Comodo Help
Find the desired product help
Xcitium Enterprise

Xcitium Enterprise

Xcitium Enterprise Administrator Guide

English

Print Help Download Help
Configure Xcitium Enterprise > Cloud Security Settings > Configure Integrations > CWPP
  • Introduction To Xcitium Enterprise - Endpoint Protection Platform
    • Key Concepts
    • Best Practices
    • Login Into The Admin Console
    • Upgrade To Full Version
  • The Admin Console
  • The Dashboards
  • CNAPP Dashboard
  • ROI Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Device Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Network Information
        • View And Manage Profiles Associated With A Device
        • View Maintenance Windows Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Xcitium
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Xcitium
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Dragon
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • View Event Logs On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Change A Device's Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Remove A Device
      • Generate Device List Report
      • Manage Isolate And Release From Isolation
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Cloud Workloads
  • Cloud Assets
  • Cloud Security
    • View Vulnerabilities Findings
    • Registry Scan
    • CSPM Executive Dashboard
    • Compliance Summary
    • CWPP Dashboard
    • App Behavior
    • Manage Policies
    • Remediation
    • View Alerts
    • Manage Triggers
    • View Reports
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On User Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
          • Thumbnails Settings
          • Chat Settings
          • Applications Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And XcitiumClient - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • View Alerts And Security Events
      • View Alerts And Security Events By Time
      • View Alerts And Security Events By Files
      • View Alerts And Security Events By Device
      • Alert Policy
      • Suppression Rule
    • Investigate Events
      • Search Events By Query
      • Search Events By File
      • Search Events By Device
      • View Android Threat History
      • Process Timeline
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Blocked Threats
    • View And Manage Quarantined Items
    • View Contained Threats
    • View And Manage Autorun Items
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Software Inventory
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • Xcitium Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • Management Settings
    • Account Management
    • License Management
      • Manage Your Licenses
      • License Allocations
      • Bill Forecast
  • Configure Xcitium Enterprise
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • Create And Manage Tags
    • Xcitium Enterprise Portal Configuration
      • Import User Groups From LDAP
      • Configure Portal Settings
      • Configure Communication And Security Client Settings
        • Configure The Xcitium Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Xcitium Enterprise Extensions
      • Configure Xcitium Enterprise Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrator's Time Zone And Language
      • Configure Audit Log Settings
    • Dashboard Settings
    • Cloud Security Settings
      • Manage Cloud Accounts
        • Amazon Web Server (AWS) Account Onboarding
        • Google Cloud Platform (GCP) Account Onboarding
        • Microsoft Azure Account Onboarding
      • Manage Cluster
      • Configure Integrations
        • CWPP
        • CSPM
        • Registry
        • S3 Data Source
      • Create And Manage Labels
      • Create And Manage Tags
      • Create And Manage Groups
      • Configure Ticket Template
    • Data Protection Templates
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • View Version And Support Information
    • Alert Notification Settings
  • Appendix 1a - Xcitium Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Xcitium Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Pre-configured Profiles
  • Appendix 3 - Default Xcitium Security Policy Details
  • About Xcitium

CWPP



  • Click 'Settings' > 'Cloud Security Settings'

  • Click 'Integrations' > 'CWPP'




Under the CWPP subsection, we can integrate with various SIEM and ticketing tools like 

  • Splunk 
  • Rsyslog 
  • AWS CloudWatch 
  • Azure Sentinel 
  • Email 
  • Slack 
  • Jira 

Splunk Integration

Splunk is a software platform to search, analyze, and visualize machine-generated data gathered from websites, applications, sensors, and devices. 



Xcitium integrates with Splunk and monitors your assets and sends alerts for resource misconfigurations, compliance violations, network security risks, and anomalous user activities to Splunk. To forward the events from your workspace you must have Splunk Deployed and HEC URL generated first for Splunk Integration. 

a. Prerequisites 

Set up Splunk HTTP Event Collector (HEC) to view alert notifications from Xcitium in Splunk. Splunk HEC lets you send data and application events to a Splunk deployment over the HTTP and Secure HTTP (HTTPS) protocols. 

To set up HEC, use instructions in Splunk documentation. For source type, _json is the default; if you specify a custom string on Xcitium, that value will overwrite anything you set here. 

