Tags
malware activity virus scope autoruns Proxy servers fallback flag Inactive discovered devices SNMP Apple Device Enrollment Program set up service explorer manually deploy Comodo EDR agent parent process multiple ticket selection selected tickets security events folder transfer discoveries network management remote folder TLS TLS1.2 pci dss pci compliance ITarian Portal Endpoint Manager vdi environment vdi clone environment instant clone documentation vendor notice security dashboard events resolution remote tool partner onboard itarian unknown file hunter TLS Encryption procedure parameters pass profiles history performance metrics real time remote endpoints download browse service URL Security Components system Global Software Inventory 2 minutes Integrate intagrate Active Directory Portable Interception SSL enable reporting Rule Threat Protection Rule Advance spam Customize archived outgoing incoming administrator validate domains add Antispam type PCI data loss Location Network information start software session extensions appoinments resource connection computers Comodo Rescue Disk infected opportunity opportunities custom relationship management quote COMODO-CRM protect mac device email notifications registry COM Quarantined point system restore msi contained applications processes security client events Release date department registration particular os section Two Factor Authentication Login interface dashboard report generate Direct Download Link One drive Google drive HIPS mode cleanup automatic suspicious suspicious certificates shellcode injection detect Elevated Access system user access default charging groups move current malware list store push IP address ip installer acronis auto-remediation server machine icon Product Logos Rebrand backup Device Control data Chromoting WebRTC ports Protocol skip offline manual time entries ticket assignee Help Guide Tour schedule Reschedule appointment unknown application protection virtual desktop Local Verdict server manage calculation cost configuration charging SD contract prepaid hours products classification inventory analyze Device list OS patches global search bar Tool bar Windows Defender Security Center file group white Citrix record SPF work billable time onsite email template template variables emails Gmail SMTP disable Add collaborators admin action Audit logs feature requests submit vote remotely Reset proxy swg secure web gateway dome error disk ticket detail page thread section tickets section internal notes Sub-help topic help topic features Application control white_list Patch Management child parent scheduled customized get to headers columns company restrict customer technician remote access list iOS devices field Reports iOS device APN Certificate MAC OS X options Linux block Comodo Client Communication (CCC) allow Comodo Client Security (CCS) network zones active component tray icon hide show packages additional install block port baseline installation package bulk implement restrict firewall endpoints security and communication global export virus import Database folders files define exclusions change staff admin rating check reassign assign permissions new role create for user of device enroll associated use how profile specific Removing Devices Uninstall windows profile Configuration templates latest version clients comodo file ratings monitoring custom All Devices Ratings Track widgets Agent valkyrie malware files Kill chain report automated establishing endpoint remote session Users prevent Android organization windows assets Mac OS billing identified threats Sort Closed inside Program executed containment service desk remote control Locally runs update scan antivirus SLA Business Hours control CCS Password access Client Auto Specific Device Response Application Third party Status View Logs intended devices alert fails Company Information Configure Verdict Patch Procedures Executable Comodo Internet Security ITSM Analysis Command Line Heuristic Filter Unrecognized Trusted File Rate Malicious Purge Calendar Device Exclusion USB Admin Panel Settings ticket Default system-wide Specific Path Details Monitor Multi Set Currency Connected Who Quick Actions Comparison Version Enterprise Managed Service Provider C1 Portal Remote management Comodo Remote Control ticket management staff panel assign tickets
More

How to check Valkyrie dashboard Overview

Release Time
07/13/2017
Views
2782 times

The functionality for the Valkyrie Dashboard has been enhanced with an overview, recent analysis requests and unknown file hunter scans sections on Overview as a friendly way of analyzing the file.In this section, we are going to concentrate on Dashboard Overview. 

Step [1]: Login into Valkyrie,
Go to --> https://valkyrie.comodo.com click Sign In Button which is available on the top most corner of the page, by clicking it will navigate to signup page on that provide credentials of your C1 account and click "Sign In" Button.It will display the Valkyrie dashboard Overview which provides the overall statistics for the devices that have been linked to a user account

DashBoard Overview:

The dashboard provides the overall statistics of the devices that are linked to a user account.It has many sections for detecting risk that is enrolled to a particular account.The overall statistics of the Total Files Upload, Total Files Queried, Files being Processed and Files Being Completed Statistics have been provided on the top.By this feature, users can able to track the file details.Newly they have provided the feature for analyzing the file on the top with "Analyze new file" as an user-friendly.

Malware or PUA File Detected Devices: This field depicts the diagrammatic representation of the devices with or without threats of PUAs.By this feature, a user can able to view the device details of the affected malware file.

Malware or PUA File Detected Devices (Global): It illustrates the diagrammatic representation of the devices with or without threats or PUAs as like Malware or PUA file detected devices but in a global manner.

Latest Malware Submissions: It displays the records of the latest malware submissions along with the status.By clicking the view button, it navigates to the next page where a detailed description of the selected malware file resides.Based on the file report it will be placed on PUA and malware file list present on the bottom.This widget lists the most recently detected files along with the result without searching the particular file information.

Malware Statistics: It displays the report of the malware files as a statistic graph.By this new widget, users can able to view the distribution of malware file according to the malware families.

Note:

  • We can add the file to an analysis by clicking the Click here to Add Analysis.
  • Sorting the file details can be done by selecting the last 30 days, last 7 days and last 24 hours.
  • We can simply move the fields of the dashboard by using widgets.

 

Top Most 10 Devices with Malware Detections: It lists the devices where the malware files have been analyzed.By this feature, users can able to protect the devices which are more vulnerable for the malware files.

Unparalleled Protection Statistics: This displays the detection files based upon Zero-Day Malware(My Account), Potentially Unwanted Applications (PUA)(My Account), Zero-Day Malware (Valkyrie Global), Potentially Unwanted Applications (PUA) (Valkyrie Global) with the Total no. of samples, Undetected by your previous antivirus vendor, Undetected by Antivirus Industry, Never seen by Virus Total(Google) and not known by virus total (Google) at the time of submission.This feature used for viewing malware and PUA file which are not detected by any company before and this helps the user to take some precautionary measures

Top 10 Queried Files: It displays the last analyzed files in user devices.By this feature, it allows the files that are seen on the endpoint which was analyzed.

Top 10 Product Vendors of Queried Files: It displays the last analyzed products in user devices.By this feature, it allows the most checked products on the endpoint.

Malware Files Top 10 Contacted Domains/IPs:
It lists the IP where the most malware files have been analyzed.By this feature, the users can able to set precautionary steps for the malware files on the domain.