Tags
Xcitium Client Security (XCS) what test Remote Control by ITarian RDS Server RDS EDR AEP csv access scope Comodo dialog box Windows UAC user access rights verification phone number password reset security code forgot password Android threat history generates alert lock device Android devices Mac OS devices mobile devices passcode Lock log SIEM log forwarding log storage log storage settings scan profile Parental control FLS file-lookup server internet access rights Real-time scan default profiles pre-configured profiles pre-defined profiles customize profile clone profile Clone unknown MAC profile Linux profile cloud-based service Maintenance Window maintenance analysis tool UFH check policy test policy Virtual Appliances DNS Resolver register invite graphs Dynamic IP Dome shield Integration O365 Comodo Office 365 removal tool CCS removal tool Comodo Secure Email Gateway subscriptions service Dome Antispam Valkyrie report info web Comodo SWG tutorial policy DLP PAC file iboss Bluecoat Websense Comodo Dome ICAP Dome Agent traffic URL C1 account SWG portal SSL Encrypted Traffic Dome Cloud enable widget chart endpoint dashboard file groups Rules exceptions Wi-Fi networks Wi-Fi setup security restrictions iCloud auto containment containment settings virtual file system sandbox environment client access control local configuration Comodo Client Security Rebranding Communication Client Rebranding security client re-brand Comodo Clients application rules global rules Portsets port sets Firewall ruleset rule set rulesets global proxy server global proxy antivirus settings Client Proxy remote control tool Firewall protection firewall settings configuration file export profile PowerShell VBS script Windows Standard Account Endpoint Manager Client Communication (EMCC) server security clients updates vulnerable security patches installed Client Communication Communication Client (CC) submission Communication Client tray icon script OS Patch Third Party Patch Installation Uninstallation Discovery additional package External Device Control external ITarian remote Windows device apps signed-in logged-in identify License wizard on-boarding local Comodo Client Security Mac devices Linux devices MSP customers EM profile Mac OS profile MAC OS X device user device configuration profile copy invoice enrollment Logging Settings SIEM tool external server Account Security mobile console EM device owners ownership remove MAC third party application remote uninstallation software inventory duplicate Name Master Image Golden Image Bulk Installation Package Windows Operating Systems summary information local time External IP address OS summary Devices list MDM profile iOS push certificate create APNs Apple account portal APN Apple Push Notification search bar filter options customer device group group membership managed device trust rating old duplicates removal device name MAC address MSP (Managed Service Provider) Versions Marketing & Sales Customer Relationship Management (CRM) Enroll New Device New Ticket quick actions bar release notes security status activity status profile status Sales funnel Secure Internet Gateway application launch Two factor Time zone Language Lockout time Change Password tokens device enrollment User Groups Manage Profiles User List Management customer report customer assessment customers End-User forms auto response attachments time entry address support User Directory scripts Knowledgebase canned Banlist announcements Hostname mail delivery CommandLine Power Shell PowerShell interface File Explorer Commands Interface Remote devices Remote Tools Paranoid Mode Training Mode Custom Ruleset Safe Mode The charging flow edit contracts Charging Flowchart Global Asset Rates Charging Plans Contracts charges calculated Remove role Edit a role staff interface Exclusions data loss prevention (DLP) network discoveries ITarian Remote Access Tool Tarian Remote Access Tool inactive devices Device removal settings Portal Set-up Malware File Name Security Sub-System communication client UI settings Communication Client Tray remove a department ticket submission configure department synchronize department submit ticket distributing Bandwidths client updates device management Bandwidth conservation malware activity virus scope autoruns Proxy