Select Settings > Data inputs > HTTP Event Collector and make sure you see HEC added in the list and that the status shows that it is Enabled. 


b. Steps to Integrate 
  • Click Cloud Security Settings > Integrations 
  • Click CWPP > Splunk  
  • Select Integrate now on Splunk 
  • Enter the following details to configure Splunk. 
    • Integration Name: Enter the name for the integration. You can set any name. e.g., sh Test Splunk 
    • Splunk HTTP event collector URL: Enter your Splunk HEC URL generated earlier.e.g., sh https://splunk-xxxxxxxxxx.com/services/collector 
    • Index: Enter your Splunk Index, once created while creating HEC. e.g., sh main 
    • Token: Enter your Splunk Token, generated while creating HEC URL. e.g., sh x000x0x0x-0xxx-0xxx-xxxx-xxxxx00000 
    • Source: Enter the source as http: sh kafka 
    • Source Type: Enter your Source Type here, this can be anything and the same will be attach to the event type forwarded to splunk. e.g.,sh _json 
  • Click Test to check the new functionality, you will receive the test message on configured slack channel. e.g.,sh Test Message host = xxxxxx-deployment-xxxxxx-xxx00 source = http:kafka sourcetype = trials 
  • Click Save to save the Integration.  

 
Rsyslog Integration

To forward the events to RSyslog you must first set up the RSyslog Integration. 



a. Prerequisites
  • A running RSyslog server. 
  • Host name/IP, Port number, Transport type (TCP or UDP) 

Note: To deploy RSyslog server, follow RSyslog Documentation. 

b. Steps to Integrate 
  • Click Cloud Security Settings > Integrations 
  • Click CWPP > Rsyslog 
  • Select Integrate now on Rsyslog 
  • Fill up the following fields: 

    • Integration Name: Enter the name for the integration. You can set any name of your choice. e.g., Container Security Alerts 

    • Server Address: Enter your RSyslog Server address here, IP address or fully qualified domain name (FQDN) of the RSyslog server e.g.,rsyslog.mydomain.com or 35.xx.xx.xx 

    • Port: The port number to use when sending RSyslog messages (default is UDP on port 514); you must use the same port number. e.g., 514 

    • Transport: Select UDP, or TCP as the method of communication with the RSyslog server 

  • Click Test to check the new functionality, you will receive the test message on configured RSyslog Server. -Test message Please ignore!! 

  • Click Save to save the Integration. You can now configure Alert Triggers for RSyslog Events. 


AWS CloudWatch Integration


a. Prerequisites 

AWS Access Key / AWS Secret Key is required for this Integration. 

Note: Please refer this link to create access keys link 

b. Steps to Integrate 
  • Click Cloud Security Settings > Integrations 
  • Click CWPP > AWS CloudWatch 
  • Select Integrate now on AWS CloudWatch 


  • Here you'll be able to see these entries: 
    • Integration Name: Enter the name for the integration. You can set any name. 
    • AWS Access Key: Enter your AWS Access Key here. 
    • AWS Secret Key: Enter your AWS Secret Key here. 
    • Region Name: Enter your AWS Region Name here. 
    • LogGroup Name: Enter your AWS LogGroup Name here. 
  • Once you fill every field then click the button this will test whether your integration is working or not. 
  • Click the Save button. 


Azure Sentinel Integration


To forward the events to Azure Sentinel, we need Azure Logic App – Webhook and Azure Sentinel Subscription. 

Steps to Integrate 
  • Click Cloud Security Settings > Integrations 
  • Click CWPP > Azure Sentinel Integration 
  • Select Integrate now on Azure Sentinel Integration 


  • Fill up the following fields: 
    • Integration Name: Enter the name for the integration. You can set any name of your choice. e.g., Container Security Alerts 
    • Webhook URL: Enter your Azure Logic App's Webhook URL here. e.g., https://xyz.xxxxx.log ic.azu re.com:443/workflows/xxxxxxxx 

    • Group Name: You can specify any group name based on your prefernece, this can be used to filter the events. This works as a key value pair, where key is Group Name and Group Value is the value for the Key Group Name. e.g., K8s Cluster 

    • Group Value: You can add any value to this group value. e.g., Dev Team Cluster 
  • Click Test to check the new functionality, you will receive the test message on configured Azure Sentinel. -Test message Please ignore!! 

  • Click Save to Save the Integration

Creating webhook using the Azure Logic App 

Azure Logic Apps is a cloud platform where you can create and run automated workflows with little to no code. Using the visual designer and selecting from prebuilt operations, you can quickly build a workflow that integrates and manages your apps, data, services, and systems.  

