Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Takeover remote endpoints using ITSM
ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install third party software and perform system maintenance.
To take over a device:
This will open the takeover options menu:
ITSM will ask for permission to launch the agent on your computer. Click ‘Open Link’ to begin the connection process. Note – you can enable ‘Remember my choice for ccv links’ so you don’t have to see this dialog again:
Once connected, the client viewer interface will display the desktop of the remote computer:
Administrators can now interact with the target device to perform tasks as required.
The client interface contains the following settings and tools:
Send Ctrl + Alt + Del – Will send the Ctrl+Alt+Del keyboard combination to the remote machine to open the Windows security screen. This allows you to lock the computer, log off the current user, change passwords, view the task manager or shut down/restart/hibernate the machine.
Send Ctrl + Esc –Will open the Windows ‘Start’ menu, allowing you to launch subsequent tasks.
Full Screen, Fit to Width, Fit to Height, Fit to Origin– Change the preferred display of the remote desktop.
Options – Allows you to configure connection and display quality. Lower quality settings may be preferable if your connection is slow.
Frequently Asked Questions:
Do I need the (old) RMM Plug-in agent to take over a device?
No. You need only install the client viewer on your management machine (as shown above), and the ‘Comodo Client – Communication’ agent on target endpoints. The RMM plugin is approaching end-of-life, but you can still use it should you prefer.
Do I need any additional agents on my devices?
No, you only need to install ‘Comodo Client – Communication’ on endpoints.
Do I need to install “Comodo Client Viewer” on each machine that I manage?
No, “Comodo Client Viewer” need only be installed once on your admin machine. Afterward, you can use the takeover feature to remote desktop into any managed endpoint that has ‘Comodo Client – Communication’ agent installed.
How to prevent users from establishing the remote session to managed endpoints
Admins can now disable Remote Control function via Settings>Portal Set-Up>Extensions Management menu. This will hide the Remote Control button on the device list and device detail menus to prevent users from establishing remote session to managed endpoints
Step 1: Go to SETTINGS > Portal Set-Up > Extensions Management and Get focused on the switch of Comodo Remote Control. By default, the switch is been ON so click the switch to get turned OFF.
If turned OFF then the Comodo Remote Control would be presented as below.
If the Comodo Remote Control is turned OFF then the icon Remote Control in the Device Management page and also in the Device Details page will be disappeared automatically.
Before Remote Control OFF:
After Remote Control OFF:
How to inform endpoint about who connected during Comodo Remote Control session
Admins can configure the new “Remote Access” profile section to enable Comodo Remote Control to inform endpoint user about who were connected to his/her device and allows them to terminate the session if it is not a suitable time for remote connection.
Step 1: Go to ‘CONFIGURATION TEMPLATES’ → ‘Profiles’ and select a profile of the endpoint. After choosing the profile click ‘Add Profile Section’ on that select ‘Remote Access Software‘ option.
Step 2: Enable the option “Show notification to device user about who connected to his/her workstation and allow terminating the connection” then click ‘Save’ button.
Step 3: For taking the remote session, select the particular device and click ‘Takeover’ option on that choose ‘With Comodo Remote Control’ option.
Step 4: If the device is not installed with Comodo Remote Control software, choose Step1 then download and install the software on that machine.
Note: For a Remote session, the device has to be installed with the latest version of Comodo Remote Control software. Ensure whether the Comodo Remote Control software is available with the latest version as specified in step 2.
Step 5: Otherwise choose Step 2 and click the “link”. Allow Open CR Application pop menu by selecting it.
Step 6: It will open Comodo Remote Control of the machine which have been takeover along with session duration. The user can also stop the session of the end user who has been connected with comodo remote control if it is not suitable for remote connection.
How to use Comodo Remote Control for Multi-Monitors Support
Comodo Remote Control (CRC) now has multi-monitor support as well! Admins can now able to monitor dual screen at once, see only one screen like screen 1 or screen 2 and have the ability to change the selection during the remote session. With the help of this feature, now admins can utilize multiple monitor screens more efficiently by displaying multiple “remote monitors” simultaneously or switching between monitor screens as they prefer.
Note: Comodo Client Viewer (CCV) has been renamed as Comodo Remote Control (CRC)
Step 1: Go to ‘Applications’ > ‘Device Management‘ and select ‘Device List’ from the ‘DEVICES’ menu and select desired machine to be taken in remote then click ‘Takeover’ icon and select the option ‘With Comodo Remote Control’
Step 2: If the Comodo Remote Control is not installed on your machine which is used to take the remote connection then follow the Step 1 of the alert window as given in the screenshot. If your machine already has the latest version of Comodo Remote Control then you can directly follow the Step 2 of the alert window as given in the screenshot. Also, allow the alert ‘Open CRControl Application?’ if present.
Step 3: There will be the option ‘Multi-Screens’ if the Computer has more than one monitor. Click the Multi-Screens drop-down to get and know about all required options as follow:
Note: Number of monitor option depends on the number of monitors you have set up for your endpoint.
IT Service Management
Tags: Comodo One,ITSM
Reading Time: 6 minutes Comodo IT and Security Manager (ITSM), which is a part of Comodo One initiative and is available absolutely free, assists MSPs in managing their client infrastructure, by equipping them with the necessary IT tools to address the four critical aspects of IT Service Management: device management, application management, security management and helpdesk management. Subscribe to…
Reading Time: 2 minutes Comodo has just released a new version of Comodo Dome Shield that significantly raises the bar for Managed Service Providers (MSPs). You can read the press release summarizing the improvements here. The bottom line summary: MSPs can now manage multiple end-customer instances of Comodo Dome Shield from a single Comodo ONE console. This will increase…
Reading Time: 6 minutes Comodo One. Configuring roles in ITSM How to assign/re-assign a role to the specific user How to create a new role with custom permissions How to create a new staff and change role How to customize permissions for a role How to assign/re-assign a role to the specific user? Step 1: Go to ITSM >…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP