Connect with us

Cyber Security

Comodo One. Understanding Devices in ITSM

Avatar

Published

on

ITSMReading Time: 25 minutes

Comodo One. Understanding Devices in ITSM

How to implement “Bulk to installation package” in devices?

Step 1: Click ‘Download Bulk Enrolment Package’ icon.

OR Go to ITSM > ‘Bulk Installation Package’

Step 2: Fill the form and Download the required package.

1. User – Select the user of your company to install package over the devices of the same user [devices enrolled under the user control]. Example: admin@yourcompany.com

2. Company – Select your company. Example: Your-Company Pvt Ltd

3. Device Group – Select the group. Example: production

4. Comodo Client, If you want to include the Comodo Client, Kindly use the further options

  • Choose operating system – Choose the operating system of the devices
  • Comodo Client – Communication – By default, it is checked and installed if not already
  • Comodo Client – Security – User can check this and let it be added into the package which is downloading here
  • Additional Option.
  • Include initial Antivirus signature database (will apply only if a Profile contains Antivirus section) – If the device profile contains antivirus product then the initialantivirusdatabaseisincludedforthepackage

5. Profile – the default profile is loaded at the beginning but if you want to change the profile then enter the name of the profile and choose it. Example: Windows x64 – Other options < Windows x86, Windows x86 and x64 (Hybrid) and MacOS

6. Restart Control Options – Use the option to get changes on restart control

  • Force reboot in – Select the time laps of the action restarting the machine. Example: 10 minutes
  • Suppress reboot – Select to skip the action restarting machine
  • Warn about the reboot and let users postpone it – Select for user decision that the user can postpone or perform instant action restarting machine
  • Reboot message – Message is auto generated but if wish to change the content, you can.

Step 2.1: Fill the UI Options if you would like to deploy the Comodo Agent through Active Directory from a Server.

1. Show error messages if installation failed

2. Show a deployment confirmation message upon completion of the installation

3. Confirmation Message – Enter your message to confirm if the installation is over. Example: deployment is over.. thank you

4. Download Installer button – click the button and save the package on the local computer

Optional: Fill the Proxy Settings and Download the package if you would like to Deploy the Comodo Agent through Proxy Server.

1. Proxy Host – Enter theProxyIPAddress .

2. Proxy Port – Port Number

3. Username – Administrator privileged user

4. Password – Password of the user

5. Download MST File – click the button and save the MST file to the local computer

**If you already use AD in your environment or you are comfortable with GPO or already have your device structure set on AD and etc, please follow the further steps.

Step 3: Once the .msi file is downloaded. From AD Server, Create a new directory and copy the file into the directory. Example, ITSM_Agent

Step 4: Right-click the created-folder and choose the option ‘Share…’

Step 5: From the ‘ITSM_Agent Properties’ Window, click the tab ‘Advance Sharing’.

Step 6: From the ‘Advance Sharing’ Window, check ‘Share this folder’ checkbox and click the ‘Permissions tab’.

Step 7: From the ‘Permissions ITSM_agent’ Window, ensure the only option ‘Read’ from the Allow column is selected (if not check the Read checkbox only) and click ‘OK’ button

Step 8: Click ‘Apply’ button from the ‘Advance Sharing’ window.

Step 9: Ensure whether the Network path is assigned. Example, \WIN-CU2OX8JDY3DITSM_Agent and then click ‘Close’ button.

Step 10: Go to ‘Administrative Tools’ from ‘Start ‘menu.

Step 11: Double-click the ‘Group Policy Management’.

Step 12: Select the domain from ‘Domains’ folder.

Step 13: Right-click the selected Domain and click the option ‘Create a GPO in this domain and Link it here …’.

Step 14: Enter the Appropriate name and Source for the GPO and click the ‘OK’ button to save it under the selected Domain.

Step 15: Select the GPO from the ‘Domains’ folder and right-click the GPO and choose ‘Edit Option’.

Step 16: Expand the folder ‘Computer Configuration as Computer Configuration’ > Policies > Software Settings and right-click the ‘Software Settings’ menu and choose New > Package…

Step 17: Copy and paste the path we have already created. Example, \WIN-CU2OX8JDY3DITSM_Agent and click the ‘Open’ button.

Step 18: Select the file and click ‘Open’ button again and click ‘OK’ button from the window ‘Deploy Software’.

Step 19: Open Command Prompt as Administrator and run the command ‘gpupdate’. Once your command finished as in the image below, your endpoints will start the installation of the ITSM agent once the user logs on the computer.

How to install custom MSI packages?

Step 1: Go to DEVICES > ‘Device List’ and select the specific device to install the desired MSI package.

Step 2: Click ‘Install MSI/Packages’ icon and select the ‘Custom MSI/Packages’ menu.

Step 3: Fill the form and click the ‘Install’ button.

1. MSI/Package URL – Enter the URL where the package is being downloaded. Example: https://notepad-plus-plus.org/reposi….Installer.exe

2. Command-Line Options – Enter the associated commands to install the package successfully. Example: /S

3. Reboot options – Set the options for reboot the machine after installation of the package

  • Force the reboot in – Select the minutes you want to delay
  • Suppress the reboot – Skip the reboot if you want to do so
  • Warn about the reboot and let users postpone it – Hand over the decision to Users who is logging in
  • Reboot message – Automatically generated.

4. Click ‘Install’ button.

Step 4: Click the ‘MSI Installation State’ tab to know the installation status in detail.
Table contains the columns to check the details of MSI Installation State

1. Option: Delete MSI Installation State – Select the records from the table and click the icon suppose you would like to delete them.

2. NAME – Name of the MSI Installation State

3. STATE – To check the state of the command started for execution

  • Command In The Queue – Waiting for execution
  • Success – Completed
  • Fail – Failures in the execution

4. CREATED – Date of execution created

How to check all malicious files from a device?

Step 1 : Go to ITSM ? ‘Devices’ and click the ‘Device List’ menu.