servers fallback flag Inactive discovered devices SNMP Apple Device Enrollment Program set up service explorer manually deploy Comodo EDR agent parent process multiple ticket selection selected tickets security events folder transfer discoveries network management remote folder TLS TLS1.2 pci dss pci compliance ITarian Portal Endpoint Manager vdi environment vdi clone environment instant clone documentation vendor notice security dashboard events resolution remote tool partner onboard unknown file hunter TLS Encryption procedure parameters pass profiles history performance metrics real time remote endpoints download browse service URL Security Components system Global Software Inventory 2 minutes Integrate intagrate Active Directory Portable Interception SSL enable reporting Rule Threat Protection Rule Advance spam Customize archived outgoing incoming administrator validate domains add Antispam type PCI data loss Location Network information start software session extensions appoinments resource connection computers Comodo Rescue Disk infected opportunity opportunities custom relationship management quote COMODO-CRM protect mac device email notifications registry COM Quarantined point system restore msi contained applications processes security client events Release date department registration particular os section Two Factor Authentication Login interface dashboard report generate Direct Download Link One drive Google drive HIPS mode cleanup automatic suspicious suspicious certificates shellcode injection detect Elevated Access system user access default charging groups move current malware list store push IP address ip installer acronis auto-remediation server machine icon Product Logos rebrand backup Device Control data Chromoting WebRTC ports Protocol skip offline manual time entries ticket assignee Help Guide Tour schedule Reschedule appointment unknown application protection Virtual Desktop Local Verdict server manage calculation cost configuration charging SD contract prepaid hours products classification inventory analyze Device list OS patches global search bar Tool bar Windows Defender Security Center file group white Citrix record SPF work billable time onsite email template template variables emails Gmail SMTP disable Add collaborators admin action Audit logs feature requests submit vote remotely Reset proxy swg secure web gateway dome error disk ticket detail page thread section tickets section internal notes Sub-help topic help topic features Application control white_list Patch Management child parent scheduled customized get to headers columns company restrict customer technician remote access list iOS devices field Reports iOS device APN Certificate MAC OS X options Linux block Comodo Client Communication (CCC) allow Comodo Client Security (CCS) network zones active component tray icon hide show packages additional install block port baseline installation package bulk implement restrict firewall endpoints security and communication global export virus import Database folders files define exclusions change staff admin rating check reassign assign permissions new role create for user of device enroll associated use how profile specific Removing Devices Uninstall windows profile Configuration templates latest version clients comodo file ratings monitoring custom All Devices Ratings Track widgets Agent valkyrie malware files Kill chain report automated establishing endpoint remote session Users prevent Android organization windows assets Mac OS billing identified threats Sort Closed inside Program executed containment service desk remote control Locally runs update scan antivirus SLA Business Hours control CCS Password access Client Auto Specific Device Response Application Third party Status View Logs intended devices alert fails Company Information Configure Verdict Patch Procedures Executable Comodo Internet Security ITSM Analysis Command Line Heuristic Filter Unrecognized Trusted File Rate Malicious Purge Calendar Device Exclusion USB Admin Panel Settings ticket Default system-wide Specific Path Details Monitor Multi Set Currency Connected Who Quick Actions Comparison Version Enterprise Managed Service Provider C1 Portal Remote management Comodo Remote Control ticket management staff panel assign tickets
More

