Predefined Security Policies
As the name suggests, a Predefined Security Policy is a set of access rights and protection settings that have been saved and can be re-used and deployed on multiple applications. Each policy is comprised of a number of 'Rules' and each of these 'Rules' is defined by a set of conditions / settings / parameters. 'Predefined Security Policies' is a set of policies that concern an application's access rights to memory, other programs, the registry etc.
Note: This section is for advanced and experienced administrators. New and inexperienced administrators to Comodo Internet Security are advise to first read the Computer Security Policy section in this help guide.
Although each application's security policy could be defined from the ground up by individually configuring its constituent rules, this practice may prove time consuming if it had to be performed for every single program on the system. For this reason, Comodo Internet Security contains a selection of predefined policies according to broad application categories. Each predefined policy has been specifically designed by Comodo to optimize the security level of a certain type of application. Administrators can, of course, modify these predefined policies to suit their environment and requirements.
Click Predefined Security Policies in Defense+ > Advanced to open the Predefined Security Policies interface. There are four default security policies listed under the Policy Name column.
To view or edit an existing predefined policy
Select the Policy Name and click the icon.
Make the required changes and OK to confirm.
Note: It is possible to modify a policy's name and make changes to its 'Process Access Rights' and 'Protection Settings' from this interface. Any changes made here is automatically rolled out to all applications currently under that policy.
To create a new predefined policy
Click the icon, type a name for the policy then follow the same configuration procedure as outlined for creating a custom, application specific policy. Click here to view the procedure. Once created, the policy is available for deployment onto specific application or file groups via the Computer Security Policy section of Defense+.
Comodo Endpoint Security Manager | © 2010 Comodo Security Solutions Inc. | All Rights Reserved.