Step 2: Choose a device from the list, for which you should see the malicious list.

Step 3: Click the ‘File list’ tab and go to the ‘Malicious’ tab.

Step 4: The malicious files that are available in a device are listed here.

Step 5: Click on the name of the file to view the detailed information of the file.

Step 6: The files can also be moved to other categories like Unrecognized and Trusted

1. Select the malicious files by marking checkbox of the table

2. Click ‘Move To Unrecognized’ icon to move the file to ‘Unrecognized’ category

3. Click ‘Move to Trusted’ icon to move the file to ‘Trusted’ category

How to check all unrecognized files from a device?

Step 1: Go to ITSM ? Devices and click ‘Device List’ menu.

Step 2: Choose a device from the list , for which you should see the unrecognized files list.

Step 3: Click the File list . Go to unrecognized tab.

Step4: The unrecognized files that are available in a device are listed here.

Step 5: Select the file name to view the detailed information of the file.

Step 6: The files can even be moved to other categories like ‘Malicious’ and ‘Trusted’.

1. Select the Unrecognized files by marking checkbox of the table

2. Click ‘Move To Malicious’ icon to move the file to ‘Unrecognized’ category

3. Click ‘Move to Trusted’ icon to move the file to ‘Trusted’ category

How to manage associated profiles with a device?

Step 1: Go to ITSM> ‘Devices’> ‘Device List’ . You can see all enrolled devices in ITSM.

Step 2: Click ‘Device’ for which associated profiles needs to be checked.

Step 3: Click ‘Manage Profiles’ button in the top. All associated profiles with the device will be listed here.

Step 4: To remove profile from the device follow below steps,

1. Select profile check box.

2. Click ‘Remove Profile’ button.

Step 5: To associate profile with device follow below steps,

1. Click ‘Add Profiles’ button in the top.

2. Select ‘Profile’

3. Click ‘Save’

How to install additional COMODO packages?

Step 1: Go to ITSM> ‘Devices’> ‘Device List’. You would be able to see all enrolled devices in ITSM.

Step 2: Click ‘Device’ for which additional packages going to be installed.

Step 3: To open install dialog box follow below steps,

1. Click ‘Install MSI/Packages’

2. Choose ‘Additional Comodo Packages’ from drop down menu.

Step 4: Select options as described below,

1. Install Comodo Client – Security – Select check box associated with this option to install ‘Comodo Client – Security’ in the device.

2. Install RMM Plugin Agent – Select check box associated with this option to install ‘RMM Plugin Agen’ in the device.

3. Force the reboot in – If you want to reboot the device after comodo package installation follow below steps,

4. Select check box associated with ‘Force the reboot in ‘

5. Choose any of the time period among “‘5 minutes’, ’10 minutes’, ’15 minutes’, ’30 minutes’” after which device will be automatically restart.

6. Suppress the reboot – Select check box associate with this option to cancel rebooting after software installed in the device.

7. Warn about the reboot and let users postpone it – Enable this option to allow users to postpone reboot upon warning.

8. Reboot message – Enter text to be displayed before reboot otherwise default message settings will be applied.

Step 5: Click ‘Install’ to complete the Comodo package installation process.

How to check active components of a device?

Step 1: Go to ITSM > ‘Devices ‘ > ‘Device list’.

Step 2: Check ‘Active components’ column for the device.

Following active components are available for ITSM devices:

1. Agent only (AG)

2. Antivirus (AV)

3. Firewall (FW)

4. Containment (CO)

Step 3: Installed components in the device have highlighted icons.

Step 4: Please Install and configure Comodo Client Security software a in the device for Antivirus, Firewall and Containment components.

How to set specific applications to be malicious and check the admin rating

In ITSM, Setting a file as a Malicious can be done in two ways.

  • Application Control
  • Device List

1. Application Control:

Step 1: Go to ITSM -> ‘Security Sub-Systems’ and then click “Application Control” menu.

Step 2: The ITSM has grouped the files into three main categories, and the categories are:

1. Unrecognized

2. Trusted

3. Malicious

Step 3: If you find a file from ‘Unrecognized’ tab or trusted tab as harmful, then you can move the file to ‘Malicious’.

Step 4: To Move the files to ‘Malicious’ tab please follow the below steps.

a. Navigate to ‘Unrecognized’ tab or ‘Trusted’ tab.

b. Select the check boxes of the appropriate files.

c. Click the “Move to Malicious” in the top.

Step 5: Go to ‘Malicious’ tab and view the saved files.

Step 6: Admin Rating, Indicates whether the file was manually moved by the Administrator from one category to another and the Categories are Unrecognized, Trusted and Malicious.

1. If Admin Rating is “yes”, Indicates that the file was moved by Administrator.
Example: Since the files were moved, the admin rating is set as “yes”. (Please Refer the screenshot)

2. If Admin Rating is “Not Set”, Indicates that the file was not moved by Administrator.
Example: Since the files were not moved, the admin rating is set as “not set”. (Please Refer the screenshot).

2. Device List:
Step 1: Go to ITSM -> ‘Devices’ and then click “Device List ” menu.

Step 2: Select a device from the list.

Example: WIN-EV5S84NSROI (Please Refer the image)

Step 3: Go to ‘File List’ tab.


Step 4: If you find a file from ‘Unrecognized’ tab or ‘Trusted’ tab as harmful, then you can move the file to Malicious.

Step 5: To Move the file(s) to malicious tab,

a. Go to ‘Unrecognized’ tab or ‘Trusted’ Tab.

b. Select the check boxes of the appropriate files.

c. Click the “Move to Malicious” option in the top.

Step 6: Click on the ‘Malicious’ tab. The malicious files that are in a device will be listed here.

How to set specific applications to be trusted and check the admin rating?