How to deploy ITarian clients in an instant Clone environment (from running golden image)

Lab Description

This article is based on VMware Horizon 7.

Testing was done with Windows 7 and Windows 10 as master images, and Windows 7 as VMware Horizon Client.

Technology Primer

  • Instant cloning is a technology used in a virtual desktop infrastructure (VDI) which lets admins create new virtual desktops ‘on-the-fly’.
     
  • The concept involves creating a ‘master’ virtual desktop which is duplicated in real-time whenever a user requests a desktop.  The new desktop is indistinguishable from a traditional machine to the end-user, even though it was created mere seconds ago and will be destroyed when the user logs off.
     
  • By creating virtual desktops ‘just-in-time’ when a user needs them, a business can make huge cost savings on hardware purchases and maintenance. And because all data and operating resources reside on the server, the system also provides better security and control for an IT department.
     
  • This tutorial explains how to configure ITarian Endpoint Manager so that it automatically enrolls such instant machines as they are created.

Step 1: Prepare the Endpoint Manager console

Open Endpoint Manager > Create a device group for the clone machines > Associate a profile with the device group:

  • Open Endpoint Manager
     
  • Click ‘Applications’ > ‘Devices’ > ‘Device List’
     
  • Choose a target company if you are using the MSP version
     
  • Click the ‘Group Management’ tab
     
  • Click the ‘Create Group’ button:

  • Provide a name for the new group. For example, ‘InstantClone’.

  • Click ‘Add’ to create the group:

Next, associate the profile you want to use on the clones with your new group:

  • Click ‘Devices’ > ‘Device List’
     
  • Click the ‘Group Management’ tab
     
  • Click on the name of the group you just created. In our example, ‘InstantClone’
     
  • Click the ‘Manage Profiles’ button then ‘Add Profiles’

Step 2: Create the Client Communication (CC) Installation Package

  • The Client Communication (CC) installer package will auto-enroll the instant clones to your new device group.
     
  • This means the clones will receive the configuration profile you associated with the group in step 1.
     
  • Each installer package is uniquely generated for your environment. Do not change the filename of the package as it is vital for enrolling the clone devices to the correct group.

Create a CC installation package:

  • Click ‘Devices’ > ‘Device List’ > ‘Bulk Installation Package’
     
  • This opens the installer config. screen:
     

  • Complete the details as follows:
     
  • Customer - MSPs only. Choose the company on whose behalf you want to create the installer.
     
  • Device Group - Type the name of the group you created in step 1. In our example this is ‘InstantClone’.
     
  • User - The user with whom the package is associated. By default, this is the admin who is currently logged-in.
     
  • Package options - Leave only ‘Communication client selected’. Don’t select ‘Xcitium Client – Security’
     
  • Operating system - Choose the OS of the target endpoint
     
  • Choose platform - Select Window OS version. 64 bit, 32 bit, or hybrid.The hybrid package will auto-detect and install the correct version. 
     
  • Choose client - Use default Communication Client version

  • Additional options - AV Database - Choose whether to include the latest virus database with the installation package. This increases the size of the package.

    If disabled, the client will download the latest database anyway when you run the first virus scan.

  • Restart / UI options - Leave at defaults
     
  • Scroll down and click the ‘Download Installer’ button.
     
  • Save the file to your local machine
     
  • Reminder. Do NOT rename the .msi in any way. Doing so will mean the clones won’t get added to the correct group.
     
  • You may ignore/close the ‘Auto Discovery and Deployment Tool’ pop-up

Creating the .msi also creates a user token which binds the installer to the ‘InstantClone’ device group. This ensures new clones get enrolled to the correct group. Please make a note of this token as we will need it later in the process.

Get the user token

  • Click ‘Users’ > ‘User List’
     
  • Click the name of the user you entered in the package configuration step earlier
     
  • Click the funnel icon on the right if you need to search for a user
     
  • Click the ‘User Tokens’ tab:



 

  • The most recently created token is listed in the top-row. Make a note of the token string as you will need it later:

Step 3: Get the Endpoint Manager host name

Next, you need to obtain the host name of your Endpoint Manager instance. You will need this in step 5 later.

  • Click ‘Devices’ > ‘Device List’ > ‘Device Management’ tab

  • Click the ‘Enroll Device’ button above the table:

This starts the device enrollment wizard:

Step 1 – Device options

  • Select Device – Choose 'Other device'
     
  • Specify User – Start typing the username of the user you chose in step2 and select the user from the suggestions.
     
  • Click 'Next'

Step 2 - Enrollment options – Leave all default options and click 'Next'

Step 3 - Installation Instructions - The enrollment link is shown:

  • Make a note of the full hostname for later use.

Step 4: Install Client Communication (CC) and Xcitium Client Security (XCS) on the master image

  • Copy the CC .msi that you created in step 2 to your master image VM and install it.
     
