Comodo ONE & ITarian - IT Operation Platform October Release(2018-10-27)

We are excited to inform you that we are planning to have new releases over Comodo ONE and ITarian on Saturday (2018-10-27) morning! The release is expected to take 4 hours to deploy, during which time Comodo One and ITarian will be in maintenance mode.

Introducing ITarian

On the release date, you will have the option to switch to the ITarian platform. This switch is not mandatory, and you may remain on the Comodo ONE platform.

We are all ITarians - Superheroes that know and use the power of IT!

I-Tar-i-an (noun): a person who supports, advocates, or practices a doctrine, theory, or set of principles associated with IT.

The new ITarian platform will have the same functionality and user experience as you are used to on the Comodo ONE platform.
ITarian is a partner of Comodo. Comodo has partnered with ITarian to give Comodo customers access to additional great products and services that will be coming soon via the ITarian platform.

All the IT management tools, training, and support you use today will remain FREE.

All functionality is the same for both the ITarian and Comodo ONE platforms. The only difference is the platform skin (either ITarian or Comodo ONE branded). Everyone’s configuration and settings will remain as they are. You will have the same products available to you that are in your portal today.

ITarian will start on its mission of helping IT administrators provide the best services possible to their enterprises. Comodo Cybersecurity will continue its mission of protecting your enterprise.

Learn more at https://www.itarian.com

Endpoint Manager (New name of IT and Security Manager)

Security

Improvements

  • The ‘Stop Scan’ button now terminates all types of scan running on an endpoint, including scheduled scans and local scans started by the end-user. Previously, the button only stopped scans initiated at the portal. ‘Stop Scan’ can be found in ‘Security Subsystems’ > ‘Antivirus’.
  • More informative security icons in the device list. The security shield icon now shows more detailed information about the security status of a device. This accelerates response time and decision making by providing actionable information upfront without the need to investigate further. New messages include
    • “The computer needs to be restarted for some changes to take effect”
    • “HIPS is not functioning properly”
    • “Firewall protection is disabled”
    • “Antivirus protection is disabled”
    • “Auto-Containment is disabled”
    • “Multiple protection components are disabled”
Patch Management

New Feature

  • Operating system patches can now be removed. We added an uninstall action for OS patches and updates, allowing you to roll back to an earlier build if required.
Remote Tools

Improvements

  • Added sorting to process explorer columns. Admins can now sort running processes on remote machines by name, PID, status, CPU/memory/disk/network/GPU and start time. Process explorer is part of the ‘Remote Tools’ menu available in ‘Devices’ > ‘Device List’. Toggle between the flat and expanded view options by the view button on the left!
Comodo Client Security

Windows

New Feature

  • Create containment rules based on software vendor. You can now create rules to contain, block or allow applications by a specific software publisher. You can also set how many levels of parent processes should be inspected.
  • Containment rules now let you specify a ‘Vendor Rating’ as an extra condition for ‘Files Signed By Vendors’. This lets you create even more granular rules than before, granting you additional control over your security policy. For example, you can block applications which are signed by vendors that you rate as malicious.
  • Automatic review of quarantined items. We added a new scan type which periodically re-evaluates all quarantined items for changes in trust rating. This helps cut-down on false-positives remaining in quarantine long-term. For security reasons, the scanner will restore false-postives which were quarantined by CCS, but will not restore items quarantined by users or admins.
  • Improved heuristic analysis and embedded code detection. CCS will now monitor Windows services, auto-run entries and scheduled tasks. This means even better protection against malicious code triggered by Windows start-up and auto-run items. You can configure the feature in the new ‘Script Analysis’ area at ‘Advanced Settings’ > ‘Script Analysis’.
Improvements
  • New ‘Script Analysis’ section. ‘Heuristic Command Line Analysis’ and ‘Embedded Code Detection’ have been moved to the new section (‘Advanced Settings’ > ‘Script Analysis’.)
  • Windows 10 1810 (Redstone 5) compatibility. We completed all required updates and testing for CCS. You can enjoy a hassle-free transition when you upgrade your endpoints to the latest Wındows release.
    • Note: Older versions of CCS have compatibility issues with the latest version of Windows. We strongly advise you update Comodo agents on endpoints before installing the new Windows release.
  • Restarts are now optional. It is no longer mandatory to reboot endpoints after installing or removing the firewall component of CCS. We still recommend you do so, though, for the smoothest experience.
  • Improved support for TLS 1.2. TLS 1.2 is the standard protocol used to encrypt connections between websites and browsers. To meet compliance regulations, we now support of this critical protocol on these older versions of Windows:
    • Windows XP
    • Windows Vista
    • Windows Server 2012
    • Windows 7 Service Pack 1 (SP1)
    • Windows Server 2008 R2 SP1
C1 Portal

New Features

  • The Quote Manager module is now available in US region instances of Comodo One.
  • Added local storage billing options to Acronis.
  • Added trial licenses for Dome Data Loss Protection Cloud. The free trial will be available from the October release onwards.
APPENDIX-1

New Client Versions:

  • Windows - Comodo Communication Client 6.23.18107.18100
  • Windows - Comodo Security Client 10.7.0.6981
  • Linux - Comodo Communication Client 6.22.16643.18090
  • Linux - Comodo Security Client 2.2.1.287
  • Android - Comodo Mobile Agent 6.13.2.28

C1 & ITarian - IT Operation Platform October Release.docx (319 KB)

Please could you direct me to the wiki article for these new features, specifically creating containment rules based on vendors. Does this work with with the TVL?

[I]Create containment rules based on software vendor. You can now create rules to contain, block or allow applications by a specific software publisher. You can also set how many levels of parent processes should be inspected.

Containment rules now let you specify a ‘Vendor Rating’ as an extra condition for ‘Files Signed By Vendors’. This lets you create even more granular rules than before, granting you additional control over your security policy. For example, you can block applications which are signed by vendors that you rate as malicious.

Automatic review of quarantined items. We added a new scan type which periodically re-evaluates all quarantined items for changes in trust rating. This helps cut-down on false-positives remaining in quarantine long-term. For security reasons, the scanner will restore false-postives which were quarantined by CCS, but will not restore items quarantined by users or adm[/I]ins

Hi @nct
The wiki article specific to ‘Create containment rules based on software vendor is not yet available. We will reach out to the team who handles these wiki articles and inform you here once it becomes available.

Hi @nct ,
The wiki is in progress right now, it will be ready soon.

Yes it works with TVL (Trusted Vendor List). You can select among the vendors provided by TVL in addition to the ones that you can import to the Vendor List.

Regards,
-Can