The Custom Configuration Editor
The Custom Configuration Editor allows administrators to configure CIS security settings as per their requirements.
A configuration can only be implemented on endpoint machines with CIS installed. To know how to deploy CIS to endpoint machines, click here
After installation of CIS, administrators MUST deploy a CIS configuration to activate the software. This can be a preset configuration or a custom configuration (this chapter)
If you wish to modify the configuration of CIS already running on an endpoint then right click on the machine and select 'Custom....'. This will fetch the configuration already in effect and open it in the editor
Once you are satisfied with your configuration in the editor, click the 'OK' button to save this configuration within the Task you are setting up. If you wish to export this configuration to a .xml file then select 'File > Save as...' at the top right of the editor (for example, to import into another Task at a later date).
There are three easy ways to access the CIS Configuration Editor using the CIS Set Config action:
1) By Right Clicking on an imported computer. Right click on the target computer (previously installed with CIS) from the list of computers in the Computers window. Point to 'Internet Security' > 'Configuration' and select 'Custom' from the context sensitive menu. This will open the current CIS configuration in the editor.
2) By using the 'New Task' wizard. Click 'New Task' on the Start Page; create a name and description for the Task ; select the target computer(s); select 'New Sequence' ; select 'Internet Security' > 'CIS Set Config' as the Task Action then click 'Next'. Now select 'Config' under the 'Config parameters' section and then click the ellipsis button (...) on the right to open the CIS Configuration Editor. This will open a blank configuration profile in the editor.
3) By creating a new sequence manually. Open the 'Sequence Manager', click the 'Add' icon. Again click the 'Add' icon in the 'New Sequence' window, select 'CIS Set Config' option and click OK . Now select 'Config' under the 'Config parameters' section and then click the ellipsis button (…) on the right to open the CIS Configuration Editor.This will open a blank configuration profile in the editor.
The CIS Configuration Editor
General Note: Unlike the standalone (home) version of CIS, the CESM version is controlled remotely and is not directly accessible from endpoint machines. Administrators looking to familiarize themselves with the workings of CIS (and to gauge the effect of the settings that they implement using this editor) may want to consider first installing the standalone version of CIS first. This can be downloaded from http://personalfirewall.comodo.com/.
The CIS Editor is split into five main configuration areas – Firewall , Defense + , Anti-Virus , Miscellaneous and Common Settings
The Firewall center allows the administrator to quickly and easily configure all aspects of the Firewall. It offers the highest levels of security against inbound and outbound threats, stealth the computer's ports against hackers and blocks malicious software from transmitting confidential data over the Internet.
Defense+ is a host intrusion prevention system that constantly monitors the activities of all executable files on a PC. Defense+ also protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks.
Comodo Antivirus leverages multiple technologies, including Real-time / On-Access Scanning and Manual / On Demand Scanning and to immediately start cleaning or quarantining suspicious files from the hard drives, shared disks, emails, downloads and system memory. The interface also allows administrator to create custom scan profiles which can be re-used across all scan types and features full event logging, quarantine and file submission facilities.
The Commonmodulehelps to create common groups, the entities of which are called in several interfaces within CIS Configuration Editor.
The Miscellaneous section allows the administrator to configure connectivity settings to Comodo's Proxy servers.
Use the bookmarks on the left to jump to the particular section you need help on.
Comodo Endpoint Security Manager | © 2010 Comodo Security Solutions Inc. | All Rights Reserved.