Comodo Help
Find the desired product help
Xcitium Enterprise

Xcitium Enterprise

Xcitium Enterprise Administrator Guide

English

Print Help Download Help
The Dashboards
  • Introduction To Xcitium Enterprise - Endpoint Protection Platform
    • Key Concepts
    • Best Practices
    • Login Into The Admin Console
    • Upgrade To Full Version
  • The Admin Console
  • The Dashboards
  • CNAPP Dashboard
  • ROI Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Device Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Network Information
        • View And Manage Profiles Associated With A Device
        • View Maintenance Windows Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Xcitium
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Xcitium
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Dragon
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • View Event Logs On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Change A Device's Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Remove A Device
      • Generate Device List Report
      • Manage Isolate And Release From Isolation
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Cloud Workloads
  • Cloud Assets
  • Cloud Security
    • View Vulnerabilities Findings
    • Registry Scan
    • CSPM Executive Dashboard
    • Compliance Summary
    • CWPP Dashboard
    • App Behavior
    • Manage Policies
    • Remediation
    • View Alerts
    • Manage Triggers
    • View Reports
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On User Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
          • Thumbnails Settings
          • Chat Settings
          • Applications Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And XcitiumClient - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • View Alerts And Security Events
      • View Alerts And Security Events By Time
      • View Alerts And Security Events By Files
      • View Alerts And Security Events By Device
      • Alert Policy
      • Suppression Rule
    • Investigate Events
      • Search Events By Query
      • Search Events By File
      • Search Events By Device
      • View Android Threat History
      • Process Timeline
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Blocked Threats
    • View And Manage Quarantined Items
    • View Contained Threats
    • View And Manage Autorun Items
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Software Inventory
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • Xcitium Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • Management Settings
    • Account Management
    • License Management
      • Manage Your Licenses
      • License Allocations
      • Bill Forecast
  • Configure Xcitium Enterprise
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • Create And Manage Tags
    • Xcitium Enterprise Portal Configuration
      • Import User Groups From LDAP
      • Configure Portal Settings
      • Configure Communication And Security Client Settings
        • Configure The Xcitium Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Xcitium Enterprise Extensions
      • Configure Xcitium Enterprise Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrator's Time Zone And Language
      • Configure Audit Log Settings
    • Dashboard Settings
    • Cloud Security Settings
      • Manage Cloud Accounts
        • Amazon Web Server (AWS) Account Onboarding
        • Google Cloud Platform (GCP) Account Onboarding
        • Microsoft Azure Account Onboarding
      • Manage Cluster
      • Configure Integrations
        • CWPP
        • CSPM
        • Registry
        • S3 Data Source
      • Create And Manage Labels
      • Create And Manage Tags
      • Create And Manage Groups
      • Configure Ticket Template
    • Data Protection Templates
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • View Version And Support Information
    • Alert Notification Settings
  • Appendix 1a - Xcitium Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Xcitium Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Pre-configured Profiles
  • Appendix 3 - Default Xcitium Security Policy Details
  • About Xcitium

The Dashboards

  • Click 'Dashboards' > 'Dashboards' in the top menu to open this page.

The dashboard shows real-time data about the operating system, connection status and security posture of all devices enrolled to Xcitium Enterprise. It contains pie charts showing device types, platforms, ownership, scan status and compliance status. The dashboard also lets you view Xcitium Verdict Cloud results, view notifications, and generate reports.


The dashboard is divided into seven sections:  

  • Xcitium Dashboard - Charts which show the summary of alerts and security events detected on the managed devices by Xcitium. This includes events from the antivirus, containment, and EDR components. See the  Xcitium Dashboard section for more details.
  • Audit - Charts which show the operating systems and client versions installed on devices on your network. Also contains charts which show the types of devices in your network, and whether the devices are personal or corporate. See the Audit section for more details.

  • Compliance - Statistics which detail how compliant your devices are with Xcitium security policies. For example, device connection status, devices with viruses, devices with blacklisted applications, rooted and jailbroken devices, and device scan status. See Compliance for more details.

