Install Comodo Client Security
You can use the Endpoint Manager (EM) interface to deploy Comodo Client Security (CCS) to your endpoints. You can purchase EM as stand-alone application or as a part of the ITarian platform.
Please see the following links if you do not already have an EM license:
- ITarian - Sign up for ITarian at https://www.itarian.com/signup/
- After signup, login and click 'Applications > 'Endpoint Manager'
- Stand-alone Endpoint Manager
- Visit https://secure.comodo.com/home/purchase.php?pid=98&license=try for the trial version or https://secure.comodo.com/home/purchase.php?pid=98 for the full version.
- You can access your EM instance at the URL provided during setup.
The following tutorial covers user and device enrollment before moving onto CCS installation:
You can deploy CCS onto endpoints only after adding users to Endpoint Manager.
- ITarian MSP customers - You can create multiple companies and enroll users to any of them.
- ITarian Enterprise, and stand-alone Endpoint Manager customers - All users are enrolled to the default company.
Add a user
- Click 'Users' > 'User List' > click the 'Create User' button
or
-
Click the 'Add' button on the menu bar and choose 'Create User'.
The 'Create new user' form will open.
- Type a login username (mandatory), email address (mandatory) and phone number for the user
- Company - Choose the organization to which you want to enroll the user.
- Role
A 'role' determines user permissions within the Endpoint Manager console itself. Endpoint Manager ships with two default roles:
- Administrator - Full administrative privileges in the Endpoint Manager console. The permissions for this role are not editable.
- User - In most cases, a 'user' will simply be an owner of a managed device who should not require elevated privileges in the management system. Under default settings, 'Users' cannot login to Endpoint Manager.
- Click 'Submit' to add the user to Endpoint Manager.
A confirmation message is shown:
- Repeat the process to add more users
- New users are added to the 'Users' interface (click 'Users' > 'User List')
Tip: You can also bulk import users from a .csv file. See https://help.itarian.com/topic-459-1-1005-14884-Import-Users-from-a-CSV-File.html for more details. |
Step 2 - Enroll Devices
The next step is to enroll user devices so you can manage them with Endpoint Manager.
- Click 'Users' then 'User List'
- Select the user(s) whose devices you wish to enroll then click the 'Enroll Device' button
Or
- Click the 'Add' button on the menu bar and choose 'Enroll Device'.
This starts step 1 of the device enrollment wizard:
Step 1 - Device Options
- Current device - Enrolls the device you are currently using. You may disregard this option at this stage as we are adding multiple devices with the 'Other device' option.
- Other device - Add devices owned by the users you selected previously. Those users should already be listed in the 'Specify User' box:
- You can add additional, existing users by simply typing their email address in the box. Endpoint Manager will auto-suggest users that have already been created.
- Create New User - Click if you want to add a new user to Endpoint Manager. You cannot add devices unless you have first added the users that own them.
- Click 'Next' to proceed to step 2.
Step 2 - Enrollment Options
Enrollment Type
Applies to Windows, Mac and Linux devices.
- Enroll and Protect - Installs both the communication client and the security client
- Just Enroll - Installs only the communication client
Background. There are two types of client:
- Communication Client - Connects the device to Endpoint Manager for central management. It is mandatory to install this client.
- Security Client - This is the security software. Depending on the operating system, it includes antivirus, firewall, threat-containment, web-filtering, and more. It is optional to install this client.
TLDR
- Click ‘Not Specified’ if you only want to install the communication client on target devices. The wizard will detect the target operating system and send the appropriate client to the device user.
- Click one of the operating system tiles if you also want to install the security client. Make sure the target devices use the operating system you selected.
Option 1 - Enroll + Protect - Single Operating System
- Choose this if you want to deploy both communication and security clients
- Click the Windows OS box. Please make sure all your target devices use this operating system.
- The wizard will send enrollment mails which only contain download links for the Windows clients.
- You can customize enrollment options as required. You can configure items such as enrollment type, reboot policy, client version, configuration profile and device name.
- Note - Please uninstall any other antivirus products from target endpoints before proceeding. Failure to do so could cause conflicts that mean CCS does not function correctly.
Option 2 - Just Enroll - Multiple Operating Systems
-
Choose this if you only want to deploy the communication client. If required, you can install the security client later after enrolling the endpoint.
Click 'Next' to skip to step 3 if you are happy with your choices thus far.
- Click 'Devices' > 'Device List'
- Select the target devices
- Click the 'Install or Update Package' button > Choose 'Install Comodo Client – Security'.
OR
See the
tables below for
more information about the options on this page.
Setting |
Description |
---|---|
Choose platform |
Select Window OS version. 64 bit, 32 bit, or
hybrid.
|
Use default Communication Client version |
This client enrolls the endpoint for central management.
|
Use default Communication Client Security version |
This client installs security software such as antivirus, firewall and auto-containment.
|
Additional options |
AV Database - Choose whether to include
the latest virus database with the installation package. This
increases the size of the package. If disabled, the client will download the latest database anyway when you run the first virus scan. |
Configuration Profile |
A configuration profile is a collection of
settings which specify a device's network access rights, security
settings, antivirus scan schedule, and more. The default is 'Windows - Security Level 1' profile. Choose a different profile if required.
|
Set Reboot Options |
Endpoints need to be restarted to complete CCS installation. You have the following restart options:
|
Device Name Options |
|
- Click 'Next' to proceed to step 3
Review your choices so far.
- Click ‘Back’ or 'Change Configuration' (top-right) to revise your choices.
- Click 'Next' to proceed to step 4
Step 4 - Installation Instructions
The final step is to send out the enrollment emails to the device owners:
- Send To Email - Click this to send enrollment mails to users with the settings you choose in steps 1 - 3.
- Enroll Another Device - Takes you back to step 1
- Go to Bulk Installation Package - Takes you to bulk installation package screen to configure and enroll users in bulk. See 'Bulk Enrollment of Devices'
- Click
'Finish' to close the window.
An example mail is shown below:
The user experience is as follows:
- User opens the email on the Windows endpoint you want to enroll.
- Click the enrollment link in the email to open the device enrollment page
- Click the 'Download Windows Installer' button:
- The EM client setup file gets downloaded.
- Run the setup file to install the client on the endpoint.
- The device is automatically added to Endpoint Manager once installation is complete. The EM communication client icon appears at the bottom-right of the endpoint screen.
- If the client is not automatically enrolled after installation, you can manually enroll the device at a later time. This might happen if, for example, there are connectivity issues.
- You will need to enter the host, port and token ID to manually enroll. You can find these items at the end of the device enrollment page.
- Protection is effective immediately after the computer restarts.
An Endpoint Manager (EM) security profile is applied to the device.
- If the user is already associated with a configuration profile in EM, then those profiles will be applied to the device. See Assign Configuration Profile(s) to User Devices and Assign Configuration Profiles to a User Group for more details.
- If no profiles are defined for the user then the default Windows profile(s) will be applied to the device. See Manage Default Profiles for more details.
The device can now be remotely managed from the EM console.