ITarian Help

Find the desired product help

IT Endpoint Manager

IT Endpoint Manager

Endpoint Manager Administrator Guide 6.43

English

Print Help Download Help
Security Systems > Manage File Trust Ratings On Windows Devices
  • Introduction To Endpoint Manager
    • Key Concepts
    • Best Practices
    • Quick Start
    • Sign Up For An ITarian Account
    • Login Into The Admin Console
  • The Admin Console
  • The Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Customer Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Hardware Information
        • View Network Information
        • View Maintenance Windows Associated With Device
        • View And Manage Profiles Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Endpoint Manager
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files
        • View And Manage Profiles Associated With A Device
        • View Mac OS Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View Summary Information Of An IOS Device
        • View And Edit Device Name Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remove A Device
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Install Apps On Android/iOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Shutdown Windows Devices
      • Wake Offline Device
      • Change A Devices Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Generate Device List Report
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll The Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Remote Control Settings
          • Client Access Control
          • Client Proxy Settings
          • Communication Client Update Settings
          • Client UI Settings
          • Remote Tools Settings
          • Monitors
          • Procedure Settings
          • Patch Management Settings
          • Maintenance Window Settings
          • Global Proxy Settings
          • Communication Client Rebranding
          • Client Logging Settings
          • Antivirus Settings
          • Firewall Settings
          • HIPS Settings
          • File Rating Settings
          • Containment Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Agent Discovery Settings
          • External Devices Control Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Xcitium Client Security Access Control
          • XCS Updates
          • Xcitium Client Security UI Settings
          • XCS Logging Settings
          • Thumbnails Settings
          • Performance Settings
          • Chat Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And Comodo Client - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • Security Dashboards
      • View Security Events By Time
      • View Security Events By Files
      • View Security Events By Device
    • View Contained Applications
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of Valkyrie Analyzed Files
    • Antivirus And File Rating Scans
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Identified Malware
    • View And Manage Quarantined Items
    • View Android Threat History
    • View And Manage Autorun Items
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Application Store
    • IOS Apps
      • Add IOS Apps And Install Them On Devices
      • Manage IOS Apps
    • Android Apps
      • Add Android Apps And Install Them On Devices
      • Manage Android Apps
    • Windows Apps
      • Install Windows Apps On Devices
  • Applications
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • EM Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • License Management
    • Manage Your Licenses
    • Manage License Allocation
    • Bill Forecast
  • Configure Endpoint Manager
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • Endpoint Manager Portal Configuration
      • Import User Groups From LDAP
      • Configure Communication And Security Client Settings
        • Configure The EM Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Endpoint Manager Extensions
      • Configure Endpoint Manager Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrators Time Zone And Language
      • Configure Audit Log Settings
    • Integrate Apple DEP With Endpoint Manager
      • Link Endpoint Manager With Apple DEP
      • Manage Apple DEP Devices
      • Manage Apple DEP Profiles
      • Configure Apple DEP Notifications
    • View Version And Support Information
  • Appendix 1a - Endpoint Manager Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Endpoint Manager Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 – Endpoint Manager License Types
  • Appendix 3 - Pre-configured Profiles
  • About ITarian

Manage File Trust Ratings on Windows Devices


  • Click 'Security ' > 'File Rating' 
  • Comodo Client Security (CCS) monitors all file activity on Windows devices. Every new executable is scanned against the Comodo white and blacklists then awarded a rating of 'Unrecognized', 'Trusted' or 'Malicious'.
  • Files that have a rating of 'Unrecognized' or 'Malicious' are reported to the 'File Rating' interface. Admins can change the rating of a file as required.
  • You can configure file analysis in the 'File Rating settings' section of the configuration profile applied to the device. See File Rating settings in the section Create a Windows Profile
  • See File Ratings explained for background information on file ratings.
 
The File Rating Interface
 
The 'File Rating' interface lets you view the trust rating of files on an endpoint. Possible ratings are 'Unrecognized', 'Trusted' or 'Malicious', with 'Unrecognized' and 'Malicious' files being reported to this interface. You can manually set the rating of a file at your discretion.
  • Files rated as 'Trusted' are allowed to run as normal on the endpoint.
  • Files rated as 'Malicious' are quarantined and not allowed to run.
  • Files rated as 'Unrecognized' are run inside the container - an isolated operating environment. Contained applications are not permitted to access files or user data on the host machine.
Any rating you set for a file is pushed to all managed endpoints on which the file is installed.
  • You can also view a history of purged files. Purged files are those which existed on devices at one point in time, but are not currently present on any device.
  • Apply the 'Show Purged Files' filter to view these files. See the explanation of Filter Options given below.
You can also hide items as required. 

