We are excited to inform you that we are planning to have new releases scheduled to go live on Saturday (2019-07-13) morning!
The release is expected to take 30 minutes to deploy, during that time platform will be under maintenance mode. Post-deployment tests are expected to continue until 2 pm EST during which you may observe minor glitches. If you observe any issues, please feel free to share with us.
Endpoint Manager Core
Proxy Mechanism for Clients
You can now specify local endpoints as proxies from which other endpoints can collect installation packages and database updates. This helps save network traffic and accelerates package deployment when a large number of endpoints are involved.
You distribute the following packages with this feature:
- Comodo Communication Client
- Comodo Client Security
- Virus database updates
- Fixed the issue of auto-remediation procedure triggers despite it is disabled in monitor settings on portal.
- Fixed the issue of MacOS Communication Client connection failure.
- Fixed the issue of maintenance window being shown as "OFF" while it is actually in the preset interval.
- Fixed the issue of location tracking for mobile devices.
- Fixed the issue of download servers from security profile not being applied to client immediately.
- Fixed the issue of translation inconsistencies for Remote Control and Remote Tool settings in profiles.
- Supported Device Platforms page is updated in order not to cause disinformation.
Virtualization Exclusions for Removable Media
You can now exclude removable media such as USB sticks and external drives from virtualization. Doing so allows apps in the Virtual Desktop to write and make changes to specific media attached to the endpoint. This provides another way to export data from the Virtual Desktop in addition to Shared Space.
You can configure these exceptions in the ‘Containment’ section of an Endpoint Manager profile.
Set Custom Disclaimer for Virtual Desktop
Expanding our white-label options, you can now configure a custom disclaimer message for the Virtual Desktop. Users must accept the disclaimer before starting the virtual session.
You can configure the disclaimer in the ‘Containment’ section of an Endpoint Manager profile.
See this wiki if you want help to white label/rebrand the Endpoint Manager clients.
Allow User to Override Virtual Desktop settings
When enabled, Endpoint Manager will not reverse local Virtual Desktop settings that are different to those in the endpoint’s profile. Ordinarily, Endpoint Manager checks devices to see if the local settings match those in the device profile. It will re-implement the profile settings if it detects any deviation.
The new setting gives admins greater flexibility and control over individual endpoints. For example, you can now disable the exit password on a specific endpoint, avoiding the need to create a whole new profile just to accomplish this one task.
This addition complements the existing override option in the ‘Client Access Control’ section of a profile, which allows local changes to every Comodo Client Security setting. Admins can now allow local override of just the virtual desktop settings, while preventing changes to other Comodo Client Security settings.
You can configure the override setting in the ‘Containment’ section of an Endpoint Manager profile.
Here is the wiki of this feature.
Show only Virtual Desktop settings on endpoint
New option to only show virtual desktop options when users click the Comodo Client Security tray icon on an endpoint. End-users can then access and launch the virtual desktop, but cannot change other Comodo Client Security settings.
This feature is useful when used with the override option described above.
You can configure this setting in the ‘UI Settings’ section of an Endpoint Manager profile.
Here is the wiki of this feature.
Auto-updates disabled by default in Comodo Client Security
Automatic updates to the Comodo Client Security client are now disabled by default in predefined profiles. This change was made after valued feedback from our customers who manage complex, sometimes delicately balanced networks. To avoid potential disruptions, customers prefer to be notified when updates are available so they can review them before installation.
New default actions for unknown autorun entries
This setting determines what Comodo Client Security should do if an application tries to create/modify a service, auto-start entry, or scheduled task. You can find it at ‘Configuration Templates’ > ‘Profiles’ > open a level 2 or 3 profile > Click the ‘Miscellaneous’ tab.
The previous default was ‘Ignore’. The new defaults are:
- Security Level 2 profiles - ‘Terminate and Disable’
- Security Level 3 profiles - ‘Quarantine and Disable’
Product Management Team