  • Xcitium Verdict Cloud - A summary of verdicts on unknown files submitted to the Xcitium Verdict Cloud file analysis system. See Xcitium Verdict Cloud for more details.

  • Reports - A list of all reports generated by Xcitium. You can also create new reports from here. See Reports section for more information.

  • Notifications - A list of notifications sent to the administrator by Xcitium. See Notifications for more details.

  • Audit Logs - A list of actions taken on managed devices by admins and staff. Example actions include applying profiles, remote installation of packages and more. See Audit Logs for more details.

Xcitium Dashboard

  • Click 'Dashboards' on the top

  • Click the 'Endpoint' tab



The top panel shows overall security summary:




  • Total alerts - The number of alerts generated by EDR and security events recorded for the past thirty days.

  • Malware detections - The number of threats identified by Antivirus on the managed endpoints, for the past thirty days

  • Total devices - The count of Windows devices currently managed by Xcitium

  • Contained Files - The number of executable files and applications run inside the containment on the managed Windows devices. These include files run by containment rules in the profile active on the devices and applications run manually inside the containment

The dashboard shows the following charts:





 Malware Detections by Hash:
  • Shows the list of malware detection events grouped by the files

  • The number on the left indicates the count of events involving the same file

  • Place your mouse over a file name to view its SHA 1 hash value

  • Click on the file name to view the list of alerts generated for the same file on all devices in 'Alerts' > 'Alerts Search' interface. See View Alerts and Security Events by Time for more details about this interface.


 Alerts By Type


 The doughnut chart shows the breakup of alerts generated by EDR and various   security components and types of alerts generated by each component.

  • Place your mouse over a sector to view the number of alerts of that type.

  • Click on a sector to view the list of only the alerts and events of that type in 'Alerts' > 'Alerts Search' interface. See View Alerts and Security Events by Time for more details about this interface.

  • Click on a legend at the bottom to show / hide details of that module.

      
  

 

 


 Most Recent Alerts


 Shows the list of eight latest alerts and events recorded from your devices by Xcitium

  • The details include the alert label, its criticality and time of generation.

  • Click on an event to view its details in 'Alerts' > 'Alerts Search' interface. See View Alerts and Security Events by Time for more details about this interface.


 Contained Files

 Shows a breakup of files run inside the container on the endpoints, grouped based on   their trust rating, for the past seven days.

  • Place your mouse on a sector to view the number of files with that rating

  • Click on a sector to view the list of hash values of the respective files

  • Click on a hash value to view the details of and events generated by the file in the 'Investigate' > 'Hash Search' interface. See Search Events by File for more on details shown on this interface.

  • Click on a legend at the bottom to show / hide that file rating.

 
 
   


 

     
 

 Alerts by Endpoint

 Shows the summary of security events and alerts, grouped by devices.

 The number on the left indicates the count of events generated on the device.

  • Place your mouse over a device name to view the numbers of events / alerts generated by each security module on that device.

  • Click on an alert type to view the list of alerts in 'Alerts' >'Alert Search' interface. See View Alerts and Security Events by Time for more details about this interface.



 Malware Detections by Endpoint

  • Shows the list of malware detection events grouped by the devices

  • The number on the left indicates the count of events on the device

  • Place your mouse over a device name to view SHA 1 hash values of the malware files detected on that device

  • Click on the device name to view the list of malware detection events on that device in the 'Alerts' > 'Alerts Search' interface. See View Alerts and Security Events by Time for more details about this interface.

 
  


  


 



 Alerts

 The timeline graph shows the numbers of alerts generated and events detected by   various security components on different days.

  • Place your mouse on a bar to view the number of events detected by that security component on that day.


Audit

  • Click 'Dashboards' on the top

  • Select the 'Audit' tab



  • Click 'Customize' at top-right if you want to change which charts are shown on the page


     
  • Use the 'On/Off' switches to add or remove charts from the dashboard

  • The numbers at the top right of the 'Customize' icon  shows the number of charts removed from the default view

  • Click and drag the grid icon  at top right of a tile to change its location.


