Comodo Help
Find the desired product help
Endpoint Manager

Endpoint Manager

Comodo Client Security 12.15

English

Print Help Download Help
Introduction To Comodo Client Security > Install Comodo Client Security
  • Introduction To Comodo Client Security
    • Special Features
    • System Requirements
    • Install Comodo Client Security
    • Start Comodo Client Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understand Security Alerts
    • Password Protection
  • General Tasks - Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
      • Automatically Scan Unrecognized And Quarantined Files
    • Instantly Scan Files And Folders
    • Process Infected Files
    • Manage Virus Database Updates
    • Manage Blocked Autoruns
    • Manage Quarantined Items
  • Firewall Tasks - Introduction
    • Configure Internet Access Rights For Applications
    • Stealth Your Computer Ports
    • Manage Network Connections
    • Stop All Network Activities
    • View Active Internet Connections
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
    • Identify And Kill Unsafe Running Processes
    • Open Shared Space
    • The Virtual Desktop
      • Start The Virtual Desktop
      • The Main Interface
      • Run Browsers Inside The Virtual Desktop
      • Open Files And Run Applications Inside The Virtual Desktop
      • Pause And Resume The Virtual Desktop
      • Close The Virtual Desktop
    • Containment Statistics Analyzer
  • DLP Tasks - Introduction
    • Run Data Loss Prevention Scans
    • Manage DLP Quarantined Files
  • Advanced Tasks - Introduction
    • Create A Rescue Disk
      • Download And Burn Comodo Rescue Disk
    • Remove Deeply Hidden Malware
    • Manage CCS Tasks
    • View CCS Logs
      • Antivirus Logs
      • VirusScope Logs
      • Firewall Logs
      • HIPS Logs
      • Containment Logs
      • Website Filtering Logs
      • Device Control Logs
      • Autorun Event Logs
      • Alert Logs
      • CCS Tasks Logs
      • File List Changes Logs
      • Vendor List Changes Logs
      • Configuration Changes Logs
      • Virtual Desktop Event Logs
      • Data Loss Prevention Event Logs
      • Search And Filter Logs
    • Submit Files For Analysis To Comodo
    • View Active Process List
  • CCS Advanced Settings
    • General Settings
      • Customize User Interface
      • Configure Virus Database Updates
      • Log Settings
      • Manage CCS Configurations
        • Comodo Preset Configurations
        • Personal Configurations
      • Manage Performance
    • Antivirus Configurations
      • Real-time Scanner Settings
      • Scan Profiles
    • Firewall Configuration
      • General Firewall Settings
      • Application Rules
      • Global Rules
      • Firewall Rule Sets
      • Network Zones
        • Network Zones
        • Blocked Zones
      • Port Sets
    • HIPS Configuration
      • HIPS Settings
      • Active HIPS Rules
      • HIPS Rule Sets
      • HIPS Groups
        • Registry Groups
        • COM Groups
    • Protected Objects
      • Protected Objects - HIPS
        • Protected Files
        • Blocked Files
        • Protected Registry Keys
        • Protected COM Interfaces
      • Protected Objects - Containment
        • Protected Files And Folders
        • Protected Keys
    • Data Loss Prevention
      • DLP Monitoring Rules
      • DLP Discovery Rules
      • DLP Keyword Groups
    • Containment Settings
      • Containment Settings
      • Auto-Containment Rules
      • Virtual Desktop Settings
      • Containment - An Overview
      • Unknown Files - The Scanning Processes
    • File Rating Configuration
      • File Rating Settings
      • File Groups
      • Submitted Files
    • Advanced Protection
      • VirusScope Settings
      • Scan Exclusions
      • Device Control Settings
      • Script Analysis Settings
      • Miscellaneous Settings
    • Web Filter Settings
      • Website Filtering Rules
      • Website Categories
  • Appendix 1 - CCS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment And VirusScope Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Set Up HIPS For Maximum Security And Usability
    • Create Rules To Auto-Contain Applications
    • Run An Instant Antivirus Scan On Selected Items
    • Create An Antivirus Scan Schedule
    • Run Untrusted Programs Inside The Container
    • Run Browsers Inside The Container
    • Restore Incorrectly Quarantined Items
    • Submit Quarantined Items To Comodo Valkyrie For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Disable Auto-Containment On A Per-application Basis
    • Switch Off Automatic Antivirus Updates
    • Suppress CCS Alerts Temporarily
    • Control External Device Accessibility
  • Appendix 2 - Comodo Secure DNS Service
    • Router - Manually Enable Or Disable Comodo Secure DNS
    • Windows - Enable Comodo Secure DNS
  • About Comodo Security Solutions

Install Comodo Client Security

 

You can use the Endpoint Manager (EM) interface to deploy Comodo Client Security (CCS) to your endpoints. You can purchase EM as stand-alone application or as a part of the Comodo Dragon/C1 platforms.