In ITSM, setting a file as trusted can be done in two ways,

  • Application Control
  • Device List

1. Application Control:
Step 1: Go to ITSM -> ‘Security Subsystems’ and then click “Application Control” menu.

Step 2: The ITSM has grouped the files into three main categories, and the categories are:

1. Unrecognized

2. Trusted

3. Malicious

Step 3: Go to ‘Trusted’ tab.

Step 4: The Trusted files from all the enrolled endpoints will be listed here.


Step 5: If you find a file from the ‘Unrecognized’ tab or ‘Malicious’ tab as ‘Trusted, then you can move the file to Trusted.

Step 6: To Move the file(s) to Trusted tab,

a. Go to Unrecognized tab or Malicious Tab.

b. select the check boxes of the appropriate files.

c. Click the “Move to Trusted ” option at the top.

Step 7: The Admin Rating, Indicates whether the file was manually moved by the Administrator from one category to another and the Categories are Unrecognized, Trusted and Malicious.

1. If Admin Rating is “yes”, Indicates that the file was moved by Administrator.
Example: Since the files were moved, the admin rating is set as “yes”. (Please Refer the screenshot)

2. If Admin Rating is “Not Set”, Indicates that the file was not moved by Administrator.
Example: Since the files were not moved, the admin rating is set as “not set”. (Please Refer the screenshot)

2. Device List:

Step 1: Go to ITSM -> ‘Devices ‘and click “Device List” menu.

Step 2: Select a device from the list.

Step 3: Go to ‘File List’ tab.


Step 4: If you find a file from the ‘Unrecognized’ tab or ‘Malicious’ tab as ‘Trusted’, then you can move the file to Trusted.

Step 5: To Move the file(s) to Trusted tab,

a. Go to ‘Unrecognized’ tab or ‘Malicious’ tab.

b. Select the check boxes of the appropriate files.

c. Click the “Move to Trusted ” option at the top.

Step 6: Click on the ‘Trusted’ tab. The trusted files that are in a device will be listed here.

How to set specific applications to be unrecognized and check the admin rating

In ITSM, setting a file as trusted can be done in two ways:

  • Application Control
  • Device List

1. Application Control:
Step 1: Go to ITSM -> ‘Security Subsystems’ and then click “Application Control” menu.

Step 2: The ITSM has grouped the files into three main categories, and the categories are

1. Unrecognized

2. Trusted

3. Malicious

set_unrecognize2

Step 3: If you find a file from the malicious tab or trusted tab as unrecognizable, then you can move the file to the unrecognized tab.

Step 4: To Move the files to unrecognized tab please follow the below steps,

a. Navigate to the ‘Malicious’ tab or trusted tab.

b. Select the check boxes of the appropriate files.

c. Click the “Move to Unrecognized” at the top.

Step 5: Go to the ‘Unrecognized’ tab. The Unrecognized files from all the enrolled endpoints will be listed here.

Step 6: Admin Rating, Indicates whether the file was manually moved by the Administrator from one category to another and the Categories are Unrecognized, Trusted and Malicious.

1. If Admin Rating is “yes”, Indicates that the file was moved by Administrator.
Example: Since the files were moved, the admin rating is set as “yes”.

2. If Admin Rating is “Not Set”, Indicates that the file was not moved by Administrator.
Example: Since the files were not moved, the admin rating is set as “not set”.

2. Device List:

Step 1: Go to ITSM -> ‘Devices’ and then click “Device List ”menu.

Step 2: Select a device from the list.

Step 3: Go to ‘File List’ tab.

Step 4: If you find a file from the ‘Trusted’ tab or ‘Malicious’ tab as unrecognizable, then you can move the file to unrecognized.

Step 5: To Move the file(s) to ‘Unrecognized’ tab,

a. Go to ‘Trusted’ tab or ‘Malicious’ tab.

b. Select the check boxes of the appropriate files.

c. Click the “Move to unrecognized ” option at the top.

Step 6: Click on the ‘Unrecognized’ tab. The unrecognized files that are in a device will be listed here.

How to update Comodo clients to latest version

This new feature in ITSM provides user interface option to update Comodo clients.
Note: “Comodo Client -communication” or “Comodo Client -Security” can be updated from ITSM only if installed versions are higher than 6.2.

Step 1: Go to ITSM> ‘Devices’> ‘Device List’. You would be able to see all enrolled devices in ITSM.

Step 2: Select checkbox associated with ‘Devices’ for which Comodo clients needs to be updated with latest version. You can select multiple devices and update clients simultaneously.

Step 3: To open client update dialog box follow below steps,

  1. a) Click ‘Install MSI/Packages’
  2. b) Choose ‘Additional Comodo Packages’ from drop-down menu.

Step 4: Select options as described below,

  1. a) Update Comodo Client – Security – Select check box associated with this option to update ‘Comodo Client – Security’ in the device.
  2. b) Update Comodo Client – Communication -Select check box associated with this option to update ‘Comodo Client – Communication’ in the device.
  3. c) Force the reboot in – If you want to reboot the device after Comodo clients update, Please follow below steps,
    1. i) Select check box associated with ‘Force the reboot in ‘
    2. ii) Choose any of the time period among “‘5 minutes’, ’10 minutes’, ’15 minutes’, ’30 minutes’” after which device will be automatically restart.
  4. d) Suppress the reboot – Select check box associate with this option to cancel rebooting after clients update completed.
  5. e) Warn about the reboot and let users postpone it – Enable this option to allow users to postpone reboot upon warning.
  6. f) Reboot message – Enter text to be displayed before reboot otherwise default message settings will be applied.

Step 5: Finally, click ‘Install’ to apply your commands to clients.

How to uninstall Comodo Clients while removing devices from ITSM

This new feature in ITSM provide user interface option to uninstall Comodo clients while removing devices from ITSM.
Step 1: Go to ITSM> ‘Devices’> ‘Device List’. You would be able to see all enrolled devices in ITSM.

Step 2: Select checkbox associated with ‘Devices’ that needs to be removed from ITSM enrollment. You can select multiple devices to remove simultaneously.