The 'Audit' dashboard contains the following tiles:


Operating System

Shows enrolled devices by operating system. Place your mouse cursor over a sector or the legend to see further details.

  • Click on an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Android' in the legend will open the 'Device List' page displaying the list of Android devices. See Manage Devices for more details.


Security Client Version (Windows)


The versions of Xcitium Client Security installed on Windows devices on your network. Xcitium Client Security is the antivirus/security software on an endpoint.

  • The number of devices using each version is shown to the right of the version number.

  • Click the number to view all devices using that version.

  • The latest version of the client is shown underneath the chart.

Update to the latest version - Click the number, select the target devices, then click 'Install or Manage Packages'.

See Remotely Install and Manage Packages on Windows Devices for more details.

 

Communication Client Version (Windows)

The versions of Communication Client installed on Windows devices on your network. This is the agent which sends updates to the Xcitium console.

  • The number of devices using each version is shown to the right of the version number.

  • Click the number to view all devices using that version.

  • The latest version of the client is shown underneath the chart.

  • Update to the latest version - Click the number, select the target devices, then click 'Install or Manage Packages'.

See Remotely Install and Manage Packages on Windows Devices for more details. 





 Security Client Version (Mac OS)


The versions of the security client installed on MAC OS devices on your network. The security client is the Xcitium Client Security for MAC (XCS for Mac) software on an endpoint.

  • The number of devices using each version is shown to the right of the version number.

  • Click the number to view all devices using that version.

  • The latest version of the client is shown underneath the chart.

  • Update to the latest version - Click the number, select the target devices, then click 'Install or Manage Packages'.

See Remotely Install Packages on Mac OS Devices for more details.

Mobile Client Version (Android)


The versions of the mobile agent installed on Android device in your network.

  • The number of devices using each version is shown to the right of the version number.

  • Click the number to view all devices using that version.

  • The latest version of the client is shown underneath the chart.


 Device Types

Shows the composition of your device fleet by device type. Place your mouse cursor over a sector see further details.

  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Tablet' in the legend will open the 'Device List' page displaying the list of tablet devices. See Manage Devices for more details.

Ownership Types

Ownership types can be 'Corporate', 'Personal' or 'Not Specified'.

  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Personal' in the legend will show all devices in that category. See 'Devices' for more details.

Change ownership type:

  • Click 'Assets' > 'Devices' > 'Device List' > click a device name > Click 'Owner' button > 'Change ownership'.


Compliance

  • Click 'Dashboards' on the top

  • Select the 'Compliance' tab

The compliance dashboard monitors the status of managed devices with regards to various security and activity criteria. Charts shown include, devices with viruses, devices with blacklisted applications, device requiring database updates, rooted and jail-broken devices, devices which are unresponsive and more.



  • Click the 'Customize' button to add or remove the charts shown in the interface

  • Click the 'Refresh' icon at top right of a tile to update the data in it

  • Click and drag the grid icon at top right of a tile to change its location.

The 'Compliance' dashboard shows the following tiles:


Top 5 Vulnerability by Device Counts


Shows the top five weaknesses detected by Xcitium on the enrolled Windows devices.

  • Place your mouse over a sector or the legend to view further details.


  • Click a vulnerability identifier (CVE code) to view the devices that require the security patch. See Manage OS Patches on Windows Endpoints to know how to deploy the security patch.

Top 5 Vulnerable Devices by Vulnerability Counts


Shows the top five devices that require security patches.

  • Place your mouse over a sector or the legend to view further details.


  • Click a device name to view the details of the required patches. See Manage OS Patches on Windows Endpoints to know how to deploy the security patch.

Endpoint Patching Status


Shows the patch statuses on your enrolled devices.

  • Place your mouse cursor over a sector or the legend to view further details. See Patch Management for details about deploying patches.


  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking 'Missing Critical Patches' will open the 'Device Management' page displaying devices that require the critical patches. See 'Manage Devices' for more details.


Devices With Viruses


Shows how many enrolled devices are affected by viruses and how many are clean.

  • Place your mouse over a sector or the legend to view further details. See Antivirus Scans for details about scanning for viruses on enrolled devices.