  • Click 'Security' > 'File Rating' 





File Rating - Table of Column Descriptions

Column Heading

Description

File Name

 The label of the application/executable file.

  • Click the name of a file to view its details.
  • See View file details given below for more details.

File Path

The installation location of the application on the endpoint.

  • Click the  icon to copy the path to the clipboard.
 

File Hash

The SHA1 hash value of the executable file.

  • Click the icon to copy the hash value to the clipboard.

Size

The size of the executable file.

# of Devices

The count of endpoints on which the item was found.

  • Click the number to view the the 'Device List' interface with a list of endpoints containing the item.
  • You can also view the activities of the item from here. For more details, refer to the description under Device List Screen below.

Comodo Rating

The rating of the file as per the Comodo File Look-up service, reported by the CCS installations at the endpoints. See File Ratings Explained for more details.

Admin Rating

Indicates the rating of the file as manually set by the administrator, if any.


Sorting, Search and Filter Options

  • Click any column header to sort items based in alphabetical order
  • Click the funnel icon to open the filter options:


  • Use the check-boxes to show or hide purged, non-executable, hidden or unrecognized files.
  • Use the search fields to filter by file name, file path or SHA1 hash value. You can also filter by file size and the number of devices on which the file is present.
  • Use the drop-down boxes to filter items by Comodo and/or Admin rating
  • To display all items again, clear any search filters and click 'OK'.

You can use any combination of filters simultaneously to search for specific apps.


Manage File Rating

The File Rating interface allows you to:

  • View the details of files in the list
  • View Process Activities of a File
  • Assign Admin rating to a file
  • Hide/Display selected files in the list
  • Export the list of selected files to a CSV file
  • Remove files from the list

  • Import Files


View the details

  • Simply click on a file in the list or select a file and click 'File Details' at the top. The 'file info' screen shows basic file details and the devices on which the file is present. You can also change the trust rating of the file in this area.

File Information

  • The file info screen shows file name, installation path, file type, version, size, hash values and the date the file was first encountered. The screen also shows the file's trust rating and the number of endpoints on which the file is present.
  • The 'Change Rating' button allows you to manually set the file's rating as 'Trusted', 'Malicious' or 'Unrecognized':





  • The new rating will be sent to all endpoints.
  • The 'Record' button lets you hide, display or remove the file from the 'File Rating' list




Device List Screen 

  • Click 'Security ' > 'File Rating' then click on a file in the list.
  • Next, select the 'Device List' tab to see a list of all devices on which the file is present
  • The 'Device List' Screen can also be opened by clicking on the number in the 'Number of Devices' column in the 'File Rating' table.
  • The  device list screen shows each endpoint on which the item was discovered. The screen also shows the installation path, the installation date and the file rating assigned by Comodo Client Security. The Viruscope column shows detailed info on processes started by the file.




  • You can remove the file from device(s) by selecting a device then clicking 'Delete'

View Process Activities of a File


Note: In order to fetch process activity data, VirusScope should be enabled in the profile in effect on the endpoint. See VirusScope Settings in Create a Windows Profile for more details.


View the activities of a file on an endpoint

  • Open the 'Device List' screen by clicking the file name or the number in the 'Number of Devices' column
  • Click the 'View Processes' link in the 'Activity' column in the row of the device name.
  • This will open a list of processes executed by the file on the selected endpoint:



  • Click 'View Activity' to see detailed information about each process. The 'Process Activity' interface has two tabs:
  • Summary - Displays the name of the device and the installation path of the executable
  • Activity - Displays a chronological list of activities by the selected process, including details of files modified by the process.



The 'Activity' - Table of Column Descriptions

Column Heading

Description

Date

Indicates the date and time of process execution.

Action

Indicates the action executed by the process on the target file.

Path

Indicates the path of the target file.

Details

Contains a link to view details of the action.


