Comodo Help
Find the desired product help
Endpoint Manager

Endpoint Manager

Endpoint Manager Administrator Guide 7.2

English

Print Help Download Help
Configuration Templates > Create Configuration Profiles > Profiles For Linux Devices > Create A Linux Profile > Antivirus Settings For Linux Profile
  • Introduction To Endpoint Manager
    • Key Concepts
    • Best Practices
    • Quick Start
    • Login Into The Admin Console
  • The Admin Console
  • The Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Customer Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Hardware Information
        • View Network Information
        • View Maintenance Windows Associated With Device
        • View And Manage Profiles Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Endpoint Manager
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remove A Device
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Install Apps On Android/iOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Shutdown Windows Devices
      • Wake Offline Device
      • Change A Devices Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Generate Device List Report
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll The Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To A Users Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And Comodo Client - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • Security Events
      • View Security Events By Time
      • View Security Events By Files
      • View Security Events By Device
      • View Android Threat History
    • View And Manage Blocked Threats
    • View And Manage Quarantined Threats
    • View Contained Threats
    • HIPS Events
    • Firewall Events
    • View And Manage Autorun Alerts
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Application Store
    • IOS Apps
      • Add IOS Apps And Install Them On Devices
      • Manage IOS Apps
    • Android Apps
      • Add Android Apps And Install Them On Devices
      • Manage Android Apps
    • Windows Apps
      • Install Windows Apps On Devices
  • Applications
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • EM Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • License Management
    • Manage Your Licenses
    • Manage License Allocation
    • Bill Forecast
  • Configure Endpoint Manager
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • Endpoint Manager Portal Configuration
      • Import User Groups From LDAP
      • Configure Communication And Security Client Settings
      • Configure The EM Android Client
        • Configure Android Client General Settings
        • Configure Android Client Antivirus Settings
      • Add Apple Push Notification Certificate
      • Configure Windows Clients
        • Configure Communication Client Settings
        • Configure Client Security Settings
      • Manage Endpoint Manager Extensions
      • Configure Endpoint Manager Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrators Time Zone And Language
      • Configure Audit Log Settings
    • Integrate Apple Business Manager With Endpoint Manager
      • Link Endpoint Manager With Apple Business Manager
      • Manage Apple Business Manager Devices
      • Manage Apple Business Manager Profiles
      • Configure Apple Business Manager Notifications
    • View Version And Support Information
  • Appendix 1a - Endpoint Manager Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Endpoint Manager Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Endpoint Manager License Types
  • Appendix 3 - Pre-configured Profiles
  • About Comodo Security Solutions

Antivirus Settings for Linux Profile


The antivirus section lets you configure real-time monitoring, custom scans, scan schedules, exclusions and more.


Configure antivirus settings in a Linux profile

  • Click 'Configuration Templates' > 'Profiles'
  • Click on the name of a Linux profile
  • Click 'Add Profile Section' then 'Antivirus' (if you haven't yet added the AV section)
OR
  • Open the 'Antivirus' tab and click 'Edit' if it was already added

The antivirus settings screen will open:



It contains three tabs:

  • Scanner Settings - Configure real-time scans, manual scans, scheduled scans and exclusions.
  • Scan Profiles - Create antivirus scan profiles that define specific folders, drives or areas to scan. Once saved, you can apply a scan profile to scheduled scans.
  • Scheduled Scans - Timetable scans to be run on managed devices according to a selected scan profile.

Configure Scanner Settings for CCS for Linux


The 'Scanner Settings' area contains four sub-tabs:

  • Realtime Scanning – Set parameters for the 'always-on' virus monitor
  • Manual Scanning - Set parameters for on-demand scans
  • Scheduled Scanning - Set parameters for scheduled scans
  • Exclusions - View and manage items which will be skipped by virus scans.


Realtime Scanning

  • Click the 'Realtime Scanning' sub-tab under 'Scanner Settings'


Please note: The real-time virus scanner is not supported on Debian. The settings in this screen do not apply to Debian devices.



Real Time Scanning Settings - Table of Parameters

Form Element

Type

Description

Real time scanning

Drop-down

Enable or disable the background virus monitor.

  • On Access – Files are scanned before they are allowed to run. Threats are detected before they get a chance to execute (Default)
  • Disabled - Real-time protection is switched off. Files are allowed to run without first being checked for threats.

Do not scan files larger than (MB)

Text box

Maximum file size that the antivirus should attempt to scan. Files larger than the size specified here are not scanned. (Default = 20 MB).

Keep an alert on the screen for (seconds)

Text box

How long threat notifications should stay on-screen if not dismissed by the end-user. (Default = 120 seconds)

Automatically update virus database

Checkbox

CCS will check for and download the latest virus database updates on system start-up, and subsequently at regular intervals.