  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'With virus(es)' will open the 'Device List' page displaying devices that contain viruses. See 'Manage Devices' for more details.


Active and Inactive Devices Last 24 Hours


Shows the connectivity status of enrolled devices. Devices which have not contacted Xcitium for more than 24 hours are marked as 'inactive'.

  • Place your mouse cursor over a sector or the legend to view further details.



  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Active Devices' will open the 'Device List' page displaying the list of active devices. Similarly clicking on the 'Inactive Device' legend will open the 'Device List' page displaying the list of inactive devices. The devices screens allow you to manage the enrolled devices. See 'Manage Devices' for more details.


Devices with Blacklisted Applications


Shows how many mobile devices contain blacklisted apps versus those that are free of blacklisted apps.

  • Place your mouse over a sector or the legend to view further details. See Blacklist and Whitelist Applications for details about adding and removing apps from blacklist.


  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'With Blacklisted Applications' legend will open the 'Device List' page displaying the list of devices that have blacklisted applications on them.  See 'Manage Devices' for more details.


Devices Responses for Virus Scan


Shows how many devices have responded to virus scan requests.

  • Place your mouse cursor over a sector or the legend to view further details. See Antivirus Scans for details about scanning for viruses on enrolled devices.


  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Scan response received' legend will opens the 'Antivirus' > 'Device List' page showing the list of devices that are responding to scan commands.

The 'Antivirus' > 'Device List' page lets you run antivirus scans on selected devices. See Run Antivirus and/or File Rating Scans on Devices for more help.


Rooted And Jail-broken Devices


Shows how many devices in your fleet are are rooted or jail-broken.

  • Place your mouse over a sector or the legend to view the further details.


  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Normal' in the legend will open the 'Device List' page displaying the list of devices that are normal, that is, not rooted or jail-broken. See 'Manage Devices' for more details.


Devices With Device Management Apps


Shows how many devices have the communication client. Android, Windows. Mac OS and Linux devices can only be enrolled with the Xcitium app/communication Client (CC). iOS devices communicate with Xcitium via the Xcitium profile that was installed during enrollment and do not require the app. However, installing the app will provide enhanced functionality such as device location and the ability to send messages to the device from the admin panel.

  • Place your mouse cursor over a sector or the legend to view further details.

 

  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'With device management App' will open the 'Device List' page displaying the list of devices that have the Xcitium communication client installed. See 'Manage Devices' for more details.


Device Online


Shows enrolled devices by online/offline status.


Devices are shown as offline if they are turned-off, are not communicating with Xcitium for other reasons, or if Communication Client is not running.

  • Place your mouse over a sector or the legend to view further details.


  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Online' will open the 'Device List' page displaying the list of devices that are online. See 'Manage Devices' for more details.


Scan Status


Shows the progress and results of antivirus scans on enrolled devices.

  • Place your mouse over a sector or the legend to view the further details.


  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Virus Found' in the legend will open the 'Antivirus Device List' page displaying the list of devices in which the malware were detected. See Antivirus and File Rating Scans for more details.


Antivirus DB Update


Shows the progress and results of AV database updates on enrolled devices.

  • Place your mouse cursor over a sector to view extra details.


  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Complete' in the legend will show devices which have the latest virus database. See Antivirus and File Rating Scans for more details.


Security Product Configuration


Shows how many of your enrolled devices have 'Safe' or 'Not Protected' statuses. 'Not Protected' means:

  • Xcitium Client Security (XCS) is not installed on the devices

  • XCS is installed but Anti-virus is not enabled in the deployed profiles on the devices

Place your mouse over a sector or a legend to view the details.



  • Click an item in the legend to view the respective 'Device List' page.

For example, clicking on 'Safe' will open the 'Device List' page displaying the list of devices that have Antivirus installed. See 'Manage Devices' for more details.


Xcitium Verdict Cloud

  • Xcitium Verdict Cloud is a cloud-based file analysis service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious.

  • To use the service, apply a profile to XCS that contains the 'Verdict' component.

