• About us
  • Disclaimer
  • Privacy Policy
Wednesday, July 6, 2022
  • Login
  • Register
W-SE (Web - SEcurity)
  • Tech today
  • Security
    • Malware
    • Top list
  • Vulnerabilities
  • How To?
    • All
    • gaming
    • Smart phone
    • smart tv
    • software
    Software help business

    Reasons to Buy the Right Business Hardware

    Network Management Security

    How to Invest in NFT Art?

    Ideal Internet Speed for Online Gaming

    Ideal Internet Speed for Online Gaming

    AceThinker Online Video Editor and Pro

    AceThinker Online Video Editor and Pro

    DGE 1001

    Splashtop Cost

    Cyber Security Degree In Pennsylvania

    How to Secure Your PC Before Going Online Shopping

    Trending Tags

    • Web Security
    • Data Security
    • Network Security
    • Cybersecurity
  • About us
  • Disclaimer
  • Privacy Policy
  • Contact
No Result
View All Result
  • Tech today
  • Security
    • Malware
    • Top list
  • Vulnerabilities
  • How To?
    • All
    • gaming
    • Smart phone
    • smart tv
    • software
    Software help business

    Reasons to Buy the Right Business Hardware

    Network Management Security

    How to Invest in NFT Art?

    Ideal Internet Speed for Online Gaming

    Ideal Internet Speed for Online Gaming

    AceThinker Online Video Editor and Pro

    AceThinker Online Video Editor and Pro

    DGE 1001

    Splashtop Cost

    Cyber Security Degree In Pennsylvania

    How to Secure Your PC Before Going Online Shopping

    Trending Tags

    • Web Security
    • Data Security
    • Network Security
    • Cybersecurity
  • About us
  • Disclaimer
  • Privacy Policy
  • Contact
No Result
View All Result
W-SE (Web - SEcurity)
No Result
View All Result
Home Tech

Endpoint Manager Communication Client

Endpoint Manager

Melina Richardson by Melina Richardson
in Tech, Tech today, Top list
A A

Communication Client and Comodo client – Security App UI Settings

  • You can configure the appearance of Communication Client, Comodo Client Security, and the Virtual Desktop via the UI Settings screen.
  • These items can be rebranded with your company logo, logo, product name, and product logo. In addition, you can:
  • Include your support website, phone number, and email in the GUI
  • Choose which parts of CCS should end-users see

Setup UI Settings

  • Click on ‘Configuration Templates > ‘Profiles.
  • Click on the Windows profile where you wish to set up UI appearance
  • Click ‘Add Profile section’ > UI Settings

Three tabs are available on the UI settings screen:

  • General Settings You can select the GUI language and the components/shortcuts that will be displayed in the interface for the end-user.
  • Comodo Client Communication Branding – Personalize CC with your company logo, brand name, and more
  • Comodo Client Security Branding – Create your brand and logo for CCS and VD.

General Settings

  • Open the UI Settings section in a profile
  • Click on the tab ‘General Settings.

 

UI Settings Configuration – Table of Parameters
Form ElementDescription
LanguageThis is the language that should be used in the Comodo Client Security interface.

(Default = English (United States))

Show messages from Comodo Message CenterMessage Center notifications are displayed as pop-ups in the lower right-hand corner.

These include news about updates and offers, as well as other interesting items.

  • You can choose whether messages should be shown to end-users.

( Disabled

Display notification messagesNotifications notify end-users of actions and status updates.

CCS notices are located in the bottom-right corner (just above the tray icons).

  • You can choose whether notifications should be displayed to end-users.

( Disabled

Show desktop widgetThis widget provides shortcuts to CCS tasks, information about traffic and security levels, and background tasks.

  • You can choose whether the widget should appear on endpoint desktops.

( Disabled

When tasks are reduced/sent to the background, show information messagesThese messages inform users about the consequences of moving or minimizing a running task into the background. This could be the case when a virus scanning task is moved to the background.

  • You can choose whether information messages should be shown to end-users.

( Disabled

When an alert is displayed, play soundCCS can play a chime when it raises security alerts if selected.

