Comodo Help
Find the desired product help
Comodo Secure Web Gateway

Comodo Secure Web Gateway

Secure Web Gateway Admin Guide

English

Print Help Download Help
Administration > User Management > Manage Computers
  • Introduction To Comodo Secure Web Gateway
    • Purchase Licenses
    • Login To The Admin Console
  • The Admin Console
  • The Dashboard
    • Customize The Dashboard
  • Configure Comodo Secure Web Gateway
    • Connect Your Network / Devices To Secure Web Gateway
      • Traffic Forwarding Via Direct Proxy Or PAC
      • Traffic Forwarding Via Proxy Chaining
      • Traffic Forwarding Via Internet Content Adaptation Protocol (ICAP)
      • Traffic Forwarding Via SWG Agent
    • Connect Your Roaming Devices To Comodo Secure Web Gateway
      • View Enrolled Roaming Devices
    • Configure Comodo Secure Web Gateway Messages
    • Configure Domain Name
    • Configure PAC File For Exclusions
    • Configure Data Loss Prevention And View ICAP Service Information
    • Configure Policy Time-Schedules
  • Manage Trusted Networks
  • Manage Policies
    • Security Policy
      • Configure Advanced Threat Protection Settings
      • Configure Containerization Settings
    • Web Content Policy
      • Manage URL Filtering Policies
      • Configure SSL Inspection Settings
      • Manage File Type Control Rules
  • Apply Policies To Networks
  • Administration
    • Configure User Authentication Settings
    • User Management
      • Manage Users
      • Manage User Groups
      • Manage Departments
      • Manage Computers
    • My Profile
  • Reports
    • Custom Reports
    • Scheduled Reports
  • Unknown Threat Statistics
  • About Comodo Security Solutions

Manage Computers


  • Click 'Administration' > 'Authentication Configuration' > 'User Management' > 'Computer Names'
  • The 'Computer Names' area lets you add endpoints to Comodo  SWG. You can then include the endpoints in a policy ('Configuration' > 'Policy')
  • Note – 'Computer Names' is only visible if you selected 'Hosted DB' method for user authentication. Click 'Administration' > 'Authentication Configuration' > 'Authentication Settings' to view/change this setting. Click here for more information about user authentication methods.
  • Policies are prioritized top-to-bottom according to the list in 'Configuration' > 'Policy'.
  • In the event of a conflict between policies over a security setting, the setting in the policy nearer the top of the list will prevail.
  • You can change policy priority in the 'Policy Order' drop-down when editing a policy:
  • Click 'Configuration' > 'Policy'
  • Locate the policy whose priority you want to change and click the 'Edit' button on the right.
  • Choose the priority with the 'Priority Order' drop-down. See 'Apply Policies to Network' section for more details.




    From the 'Computers Name' interface, you can:

    • Add a computer
    • Edit computer details
    • Delete a computer name


    Add a computer

    • Click 'Computer Names' then 'Add Computer Name' at top-right
    • This opens the 'Add Computer Name' dialog:




    • Name - Create the label for the computer
    • Remark - Provide appropriate comments for the computer
    • Click 'Save'

    The computer is added to the computer names area:




    You can now deploy policies to the endpoint as required. See 'Applying Policies to Networks' to know how to deploy polices.


    Edit computer details

    • Click the edit icon beside the computer name




    • Update the details as required. The process is similar to adding a computer explained above.
    • Click 'Save' to apply your changes.

    If the computer is applied any policies, the changes done here will also be reflected in the Policy List interface.

    Delete a computer

    • Click the trash can icon beside the computer that you want to remove from the list. Note – you cannot delete a computer that has a policy assigned to it.
    • Click 'OK' in the confirmation dialog.
    Our Products
    • Free Antivirus
    • Free Internet Security
    • Website Malware Removal
    • Free Anti-Malware
    • Anti-Spam (Free Trial)
    • Windows Antivirus
    • Antivirus for Windows 7
    • Antivirus for Windows 8
    • Antivirus for Windows 10
    • Antivirus for MAC
    • Antivirus for Linux
    • Free Endpoint Security
    • Free ModSecurity
    • Free RMM
    • Free Website Malware Scanner
    • Free Device Manager for Android
    • Free Demo
    • Network Security
    • Endpoint Protection
    • Antivirus for Android
    • Comodo Antivirus
    • Wordpress Security
    Cheap CDN
    • Bootstrap CDN
    • Semantic UI CDN
    • Jquery CDN
    • CDN Plans
    • CDN
    • Free CDN
    Enterprise
    • Patch Management Software
    • Patch Manager
    • Service Desk
    • Website Down
    • Endpoint Protection Solutions
    • Website Security Check
    • Remote Monitoring and Management
    • Website Security
    • Device Manager
    • ITSM
    • CRM
    • MSP
    • Android Device Manager
    • MDR Services
    • EDR Services
    • Ransomware Prevention
    • Managed IT Support Services
    • EDR
    Free SSL Certificate
    Support Partners Terms and Conditions Privacy Policy

    © Comodo Group, Inc. 2023. All rights reserved.