Comodo Help
Find the desired product help
Endpoint Manager

Endpoint Manager

Endpoint Manager Administrator Guide 7.2

English

Print Help Download Help
Security > Security Events > View Security Events By Time
  • Introduction To Endpoint Manager
    • Key Concepts
    • Best Practices
    • Quick Start
    • Login Into The Admin Console
  • The Admin Console
  • The Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Customer Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Hardware Information
        • View Network Information
        • View Maintenance Windows Associated With Device
        • View And Manage Profiles Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Endpoint Manager
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Endpoint Manager
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remove A Device
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Install Apps On Android/iOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Shutdown Windows Devices
      • Wake Offline Device
      • Change A Devices Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Generate Device List Report
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll The Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To A Users Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And Comodo Client - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • Security Events
      • View Security Events By Time
      • View Security Events By Files
      • View Security Events By Device
      • View Android Threat History
    • View And Manage Blocked Threats
    • View And Manage Quarantined Threats
    • View Contained Threats
    • HIPS Events
    • Firewall Events
    • View And Manage Autorun Alerts
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Application Store
    • IOS Apps
      • Add IOS Apps And Install Them On Devices
      • Manage IOS Apps
    • Android Apps
      • Add Android Apps And Install Them On Devices
      • Manage Android Apps
    • Windows Apps
      • Install Windows Apps On Devices
  • Applications
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • EM Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • License Management
    • Manage Your Licenses
    • Manage License Allocation
    • Bill Forecast
  • Configure Endpoint Manager
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • Endpoint Manager Portal Configuration
      • Import User Groups From LDAP
      • Configure Communication And Security Client Settings
      • Configure The EM Android Client
        • Configure Android Client General Settings
        • Configure Android Client Antivirus Settings
      • Add Apple Push Notification Certificate
      • Configure Windows Clients
        • Configure Communication Client Settings
        • Configure Client Security Settings
      • Manage Endpoint Manager Extensions
      • Configure Endpoint Manager Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrators Time Zone And Language
      • Configure Audit Log Settings
    • Integrate Apple Business Manager With Endpoint Manager
      • Link Endpoint Manager With Apple Business Manager
      • Manage Apple Business Manager Devices
      • Manage Apple Business Manager Profiles
      • Configure Apple Business Manager Notifications
    • View Version And Support Information
  • Appendix 1a - Endpoint Manager Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Endpoint Manager Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Endpoint Manager License Types
  • Appendix 3 - Pre-configured Profiles
  • About Comodo Security Solutions

View Security Events by Time


  • Click 'Security' > 'Security Events' > 'Event View' 
  • Select a company or group to view events in that group

Or

  • Select 'Show all' to view all events. 
      • Event view shows security events from all managed endpoints in chronological order:



      Security Dashboards - Event View - Column Descriptions

      Column Header

      Description

      Date/Time

      The time at which the event occurred.

      Components

      The CCS module that reported the event. This can be 'Antivirus', 'Containment', 'Application Control', 'Autorun Control' or 'Virtual Desktop'.

      Action

      The response to the event. This shows how the file was handled by the component mentioned above.


      Here are the possible actions per module:


      Antivirus – Windows, Mac OS, and Linux devices

      • Malware detected.
      • Malware quarantined.
      • Malware removed from quarantine.
      • Malware restored from quarantine.
      • Malware removed from infected file.
      • The file was skipped by the scan.
      • Detected malware ignored.
      • Detected malware blocked.
      • File added to exclusions.
      • File added to trusted files list.
      • File reported as false positive from the results screen.
      Containment - Windows devices
      • File run inside container with different restriction levels:
      • Restricted
      • Virtually
      • File blocked.
      • File ignored.

      File Rating - Windows devices

      • File added to the file list.
      • File removed from the endpoint.
      • Trust rating updated for a file.

      Autorun Control - Windows devices 

      • Detected item ignored.
      • Process / service stopped.
      • Auto-run process stopped. Corresponding auto-run entry removed. In the case of a service, CCS disables the service.
      • Auto-start process quarantined. Corresponding auto-start entry removed.In the case of a service, CCS disables the service.
      • Processes restored from quarantine.
      • File deleted from the endpoint.

      Virtual Desktop - Windows devices

      • Launched
      • Terminated
      • Session started
      • Session paused
      • Session continued
      • Session terminated
      • Switched to host
      • Switched to virtual desktop

      Device Name

      The label of the endpoint on which the event occurred.

      • Click the name of a device to open its 'Device Details' interface.

      • See Manage Devices for more details on the interface.

      File Name

       The label of the executable file affected by the action

      • Click the name of a file to open its 'File Details' interface.
      • See View the details of a file for more details.

      File Path

      The installation location of the executable file on the endpoint.

      • Click the  icon to copy the path to the clipboard.

      File Hash

      The SHA 1 hash value of the executable file.

      • Click the  icon to copy the hash value to the clipboard.

      Initial Xcitium Rating

      The trust rating awarded by Xcitium File Look-up Service (FLS) to the file before the event.

      Current Xcitium Rating

      The present trust rating of the file as per the Xcitium FLS.

      Initial Admin Rating

      The trust rating of the file as manually set by the admin before the event, if any.

      • See Rate Files as Trusted, Malicious or Unrecognized for more details.

      Current Admin Rating

      The most recent trust rating of the file as manually set by the admin after the event, if any.

      • See Rate Files as Trusted, Malicious or Unrecognized for more details.

      Additional Info

       Provides the current status of the event or the action taken on the affected file.

      Controls

      Action on Endpoints

      Delete or restore a file from quarantine on the endpoint. Applies to events where malware or autorun items were quarantined.

      •  See Handle Quarantined Items for more details

      Change rating

      Assign a new admin rating to a file (trusted, malicious or unrecognized).

      • See Rate Files as Trusted, Malicious or Unrecognized for more details.

      File Details

      View complete information about the file that caused the event. You can also view a history of actions taken by the file.

      • See View the details of a file for more details.

      Download Valkyrie Report

      Get a detailed Valkyrie analysis report for the file as a PDF.

      Check Valkyrie Details

      View the Valkyrie analysis on a file.

      • See View Valkyrie analysis details of file for more details

      Export

      Save the list of events as a comma separated values (csv) file.

      • See Export the List of Events for more details.


      The 'Event View' interface lets you to:

      • Handle Quarantined Items
      • Rate Files as Trusted, Malicious or Unrecognized
      • View the details of a file
      • Get Valkyrie Report of a file
      • View Valkyrie analysis details of a file
      • Export the List of Events

      Sorting, Search and Filter Options

      • Click the 'Date/Time', 'File Name', 'File Path' or 'File Path' column header to sort events in ascending or descending order
      • Enter the SHA 1 hash value of a file in the search box to filter the events involving the file.
      • Click the funnel icon on the top right to open more filter options:




      • Use the search fields to filter the events by OS, date/time, file ratings and other criteria.
      • By default, 'Security' > 'Security Events' > 'Event View' does not show the files that are ignored by auto-containment rules.
      • Select 'Show containment ignored events' to include the files ignored by auto-containment rules in the events list.
      • To display all items again, clear any search filters then click 'OK'.

      You can use any combination of filters simultaneously to search for specific apps.


      Handle Quarantined Items


      You can delete or restore quarantined items from the 'Event View' tab of the security dashboard.

      • Click 'Security' > 'Security Events' > 'Event View.' 
      • Select a company or group to view events in that group.

      Or

      • Select 'Show all' to view all events.
      • Select the events where the files of interest were moved to quarantine.
      • Click 'Action on Endpoint' button:




      • Select 'Delete File / Delete Autorun from device' to remove the file from the device
      • Select 'Restore from Quarantine' / 'Restore Autorun' to move the file(s) from quarantine to their original location on the device.

      Rate Files as Trusted, Malicious or Unrecognized


      If required, you can manually rate files as unrecognized, trusted or malicious. The new rating will be sent to endpoints during the next sync.

      • Click ''Security' > 'Security Events' > 'Event View' 
      • Select a company or group to view events in that group

      Or

      • Select 'Show all' to view all events
      • Select the events involving the files of interest.
      • Click the 'Change Rating' button
      • Set your preferred rating from the options:



      The new rating will be propagated to all endpoints during the next synchronization.

       

      View the details of a file

      • You can view the complete details of the executable file that effected a security event on a managed endpoint from the 'Events View' interface.
      • You can also view the history of actions taken on the file on all endpoints on which it was discovered.

      To view the details of a file that induced a security event

      • Click 'Security' > 'Security Events' > 'Event View' 
      • Select a company or group to view events in that group

      Or

      • Select 'Show all' to view all events
      • Select the event involving the file of interest.
      • Click the 'File Details' button:
      • Alternatively, click the label of the file in the 'File Name' column



      The information on the file are shown under two tabs:

      • File Details
      • File History

      File Details

      • The 'File Details' tab shows the particulars of the file.
      • The interface also allows you to:
      • Change the admin trust rating of the file
      • Delete the file from the endpoints or restore the file from quarantine, if the file has been moved to quarantine by antivirus on the endpoints.
      • Get a Valkyrie analysis report of the file as a PDF
      • View Valkyrie analysis details of the file




      The 'File Summary' pane shows the following details:

      • Last detected file name - Label of the file when it was most recently scanned
      • SHA1 - SHA1 hash value of the file
      • First Seen by Xcitium - Date and time at which the file was first reported to Xcitium threat labs
      • First Seen on my Network - Date and time at which the file was first detected on one of your devices
      • Number of endpoints - The count of Windows devices on which the file was found
      • Click 'Calculate' to update the number of devices on which the file is currently found
      • Xcitium Rating - The trust verdict on the file from Xcitium threat labs
      • Last Update of Xcitium Rating - Date and time at which the Xcitium rating last changed
      • Admin Rating - The trust rating most recently assigned to the file by an administrator, if any.
      • Version - The version number of the executable file
      To handle a quarantined file
      • Click 'Action on Endpoint' on the top


         
      • Select 'Delete File' to remove the file the device, on which the selected event occurred. 
      • Select 'Restore from Quarantine' to move the file from quarantine to their original location on the device. 