  • Click 'Assets' > 'Configuration Templates' > 'Profiles'
  • Click the name of the profile you want to edit, or click 'Create' to make a new profile
  • Click the 'Add Profile Section' button > 'Verdict'
  • Click 'Save' 
  • All results will be displayed in the Xcitium Verdict Cloud dashboard. See Xcitium Verdict Cloud in Create Windows Profiles for more details.

Note: The version of Xcitium Verdict Cloud that comes with the trial version of Xcitium is limited to the online testing service. The Premium version also includes manual file testing by Xcitium research labs, helping enterprises quickly create definitive whitelists of trusted files. Xcitium Verdict Cloud is also available as a standalone service. Contact your Xcitium account manager for further details.


Open the Xcitium Verdict Cloud dashboard

  • Click 'Dashboards' on the top

  • Select the 'Xcitium Verdict Cloud' tab



  • Click the 'Customize' button to add or remove the charts shown in the interface

  • Click the 'Refresh' icon at top right of a tile to update the data in it

  • Click and drag the grid icon at top right of a tile to change its location.

The 'Xcitium Verdict Cloud' dashboard shows the following tiles:


Unparalleled Protection by Xcitium (Last Week)

Shows the number of threats identified by Xcitium Verdict Cloud over the past week versus the user's previous vendor and the antivirus industry as a whole.

Place the mouse cursor over a sector or the legend to see the percentage of number of files in a particular category.

See Manage File Trust Ratings on Windows Devices for more details on Windows File List screen.







Unparalleled Protection By Xcitium (All Time)


Shows the number of threats identified by Xcitium Verdict Cloud since installation versus the user's previous vendor and the antivirus industry as a whole.

Place the mouse cursor over a sector or the legend to see the percentage of number of files in a particular category.

See Manage File Trust Ratings on Windows Devices for more details on Windows File List screen.





File Statistics (Windows Devices)

Shows the trust rating and status of files on your network.

See Manage File Trust Ratings on Windows Devices for more details on Windows File List screen

  • Click any item in the legend will to open the respective 'File List' page.

For example, clicking on 'Unrecognized' will open the 'Application Control' > 'Unrecognized' page displaying the list of unrecognized files detected from enrolled devices. See Manage File Trust Ratings on Windows Devices for more details.







Xcitium File Verdicts (Last Week)

Displays Xcitium Verdict Cloud trust verdicts on unknown files for the previous 7 days. This includes the number of unknown files identified as malicious, those that remain unknown, and those that were white-listed (trusted). The total amount of unknown files analyzed is shown at the bottom.

Place your mouse cursor over a sector or the legend to view the percentage of files in that category.

See Manage File Trust Ratings on Windows Devices for more details on Windows File List screen.


Xcitium File Verdicts (All Time)

Displays Xcitium Verdict Cloud trust verdicts on unknown files for the lifetime of your account. This includes the number of unknown files identified as malicious, those that remain unknown, and those that were white-listed (trusted). The total amount of unknown files analyzed is shown at the bottom.

Place your mouse cursor over a sector or the legend to view the percentage of files in that category.

See Manage File Trust Ratings on Windows Devices for more details on Windows File List screen.







Reports


Xcitium can create a wide variety of reports on system and malware activity on your fleet of devices.

  • Click 'Dashboards' at the top

  • Select the 'Reports' tab

  • The reports interface lets you generate and download many different report types:



Column Header

Description

Name

The subject of the report.

  • Click the name to view report details and download the report.

Type

The file format of the report.

Status

Whether or not the report has been downloaded by any user.

Created By

The admin who generated the report.

  • Click the admin name to view their details. See View User Details if you need help with this.

Created At

The date and time the report was generated

  • Click any column header to sort items in ascending/descending order of items in that column.

  • Click the funnel icon at top-right to filter and search reports

You can generate reports from the reports interface or from individual product areas:

  1. 'Dashboards' > 'Dashboards' > 'Reports' interface - Lets you generate following report types:

    • Android Antivirus

    • Android MDM

    • Windows Antivirus

    • Windows Malware List

    • Windows Top Malware

    • Windows Quarantine

    • Hardware Inventory

These reports are generated in spreadsheet (.xls) file format.