Step 3: Click ‘More…’ button at the top.
Step 4: Choose ‘Delete Device’ option from drop down menu . You can see confirmation pop-up window now.

Step 5: Ensure below options are checked to uninstall clients in confirmation windows viz,

  1. i) Uninstall Comodo Client – Security from the selected Windows device(s) – If selected CCS agent will be uninstalled automatically from device after removed from ITSM.
  2. ii) This may require reboot of the device(s).
  3. iii) Uninstall Comodo Client – Communication from the selected Windows device(s) -If selected CCC agent will be uninstalled automatically from device after removed from ITSM.

Step 6: Click ‘Confirm’ button in the bottom of confirmation window to remove devices from ITSM as well as uninstall clients from devices.

How to enroll device for a user

Step 1: Go to ITSM -> Users’ and click ‘User List’ menu.

Step 2: Click the name of the user from the list for which you want to enroll the device and click “Enroll Device” button.

Step 3: In ‘Enroll Devices’ dialog box,

  1. 1. In “Please choose the device owner(s) ” – The name of the user will be selected in the text box in default. To add more users type the name of the user and select from the drop-down.
  2. 2. The “Show enrollment instructions” Button – Click on this button to view the instructions.

3. The “Email enrollment instructions” Button – Click on this button to send the instructions through mail.

Step 4: Based on the operating system, the user can download the software from the appropriate link.
For example: For Windows, you can download from the link below the caption “For Windows devices “.

Step 5: Open and install the downloaded software. The machine will be enrolled.

How to see all devices associated with a user

Please refer below steps to check devices associated with particular ITSM user.

Step 1: Launch ITSM.

device associates

Step 2: Go to ‘USERS’ ->’ User List’.

device_associate2

Step 3: Click on the specific user’s link: select the user to check associated devices for the same user.

device_associate3

Step 4: Select the ‘Associated Devices’ tab

device_associate4a

Check the list of Devices which are associated with the user account.

device_associate4b

How to view the logs in the ITSM device” in devices

When a procedure or an event applied to a device, a log will be created for those events. In ITSM, a log records the audit trail of the following events “ Alerts”, “Monitoring”, ”Script Procedures ”, “Patch Procedures”.

The logs are used to keep track of the events executed and also they can also be used to diagnose a problem. The logs are categorized and maintained separately for every device.

1. Alert logs – The alerts are created and associated with the events or procedures such as Monitoring, Script procedure and Patch procedure .When an event or procedure fails, the alert will be triggered, if the alert trigger option in the respective procedure or event is enabled. When an alert triggers, the log will be created under the category ‘Logs’ → “Alert Logs” in a device.

2. Monitoring logs – Whenever the monitoring event’s condition associated with a device exceeds its limit, the alert will be triggered and the log will be created for that monitoring under the ‘Logs’ → ‘Monitoring Logs’.

3. Script logs – When you execute a script procedure in your device, a log will be created under the Script Logs.

4. Patch logs – When you execute a patch procedure in your device, a log will be created under the Patch Logs.

View Alert Logs:

Step 1: Go to ITSM → ‘Devices’ → ‘Device List’ menu and click “Device Management” tab. Select a device to which you want to see the log files from the list.

alert_log1

Step 2: Click the “Logs” tab. Click “Alert logs” tab, the triggered alerts will be listed here with the following details alert name, Trigger name, Trigger Type, Hits Count (24H Period).

alert_log2

Step 3: Click the name of the alert to view the detailed information of the alert.

alert_log3a

Note: While configuring the alert setting the following options should been abled, to create ticket and to notify the alert in the portal and also the time difference for notification.

1. Create notifications on the portal – If enabled, the notification will be created on your portal
2. Create alert tickets on the service desk – If enabled, creates ticket through service desk automatically
3. Don’t create additional alerts (about the same issue) for – If enabled ,Based on the time period mentioned additional alerts will not be created on the same issue. Example: 5 minutes.

alert_log3b

View Monitoring Logs:

Step 1: Go to ITSM → ‘Devices’ → ‘Device List’ menu and click “Device Management” tab. Select a device to which you want to see the log files from the list.

alert_log_monitor1

Step 2: Click the “Logs” tab > “Monitoring logs”. The list of monitoring added to the device will be listed here.
Click “Details” link to view the log details of the monitoring.

1. Status – The log of monitoring messages will be displayed here.
2. Tickets – The tickets will be created when the monitoring condition exceeds the limit.
Note: Tickets are raised only if the option is enabled.

alert_log_monitor2

View Script Logs

Step 1: Go to ITSM → ‘Devices’ → ‘Device List’ menu and click “Device Management” tab. Select a device to which you want to see the log files from the list.

alert_log_script1

Step 2: Click the “Logs” tab. Click “Script Logs”, the list of scripts executed by the device will be listed here. Click “Details” link to view the result of the executed script.

1.Status – The output of the script will be displayed here.
2.Tickets – The tickets will be created when the scripts are exceeded the limit.
Note: Tickets will be raised if the procedure fails and those tickets will be listed here.

alert_log_script2

View Patch Logs:

Step 1: Go to ITSM → ‘Devices’ → ‘Device List’ menu and click “Device Management” tab.

alert_log_patch1

Step 2: Click the “Logs” tab. Click “Patch Logs”, the list of patch procedures executed on the device will be listed here. Click the “Details” link to view the result of the executed patch procedure.

1.Status – The output of the patch procedure will be displayed here.
2.Tickets – The service desk tickets will be created when the patch procedures fail.
Note: If an alert configured and added to the patch procedure appropriately.

alert_log_patch2

How to update file ratings in order to reflect the same ratings in all devices

Admins can manage file rating also under the ‘Device Detail’ > ‘File List’ view. This will allow admins to take action more quickly on the files collected from the endpoints. Admin ratings provided in this view will be also reflected global view under ‘Security Sub-Systems’ → ‘Application Control’ view so that the admin would not need to take the same action for each device.