    Dragon / C1

    • Dragon - Sign up for Dragon at https://platform.comodo.com/signup
    • Comodo One - Customers who already purchased Advanced Endpoint Protection (AEP) licenses from Comodo or its resellers can sign-in to C1 at https://one.comodo.com/app/login
    • Login with the username / password of your Comodo account created during purchase of AEP licenses
    • Set-up your C1 MSP / Enterprise account
    • After sign-up, login to the portal then click 'Applications > 'Endpoint Manager'.
      Stand-alone Endpoint Manager
      • Visit https://secure.comodo.com/home/purchase.php?pid=98&license=try for the trial version or https://secure.comodo.com/home/purchase.php?pid=98 for the full version.
      • After sign-up, you can access your Endpoint Manager at the URL provided during setup.
      The following tutorial covers user and device enrollment before moving onto CCS installation:
      • Step 1 - Enroll Users
      • Step 2 – Enroll Devices


      Step 1 - Enroll Users


      You must enroll users before you can deploy CCS to your endpoints.

      • Dragon MSP / C1 MSP customers - You can create multiple companies and enroll users to any of them.
      • Dragon Enterprise / C1 Enterprise, and stand-alone Endpoint Manager customers - All users are enrolled to the default company.

      Add a user

      • Click 'Users' > 'User List' > click the 'Create User' button

      or

      • Click the 'Add' button  on the menu bar and choose 'Create User'.




      The 'Create new user' form will open.




      • Type a login username (mandatory), email address (mandatory) and phone number for the user
      • Company - Choose the organization to which you want to enroll the user
      • Role
      A 'role' determines user permissions within the Endpoint Manager console itself. Endpoint Manager ships with two default roles:
      • Administrator - Full privileges in the Endpoint Manager console. The permissions for this role are not editable.
      • User - In most cases, a user is simply an owner of a managed device. They should not require access to the Endpoint Manager console. Under default settings, users cannot login to Endpoint Manager.
      • Click 'Submit' to add the user to Endpoint Manager.

      A confirmation message is shown:



      • Repeat the process to add more users
      • New users are added to the 'Users' interface (click 'Users' > 'User List')

       

      Tip: You can also bulk import users from a .csv file. See https://help.comodo.com/topic-399-1-786-12973-Import-Users-from-a-CSV-File.html for more details.


      Step 2 - Enroll Devices


      The next step is to add user devices so you can manage them with Endpoint Manager.

      • Click 'Users' then 'User List'
      • Select the users whose devices you want to add then click the 'Enroll Device' :

      Or

      • Click the 'Add' button  on the menu bar and choose 'Enroll Device'.


         

       

      This starts step 1 of the device enrollment wizard:


      Step 1 - Device Options

      • Current device - Enrolls the device you are currently using. You may disregard this option at this stage as we are adding multiple devices with the 'Other device' option.
      • Other device - Add devices owned by the users you selected previously. Those users should already be listed in the 'Specify User' box:



       

      • You can add additional, existing users by simply typing their email address in the box. Endpoint Manager will auto-suggest users that have already been created.
      • Create New User - Click if you want to add a new user to Endpoint Manager. You cannot add devices unless you have first added the users that own them.
      • Click 'Next' to proceed to step 2.

      Step 2 - Enrollment Options


      Enrollment Type


      Applies to Windows, Mac and Linux devices.

      • Enroll and Protect - Installs both the communication client and the security client.
      • Just Enroll - Installs only the communication client.

      Background. There are two types of client:

      • Communication Client - Connects the device to Endpoint Manager for central management. It is mandatory to install this client.
      • Security Client - This is the security software. Depending on the operating system, it includes antivirus, firewall, threat-containment, web-filtering, and more. It is optional to install this client.


       

      TLDR

      • Click ‘Not Specified’ if you only want to install the communication client on target devices. The wizard will detect the target operating system and send the appropriate client to the device user.
      • Click one of the operating system tiles if you also want to install the security client. Make sure the target devices use the operating system you selected.