  • This will add your master image as a device to your new (‘InstantClone’) device group.
     
  • Confirm the operation was a success in Endpoint Manager as follows:
     
  • Click ‘Devices’ > ‘Device List’ > ‘Group Management’ tab
     
  • Click on the name of the group (‘InstantClone’ in our example).
     
  • Click the ‘Device Management’ tab
     
  • Your master image should be listed as a device there
     
  • Stay on the ‘Device Management’ screen. The next step is to install Xcitium Client Security (XCS):
     
  • Use the checkboxes on the left to select your master image device
     
  • Click the ‘Install or update packages’ button
     
  • Select ‘Install Additional Xcitium Packages’ from the menu:
     


 

  • This will open the XCS install config. screen. Make sure ‘Install Xcitium Client – Security’ is selected and select the version of XCS to be installed (if enabled).
     
  • 'Install xcitium client-EDR' is selected and able to buy new license (if enabled)
     
  • You must reboot the image to complete XCS installation. Choose reboot options as per your preference.
     
  • Click ‘Install’ to deploy xCS to your master image:

  • After rebooting you will have installed both CC and xCS on your master image. The image is listed as a device in your ‘InstantClone’ device group and has the correct profile associated with it.

Step 5: Configure the master image

This step explains how to configure your master image so that new VMs are automatically enrolled into Endpoint Manager.

Enrollment and proxy requirements:

[General]

host = companydomain.cmdm.Xcitium.com

port = 443

remove_third_party = false

suite = 4

token = xxxxxxxxxxxxxxxxxxxxxxxxxxxx

  • Host / Port – Enter the information you obtained in step 3.
     
  • Token – Enter the user token string you generated in step 2.
     
  • Save the .ini in the ‘Endpoint Manager’ folder on your master image VM at:
     
  • C:\Program Files\ITarian\Endpoint Manager (32 bit)
     
  • C:\Program Files (x86)\ITarian\Endpoint Manager (64 bit)
     
  • If you have added a ‘Clients Proxy’ section to your profile then you will need a second file - proxy_settings.ini.
     
  • Download proxy_settings.ini from https://drive.google.com/open?id=1P070wdHWqL2crD9QiEzW_TlwlaefC5m-
    In the file you have:


[General]

proxy_use = "true"

proxy_host =

proxy_port =

proxy_use_auth = "false"

proxy_user =

proxy_password 

  • Enter the host name and port of your proxy in the appropriate fields.
     
  • If you are using authentication, change ‘proxy_use_auth’ to “true”, and provide the username and password.
     
  • Note – Both ‘enrollment_config.ini’ and ‘proxy_settings.ini’ are erased every time a new machine is spawned. To avoid generating these files every time, you should place them in a backup folder on the master VM. Create a new folder called ‘Backup’ inside the Endpoint Manager folder at:
     
  • C:\Program Files\ITarian\Endpoint Manager\Backup  <32bit>
     
  • C:\Program Files (x86)\ITarian\Endpoint Manager\Backup  <64 bit>

Unenroll requirements:

  • The device needs to be unenrolled from Endpoint Manager every time you shut down the master image.  
     
  • Enrollment_config.ini (and proxy_settings.ini if used) need to be in the Endpoint Manager folder when the ITSM service restarts. This ensures the machine will be correctly enrolled.
     
  • You can automate both these processes by creating .bat files. Make sure you have created a backup folder as explained above then follow these steps:

Step 1

This file contains the following:

@ECHO OFF

timeout 5

net start ITSMService

@ECHO OFF

REM Please create a folder called ‘Backup’ in the "Endpoint Manager" folder

REM In this folder please copy "enrollment_config.ini" and "proxy_settings.ini" files

REM This script will copy the two files to the "Endpoint Manager" folder when the enrollment command is run

SET backupfolder=Backup

REM If you are using proxy, please use Proxy = "yes"

SET proxy=no

 