Note: If the ‘File List’ tab is not found on the device details page then you need to install Comodo Client Security – Please refer the link for more details https://forum.mspconsortium.com/forum/products/other-comodo-products/comodo-device-management/wiki-faq-how-to/7528-wiki-how-to-install-additional-comodo-packages

Step 1: Go to ‘Device Details’ > ‘File List’ and select the files collected by the CCS

Step 2: Click ‘Change Rating’ icon and select the option you would rate the file – you can check the rating at the column ADMIN RATING of the same table, this will be immediately updated.

Options:

  • Rate File as Trusted – Admin confidently believes the file that will not harm the endpoint
  • Rate File as Malicious – Admin surely knew that the file will harm the endpoint ever>
  • Rate File as Unrecognized – Admin is not sure on taking decision on the file behavior
    For example, If I update the file as Unrecognized then the file is also being updated for the same ratings in our global view also.
  • To ensure the same, go to ‘SECURITY SUB-SYSTEM’ > ‘Application Control’ and select the same file you have rated then check the ‘ADMIN RATING’ column has the ‘Unrecognized’.

How to add exclusions to external devices control like USB devices

The “External devices control” profile section, allows the user to block the access of the external devices at the endpoints. The devices like “bluetooth devices”, “USB storage devices” can be blocked. Thus it blocks every USB storage devices that are added to the devices. Add exclusions to certain devices using wild characters in the device id.

For example : Device ID = “USBSTORDiskHUAWEI__*”

  • The Device ID matches the above wild characters, will be excluded from the restrictions.

Note : A Device ID can be obtained from from the ” Device Manager ” in the windows device.

Example : Open the Device Manager , select Hardware devices(Universal serial Bus collectors ) and select appropriate hardware like USB Root Hub and then right click and go to ‘Properties’ → ‘Details’ and choose hardware id from the property. The value listed are the Device ID.

Step 1: Go to “Configuration Templates” -> “Profiles”. Select a profile from the list, to which you add the exclusions to the external devices.

Step 2: Go to “External Devices control” tab. There are two available tabs:

  • 1.The “Blocked Devices Classes” tab – A device class such as “USB devices” that are to be excluded can be added here and it also lists the blocked devices classes.
  • 2.The “Exclusion” tab – Lists the exclusion added to the blocked devices.

Step 3: Click “Edit” button in the “External Devices Control” and go to “Exclusion” tab, click “Add” button.

The “Add Exclusion” dialog box appears. Provide the “Device custom name” and “Device Id” then click ‘Add’ button. The exclusion will be added.

  • 1. Device custom name – Name of the device. E.g.: AS123
  • 2. Device Id – Unique identifier of the device
  • Condition: If you want to add the exclusion to all the HUAWEI USB devices that are being connected to the endpoints.
    • Give a device id that matches all the HUWAEI devices.
    • Example: Device Id : ” USBSTORDiskHUAWEI__* “
    • Device id : “HUAWEI__* “
    • so it add exclusions to the following devices(Refer above Example in the Note).
    • 1. USBSTORDiskHUAWEI__TF_CARD_Storage_2.31
    • 2. USBSTORDiskHUAWEI__TF_CARD_Storage_
    • 3. USBSTORDiskHUAWEI__TF_CARD_Storage_2
    • 4. USBSTORDiskHUAWEI__
    • 5. DiskHUAWEI__
  • Similarly N number of devices that matches the string mentioned in the device id, can be added to the exclusions.

Step 4: To delete the exclusion, select the checkbox of the exclusion and click “Delete” button.

The exclusion will be removed from the device. Note: This setting will be applied to the endpoints only when the profile is added to that particular endpoint.

Related Resources

What is Device Manager?

Device Manager for Android

TEST YOUR EMAIL SECURITY GET YOUR INSTANT SECURITY SCORECARD FOR FREE Source: https://blog.comodo.com/it-management/comodo-one-understanding-devices-itsm/

Big Data

Top 10 Big Data trends of 2020

Avatar

Published

on

Top 10 Big Data trends of 2020

By Priya Dialani

During the last few decades, Big Data has become an insightful idea in all the significant technical terms. Additionally, the accessibility of wireless connections and different advances have facilitated the analysis of large data sets. Organizations and huge companies are picking up strength consistently by improving their data analytics and platforms.

2019 was a major year over the big data landscape. In the wake of beginning the year with the Cloudera and Hortonworks merger, we’ve seen huge upticks in Big Data use across the world, with organizations running to embrace the significance of data operations and orchestration to their business success. The big data industry is presently worth $189 Billion, an expansion of $20 Billion more than 2018, and is set to proceed with its rapid growth and reach $247 Billion by 2022.

It’s the ideal opportunity for us to look at Big Data trends for 2020.

Chief Data Officers (CDOs) will be the Center of Attraction

The positions of Data Scientists and Chief Data Officers (CDOs) are modestly new, anyway, the prerequisite for these experts on the work is currently high. As the volume of data continues developing, the requirement for data professionals additionally arrives at a specific limit of business requirements.

CDO is a C-level authority at risk for data availability, integrity, and security in a company. As more businessmen comprehend the noteworthiness of this job, enlisting a CDO is transforming into the norm. The prerequisite for these experts will stay to be in big data trends for quite a long time.

Investment in Big Data Analytics

Analytics gives an upper hand to organizations. Gartner is foreseeing that organizations that aren’t putting intensely in analytics by the end of 2020 may not be ready to go in 2021. (It is expected that private ventures, for example, self-employed handymen, gardeners, and many artists, are excluded from this forecast.)

The real-time speech analytics market has seen its previously sustained adoption cycle beginning in 2019. The idea of customer journey analytics is anticipated to grow consistently, with the objective of improving enterprise productivity and the client experience. Real-time speech analytics and customer journey analytics will increase its popularity in 2020.

