Comodo Endpoint Security Manager - SME - Administrator Guide
quarantined items or restore them to their original locations after analyzing the report from the Computer details > Internet
Security screen. Refer Viewing Endpoints > Computer Properties > Internet Security for more details.
Note: For the local CIS installations at the endpoints to quarantine the threats detected during scanning, the policy applied to
them should have been derived from a computer in which CIS has been configured to automatically quarantine the threats
identified from various scans. For more details on configuring CIS refer to the online help guide at http://help.comodo.com/.
To generate a 'Quarantined Items' report, click the 'quarantine' tile from the 'reports gallery' screen.
The 'Create Quarantined Items Report' wizard will start.
Step 1 - Selecting Targets
The 'Select Targets' screen will appear:
Endpoint Security Manager - SME Administrator Guide | © 2013 Comodo Security Solutions Inc. | All rights reserved 150
Comments to this Manuals