  1. From specific interfaces:

  • User Management menu

    • User List - Click 'Assets' > 'User Management' > 'User List' > 'Export'. Click here for more details.

    • User Groups - Click 'Assets' > 'User Management' > 'User Groups' > 'Export'. Click here for more details.

    • Role Management:

      • Roles - Click 'Assets' > 'Users' > 'Role Management' > 'Roles' > 'Export'. Click here for more details.

      • Users - Click 'Assets' > 'Users' > 'Role Management' > 'Users' > 'Export'. Click here for more details.

  • Devices menu

    • Device List - Click 'Assets' > 'Devices' > 'Device List' > 'Export'. Click here for more details.

    • Device Details > File List - Click 'Devices' > 'Device List' > Any Windows Device > 'File List' > 'Export'. Click here for more details.

  • Configuration Templates menu

    • Profiles - Click 'Assets' > 'Configuration Templates' > 'Profiles' > 'Profiles' > 'Export'. Click here for more details.

    • Default Profiles - Click 'Assets' > 'Configuration Templates' > 'Profiles' > 'Default Profiles' > 'Export'. Click here for more details.

    • Alerts - Click 'Assets' > 'Configuration Templates' > 'Alerts' > 'Export'. Click here for more details.

    • 'Procedures' main menu

      • Procedures List - Click 'Assets' > 'Configuration Templates' > 'Procedures' > 'Export'. Click here for more details.

      • Procedure Execution Logs - Click 'Assets' > 'Configuration Templates' > 'Procedures' > 'any script procedure' > 'Execution Log' sub-tab > 'Export'. Click here for more details.

  • Network Management menu
    • Discoveries – Click 'Assets' >  'Network Management' > 'Discoveries' > 'Export'. Click here for more details.
    • Managed Devices List – Click 'Assets' > 'Network Management' > 'Devices' > 'Managed Devices' tab > 'Export'. Click here for more details.
    • Discovered Devices List – Click 'Assets' > 'Network Management' > 'Devices' > 'Discovered Devices' tab > 'Export'. Click here for more details. 
  • Software Inventory menu

    • Mobile Applications- Click 'Software Inventory' > 'Applications' > 'Mobile Applications' > 'Export'. Click here for more details.

    • Patch Management - Click 'Software Inventory' > 'Applications' > 'Patch Management' > 'Operating System' tab > 'Export'. Click here for more details.

  • Security menu

    • Containment - Click 'Security' > 'Endpoint Security' > 'Containment' > 'Export'. Click here for more details.

    • Application Control - Click 'Security' > 'Endpoint Security' > 'Application Control' > 'Export'. Click here for more details.

    • File Verdicts - Click 'Security' > 'Endpoint Security' > 'File Verdicts' > 'Export'. Click here for more details.

    • Device Control - Click 'Security' > 'Endpoint Security' > 'Device Control' > 'Export'. Click here for more details.

    • Antivirus:

      • Device List - Click 'Security' > 'Endpoint Security' > 'Antivirus' > 'Device List' tab > 'Export'. Click here for more details.

      • Current Malware List - Click 'Security' > 'Endpoint Security' > 'Antivirus' > 'Current Malware List' tab > 'Export'. Click here for more details.

      • Quarantined Files - Click 'Security' > 'Endpoint Security' > 'Quarantined Files' tab > 'Export'. Click here for more details.

      • Android Threat History - Click 'Security' > 'Endpoint Security' > 'Antivirus' > 'Android Threat History' tab > 'Export'. Click here for more details.

      • Autoruns Items- Click 'Security' > 'Endpoint Security' > 'Antivirus' > 'Autoruns Items' tab > 'Export'. Click here for more details. 