Multi-cloud and Hybrid are Setting Deep Roots

As cloud-based advances keep on developing, organizations are progressively liable to want a spot in the cloud. Notwithstanding, the process of moving your data integration and preparation from an on-premises solution to the cloud is more confounded and tedious than most care to concede. Additionally, to relocate huge amounts of existing data, organizations should match up to their data sources and platforms for a little while to months before the shift is complete.

In 2020, we hope to see later adopters arrive at a conclusion of having multi-cloud deployment, bringing the hybrid and multi-cloud philosophy to the front line of data ecosystem strategies.

Actionable Data will Grow

Another development concerning big data trends 2020 recognized to be actionable data for faster processing. This data indicates the missing connection between business prepositions and big data. As it was referred before, big data in itself is futile without assessment since it is unreasonably stunning, multi-organized, and voluminous. As opposed to big data patterns, ordinarily relying upon Hadoop and NoSQL databases to look at data in the clump mode, speedy data mulls over planning continuous streams.

Because of this data stream handling, data can be separated immediately, within a brief period in only a single millisecond. This conveys more value to companies that can make business decisions and start processes all the more immediately when data is cleaned up.

Continuous Intelligence

Continuous Intelligence is a framework that has integrated real-time analytics with business operations. It measures recorded and current data to give decision-making automation or decision-making support. Continuous intelligence uses several technologies such as optimization, business rule management, event stream processing, augmented analytics, and machine learning. It suggests activities dependent on both historical and real-time data.

Gartner predicts more than 50% of new business systems will utilize continuous intelligence by 2022. This move has begun, and numerous companies will fuse continuous intelligence during 2020 to pick up or keep up a serious edge.

Machine Learning will Continue to be in Focus

Being a significant innovation in big data trends 2020, machine learning (ML) is another development expected to affect our future fundamentally. ML is a rapidly developing advancement that used to expand regular activities and business processes

ML projects have gotten the most investments in 2019, stood out from all other AI systems joined. Automated ML tools help in making pieces of knowledge that would be difficult to separate by various methods, even by expert analysts. This big data innovation stack gives faster results and lifts both general productivity and response times.

Abandon Hadoop for Spark and Databricks

Since showing up in the market, Hadoop has been criticized by numerous individuals in the network for its multifaceted nature. Spark and managed Spark solutions like Databricks are the “new and glossy” player and have accordingly been picking up a foothold as data science workers consider them to be as an answer to all that they disdain about Hadoop.

However, running a Spark or Databricks work in data science sandbox and then promoting it into full production will keep on facing challenges. Data engineers will keep on requiring more fit and finish for Spark with regards to enterprise-class data operations and orchestration. Most importantly there are a ton of options to consider between the two platforms, and companies will benefit themselves from that decision for favored abilities and economic worth.

In-Memory Computing

In-memory computing has the additional advantage of helping business clients (counting banks, retailers, and utilities) to identify patterns rapidly and break down huge amounts of data without any problem. The dropping of costs for memory is a major factor in the growing enthusiasm for in-memory computing innovation.

In-memory innovation is utilized to perform complex data analyses in real time. It permits its clients to work with huge data sets with a lot more prominent agility. In 2020, in-memory computing will pick up fame because of the decreases in expenses of memory.

IoT and Big Data

There are such enormous numbers of advancements that expect to change the current business situations in 2020. It is hard to be aware of all that, however, IoT and digital gadgets are required to get a balance in big data trends 2020.

The function of IoT in healthcare can be seen today, likewise, the innovation joining with gig data is pushing companies to get better outcomes. It is expected that 42% of companies that have IoT solutions in progress or IoT creation in progress are expecting to use digitized portables within the following three years.

Digital Transformation Will Be a Key Component

Digital transformation goes together with the Internet of Things (IoT), artificial intelligence (AI), machine learning and big data. With IoT connected devices expected to arrive at a stunning 75 billion devices in 2025 from 26.7 billion presently, it’s easy to see where that big data is originating from. Digital transformation as IoT, IaaS, AI and machine learning is taking care of big data and pushing it to regions inconceivable in mankind’s history.

Source: https://www.fintechnews.org/top-10-big-data-trends-of-2020/

Continue Reading

Cyber Security

Feedzai grows +44% in the first half of the fiscal year and strengthens its C-suite

Avatar

Published

on

Feedzai grows +44% in the first half of the fiscal year and strengthens its C-suite
  • H1 growth above target amid the COVID-19 pandemic and market uncertainty. Multiple multi-year enterprise contracts negotiated during the lockdown

  • New Chief Financial Officer and Chief Marketing Officer join the company

  • 26% of the revenue invested in R&D and 10 patents filed in H1 2020

Feedzai, the world’s leading risk management platform, announced today that its Q2 2020 has been one of the most successful ever from a new business generated perspective. The company has experienced a +44% growth in new Annual Recurring Revenue (ARR) in H1 2020 when compared to H1 2019. A very successful renewal cycle and new large-enterprise deals closed in the US, EMEA, APAC, and LATAM, made the first half of the year a success.

Feedzai currently protects companies with more than 800 million customers in 190 countries. With more than 154M US individual and business taxpayers, almost half of the UK and Canada’s population, and 60% of global music streaming subscriptions being monitored and protected by Feedzai, the company has shown over the years that its mission-critical technology is preferred by the largest and most innovative companies in the world.

Since the beginning of the pandemic, Feedzai has seen an increase in financial crime, particularly mule accounts, phishing attacks, employer fraud, and a big spike in fraudulent activity related to online commerce in which people had to significantly rely on during the lockdown.

“Fraudsters thrive on periods of confusion and chaos, and this pandemic represents fertile breeding ground. While many bank capital investments are on hold amidst the economic uncertainty, we are seeing that solutions like Feedzai’s, which reduce fraud losses, decrease operational expense, and improve customer experience through more efficient detection routines are actually seeing increased prioritization for funding, given the increased urgency to protect digital channel transactions in a customer-friendly manner,” says Julie Convoy, Research Director at Aite.