  • Disable this option if you do not want CCS to automatically check for updates.

(Default = Enabled).

Automatically quarantine threats found during scanning

Checkbox

Threats will be encrypted and moved to a secure holding area where they can cause no harm. You can review quarantined items and delete, ignore or restore them.

  • Disable this option if you do not want threats to be moved to quarantine.

(Default = Enabled)

Show notification messages

Checkbox

Choose whether or not a notification is to be shown to the end-user, whenever CCS identifies a threat and moves it to quarantine.


(Default = Disabled)

Enable heuristic scanning

Checkbox

Enable or disable heuristics scanning and define the scan level.


The scan level determines how likely the scanner is to classify an unknown file as a threat.

  • Low - Lowest sensitivity to detecting unknown threats / generates fewest false positives. The 'low' setting combines an extremely high level of security and protection with a low rate of false positives. Comodo recommends this setting for most users. (Default)
  • Medium - Detects unknown threats with greater sensitivity than the 'Low' setting but with a corresponding rise in the possibility of false positives.
  • High- Highest sensitivity to detecting unknown threats / increased possibility of false positives.

(Default = Enabled with 'Low ' option)


Background Note: Background. Heuristics identify previously unknown malware by checking whether it contains code typical of a virus. If it is found to do so then the application deletes the file or recommends it for quarantine.


Heuristics is about detecting 'virus-like' attributes rather than looking for a virus signature which exactly matches a signature on the blacklist. This allows the engine to detect new viruses even if they are not in the current database.


Manual Scanning

  • Click the 'Manual Scanning' sub-tab under 'Scanner Settings'
  • The options you set here will apply to manual scans on the endpoints on which the profile is active.
  • A manual scan is one you run 'on-demand' on selected files, folder or drives. Manual scans can be launched from 'Security Sub-Systems' > 'Antivirus'.
  • For more details on running on-demand scans on selected devices, see Run Antivirus and/or File Rating Scans on Devices.



Manual Scanning Settings - Table of Parameters

Form Element

Type

Description

Do not scan files large than (MB)

Text box

Maximum file size that the antivirus should attempt to scan. Files larger than the size specified here are not scanned. (Default = 20 MB).

Scan archive files

Checkbox

CCS scans archive files such as .ZIP and .RAR files.

  • Disable this option if you don't want archive files to be scanned.

(Default = Enabled).

Automatically update virus database before scanning

Checkbox

CCS will check for and download the latest virus database before starting an on-demand scan.

  • Disable this option if you do not want CCS to automatically check for updates.

(Default = Enabled).

Enable cloud scanning

Checkbox

CCS detects the very latest viruses more accurately because the local scan is augmented with a real-time look-up of Comodo's online signature database. This makes it possible to detect zero-day malware even if your local virus database is outdated. (Default = Disabled).

Enable heuristic scanning

Checkbox

Enable or disable heuristics scanning and define the scan level.


The scan level determines how likely the scanner is to classify an unknown file as a threat.

  • Low - Lowest sensitivity to detecting unknown threats / generates fewest false positives. The 'low' setting combines an extremely high level of security and protection with a low rate of false positives. Comodo recommends this setting for most users. (Default)
  • Medium - Detects unknown threats with greater sensitivity than the 'Low' setting but with a corresponding rise in the possibility of false positives.
  • High- Highest sensitivity to detecting unknown threats / increased possibility of false positives.

(Default = Enabled with 'Low ' option)


Background Note: Background. Heuristics identify previously unknown malware by checking whether it contains code typical of a virus. If it is found to do so then the application deletes the file or recommends it for quarantine.


Heuristics is about detecting 'virus-like' attributes rather than looking for a virus signature which exactly matches a signature on the blacklist. This allows the engine to detect new viruses even if they are not in the current database.


Scheduled Scanning

  • Click the 'Scheduled Scanning' sub-tab under 'Scanner Settings'
  • The options you set will apply to scheduled scans created for the profile. See Create and Manage Scheduled Scans for the Profile if you need help with this.



Scheduled Scanning Settings - Table of Parameters

Form Element

Type

Description

Do not scan files large than (MB)

Text box

Maximum file size that the antivirus should attempt to scan. Files larger than the size specified here are not scanned. (Default = 20 MB).

Scan archives files

Checkbox

CCS scans archive files such as .ZIP and .RAR files.

  • Disable this option if you don't want to scan archive files.

(Default = Enabled).

Automatically quarantine threats found during scanning

Checkbox

Threats identified by scheduled scans will be encrypted and moved to a secure holding area where they can cause no harm. You can review quarantined items and delete, ignore or restore them.

  • Disable this option if you do not want threats to be moved to quarantine.