IF EXIST "%SystemDrive%\Program Files (x86)" (

                cd "%ProgramFiles(x86)%\ITarian\Endpoint Manager"

                ITSMService.exe -c 2

                timeout 30

                IF EXIST "%ProgramFiles(x86)%\ITarian\Endpoint Manager\enrollment_config.ini" (

                                del "%ProgramFiles(x86)%\ITarian\Endpoint Manager\enrollment_config.ini" >nul 2>&1

                )

                IF "%proxy%" == "yes" (

                                IF EXIST "%ProgramFiles(x86)%\ITarian\Endpoint Manager\proxy_settings.ini" (

                                                del "%ProgramFiles(x86)%\ITarian\Endpoint Manager\proxy_settings.ini" >nul 2>&1

                                )

                )

                IF NOT EXIST "%ProgramFiles(x86)%\ITarian\Endpoint Manager\enrollment_config.ini" (

                                xcopy "%ProgramFiles(x86)%\ITarian\Endpoint Manager\%backupfolder%\enrollment_config.ini" "%ProgramFiles(x86)%\ITarian\Endpoint Manager\" /Y >nul 2>&1

                )

                IF "%proxy%" == "yes" (

                                IF NOT EXIST "%ProgramFiles(x86)%\ITarian\Endpoint Manager\proxy_settings.ini" (

                                                xcopy "%ProgramFiles(x86)%\ITarian\Endpoint Manager\%backupfolder%\proxy_settings.ini" "%ProgramFiles(x86)%\ITarian\Endpoint Manager\" /Y >nul 2>&1

                                )

                )

                net stop ITSMService

                timeout 5

) ELSE (

                cd "%ProgramFiles%\ITarian\Endpoint Manager"

                ITSMService.exe -c 2

                timeout 30

                IF EXIST "%ProgramFiles%\ITarian\Endpoint Manager\enrollment_config.ini" (

                                del "%ProgramFiles%\ITarian\Endpoint Manager\enrollment_config.ini" >nul 2>&1

                )

                IF "%proxy%" == "yes" (

                                IF EXIST "%ProgramFiles%\ITarian\Endpoint Manager\proxy_settings.ini" (

                                                del "%ProgramFiles%\ITarian\Endpoint Manager\proxy_settings.ini" >nul 2>&1

                                )

                )

                IF NOT EXIST "%ProgramFiles%\ITarian\Endpoint Manager\enrollment_config.ini" (

                                xcopy "%ProgramFiles%\ITarian\Endpoint Manager\%backupfolder%\enrollment_config.ini" "%ProgramFiles%\ITarian\Endpoint Manager\" /Y >nul 2>&1

                )

                IF "%proxy%" == "yes" (

                                IF NOT EXIST "%ProgramFiles%\ITarian\Endpoint Manager\proxy_settings.ini" (

                                                xcopy "%ProgramFiles%\ITarian\Endpoint Manager\%backupfolder%\proxy_settings.ini" "%ProgramFiles%\ITarian\Endpoint Manager\" /Y >nul 2>&1

                                )

                )

                net stop ITSMService

                timeout 5

)

  • Place both of the .bat files in your backup folder.

Step 2

  • Open ‘services.msc’ on your master image VM
     
  • Locate ‘ITSMService’ in the list, right-click and select ‘Properties’
     
  • Change the ‘Startup Type’ from ‘Automatic’ to ‘Manual’:

Step 3

EnrollmentITSM.bat needs to run at logon using ‘Task Scheduler’. This is because the user may have limited permissions in GPO which will prevent the file running.

Please review the print screens for how to create a task in Windows 7 and Windows 10.

Windows 7:


Windows 10:

Step 4

UnEnrolmentITSM_ITarian.bat needs to run at shutdown. In this case we can use GPO to add the script at shutdown:

  • Open ‘Local Group Policy Editor’ > ‘Scripts (Startup/Shutdown)’ > ‘Shutdown’ > right click > ‘Properties’ > ‘Add…’ – browse to ‘UnEnrolmentITSM_ITarian.bat’ > Click ‘OK’

Windows 7:

 

Windows 10:

Note:
Please don’t be tempted to use ‘Task Scheduler’ for UnEnrolmentITSM_ITarian.bat. Use GPO as explained above.