    • Data Loss Prevention - Click 'Security' > 'Endpoint Security' > 'Data Loss Prevention' > 'Quarantined Files' tab > 'Export'. Click here for more details. 
  • License Management menu
    • Licenses - Click 'License Management' > 'License Management' > 'Licenses' tab > 'Export'. Click here for more details
    • Customers - Click 'License Management' > 'License Management' > 'Licenses' tab > select a license > 'Details' > 'Customers' tab > 'Export'. Click here for more details

These reports are generated in comma separated values (.csv) format.


Generate a report from the 'Reports' interface

  • Click 'Dashboards' 

  • Select the 'Reports' tab

  • Click 'Generate Report' from the top and then click on the report type from the drop-down.





A new report is generated for the selected report type.


Download a report

  • Select the report and click 'Download' to save the report on your admin computer




  • Click a report name to view report details.



  • To remove a report from the list,select it and click 'Delete'.

Notifications

  • Click 'Dashboards' on the top

  • Select the 'Notifications' tab

  • The notifications screen shows the list of messages generated for you by Xcitium.



  • Message titles also act as shortcuts to the relevant interface. For example, clicking on 'Malware Found on Windows device' message opens the 'Antivirus Current Malware List' screen.

Tip: You can also receive notifications as emails. Click the cog wheel icon at top right and configure notification settings. See Alert Notification Settings if you need help with this.


Audit Logs

  • Click 'Dashboards' at the top

  • Select the 'Audit Logs' tab

  • Xcitium logs actions implemented on managed devices by admins and staff. These logs can be useful when troubleshooting issues.

  • You can forward logs to an external syslog server if required. See Configure Audit Log Settings for more on this.

  • Example logged actions include: 

    • Add or remove devices 
    • Apply a security profile
    • Create or edit a profile
    • Package installations
    • Remote take-over sessions
    • Changes to containment settings 
    • Remote file transfers 
    • Auto-removal of old / duplicate devices
       
  • Each log entry is accompanied with details such as the staff member who applied the action, the affected device, the action taken, and more.

  • Logs are kept for up to one year for PCI-DSS compliance.

  • You can generate a report containing logs for the past three months as a comma separated values (CSV) file.




Audit Logs - Column Descriptions

Column Heading

Description

Staff

Username of the admin or staff member who executed the action.

  • Click the staff name to view their details. See View user details if you need help with the details interface.

Event Name

The action executed on the device. Examples include enrollment of devices, remote installation of Xcitium and third party MSI packages, remote take-overs and device removals.

Affected Object

The device, device group, profile, procedure or file group on which the action was executed.

  • Click the name to view more details about the item

  • The details interface allows you to view and manage the respective item.

Old Value

The previous setting or value before the action was implemented.

For example, if a Xcitium package is remotely updated, the old version number of the package will be shown here.

New Value

The new setting or value after the action was implemented.

For example, if a Xcitium package is remotely updated, the version number of the new package will be shown here.

Extra Info

Additional details about the action. Additional details include devices on which the procedure was run, package installation parameters, profiles applied/removed, malware quarantined, antivirus scans run and so on.

  • Script or patch procedures - Click the 'Selected Devices' link to view devices on which the procedure was run.

  • Click a device name in the list to view its 'Device Details' interface

Session ID

String used to identify the connection session between the device and the Xcitium server during the action.

Log Creation Date

Date and time of the event.

Controls

Export

Generate a comma separated values (CSV) file of logs for a selected time period.

The exported .csv is available in 'Dashboard' > 'Reports'

See Generate Audit Logs Reports for more details.

  • Click the 'Refresh' icon to load the latest events.

Search and filter options

  • Click any column header (except 'Event Name') to sort items in alphabetical order of items in that column

  • To filter or search for a specific event, click the funnel icon  at the top right.


  • You can filter items by various criteria or search for specific events.

  • Click 'Apply' to run your filter.

Generate Audit Logs Reports

  • Click 'Dashboard' > 'Audit Logs'.

  • Click the funnel icon to filter which records are included in the report. 

  • Click 'Export' above the table then choose 'Export to CSV'. You can export logs for up to the past 90 days (Day 1 - Day 90). 

  • The CSV file will be available in 'Dashboard' > 'Reports'

  • See Reports for more details.

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.