(Default = Enabled)

Automatically update virus database before scanning

Checkbox

CCS will check for and download the latest virus database updates on system start-up, and subsequently at regular intervals.

  • Disable this option if you do not want CCS to automatically check for updates.

(Default = Enabled).

Show scanning progress

Checkbox

End-users will see a scan progress bar when the scan is running.

  • Disable this option if you don't want CCS to show the progress bar.

(Default = Enabled)

Enable cloud scanning

Checkbox

CCS detects the very latest viruses more accurately because the local scan is augmented with a real-time look-up of Comodo's online signature database. This makes it possible to detect zero-day malware even if your local virus database is outdated. (Default = Disabled).

Enable heuristic scanning

Checkbox

Enable or disable heuristics scanning and define the scan level.


The scan level determines how likely the scanner is to classify an unknown file as a threat.

  • Low - Lowest sensitivity to detecting unknown threats / generates fewest false positives. The 'low' setting combines an extremely high level of security and protection with a low rate of false positives. Comodo recommends this setting for most users. (Default)
  • Medium - Detects unknown threats with greater sensitivity than the 'Low' setting but with a corresponding rise in the possibility of false positives.
  • High- Highest sensitivity to detecting unknown threats / increased possibility of false positives.

(Default = Enabled with 'Low ' option)


Background Note: Background. Heuristics identify previously unknown malware by checking whether it contains code typical of a virus. If it is found to do so then the application deletes the file or recommends it for quarantine.

Heuristics is about detecting 'virus-like' attributes rather than looking for a virus signature which exactly matches a signature on the blacklist. This allows the engine to detect new viruses even if they are not in the current database.


Exclusions

  • Click the 'Exclusions' sub-tab under 'Scanner Settings'
  • You can add files to be ignored by CCS during virus scans.
  • Note. Any item you exclude will be skipped by ALL types of scan - real-time, on-demand and scheduled.



A list of excluded items will be displayed.


To add an item to the 'Exclusions' list

  • Click 'Add'



  • Enter the location of the item to be excluded in the 'Path' field and click 'Ok'
  • Repeat the process to add more items
  • To edit the path of an item, click the pencil icon  beside it

Create and Manage Scan Profiles for the Profile

  • Click the 'Scan Profiles' tab under 'Antivirus'
  • Scan profiles instruct CCS to scan selected areas, folders or drives on a the device.
  • The scan profiles you create here will be available when you configure a scheduled scan.



The list of pre-defined scan profiles will be displayed.


Add a new scan profile

  • Click 'Add'



  • Enter a name for the scan profile
  • Click 'Add' to specify the locations to be scanned as per the custom profile




  • Enter the path of the location to be scanned as per the custom profile and click 'Ok'

The path will be added to the profile.



  • To add more paths, click 'Add Path' and repeat the process
  • To edit the path, click the pencil icon  beside it
  • Click 'Ok' in the 'Add Scan Profile' dialog.
  • The profile will be added to the list of 'Scan Profiles'.




The custom profile will be added to the list.

  • To add more custom scan profiles, click 'Add' and repeat the process
  • To edit a custom scan profile, click the pencil icon  beside it
  • To remove a custom scan profile, select it and click 'Remove'

Create and Manage Scheduled Scans for the Profile

  • Click the 'Scheduled Scans' tab under 'Antivirus'
  • The highly customizable scan scheduler lets you timetable scans to be run on managed devices according to your preferences. CCS automatically starts scanning the entire system or the disks or folders contained in the scan profile selected for that scan.
  • You can add any number of scheduled scans for a profile to run at a time that suits your preference. A scheduled scan may contain any scan profile of your choice.




A list of pre-configured scheduled scans will be displayed.


To add a new scheduled scan

  • Click 'Add'




Add Scheduled Scan - Table of Parameters

Form Element

Type

Description

Name

Text box

Label for the scheduled scan.

Profile

Drop-down

Choose the pre-defined or custom scan profile to be applied for the scheduled scan. The scan profiles included under the 'Scan Profiles' tab will be available in the drop-down.

Day of the Week

Buttons

Select the day(s) of the week on which the scan has to run.

Time

HH:MM drop-down combo boxes

Set the time at which the scans are to run on the selected days.


  • Click 'Ok'

The scheduled scan will be added to the list.



  • To add more scheduled scans to the configuration profile, click 'Add' and repeat the process
  • To edit the settings of a scheduled scan, click the pencil icon beside it
  • To remove a scheduled scan, select it and click 'Remove'
  • Click 'Save' on the top right for your settings to take effect for the profile.

The settings will be saved and displayed under the 'Antivirus' tab. You can edit the settings or remove the section at anytime. See Edit Configuration Profiles for more details.

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.