  • You can inspect a particular activity by clicking the 'Details' link: 



Assign Admin Rating to a File

  • Each file on an endpoint is automatically scanned and assigned a trust rating by Comodo Client Security on the endpoint.
  • These ratings can be either  'Unrecognized', 'Trusted' or 'Malicious'. The rating for each file is shown in the 'Comodo Rating' column of the 'File Rating' interface.
  • The file rating determines whether or how the file is allowed to run:
  • Trusted – The file will be allowed to run normally. It will, of course, still be subject to the standard protection mechanisms of Comodo Client Security (behavior monitoring, host intrusion prevention etc).
  • Malicious – The file will not be allowed to run. It will be automatically quarantined or deleted depending on admin preferences.
  • Unknown – The file will be run inside the container. The container is a virtual operating environment which is isolated from the rest of the endpoint. Files in the container write to a virtual file system, use a virtual registry and cannot access user or operating system data.
  • Automatic file rating can be configured in the 'File Rating' section of the configuration profile active on the endpoint. See File Rating settings in Create a Windows Profile for more details.
  • Click 'Change Rating' in the 'File Rating' interface to manually set a rating for a selected file or files. The new rating will be propagated to all endpoints on which the item was identified and will determine the file's run-time privileges. Admin assigned ratings will be shown in the 'Admin Rating' column of the interface:


Assign a file rating to a file 

  • Select the file(s) whose rating you want to change and click 'Change Rating' button.
  • Choose the rating you want to from the drop-down:



As mentioned, the admin rating will be set and sent to all endpoints. The admin rating will determine the file's run-time privileges.


Hide/Display Selected Files

  • Select the file(s) to be hidden and click 'Record' at the top




  • Select 'Hide / Unhide / Delete Record' as required.


View hidden files

  • Click the funnel icon at the top-right to open the filter options
  • Select 'Show with hidden file(s)' and click 'Apply'



The hidden files will be included to the 'File Rating' interface. These files will be highlighted with a gray stripe.


Restore hidden files 

  • Click the funnel icon at the top-right to open the filter options
  • Enable 'Show with hidden file(s)'
  • Select the hidden files you want to restore click 'Record' and choose 'Unhide Record' from the drop-down




The files will be displayed in the list permanently.


Export a Report of the Files List


You can export a file-rating report in .csv format as follows:

  • Click 'Security' > 'File Rating'
  • Click the funnel  icon to apply any filters you require
  • Click the 'Export' button and choose 'Export to CSV':




The report will be generated in .csv file format.



The report will be available in the 'Dashboard' > 'Reports' interface. See Reports if you need more help with this interface.


Remove files from the list


You can hide files that you no longer wish to see in the list. The files will be removed from the list but will not be deleted from the endpoints.

  • Select the files you want to remove and click 'Record' at the top
  • Choose 'Delete Record' from the drop-down




Import Files


You can import a file to the file rating interface

  • Click 'Security' > 'File Rating'
  • Click the funnel  icon to apply any filters you require
  • Click the 'Import' button and choose 'Import from CSV':




A pop up dialogue box will appear




  • Click 'Choose File' to import your CSV file
Note : The file only support the CSV (Comma Seperated Values) format with  CSV files need to contain admin rating and proper file hash.
  • Select the file which you want to upload

  • Click 'Import' to add your file to file rating 



You will get a message that CSV file imported succesfully

 
Prequesties for importing a file

  • The imported file must be in the proper format. In case of the following cases, "The CSV file is corrupt or not properly formatted." warning message will be displayed.

  • Admin rating should be other than "Trusted", "Unrecognized" or "Malicious"

  • Hash and admin rating value should be added correctly or you will get "Missing/wrong typing of hash information" or "Missing/wrong typing of admin rating information" while uploading a file

  • The files limit of maximum 1000 hashes can be added. When trying to import a file that exceeds the limit, the warning message "A maximum of 1000 hashes can be imported." will be displayed.
The trusted hashes, files must be uploaded to Valkyrie so that Comodo Verdict can be determined



Comodo Help
  • IT Platform:
  • Help
  • Scripts
  • Wiki
  • Forum
  • Developer
  • RMM
  • Patch Management
  • Service Desk
  • ITSM
  • Managed Service Provider
  • Managed Detection and Response
  • Ticketing System
  • Helpdesk
  • ITIL

Copyright 2025 Itarian