( Disabled

Display shared space shortcut from the desktop“Shared Space” is a special folder at an endpoint that allows contained applications to save files. This folder can be accessed via the shared space shortcut.

  • You can choose whether the shortcut should be displayed to end-users.

( Disabled

Icon for a security client trayYou can choose whether the CCS icon will be displayed in the system tray.

  • End-users can use the tray icon to submit support tickets for Service Desk should they require assistance with their devices.
  • You can allow users to submit tickets to certain departments if enabled. For more information, see Configure Service Desk Departments Available to End-user.

(Default = Enabled).

Icon for showing security client desktop shortcutYou can choose whether or not you want a shortcut to CCS placed on your endpoint desktops.

( Disabled

Icon for client tray showing communicationChoose whether the CCC icon will be displayed in the system tray.

 

Show file listCCS can display a list file on a device with trust ratings (Trusted, Unrecognized, or Malicious). This option is available under ‘Advanced Settings > Security Settings > File Rating > File List.

For more details click the link https://help.comodo.com/topic-399-1-790-10397-File-List.html

  • You can choose whether the file list should be made available to end-users.

( Disabled =

Show vendor listAllow local users to access the vendor area of Comodo Client Security from an endpoint.

CCS ships with a list of trusted vendors that have a reputation for creating safe, legitimate software. CCS will allow unknown files to be run if they are digitally signed by one of these vendors.

You can add new vendors and modify the rating of vendors.

To view the vendor list, click ‘Advanced Settings > Security Settings > File Rating > Vendors List’ in CCS.

See https://help.comodo.com/topic-399-1-790-10401-Trusted-Vendors-List.html if you want to read more.

Only show Virtual Desktop settings in security client interfaceIf you are interested in:

  • The widget and the CCS tray icon are hidden at the endpoint.
  • Only virtual desktop options are displayed in the CCS desktop and start menu shortcuts:
  • Open Virtual Desktop
  • Open Virtual Desktop Setting – This opens the virtual desktop settings area of CCS (‘Settings’ > ‘Containment’ > ‘Virtual Desktop’).

CCS is not available to end-users.

(Default = Disabled).

Notification This setting is only available if the option ‘Allow the user the override Virtual Desktop settings’ has been disabled in the Containment” section of your profile. See Setting up virtual desktop In Configurations for Containment for more details.

End-users have access to the Configure Service Desk department

  • Users can send support tickets to Service Desk by right-clicking on the icon in the CCS system tray icon if enabled.
  • This menu can be customized to include specific departments. The user can submit a ticket to the correct department.
  • The drop-down ‘Department” shows you departments that have been marked as Public’ in Service Desk.
  • See https://help.comodo.com/topic-289-1-625-7881-Departments.html if you want more help with departments
  • To choose your departments, click ‘UI Settings > ‘General Settings > ‘Show Communication Client Tray Icon’

Choose from the available departments

  • Open the UI Settings section in a profile
  • Click on the tab ‘General Settings.
  • Allow ‘Show client tray icon for communication’
  • Allow ‘Configure Departments to Ticket Submission’
  • The left pane lists all departments that have been added to your Service Desk instance
  • To instantly import new departments, click the “Synchronize” button
  • When end-users right-click on the CCS tray icon, they will see the right pane.
  • To enable the department for the end-user, select it from the left and click ‘Add.
  • Continue the process until you have added more departments
  • To disable it for an end-user, select a department from the right and click ‘Remove.
  • To save your changes, click ‘Save’

Communication CustomerRebranding

You can change the interface text and appearance of the communication client using the rebranding tab. This feature is particularly useful for customers who wish to white-label their endpoint clients.

  • You can modify the company name, contact website, phone number, and email.
  • You can upload replacement images to company logos, header logos, product icons, and product logos.
  • You can preview your changes online.
  • To see your changes in the example image, start typing in the fields.
  • Upload images in the right size and format (.png).
Communication Client Rebranding – Table of Parameters
Form ElementDescription
Name of the ClientFor the application, enter a unique name.