“Feedzai had one of its best quarters ever amid the pandemic, while many industries, unfortunately, showed signs of deterioration. This simultaneously shows that our technology is mission-critical, and our business is crisis resilient,” said Nuno Sebastiao, Co-founder, and CEO of Feedzai. “I’m confident that our next phase of growth will benefit from market conditions in which digital transformation will play a larger than ever role, and from a set of strategic decisions we’ve made in the last 9 months.”

As part of the growth, Feedzai has achieved several important milestones, including:

Business Performance – Feedzai reports a +44% growth in H1 2020 compared to the same period in 2019. The company has also seen Q2 2020 growth above target amid the COVID-19 pandemic, which led to one of its best quarters ever from a new Annual Recurring Revenue (ARR).

C-suite Strengthening – the company has defined a combination of strategic hires and internal promotions to prepare the organization for the next level of growth

  • Amaury Dauge, Chief Financial Officer – joins Feedzai after several C-level roles at Qontigo and previous experience as the CFO of Euronext, the 6th largest stock exchange in the world

  • Varun Kohli, Chief Marketing Officer – a seasoned Silicon Valley executive, who has been part of multiple multi-billion dollar exits (8 out of 9 companies he worked at either went IPO or were acquired)

  • Richard Harris, EVP of Global Sales – a veteran in both the finance and technology industries, steps in to spearhead the global sales operation after 5 very successful years at Feedzai where he led international operations. Prior to that, Harris held leadership positions at Visa, Experian, and American Express

  • Pedro Barata, SVP of Product – after 10 years at Feedzai – hired as one of the first employees of the company – Barata becomes the new product leader after successfully building from scratch the entire Customer Success operation

  • Cristina Perez, Head of Legal – joins Feedzai after 20 years spearheading legal, public policy, and regulatory affairs at Vodafone Portugal

Geographic Expansion and Strategic Deals – Feedzai has closed deals during H1 in all of the regions it is currently operating in – US, EMEA, APAC, and LATAM – and was able to negotiate multi-year contracts with some of the largest and most innovative companies in the world (e.g. one of the biggest payments processors in the world, one of the top 3 banks in Brazil, one of the big four banks in Australia, the largest national card processor in Europe, and several others).

Cutting-Edge technology – Feedzai continues to pave the way with the most advanced, and promising machine learning techniques built to better protect customers and businesses all over the world. The company also keeps protecting its growing Intellectual Property portfolio with 6 new patents filed in the first half of the year around Deep Learning, Model Fairness Optimization, Active Learning, Transaction Graph Representations, and more. Feedzai will also invest around 26% of its revenue in R&D by the end of 2020, while the average investment made by successful SaaS companies sits at 23%.

Source: https://www.fintechnews.org/feedzai-grows-44-in-the-first-half-of-the-fiscal-year-and-strengthens-its-c-suite/

Continue Reading

Big Data

A pilot launched in Estonia aims to set a new standard for AML fight

Avatar

Published

on

A pilot launched in Estonia aims to set a new standard for AML fight

The pilot is initiated in the collaboration of Salv and four of the largest banks active in Estonia – LHV, SEB Estonia, Swedbank Estonia, and Luminor, owned by the world’s largest investment fund Blackstone.

Salv, the anti-money laundering (AML) startup that raised $2M last year, is set to launch a pilot program called AML Bridge, in cooperation with four of Estonia’s largest banks. The pilot comes with cooperation from Estonia’s Financial Supervisory Authority, Financial Intelligence Unit, and Data Protection Inspectorate whose experts have been participating as consultants in the working groups. Results of the pilot will be announced in the spring of 2021.

The aim of this pilot is threefold. First, to prove that collaborative crime-fighting in the banking industry is the best way to fight money laundering. Secondly, to confirm that the Privacy Enhancing Technology (PET) enables safe, secure data sharing within the bounds of regulatory and data privacy laws in the European Union. Finally, if the pilot proves successful in Estonia, it should set a new AML standard for financial institutions across Europe to follow in Estonia’s footsteps.

Taavi Tamkivi, the founder of Salv, recognizes Estonian banks and regulators for an open-minded approach to challenge financial crime with intelligent technology. “Today, it’s estimated that banks can prevent less than 1% of illicit funds flowing through their system. The current system is unduly burdensome for honest customers who have nothing to do with money laundering and has nothing to do with banks’ hesitation to prevent money laundering. The core problem is inefficient tooling. Up until now, criminals have had the upper hand — because they can collaborate. Banks cannot. Achieving a new crime-fighting standard is a complex objective because of the need to respect privacy protection rights. A new standard can only be established in collaboration with forward-thinking banks and regulators. I do hope that Estonian banks and regulators can forge paths for the rest of the world to follow,” he further explains.

Tamkivi points out that criminals with a global reach cooperate and share best practices amongst each other. “They literally share laundered cash flows. In other words, they cooperate in legalizing illegal income, and they consciously plan the most complex and hard-to-find networks. At the same time, due to regulatory challenges, banks work in silos without being able to quickly exchange information. Until now, there hasn’t been a technological solution that could make sense of data without violating a person’s right to privacy. The situation is further complicated in some countries when its people suspect senior government officials of collaborating with criminal network leaders. Criminals gain an advantage when given access to information on current preventive and blocking measures taken against financial crime. AML Bridge is a supplement, not a replacement, for AML tools financial institutions use today. Our technology offers banks a new tool that enables secure access to third party intelligence and, thus, greater collaboration in the fight against crime,” says Tamkivi.

The AML Bridge pilot tests a similar solution to X-road Estonia, Estonia’s centralized e-platform where, instead of storing data in a centralized location, technology instead enables data to be kept in the hands of the originator and accessed securely from there. This ensures maximum immunity against cyber-attacks and robust personal data protection. AML Bridge will only allow a bank to access another bank’s intelligence if there’s a reasonable basis according to the Money Laundering and Terrorist Financing Prevention Act. Salv’s technology can create links between peer banks’ data and securely share AML intelligence to identify potentially severe risks. In this way, banks will be able to prevent illicit transactions and discrimination against honest customers. “We can rule out cases where a person is refused service because a criminal in another country has their same name,” said Tamkivi.

