The customer assessment procedure lets you quickly evaluate the security of your managed Windows endpoints. The procedure generates a report which summarizes the following:
You must login to Valkyrie and get the API key in order to run the scan. The scan itself is run by Valkyrie, our cloud-based threat analysis service.
Click 'Apply' then 'Run' in the procedure dialog.
The command is immediately sent to the selected endpoints. Click 'customer assessment report' link in the procedures screen, then 'Execution Log' to view the status of the scan.
A scan report is sent to the recipients you added to the email list:
Click 'You can view your files online' to see results on the Valkyrie website. Click here if you want to learn more about Valkyrie.
Download the PDF report from the mail:
The report is divided into four sections:
Comodo agents – The Comodo clients installed on the endpoints.
Device Vulnerability Risk – Details about OS and third-party patches that should be installed on the devices.
Endpoint Security Risk – Details about malware and unknown file types found on scanned devices. Unknown files are those that do not yet have a trust rating of definitely safe nor definitely malware.
Phishing and Internet Risks – Shows whether your endpoints are protected from harmful websites in various categories. ‘Not protected’ means the scanner was able to make a connection to a site in the category from the endpoint.
Our Secure Internet Gateway product provides complete, DNS-based protection from harmful sites. Log into ITarian > Click ‘Applications’ > ‘Secure Internet Gateway’ to get started.
Configure and run procedures on managed devices
How to patch endpoints using Endpoint Manager
How to run virus scans on endpoints
How to manage unknown and malicious files on your devices
How to block harmful websites for your users
How to install the security client on devices