You can use special, numeral, and alphabetical characters. Maximum = 20 characters.

Name of the CompanyYour company name.
Support WebsiteThe URL of your support site.

The URL will appear in the CC application’s ‘About” dialog.

Support PhoneThe number for customer support.

This number will appear in the CC application’s ‘About” dialog.

Support EmailYour customer support email address.

This address will appear in the CC application’s ‘About’ dialog.

Logo for Company HeaderThe logo is shown in the upper-left corner of your application window.

Accepted image size = 112 x 17 pixels

Accepted image format =.png

Logo for the companyThe logo is shown at the top right of the CC “About” dialog.

Accepted image size: 180 x 43 pixels

Accepted image format =.png

Logo for ProductLogo displayed at the left side of the CC “About” dialog.

Accepted image size =98×98 pixels

Accepted image format =.png

IconWindows shortcut icon and start menu

Accepted sizes for images: 16×16, 20×20, 32×32, 32×32, 32×32, 32×32, 40×40, 48×48, 64×64 pixels, and 48×48 pixels

Accepted image format =.ico

http://www.dihav.com/view.php?id=png2icon

This tool converts.png files into.ico files for free

Tray Icon (normal mode)When Endpoint Manager is connected, the Tray icon will be displayed.

Accepted image sizes are 16 x 16 pixels

Accepted image format =.png

Tray Icon (offline mode)When Endpoint Manager is connected, the Tray icon will be displayed.

Accepted image sizes are 16 x 16 pixels

Accepted image format =.png

 

  • To save your design, click ‘Save’

Comodo Client Security Branding

You can change the look of CCS or the Virtual Desktop by using the rebranding tab. To reinforce your brand’s image in the eyes your customers, you can upload your company logos or text.

  • Similar. A disclaimer message can be created that is displayed to users when they open the virtual desktop. This can be set up in the Containment section of a profile. For more information, see Virtual Desktop under Containment Setting.

CCS interfaces rebranded

  • Open the section ‘UI settings’ in a profile
  • Click on the tab ‘Comodo Client Security Branding’
  • To see your changes in the example images, start typing in the fields
  • Upload images in the right file format (.png).
  • All interfaces in CCS will see the changes that you make.
  • A default profile cannot be modified concerning the UI.
Comodo Client Security Branding – Table Of Parameters
Form ElementDescription
Logo for Company HeaderThe logo is shown in the upper-left corner of your application window.

Accepted image size = 122 x 24 pixels

Accepted image format =.png

Logo for the companyLogo displayed in different CCS interfaces

The accepted image size is 150×24 pixels

Accepted image format =.png

Logo for ProductLogo displayed on the left sidebar of the CCS “About” dialog.

Accepted image size =106 x106 pixels

Accepted image format =.png

Widget CaptionLogo displayed on the header for the CCS desktop widget.

Accepted image size = 289 x 28 pixels

Accepted image format =.png

IconWindows shortcut icon and start menu. Other interfaces of the program also display this icon.

Accepted sizes for images: 16×16, 20×20, 32×32, 32×32, 32×32, 32×32, 40×40, 48×48, 64×64 pixels, and 48×48 pixels

Accepted image format =.ico

http://www.dihav.com/view.php?id=png2icon

This tool converts.png files into.ico files for free

Client NameYou can enter a unique name for the application. This name will appear in the interface and will be used in the Windows Start menu.

You can use numbers, letters, and special characters. Maximum = 20 characters.

Comodo Virtual Desktop
Client NameYou can enter a unique name for the application. This name will appear in the interface and will be used in the Windows Start menu.

You can use numbers, letters, and special characters. Maximum = 25 characters.

Wallpaper iconShown on the main virtual desktop screen.

Accepted image size: 128 x128 pixels

Accepted image format =.png

Wallpaper imageVirtual desktop background image.

Accepted image size: 1920 x 1200 pixels

Accepted image format =.png

Icon for the Start menuWindows shortcut icon and start menu

Accepted image size: 32 x 32 pixels

Accepted image format =.png

Widget iconThe logo is displayed on the header for the virtual desktop widget.

