System information
Comodo Endpoint Security Manager - SME - Administrator Guide
If none of these addresses succeeded or if Internet Server Address value wasn't specified, the Agent will try the remaining
hosts in the Server Network Addresses list, applying the corresponding policy based upon analysis per RFC 3330 of a
connection succeeding via a special use address as indicating Local policy, and a public address indicating Internet policy.
• Click the right arrow to move to the step 5 - Selecting Targets.
Step 5 - Selecting Targets
The administrator can select the target computer group(s) onto which the created policy has to be applied.
• Click the check box for 'Assign policy to groups after finish' if you to apply the newly created policy after it is imported
to an existing group. You can also assign this policy at a later stage to groups if you do not want to do so now. See
Viewing Policies section for more details.
• For the group(s) of computers connected through the local network you wish to apply the new policy, select 'For Local
Policy' checkbox.
• For the group(s) of computers connected through the Internet you wish to apply the new policy, select 'For Internet
Policy' checkbox.
• Options:
• Override individual computers policy - Selecting this option will apply the new policy onto target
computers in the selected groups that currently have individual policies that differ from the group policy,
thereby reverting their policies to come from their group membership.
• Force target computers to be remotely managed upon policy assignment - Selecting this option will
forcibly switch the CIS installations in the selected target endpoints to remote management mode on
assigning the new policy, irrespective of their current management mode.
• Make your selections and click the right arrow to move to step 6 - Importing the Settings and Creating the Policy.
Step 6 - Importing the Settings and Creating the Policy
The next step requires the administrator to specify a name and provide a description for the policy created.
Endpoint Security Manager - SME Administrator Guide | © 2013 Comodo Security Solutions Inc. | All rights reserved 133