      Option 1 - Enroll + Protect - Single Operating System

      • Choose this if you want to deploy both communication and security clients
      • Click the Windows OS box. Please make sure all your target devices use this operating system.
      • The wizard will send enrollment mails which only contain download links for the Windows clients.
      • You can customize enrollment options as required. You can configure items such as enrollment type, reboot policy, client version, configuration profile and device name.
      • Note - Please uninstall any other antivirus products from target endpoints before proceeding. Failure to do so could cause conflicts that mean CCS does not function correctly.

      Option 2 - Just Enroll - Multiple Operating Systems

      • Choose this if you only want to deploy the communication client. If required, you can install the security client later after enrolling the endpoint.
      • Click 'Devices' > 'Device List'
      • Select the target devices
      • Click the 'Install or Update Package' button > Choose 'Install Comodo Client – Security'

      Click 'Next' to skip to step 3 if you are happy with your choices thus far


      OR


      See the tables below for more information about the options on this page


      Setting

      Description

      Choose platform

      Select Window OS version. 64 bit, 32 bit, or hybrid.


      The hybrid package will auto-detect and install the correct version.

      Use default Communication Client version

      This client enrolls the endpoint for central management.

      • You can only change the CCC version if enabled in portal settings. If the option is not enabled then the 'Default version' is deployed.

      Use default Communication Client Security version

      This client installs security software such as antivirus, firewall and auto-containment.

      • You can only change the CCS version if enabled in portal settings. If the option is not enabled then the 'Default version' is deployed.

      Additional options

      AV Database - Choose whether to include the latest virus database with the installation package. This increases the size of the package.


      If disabled, the client will download the latest database anyway when you run the first virus scan.

      Configuration Profile

      A configuration profile is a collection of settings which specify a device's network access rights, security settings, antivirus scan schedule, and more.


      The default is 'Windows - Security Level 1' profile. Choose a different profile if required.

      • The default profile is recommended for most users and can always be changed later if required.
      • If you want to change it, type the first few characters of a profile name and choose from the suggestions that appear.
      • You can view the settings in a profile at ‘Configuration Templates’ > ‘Profiles’.

      Set Reboot Options

      Endpoints need to be restarted to complete CCS installation. You have the following restart options:

      • Force the reboot in... - Restart the endpoint a certain length of time after installation. Select the delay period from the drop-down. A warning message is shown to the user prior to the restart.
      • Suppress reboot - Endpoint is not auto-restarted. The installation is finalized when the user next restarts the endpoint.
      Optional. Type a custom message in the 'Reboot Message' field.
      • Warn about reboot and let users postpone it - Shows a message to the user which tells them that the endpoint needs to be restarted. The user can choose when the restart happens.

      Device Name Options

      • Do Not Change - The device’s existing name is used to identify the device in Endpoint Manager.
      • Change - Enter a new device name. Note - You can restore the original name from the device list screen if required.


      • Click 'Next' to proceed to step 3


      Step 3 - Installation Summary


      Review your choices so far.



      • Click ‘Back’ or 'Change Configuration' (top-right) to revise your choices.
      • Click 'Next' to proceed to step 4

      Step 4 - Installation Instructions


      The final step is to send out the enrollment emails to the device owners:



      • Send To Email - Click this to send enrollment mails to users with the settings you choose in steps 1 - 3.



      • Enroll Another Device - Takes you back to step 1
      • Go to Bulk Installation Package - Takes you to bulk installation package screen to configure and enroll users in bulk. See 'Bulk Enrollment of Devices'
      • Click 'Finish' to close the window.
      An example mail is shown below:



      The user experience is as follows:

      • User opens the email on the Windows endpoint you want to enroll
      • Click the enrollment link in the email to open the device enrollment page
      • Click the 'Download Windows Installer' button:




      • The EM client setup file gets downloaded.
      • Run the setup file to install the client on the endpoint.
      • The device is automatically added to Endpoint Manager once installation is complete. The EM communication client icon  appears at the bottom-right of the endpoint screen.
      • If the client is not automatically enrolled after installation, you can manually enroll the device at a later time. This might happen if, for example, there are connectivity issues.
      • You will need to enter the host, port and token ID to manually enroll. You can find these items at the end of the device enrollment page.
      • Protection is effective immediately after the computer restarts.

      An Endpoint Manager (EM) security profile is applied to the device.

      • If the user is already associated with a configuration profile in EM, then those profiles will be applied to the device. See Assign Configuration Profile(s) to User Devices and Assign Configuration Profiles to a User Group for more details.
      • If no profiles are defined for the user then the default Windows profile(s) will be applied to the device. See Manage Default Profiles for more details.

      The device can now be remotely managed from the EM console.

      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.