According to Erki Kilu, Chairman of the Board of the Estonian Banking Association, the pilot gives Estonia a unique opportunity to test intelligent collaborative solutions to make AML measures more effective. He believes those findings could be implemented outside Estonia. “Today, the Estonian digital society is an example for other countries in the world. Estonia is seen as an opinion leader when it comes to e-government solutions, so perhaps Estonia could also become an opinion leader in the prevention of money laundering acts. The biggest challenge isn’t so much in the technology’s capabilities, but in how to conduct the pilot in full compliance with data privacy regulations. Therefore, the pilot is conducted in collaboration with experts from FSA, Financial Intelligence Unit, and Data Protection Inspectorate,” Kilu explains.

Source: https://www.fintechnews.org/a-pilot-launched-in-estonia-aims-to-set-a-new-standard-for-aml-fight/

Continue Reading
Energy53 mins ago

Power Plant Boiler Market by Type, Capacity, Technology, Fuel Type, and Region – Global Forecast to 2025

Energy53 mins ago

Rising Phoenix Royalties Announces Second Yoakum County, Permian Basin, Oil and Natural Gas Royalty Acquisition

Energy57 mins ago

Chem-Dry Grows Amid Pandemic with Signed Agreements to Open 64 New Franchises Across the Nation

Energy1 hour ago

Key Trends and Recent Innovations in Powder Bed Fusion, IDTechEx Identifies

Blockchain News1 hour ago

Bitcoin Breaks $12K Resistance and Aims for $14K as BTC Rallies Higher in the Expense of Altcoins

Energy1 hour ago

Pasternack Now Offers a Broad Selection of Field Replaceable Connectors Available for Same-Day Shipment

AR/VR2 hours ago

Star Wars: Tales from the Galaxy’s Edge Gameplay Trailer Drops With November Date for Oculus Quest

Crunchbase2 hours ago

The Briefing: RVShare raises over $100M, Google disputes charges, and more

Blockchain3 hours ago

Mode Adds Bitcoin to Reserves, Joining Microstrategy and Square

Blockchain3 hours ago

Has Bitcoin met its match with this altcoin?

Crunchbase3 hours ago

Syte Sees $30M Series C For Product Discovery

Blockchain News3 hours ago

What could a Democrat Sweep in US Elections mean for Bitcoin?

Blockchain3 hours ago

Yearn Finance Adds GUSD Vaults and Updated Keep3r Network Details

Blockchain3 hours ago

B2BX Exchange Announces B2BX Token Buyback

Blockchain3 hours ago

Coinend: 1, 2, 3 Take off -New Gamified Crypto Prediction Platform!

Coinpedia3 hours ago

GenTech Proudly Secures Deal with TruLife Distribution to Drive Growth in SINFIT Digital Sales

Blockchain3 hours ago

Coinend: 1, 2, 3, Take off – New gamified crypto prediction platform!

Blockchain3 hours ago

PayPal to allow transactions in Bitcoin, Ethereum etc. from 2021

Blockchain News3 hours ago

Ripple CTO Assesses XRP as a Bridge Cryptocurrency Between CBDCs, Stablecoins, and Fiat

Big Data3 hours ago

Top 10 Big Data trends of 2020

Fintech4 hours ago

5 Things to Know Before Investing in Bitcoin

Crunchbase4 hours ago

Intellimize Closes $12M Round Of New Funding

Crunchbase4 hours ago

Fintech Startups Broke Apart Financial Services. Now The Sector Is Rebundling

CNBC4 hours ago

eBay makes a dedicated portal for officially refurbished gear

Fintech4 hours ago

Headout & Nuclei partner to enable customers to book events & experiences directly from their mobile Banking applications

Blockchain4 hours ago

Community Token Sector Blossoms Alongside Surging NFT Market Caps

Energy4 hours ago

Study Reinforces Sustainability of Ring Container Technologies’ SmartCAN™

Business Insider4 hours ago

AutoNation Board Raises Share Repurchase Authorization – Quick Facts

Business Insider4 hours ago

Conversion Labs Appoints Former White House Physician and U.S. Navy Rear Admiral, Dr. Connie Mariano, to Board of Directors

Business Insider4 hours ago

Mehiläinen Yhtiöt Oy supplements the tender offer document dated 8 January 2020 regarding the public cash tender offer for all shares in Pihlajalinna Plc

Business Insider4 hours ago

AutoNation Inc. Q3 adjusted earnings Beat Estimates

Business Insider4 hours ago

Outlook on the Commercial Aviation Aircraft Tires Global Market to 2025 – by Type, Aircraft Type, Position, End-user & Geography

Business Insider4 hours ago

Global CRO Services Market to Rise Impressively at 9.9% CAGR and Reach US$ 90,926.3 by 2026; forecast to Gain Impetus from Recent Mergers and Acquisitions, says Fortune Business Insights

Business Insider4 hours ago

Broadridge 2020 Sustainability Report Underlines Commitment to ESG

Business Insider4 hours ago

Winnebago Industries Q4 Profit Rises; Revenues Up 39.1% – Quick Facts

Business Insider4 hours ago

TG Therapeutics Announces Fast Track Designation Granted by the FDA to Ublituximab in Combination with Umbralisib for the Treatment of Adult Patients with Chronic Lymphocytic Leukemia

Business Insider4 hours ago

Collection Sites Announces Agreement with Sandor Development to Launch Testing Sites at 65 Big Boxstore Locations Across the U.S.

Energy4 hours ago

NextEra Energy Partners, LP third-quarter 2020 financial results available on partnership’s website

Energy4 hours ago

NextEra Energy third-quarter 2020 financial results available on company’s website

Energy4 hours ago

Advisory – Changes to Boralex Management Team

Trending