Comodo Help
Find the desired product help
Endpoint Manager

Endpoint Manager

Endpoint Manager Administrator Guide 7.2

English

Print Help Download Help
Security > View Contained Threats
  • Introduction To Endpoint Manager
    • Key Concepts
    • Best Practices
    • Quick Start
    • Login Into The Admin Console
  • The Admin Console
  • The Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Customer Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Hardware Information
        • View Network Information
        • View Maintenance Windows Associated With Device
        • View And Manage Profiles Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Endpoint Manager
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remove A Device
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Install Apps On Android/iOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Shutdown Windows Devices
      • Wake Offline Device
      • Change A Devices Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Generate Device List Report
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll The Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To A Users Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And Comodo Client - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • Security Events
      • View Security Events By Time
      • View Security Events By Files
      • View Security Events By Device
      • View Android Threat History
    • View And Manage Blocked Threats
    • View And Manage Quarantined Threats
    • View Contained Threats
    • HIPS Events
    • Firewall Events
    • View And Manage Autorun Alerts
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Application Store
    • IOS Apps
      • Add IOS Apps And Install Them On Devices
      • Manage IOS Apps
    • Android Apps
      • Add Android Apps And Install Them On Devices
      • Manage Android Apps
    • Windows Apps
      • Install Windows Apps On Devices
  • Applications
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • EM Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • License Management
    • Manage Your Licenses
    • Manage License Allocation
    • Bill Forecast
  • Configure Endpoint Manager
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • Endpoint Manager Portal Configuration
      • Import User Groups From LDAP
      • Configure Communication And Security Client Settings
      • Configure The EM Android Client
        • Configure Android Client General Settings
        • Configure Android Client Antivirus Settings
      • Add Apple Push Notification Certificate
      • Configure Windows Clients
        • Configure Communication Client Settings
        • Configure Client Security Settings
      • Manage Endpoint Manager Extensions
      • Configure Endpoint Manager Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrators Time Zone And Language
      • Configure Audit Log Settings
    • Integrate Apple Business Manager With Endpoint Manager
      • Link Endpoint Manager With Apple Business Manager
      • Manage Apple Business Manager Devices
      • Manage Apple Business Manager Profiles
      • Configure Apple Business Manager Notifications
    • View Version And Support Information
  • Appendix 1a - Endpoint Manager Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Endpoint Manager Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Endpoint Manager License Types
  • Appendix 3 - Pre-configured Profiles
  • About Comodo Security Solutions

View Contained Threats


Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • The container is a secure environment in which files with an 'unknown' trust rating are run. 'Unknown' files have not yet been classified as either 'safe' or 'malware'.
  • Contained threats are not permitted to modify files, user data or other processes on the host machine.
  • You can also submit unknown applications to Valkyrie, Comodo's file analysis system. Valkyrie will test the file and attempt to classify it as 'safe' or 'malware'.

A threats could be run inside the container because:

  • It was auto-contained by rules in the EM configuration profile applied to the endpoint. See 'Containment Settings' in the section Create Windows Profiles for more details about containment rules in a profile.
  • It was auto-contained by local Comodo Client Security rules on the endpoint
  • The endpoint user ran the program inside the container on a 'one-off' basis. This can be helpful to test the behavior of new executables that have they downloaded.

You can view all programs that ran inside the container from the 'Containment' interface. Admins can also view the activity of processes started by contained threats. Admins have the option to rate a contained file as trusted or malicious.


Open the containment list interface:
  • Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • Select a company or group to view contained programs in that group
Or
Select 'Show all' to view all contained programs.




Containment - Column Descriptions

Column Heading

Description

File Name

The executable that was run in the container.
  • Click the name of the file to view its details. 
  • See View details of a contained application for more details.

File Path

 The location of the contained file on the local endpoint.

  • Click the   icon to copy the path to the clipboard.

File Hash

 SHA1 hash value of the file.

  • Click the  icon to copy the hash value to the clipboard.

Number of Devices

The quantity of endpoints on which the item was identified.

  • Click the number to view a list of endpoints on which the item was found.
  • This also allows you to view the activities of processes started by the item. For more details, see Device List Screen below.

Contained By

The reason the file was contained.

 Parent Process Name
 The program or service that launched the contained threats.

Action

The permission level at which the file was executed in the container, or the action that was taken upon it. The possible values are:

  • Restricted - The file was run inside the container but had limited access to the operating system resources.
  • Virtually - The file was completely isolated from the operating system and files on the computer.
  • Blocked - The file was not allowed to run at all.
  • Ignored - The file was allowed to run outside the container without any restrictions.
  • Unknown - The containment status was not determined.

Status

 The execution state of the file inside the container. The possible values are:

  • Running
  • Complete
  • Failed

Comodo Rating

The present trust rating of the file as per the Comodo File Look-up Service (FLS).

Admin Rating

The trust rating of the file as set by the administrator. Files can be rated as trusted, malicious or unrecognized.

 Date and Time

Date and time the file ran in the contained environment.

