Comodo Help
Find the desired product help
Xcitium EDR

Xcitium EDR

Comodo EDR Quick Start Guide

English

Print Help Download Help
Comodo EDR - Quick Start > Step 7 - Investigate Events On Computers
  • Comodo EDR - Quick Start
    • Step 1 - Login To EDR
    • Step 2 - Add Endpoints To EDR
    • Step 3 - Manage EDR Policies
    • Step 4 - View Events Details On Endpoints
    • Step 5 - View Alerts
    • Step 6 - Analyze Events
    • Step 7 - Investigate Events On Computers
    • Step 8 - Analyze Files By Their Hash Values
    • Step 9 - View Process Timeline Of Events

Step 7 - Investigate Events on Computers


The 'Computer Search' screen shows events recorded on all endpoints added to EDR. Details include event trends, network connection events, malware detection events and so on.
  • Click 'Investigation' on the left then 'Computer Search' to open the interface




By default, the screen will be empty with the search range set for the past 3 days.

  • Click inside the search field above the data tiles, then:
  • Select an endpoint from the list from the list to view data about the device.
  • You can search for specific endpoints if required
  • Use the time-range drop-down to show event info for specific dates (applies to Network Connections, Admin Privilege Usage, Malware Detections and Event Trend tiles).
  • Click 'Apply'.

Information about the selected endpoint is shown directly below the search box:



The six tiles in the main section contain data about events on the endpoint:

  • Local and External IP Changes- Changes to the endpoint's local IP and external IP.
  • Event Trend - Number of events on the endpoint for the selected time-period. You can zoom the timeline by clicking and dragging on the graph. Place your mouse cursor on a point in the line to see events for a specific day.
  • Unique Users Logged on - Most recent login times of every user that has logged onto the endpoint.
  • Admin Privilege Usage - Events that required admin privileges.
  • Network Connections - Network connection events for the selected time-period.
  • Malware Detections - Threat detection events on the endpoint. Click a hash signature to view full details in the 'Hash Search' interface.

See 'Computer Search' topic if you need more help with this.


Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.