Accepted image size is 24 x 24 pixels

Accepted image format =.png

 

  • To save your profile settings, click ‘Save’
  • If you want to make changes to a design you’ve saved, click the “Edit” button
Tags: Endpoint ManagerEndpoint Manager Communication Client
ShareTweetShare
Previous Post

Comodo Remote Control

Next Post

Icedragon – What it is?

Melina Richardson

Melina Richardson

Melina Richardson is a Cyber Security Enthusiast, Security Blogger, Technical Editor, Certified Ethical Hacker, Author at Cybers Guards & w-se. Previously, he worked as a security news reporter.

Next Post
Why Does Spectrum Keep Buffering?

Icedragon - What it is?

Please login to join discussion
  • Trending
  • Comments
  • Latest
inurl technology

Latest Carding Dorks List for Sql Injection 2022

March 16, 2022
connect monitor to laptop two screens

How To Connect A Monitor To A Laptop And Use Both Screens?

February 10, 2021
how to connect two monitors to my laptop

How Do I Connect 2 Monitors To My Lenovo Laptop?

January 22, 2021
Gb Whatsapp An Unexpected Error

Gb Whatsapp An Unexpected Error

November 7, 2021
Windows Flaw

If Older Battleye software is used, Windows 10 1903 Blocked

0
Mac Os

New unpatched macOS bypass gatekeeper published online

0
Siemens Medical Products

Wormable Windows Flaw Affected Siemens Medical Products

0
Cloud Computing

5 Tips of the Personal Data Protection in the Cloud

0
Software help business

Reasons to Buy the Right Business Hardware

June 30, 2022
Business Intelligence

How Containerization Can Help with Your Automation Strategy

June 27, 2022
Private Browsing Do's And Don'ts

Private Browsing Do’s And Don’ts

June 27, 2022
The Safest Mobile Payment Options Available

The Safest Mobile Payment Options Available

June 27, 2022

Quick Links

Learnopedia
Tech Write For US
Technology Write For US
Casino Write For Us
Mr.Perfect Reviews
Cyber Security Career

Recent News

Software help business

Reasons to Buy the Right Business Hardware

June 30, 2022
Business Intelligence

How Containerization Can Help with Your Automation Strategy

June 27, 2022
Private Browsing Do's And Don'ts

Private Browsing Do’s And Don’ts

June 27, 2022
The Safest Mobile Payment Options Available

The Safest Mobile Payment Options Available

June 27, 2022
W-SE (Web – SEcurity)

W-SE regularly updates cyber attacks, hacking and events that provide IT security professionals with information throughout the world. Also offering news in W-SE. We spent two years living and sharing guidance and insights with IT experts, detailed analyzes and news.

We also train people with product reviews in different form of content.

Browse by Category

  • computer
  • Fraud & Identity
  • gaming
  • How To?
  • laptop
  • Malware
  • Microsoft
  • Mobile
  • photography
  • Privacy
  • Reviews
  • Security
  • Security Degree
  • Smart phone
  • smart tv
  • Social
  • software
  • Tech
  • Tech today
  • Top list
  • Uncategorized
  • Virus & Threats
  • Vulnerabilities
  • Website
  • What is?

Recent News

Software help business

Reasons to Buy the Right Business Hardware

June 30, 2022
Business Intelligence

How Containerization Can Help with Your Automation Strategy

June 27, 2022
  • About us
  • Contact
  • Disclaimer
  • Home
  • Privacy Policy
  • Resources
  • Support Forum
  • Tech Blog
  • Technology Write For Us
  • W-SE (Web Security)

© 2020 w-se.com - Powered by Fix Hacked Website, Cyber Special , SSL Authority Reviews Powered by Mr.Perfect Reviews.

No Result
View All Result
  • Tech today
  • Security
    • Malware
    • Top list
  • Vulnerabilities
  • How To?
  • About us
  • Disclaimer
  • Privacy Policy
  • Contact

© 2020 w-se.com - Powered by Fix Hacked Website, Cyber Special , SSL Authority Reviews Powered by Mr.Perfect Reviews.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In