Step 1. Run a set of Discovery Profiles on the Managed Computers
While not essential to the deployment of Comodo Internet Security, running a Discovery Profile Sequence on imported, Managed computers will provide administrators with very important configuration information about the computers they are about to manage using CESM. For a full description of Discovery Profiles, see section The Discovery Profiles Window.
Note: Since CESM version 1.4, much of the data available using Discovery Profiles can now be done by simply right-clicking on the target machine and selecting 'Properties'.
To run a set of Discovery Profiles:
- Open the 'Sequence Manager' window by selecting ' View > Sequence Manager';
- Click the 'Add New Sequence' Icon (highlighted below).
- This will open the 'Add New Sequence' dialog. At this stage, you should create an appropriate Name and Description for the sequence you are about to create. In the example shown below, we have chosen to name the Sequence 'Discover Profiles'.
- Next, choose the type of Discovery Profile. (The red exclamation mark indicates that you cannot save this Sequence until a 'Discovery Parameter' has been chosen.) Select a Discovery Profile type from the drop-down list by clicking the ellipsis button (...) at the Discovery Parameter panel on the right (as shown below).
- The 'Windows Service list' Discovery Data Action has now been added to the Sequence. Repeat this procedure for the other four main types of Discovery Profile.
Note: You can specify all types of profiles. This depends on kind of information you wish to discover.
The completed Sequence containing five Discover Data Actions should look similar to the graphic below:
- Click 'Save':
- Next we need to add this Sequence to a Task that will execute the Discovery Profile Actions on the Target Computers. Open the 'Task Manager' tab by selecting 'View > Task Manager'.
- Click the 'Add New Task' Icon (highlighted below).
- This will open the 'Add New Task' dialog (shown below). At this stage, you should create an appropriate Name and (optional) Description for the Task you are about to create.
- Next, click the browsing a sequence button to the right of the 'Sequence' field (highlighted above). This will open the 'Choose Sequence' dialog. Choose the 'Discover Profiles' Sequence you created earlier and click 'OK':
- This will return you to the 'New Task' dialog where the name of the Sequence will now be displayed in the 'Sequence' field:
- Select the target Managed workstations, controllers, domains and/or Workgroups you want to discover data for.
- Click the 'Save' button to confirm and save the new Task.
- Open the 'Task Manager' window (View > Task Manger ). Select the task you have just created and click the 'Execute' icon as shown below:
- This will execute the Task on the target computers. Open the 'Task Result Manager' ( History > Task Results) to check whether the Task executed successfully or not. More details on the Task Result window can be found in section The Task Result Manager Window.
To view the discovered data about the target machines you need to open the 'Discovery Profiles' window ( View > Discovery Profiles). The Discovery Profiles window lists the four types of profile. Clicking any of the profiles will open a list of computers upon which that profile has been run. The graphic below shows a typical 'Windows Services' list:
- To the right of this list of computers is the results panel for the selected machine. Clicking the ellipsis button ( ... ) on the right hand side of this panel will display those details. In the case of the 'Windows Service list' profile shown above, it will display the Name, Version, Publisher, Date (of installation) and Location of all Comodo and 3rd party Packages present on the machine at the time the Action was run. Similarly, the OS Version profile will inform the administrator of the exact version of Windows that is running on the target computer.
- For more details on the functionality, operation and uses of Discovery Profiles, see section The Discovery Profiles Window.
Comodo Endpoint Security Manager User Guide | © 2010 Comodo Security Solutions Inc. | All Rights Reserved