Introduction to Comodo Internet Security Configuration Editor
After installation of Comodo Internet Security (CIS) on endpoint computers, administrators must deploy a CIS configuration to activate the software. There are two ways in which this can be done:
Deploy a preconfigured configuration.
This is the default and recommended option and allows admins to quickly implement a Comodo preset configuration according to requirements.
Create a custom configuration using the built in CIS Configuration Editor.
This option involves the administrator using the built in CIS Configuration Editor to specify custom settings.
Prerequisites to deploying a CIS configuration
There are some prerequisites that are required to be implemented prior to deploying any configuration for the application to run effectively. The following steps should already have been completed before configuring and deploying a custom or predefined configuration:
Comodo Endpoint Security Manager | © 2010 Comodo Security Solutions Inc. | All Rights Reserved.