McAfee QUICKCLEAN 3.0 Technical Information Page 2

  • Download
  • Add to my manuals
  • Print
  • Page
    / 212
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 1
Comodo Endpoint Security Manager - SME - Administrator Guide
Table of Contents
1.Introduction to Endpoint Security Manager - SME..................................................................................................................4
1.1.Software Components and System Requirements..............................................................................................................6
1.2.Removing Incompatible Products........................................................................................................................................8
1.3.Installing and Configuring the Service ..............................................................................................................................10
1.4.Key Concepts....................................................................................................................................................................16
1.5.Best Practices...................................................................................................................................................................17
1.6.Quick Start Guide..............................................................................................................................................................18
2.The Administrative Console....................................................................................................................................................26
2.1.Logging-in to the Administrative Console..........................................................................................................................27
2.2.The Dashboard Area.........................................................................................................................................................28
2.2.1.Adding and Re-configuring Tiles..............................................................................................................................30
2.2.1.1.Quick Actions Tiles..........................................................................................................................................31
2.2.1.2.Policy Status Tile.............................................................................................................................................35
2.2.1.3.Endpoint Updates Tile.....................................................................................................................................37
2.2.1.4.Endpoint Infections Tile...................................................................................................................................38
2.2.1.5.Connectivity Tile..............................................................................................................................................40
2.2.1.6.Getting Started Tile.........................................................................................................................................41
2.2.1.7.System Status Tile..........................................................................................................................................42
2.2.1.8.License Status Tile..........................................................................................................................................46
2.2.1.9.Software Tile...................................................................................................................................................49
2.3.The Computers Area.........................................................................................................................................................51
2.3.1.Adding Endpoint Computers to ESM........................................................................................................................52
2.3.1.1.Importing Computers by Automatic Installation of Agent.................................................................................52
2.3.1.2.Adding Computers by Manual Installation of Agent and CIS...........................................................................67
2.3.1.3.Updating Comodo Software on Managed Computers.....................................................................................72
2.3.2.Creating Endpoint Groups........................................................................................................................................80
2.3.3.Viewing Endpoints....................................................................................................................................................84
2.3.4.Updating Endpoints..................................................................................................................................................96
2.4.The Policies Area............................................................................................................................................................102
2.4.1.Viewing Policies.....................................................................................................................................................104
2.4.2.Creating a New Policy............................................................................................................................................126
2.5.The Reports Area............................................................................................................................................................133
2.5.1.Reports Gallery......................................................................................................................................................134
2.5.1.1.Computer Details Report...............................................................................................................................137
2.5.1.2.CIS Configuration Report..............................................................................................................................142
2.5.1.3.Computer Infections Report..........................................................................................................................146
2.5.1.4.Quarantined Items Report.............................................................................................................................148
2.5.1.5.Antivirus Updates Report..............................................................................................................................152
2.5.1.6.CIS Log Report.............................................................................................................................................156
2.5.1.7.Policy Compliance Report.............................................................................................................................164
2.5.1.8.Policy Delta Report.......................................................................................................................................168
2.5.1.9.Malware Statistics Report.............................................................................................................................172
2.5.1.10.Top Ten Malware Report.............................................................................................................................179
2.5.2.Report Explorer......................................................................................................................................................184
2.5.3.Report Settings......................................................................................................................................................185
Endpoint Security Manager - SME Administrator Guide | © 2013 Comodo Security Solutions Inc. | All rights reserved 2
Page view 1
1 2 3 4 5 6 7 ... 211 212

Comments to this Manuals

No comments