Importing Network Structure
This section outlines the preliminary steps required to establish control of networked computers under Comodo Endpoint Security Manager.
Ultimately, any computer (or group of computers) must be designated as a CESM 'Managed' computer in order for an administrator to define and schedule tasks for the Comodo applications installed upon it. To complete this process, you will need to carry out the following steps:
i. Import networked computers into the CESM Administrative Console;
ii. (Optional) Create computer 'Groups' within CESM Administrative Console to simplify management;
iii. Assign 'Managed' status to those computers that you wish to control;
iv. Install the CESM Remote Agent on those Managed computers.
After completing steps (i) through (iv) you will have successfully finished the initial setup of your CESM configuration and can begin to set tasks for your chosen Managed machines. For example, you can begin to roll out the installation of CESM controlled applications such as Comodo Internet Security to those machines. (Full details on each aspect of creating and setting Tasks can be found in ‘The Administrative Console’. A walk through example can be found in ‘Managing Computers using the CESM Administrative Console’).
Note: CESM also allows the Administrators to add individual computers. For more details see Importing Computers by IP Addresses.
Comodo Endpoint Security Manager User Guide | © 2010 Comodo Security Solutions Inc. | All Rights Reserved