Installation
Comodo Client Security (CCS) provides best-in-class threat prevention for Windows endpoints. The product is part of Comodo Endpoint Manager and is deployed from the Endpoint Manager console.
This section covers how to:
Subscribe for Endpoint Manager
You can use the Endpoint Manager (EM) interface to deploy Comodo Client Security (CCS) to your endpoints. You can purchase EM as stand-alone application, or as a part of the ITarian platform.
- ITarian - Sign up for ITarian at https://www.itarian.com/signup/
- After signup, login and click 'Applications > 'Endpoint Manager'
- Standalone: Sign up for the free version at https://secure.comodo.com/home/purchase.php?pid=98&license=try or https://secure.comodo.com/home/purchase.php?pid=98 for the full version.
- Visit https://secure.comodo.com/home/purchase.php?pid=98&license=try for the trial version, or https://secure.comodo.com/home/purchase.php?pid=98 for the full version.
- You can access your EM instance at the URL provided during setup.
You must add users to Endpoint Manager before you can deploy CCS to their endpoints.
Add a user
- Click 'Users' > 'User List' > click the 'Create User' button
or
- Click the 'Add' button on the menu bar and choose 'Create User'.
Complete the new user form:
- Type a login username (mandatory), email address (mandatory) and phone number for the user
- Company - Select the organization to which you want to enroll the user
- Role
A 'role' determines user permissions within the Endpoint Manager console itself. Endpoint Manager ships with two default roles:
- Administrator - Full admin privileges in the Endpoint Manager console. The permissions for this role are not editable.
- User - In most cases, a 'user' will simply be an owner of a managed device. They shouldn't require elevated privileges in the management console. Under default settings, users cannot login to Endpoint Manager.
- Click 'Submit' to add the user to Endpoint Manager.
A confirmation message is shown:
- Repeat the process to add more users
- New users are added to the 'Users' interface (click 'Users' > 'User List')
Tip: You
can also bulk import users from a .csv file. See https://help.itarian.com/topic-459-1-1005-14884-Import-Users-from-a-CSV-File.html for more details. |
The next step is to enroll user devices so you can manage them with Endpoint Manager.
- Click 'Users' > 'User List'
- Select the users for whom you want to enroll devices
- Click the 'Enroll Device' button above the table
OR
- Click the 'Add' button on the menu bar and choose 'Enroll Device'.
This starts step 1 of the device enrollment wizard:
- Current device - Enrolls the device you are currently using. You may disregard this option at this stage as we are adding multiple devices with the 'Other device' option.
- Other device - Add devices owned by the users you selected previously. Those users should already be listed in the 'Specify User' box:
- You can add additional, existing users by simply typing their email address in the box. Endpoint Manager will auto-suggest users that have already been created.
- Create New User - Click if you want to add a new user to Endpoint Manager. You cannot add devices unless you have first added the users that own them.
- Click 'Next' to proceed to step 2.
Step 2 - Enrollment Options
Enrollment Type
Applies to Windows, Mac and Linux devices.
- Enroll and Protect - Installs both the communication client and the security client.
- Just Enroll - Installs only the communication client
Background. There are two types of client:
- Communication Client - Connects the device to Endpoint Manager for central management. It is mandatory to install this client.
- Security Client - This is the security software. Depending on the operating system, it includes antivirus, firewall, threat-containment, web-filtering, and more. It is optional to install this client.
TLDR
- Click ‘Not Specified’ if you only want to install the communication client on target devices. The wizard will detect the target operating system and send the appropriate client to the device user.
- Click one of the operating system tiles if you also want to install the security client. Make sure the target devices use the operating system you selected.
Option 1 - Enroll + Protect - Single Operating System
- Choose this if you want to deploy both communication and security clients
- Click the Windows OS box. Please make sure all your target devices use this operating system.
- The wizard will send enrollment mails which only contain download links for the Windows clients.
- You can customize enrollment options as required. You can configure items such as enrollment type, reboot policy, client version, configuration profile and device name.
- Note - Please uninstall any other antivirus products from target endpoints before proceeding. Failure to do so could cause conflicts that mean CCS does not function correctly.
Option 2 - Just Enroll - Multiple Operating Systems
- Choose this if you only want to deploy the communication client. If required, you can install the security client later after enrolling the endpoint.
- Click 'Devices' > 'Device List'
- Select the target devices
- Click the 'Install or Update Package' button > Choose 'Install Comodo Client – Security'.
Click 'Next' to skip to step 3if you are happy with your choices thus far.
OR
See the tables below for more information about the options on this page.
Setting |
Description |
---|---|
Choose platform |
Select Window OS version. 64 bit, 32 bit, or
hybrid.
|
Use default Communication Client version |
This client enrolls the endpoint for central management.
|
Use default Communication Client Security version |
This client installs security software such as antivirus, firewall and auto-containment.
|
Additional options |
AV Database - Choose whether to include the latest virus database with the installation package. This increases the size of the package. If disabled, the client will download the latest database anyway when you run the first virus scan. |
Configuration Profile |
A configuration profile is a collection of
settings which specify a device's network access rights, security
settings, antivirus scan schedule, and more. The default is 'Windows - Security Level 1' profile. Choose a different profile if required.
|
Set Reboot Options |
Endpoints need to be restarted to complete CCS installation. You have the following restart options:
|
Device Name Options |
|
Click 'Next' to proceed to step 3.
Review your choices so far.
- Click ‘Back’ or 'Change Configuration' (top-right) to revise your choices.
- Click 'Next' to proceed to step 4
Step 4 - Installation Instructions
The final step is to send out the enrollment emails to the device owners:
- Send - Click this to send enrollment mails to users with the settings you choose in steps 1 - 3.
- Enroll Another Device - Takes you back to step 1
- Go to Bulk Installation Package - Takes you to bulk installation package screen to configure and enroll users in bulk. See 'Bulk Enrollment of Devices'
- Click 'Finish' to close the window.
An example mail is shown below:
The user experience is as follows:
- User opens the email on the Windows endpoint you want to enroll
- Click the enrollment link in the email to open the device enrollment page
- Click the 'Download Windows Installer' button:
- The EM client setup file gets downloaded.
- Run the setup file to install the client on the endpoint.
- The device is automatically added to Endpoint Manager once installation is complete. The EM communication client icon appears at the bottom-right of the endpoint screen.
- If the client is not automatically enrolled after installation, you can manually enroll the device at a later time. This might happen if, for example, there are connectivity issues.
- You will need to enter the host, port and token ID to manually enroll. You can find these items at the end of the device enrollment page.
- Protection is effective immediately after the computer restarts.
An Endpoint Manager (EM) security profile is applied to the device.
- If the user is already associated with a configuration profile in EM, then those profiles will be applied to the device. See Assign Configuration Profile(s) to User Devices and Assign Configuration Profiles to a User Group for more details.
- If no profiles are defined for the user then the default Windows profile(s) will be applied to the device. See Manage Default Profiles for more details.
The
device can now be remotely managed from the EM console.