Controls

File Details

View full information of the contained file including the devices on which it was contained and its activity.

Change Rating

You can change the rating of the contained file as trusted, malicious or unrecognized.

Hide file(s)

Conceal contained file record(s) from the list.

Unhide file(s)  Reveal concealed file record(s).

Export

Export the list of contained files to a .csv file.


The exported file can be viewed in 'Dashboard' > 'Reports'.

Download Valkyrie report

Valkyrie is Comodo's advanced file analysis and verdicting system. Each report contains an in-depth breakdown on the activity an unknown file, along with an overall verdict on its trustworthiness.

Check Valkyrie details

View Valkyrie file analysis of the contained file at https://valkyrie.comodo.com


  • Click any column header to sort items in ascending/descending order of entries in that column.
  • Click the funnel icon  on the right to search for contained threats by name, file path, SHA1 file hash, admin rating, action, status and/or execution date.
  • To display all the items again, remove / deselect the search key from filter and click 'Apply'.
  • EM returns 20 results per page when you perform a search. To increase the number of results displayed per page up to 200, click the arrow next to 'Results per page' drop-down and choose the number.

Manage Contained Items

The 'Containment' interface allows you to:

  • View the details of the contained threats
  • Rate the files
  • Hide file(s)
  • Restore hidden file(s)
  • Export file records as CSV file
  • Download Valkyrie report
  • View Valkyrie fie analysis report online

View details of a contained threats

  • Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • Select a company or group to view contained programs in that group
Or
  • Select 'Show all' to view all contained programs 
  • Click on a specific file-name in the list OR select a file and click 'File Details'
  • This will open the file details interface which shows: 
  • File Info - General information such as file-name, path, age, hash and file-size.
  • Device - Shows endpoints upon which the file was found. This tab also tells you the device owner and lists any activities by the file.

Devices List Screen

  • Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • Click on a specific file-name in the list OR select a file and click 'File Details'
  • Click the 'Device List' tab 
The 'Device List' shows endpoints on which the file was discovered and its activities. Admins can view processes executed by the file with details on data handled by each process.  




Rate files as trusted / malicious

 

If required, admins can rate contained files as unrecognized, trusted or malicious. Please make sure before marking a file as trusted. Any new file ratings will be sent to endpoints during the next sync.
  • Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • Select a company or group to view contained programs in that group
Or
  • Select 'Show all' to view all contained programs 
  • Select the file(s) whose rating you wish to change
  • Click the 'Change Rating' button
  • Set your preferred rating from the options:



The new rating will be propagated to all endpoints during the next synchronization.


Export file records as a CSV file

  • Click ''Security' > 'Contained Threats'> 'Containment Logs'
  • Select a company or group to view contained programs in that group
Or
  • Select 'Show all' to view all contained programs 
  • Click the funnel  icon to filter which records are included in the report.
  • Click the 'Export' button and choose 'Export to CSV':



 

The report is generated in .csv file format.



You can access the report in the 'Dashboard' > 'Reports' interface. See Reports if you need more help with this interface.

 

Hide File(s)

  • You can hide records of contained threats from the list. For example, you can hide unimportant hash records.

Hide contained file record(s)

  • Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • Select a company or group to view contained programs in that group
Or
  • Select 'Show all' to view all contained programs 
  • Select the files that you want to hide and click 'Hide file(s)'




To view the hidden files again, you have to unhide them.


Restore Hidden File(s)

  • Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • Select a company or group to view contained programs in that group
Or
  • Select 'Show all' to view all contained programs 
  • Click the funnel icon  on the right, select 'Show hidden files' and click 'Apply'




  • The hidden files are shown with dark gray background stripe.
  • Select the hidden files from the list and click 'Unhide file(s)'




A confirmation message is displayed. The files are re-added to the list.


Valkyrie Reports


Files running in the container are analyzed and rated by Comodo's behavior analysis system, Valkyrie. Valkyrie tests unknown files with a range of static and dynamic behavioral checks to identify whether they are malicious or safe.


You can view the file rating in the 'Application Control' interface also. You can download a Valkyrie report or view it online at https://valkyrie.comodo.com/


Download Valkyrie report 

  • Click 'Security' > 'Contained Threats'> 'Containment Logs'
  • Select a company or group to view contained programs in that group
Or
  • Select 'Show all' to view all contained programs 
  • Select any file
  • Click 'Download Valkyrie report':



This will open the Valkyrie report on the contained file in PDF format:



You can also download and view the report at https://valkyrie.comodo.com/ after signing into your Valkyrie account.


View Valkyrie fie analysis report online

  • Select the file from the list and click 'Check Valkyrie Details' at the top.




You will be taken to the report summary page of the selected file at https://valkyrie.comodo.com/.




  • View a more detailed version of the Valkyrie analysis by logging in at https://valkyrie.comodo.com/. You can use your Comodo One username and password to login.
  • See https://help.comodo.com/topic-397-1-773-9563-Introduction-to-Comodo-Valkyrie.html for help to use the Valkyrie online portal.
Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.