Deployment Tool

            • Remotely deploy applications to multiple endpoints via Active Directory, Workgroup or IP address/IP range/host name.
            • The utility can be used to remotely install .exe, .msi or .mst packages.
            • ADDT is a portable app which does not require installation. Simply double-click on ADDT.exe to run the application.

            Download the Auto Discovery and Deployment tool

            • Click 'Tools' in the top-menu
            • Locate the 'Auto-Discovery and Deployment' tile
            • Click the 'Download' button
            • Agree to the terms and conditions
            • Click 'Download':



            • Simply open the file to run the application - no installation is required.

            Remote Control by ITarian

            • Remotely access Windows and Mac endpoints enrolled to Endpoint Manager.
            • From here, you can solve issues, install third party software, run system maintenance and more.


            Download the remote control tool

            • Click 'Tools' in the top-menu
            • Locate the 'Remote Control' tile
            • Click the 'Download' button.
            • Select the operating system of the admin computer on which you wish to install the tool.
            • Click the 'Download' button:



            For more details about using the application, see https://help.comodo.com/topic-399-1-786-12348-Download-and-Install-the-Remote-Control-Tool.html

             

            ITarian Remote Access Tool

            • Standalone tool to remotely gain access to the client computer
            • Enables you to immediately troubleshoot issues, access files on network endpoints, run system maintenance and more.

            Download the ITarian Remote Access tool

            • Click 'Tools' in the top-menu from the computer you want to control
            • Locate the 'ITarian Remote Access Tool' tile
            • Click the 'Download' button.
            • Select the file from your 'Downloads' folder and
            • Agree to the terms and conditions
            • Click 'Install':




            For more details about using the application, see https://help.comodo.com/topic-452-1-947-13101-ITarian-Remote-Access---User-Guide.html


            Agent Removal Tool
            • The CCS removal tool is used to uninstall Comodo products that you are having difficulties removing with the normal Windows uninstaller. The tool is designed for Windows only.
            • It scans the entire target system and removes Comodo application files, drivers, dlls and registry entries. It also creates a system restore point prior to performing the uninstall.
            • This tool should only be used if you are having difficulties removing CCS or other Comodo products via Windows control panel.
            This section explains how to download and use the tool, plus two other methods for removing CCS:
            • Download the removal tool
            • Use the removal tool
            • Alternative – uninstall via Endpoint Manager
            • Alternative – uninstall locally

            Download the removal tool

            • Click 'Tools' in the top-menu
            • Locate the 'CCS Removal Tool' tile
            • Click the 'Download' button.




            • Select the operating system of the device on which you wish to use the tool.
            • Click 'Download' and save the tool.
            • Transfer the tool to the device on which the CCS is to be removed.

            Use the removal tool

            • Run the CCS removal tool




            • Read the advisory, agree to the EULA then click 'I accept' to continue:



            • Click 'Scan' to search for Comodo security products.




            • Click 'Continue' to remove the items, if If the tool detects any of the specified products




            • Click 'Restart' after the uninstallation process is complete
            • The tool requires a second restart to finalize the removal.


            Uninstall CCS using Endpoint Manager

            • Click 'Devices' > 'Device List' > 'Device Management'
            • Select a company or group on the left to view devices in the group
            Or
            • Select 'Show All' to view every device enrolled to EM
            • Click the name of a Windows device to open its device details interface
            • Click the 'Software Inventory' tab
            • Select 'Comodo Client – Security'
            • Click 'Uninstall Application(s)' from the top.




            Uninstall CCS locally using the control panel

            • Type 'Add/Remove Programs' into the Windows search box
            • Windows 10 – The search box is pinned to the task bar
            • Windows 7 and other versions - Click the 'Start' button to view the search box
            • Locate the Comodo product you wish to remove in the list of programs
            • Click 'Uninstall'.

            Comodo Help
            • IT Platform:
            • Help
            • Scripts
            • Wiki
            • Forum
            • Developer
            • RMM
            • Patch Management
            • Service Desk
            • ITSM
            • Managed Service Provider
            • Managed Detection and Response
            • Ticketing System
            • Helpdesk
            • ITIL

            Copyright 2025 Itarian