  • Task Scheduler does not wait for the task/script to finish like GPO.
     
  • When the command ITSMService.exe -c 2 is used, CCC places it in an action queue. This means we have added a 30 second delay to script execution.
     
  • GPO executes the task immediately without delay.

 Again, we recommend you use GPO for the unenrollment task. However, if you still want to use task scheduler, then use the following information:

Example using Task Scheduler for UnEnrolmentITSM_ITarian.bat.

We will need to use the following Event ID’s:

  • Event ID 7002

Windows 7:

 

  • Event ID 1074

 

Windows 10:

  • Event ID 4647

  • Event ID 1074

Please review the print screens on how to create a Task in Windows 7 and Windows 10.

Windows7:

Windows 10:

Now at shutdown/logoff, the .bat file will unenroll the machine from the ITSM console and prepare the enrollment process by copying the file or files from the ‘Backup’ folder to the Endpoint Manager folder.

Step 6: Rate the .bat file as ‘Trusted’ on the master image machine

We want the .bat file to run unimpeded, so we need to give it a ‘Trusted’ file rating in Xcitium Client Security (XCS). Doing so means XCS will not block the file regardless of the security level you are using.

1) Enable the file list

  • Open Endpoint Manager
     
  • Click ‘Configuration Templates’ > ‘Profiles’
     
  • Click on the name of the profile you applied to the master image
     
  • Open the ‘UI Settings’ tab
    • Click ‘Add Profile Section’ > ‘UI Settings’ if you have not yet added this section
       
  • Enable ‘Show File List’ and save the profile
     
  • This will command xCS on the master image to make the file list available to you

2) Give the .bat file a trusted rating

  • Open Xcitium Client Security on your master image
     
  • Click ‘Settings’ > ‘File Rating’ > ‘File List’
     
  • Click the ‘Add’ button > ‘Files’
     
  • Browse to the .bat file and click ‘Ok’.
     
  • Alternatively, enter the absolute path. In our example:
    • C:\Program Files\ITarian\Endpoint Manager\Backup\EnrolmentITSM.bat or
    • C:\Program Files (x86)\ITarian\Endpoint Manager\Backup\EnrolmentITSM.bat
       
  • Select ‘Trusted’ as the rating:


     
  • Click ‘OK’
     
  • Repeat the process to trust ‘UnenrolmentITSM_ITarian.bat’
     
  • Click ‘OK’ to apply the new rating.

Your scripts are now trusted and will not be blocked by XCS.

Step 7: Confirm that XCS doesn’t need a reboot

Important:

At this step you should confirm that Xcitium Client Security doesn’t require a restart. For example, a restart is required If you add or remove AV, FW or Containment from a profile.

Step 8: Reboot the master image

Reboot the master image device to confirm the following:

  • The device is removed from Endpoint Manager when you shut it down
     
  • The device is re-enrolled when the reboot is complete
     
  • The device is correctly added to the ‘InstantClone’ group

You can check the success or failure of all these steps in the Endpoint Manager interface:

  • Open Endpoint Manager > Click ‘Devices’ > ‘Device List’ > ‘Group Management’ tab > open the ‘InstantClone’ group

Step 9: Confirm that the instant clones are enrolled & unenrolled correctly in Endpoint Manager

Now that we have confirmed that the Master Image is working correctly, shutdown the machine and take a snapshot.

When you create a desktop pool, please select “Automatically logoff after disconnect: Immediately”

Note:

If you don’t choose this option, “Automatically logoff after disconnect: Immediately”, please remove the UnEnrolmentITSM_ITarian.bat from logoff.

After the desktop pool is created, please test and confirm that the instant clones are enrolled/removed from the EM console correctly.