      Assign or change the admin rating of the file

      • Click 'Change Rating' on the top
      • Set your preferred rating from the options:



      The new rating will be propagated to all endpoints during the next synchronization.

       

      Download Valkyrie report of a file
      • Click the 'Download Valkyrie Report' button
      • See Get Valkyrie Report of a file for more details on the report

      To view the Valkyrie analysis results of the file

      • Click the 'Check Valkyrie Details' button
      • See View Valkyrie analysis details of file for more details on the results


      File History

      • This tab shows a timeline of events caused by the file. You can see the devices on which the file was found, the security module which detected the activity, and the action that was taken on the file
      • The interface also allows you to:
      • Change the admin trust rating of the file
      • Delete the file from the endpoints or restore the file from quarantine, if the file has been moved to quarantine by antivirus on the endpoints.




      Security Dashboards - Event View - File History - Column Descriptions

      Column Header

      Description

      Date/Time

      The time at which the event occurred.

      Components

       The module that reported the event. This can be 'Antivirus', 'Containment', 'Application Control' or 'Autorun Control'.

      Action

      The nature of the event showing the how the file was handled by the CCS component. The possible actions are:


      Antivirus:

      • Detection of malware
      • Malware quarantined
      • Malware removed from quarantine
      • Malware restored from quarantine
      • Malware removed from infected file
      • Detected item ignored
      • Detected file blocked
      • File added to exclusions
      • File added to trusted files list
      • File reported as false positive from the results screen

      Containment

      • File run inside container with different restriction levels:
      • Restricted
      • Virtually
      • File blocked
      • File ignored

      Application Control:

      • File added to the file list
      • File removed from the file endpoint
      • Trust rating updated for a file

      Autorun Control:

      • Detected item ignored
      • Process / service stopped
      • Auto-run process stopped. Corresponding auto-run entry removed. In the case of a service, CCS disables the service.
      • Auto-start process quarantined. Corresponding auto-start entry removed. In the case of a service, CCS disables the service.
      • Processes restored from quarantine
      • File deleted from the endpoint

      Device Name

      The label of the Windows endpoint on which the event occurred. 

      • Click the name of a device to open its 'Device Details' interface.
      • See Manage Windows Devices for more details on the interface.

      Additional Info

      Provides the current status of the event or the action taken on the affected file.

      Controls

      Action on Endpoints

      Allows you to delete a file or restore a file from quarantine on the endpoint. Applicable only for events involving 'Malware quarantined' action.

      Change rating

      Allows you to change the rating of the affected file to trusted, malicious or unrecognized.


      Handle a quarantined file

      • Click 'Action on Endpoint' on the top


       
      • Select 'Delete File' to remove the file the device, on which the selected event occurred.  
      • Select 'Restore from Quarantine' to move the file from quarantine to their original location on the device. 

      Assign or change the admin rating of the file

      • Click 'Change Rating' on the top
      • Set your preferred rating from the options:



      The new rating will be propagated to all endpoints during the next synchronization.

       

      Get the Valkyrie Report on a file

       

      Background:

      • Valkyrie is a cloud-based file analysis service that tests unknown files with a range of static and behavioral checks. The service helps Xcitium establish whether an unknown file is malicious or safe
      • You can configure Xcitium Client Security on endpoints to automatically upload unknown files to Valkyrie
      • You can schedule the upload of unknown files in the 'Valkyrie' section of a Windows profile. See Valkyrie Settings if you need help with this.


      Download a Valkyrie report

      • Click 'Security' > 'Security Events' > 'Event View' 
      • Select a company or group to view events in that group

      Or

      • Select 'Show all' to view all events
      • Select the event involving the file of interest
      • Click the 'Download Valkyrie Report' button


       

      • The PDF opens in a new browser tab.
      • The report contains granular details of various tests on the file

      View Valkyrie analysis on a file

      • Click ''Security' > 'Security Events' > 'Event View' 
      • Select a company or group to view events in that group

      Or

      • Select 'Show all' to view all events
      • Select the event involving the file of interest
      • Click the 'Check Valkyrie Details' button


       

      • The Valkyrie 'file verdict' page opens in a new tab.
      • The page contains the results of various tests, and a trust verdict from each test.
      • For more details on Valkyrie tests, see http://help.Xcitium.com/topic-397-1-773-9563-Introduction-to-Xcitium-Valkyrie.html.


      Export the List of Events


      You can save the list of events as a comma separated values (CSV) file for future analysis.

      • Click 'Security' > 'Security Events' > 'Event View' 
      • Apply any filters that you require.
      • Click 'Export' > 'Export to CSV'


      • The CSV file will be available in 'Dashboard' > 'Reports'
      • See Reports in The Dashboard for more details.
      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.