To create a webhook using the logic app. 

Step 1: Search for the logic app in the Azure portal. 

Step 2: Add the new logic app and fill in the relevant details. 

Step 3: After creating the logic, it will appear in the logic app dashboard. 

Step 4: Open the app and click on the go-to resource button. 

Step 5: Select the http request to receive the logs. 

Step 6: Click on the new step and click HTTP after that click on the Azure log analytics to receive the alert data. 

Step 7: Add the connection name, workspace ID, and workspace key you can get the workspace ID and key in the log analytics workspace tab.  

Step 8: Click on the Integration and click on the Agents tab. 

Step 9: Click on the Azure log analytics data collector and click JSON request body as the body and log name, After the setup is done you will receive a webhook URL. 

 

Email Integration

Integrate your Workspace to send alerts as emails to your email account. 

Steps to Integrate 

  • Click Cloud Security Settings > Integrations 
  • Click CWPP > Email Integration 
  • Select Integrate now on Email Integration 
 

  • Fill up the following fields: 
    • Integration Name: Enter the name for the integration. You can set any name of your choice. e.g., Container Security Alerts 
    • Email: Enter Email here. e.g., xcitium@yopmail.com 
  • Click Test to check the new functionality. 
  • Click Save to save the Integration. 

 
Slack Integration

To send an alert notification via Slack you must first set up the Slack notification Channel. 

a. Prerequisites 

You need a valid and active account in Slack. After logging into your Slack channel, you must generate a Hook URL. 

Note: To generate Hook URL, follow the steps, Webhooks-for-Slack. 

b. Steps to Integrate
  • Click Cloud Security Settings > Integrations 
  • Click CWPP > Slack Integration 
  • Select Integrate now on Slack Integration  


  • Fill up the following fields: 
    • Integration Name: Enter the name for the integration. You can set any name. e.g., Container Security Alerts 
    • Hook URL: Enter your generated slack hook URL here. e.g., https://hooks.slack.com/services/T000/B000/XXXXXXX 
    • Sender Name: Enter the sender name here. e.g., Xcitium User 
    • Channel Name: Enter your slack channel name here. e.g., livealertsforcontainer 
  • Click Test to check the new functionality, you will receive the test message on configured slack channel. Test message Please ignore!! 
  • Click Save to save the Integration.  


Jira Integration

Integrate Xcitium with Jira and receive Xcitium alert notifications in your Jira accounts. With this integration, you can automate the process of generating Jira tickets with your existing security workflow. 

To set up this integration, you need to coordinate with your Jira administrator and gather the inputs needed to enable communication between Xcitium and Jira. 

a. Prerequisites 
  • You need a Jira Site URL, Email, UserID & API token, Project key for this integration. 
  • To create a JIRA token, go to https://id.atlassian.com/manage-profile/security/api-tokens, and click on create an API token.
b. Steps to Integrate
  • Click Cloud Security Settings > Integrations 
  • Click CWPP > Jira Integration 
  • Select Integrate now on Jira Integration

  • Enter the following details to configure JIRA. 
    • Integration Name: Enter the name for the integration. You can set any name. e.g.,Test JIRA 
    • Site: Enter the site name of your organisation. e.g., https://jiratest.atlassian.net/ 
    • User Email: Enter your Jira account email address here.e.g., jira@organisation.com 
    • Token: Enter the generated Token here from https://id.atlassian.com/manage-profile/security/api-tokens. .e.g., kRVxxxxxxxxxxxxx39 
    • User ID: Enter your Jira user ID here. You can visit people section and search your name to see the User ID. For more details check here. e.g., 5bbxxxxxxxxxx0103780 
    • Project ID: Enter your Project key here, each project in an organisation starts with some keyvalue and is case sensitive. Breakdown of a jira ticket to identify Project ID: https://[JIRA-SITE]/browse/[PROJECT ID]-1414, e.g., DEVSECOPS 
    • Issue Summary: Enter the summary for the JIRA tickets to be viewed in each JIRA tickets created. e.g., Issue generated form High Severity Incidents on onboarded cluster. 
    • Issue Type: You can choose from the dropdown. i.e., Story and Bug 
  • Click Test to check if the entered details are being validated, If you receive Test Successful, you have entered a valid JIRA credentials. 
  • Click Save to save the Integration. 

 
Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.