Showing 1031-1040 from 1464
...Comodo Dragon inherit the role they have in the portal. You can change this role in the Service Desk interface at any time. See Staff Roles if you want to read more about adding and managing roles. Select a role for the staff member from the drop-down: Department - The internal department to which the staff member belongs. New staff are auto-assigned to the Service Desk ‘Default’ department. You can view and change the default department at ‘Admin Panel’ > Settings’ > ‘System’. See Service Desk System Settings for more guidance on setting default department. Service Desk ships with...
http://help.comodo.com/topic-457-1-990-14518-Staff-Members.html...save the file. Run the script file on all required endpoints. The script will configure the RSYSLOG utility to send logs to cWatch Network. cWatch will receive and store the logs under the respective customer/network for monitoring and incident reporting. Alternatively, you can download the script file for configuring the RSYSLOG utility from 'Administration' > 'Event Collection' interface, manually enter the parameters for the customer network to be monitored and run the script at the endpoints. See Event Collection for more details. In addition to event log collection, cWatch Network is capable of collecting log information from Comodo...
http://help.comodo.com/topic-285-1-833-10546-Configure-Nxlog-and-Rsyslog-to-Send-Logs-to-cWatch-Network-Server.html... Data Loss Prevention Event Logs Click 'Logs' in the CCS menu bar Select 'Data Loss Prevention Events’ in the drop-down at top-left The logs show items flagged by data loss prevention scans and monitoring events: Date & Time - When the event occurred. Target - The item affected by the rule. DLP Monitoring event – Shows the type...
http://help.comodo.com/topic-467-1-1050-16733-Data-Loss-Prevention-Event-Logs.html... Data Loss Prevention Event Logs Click 'Logs' in the CCS menu bar Select 'Data Loss Prevention Events’ in the drop-down at top-left The logs show items flagged by data loss prevention scans and monitoring events: Date & Time - When the event occurred. Target - The item affected by the rule. DLP Monitoring event – Shows the type of external storage...
http://help.comodo.com/topic-399-1-904-11856-Data-Loss-Prevention-Event-Logs.html... Configure Event Queries The event query area lets you search for specific events using built-in queries or custom queries. You create your own conditions for each search. For example, for events during a specific period in specific customer networks. The results table shows all events which match the query conditions. The table also lets you run a...
http://help.comodo.com/topic-285-1-833-10560-Configure-Event-Queries.html...Save for your settings to take effect Connection Status and Control The 'Connection Status and Control' area displays a list of IPsec tunnels that have been added, their connection status and controls for enabling, disabling and editing them. IPsec Connection Status and Control table - Column Descriptions Column Description Name The name for identifying the connection. Type Indicates the type of the tunnel and the authentication type used. The IPsec service supports two types of authentication: Pre-Shared key (PSK) – Requires username/password to be entered at the client device Certificate – Requires the client certificate to be installed on the client...
http://help.comodo.com/topic-451-1-940-12923-IPSec-Configuration.html...Comodo Endpoint Security Manager (CESM) so that the endpoint (computer) can be remotely managed. CESM allows businesses to centrally manage CIS protected computers and provides a single interface for installation, updates and virus response across an entire network. It has an easy to use dashboard that provide fingertip access to common tasks and a wealth of statistics and reports that deliver a comprehensive snapshot of a network’s security levels. Using CESM to manage nodes protected with CIS will help administrators to greatly improve overall security, simplify administration, increase awareness levels, reduce virus response times and could save...
http://help.comodo.com/topic-72-1-284-3149-Manage-This-Endpoint.html...Comodo Secure Web Gateway ' if you need help with this. End user authentication and traffic forwarding - The method used for traffic forwarding and user authentication. Available options are 'Proxy Chain' and 'ICAP'. Select the appropriate method for your network. If you don't enable either then SWG agent authentication and traffic forwarding will be used. Note - If you enable user authentication then you must add and configure users in the 'User Management' interface. If you don't enable user authentication, then you cannot deploy user-based policies. Instead, network based rules or default rules will be applied...
http://help.comodo.com/topic-436-1-842-10933-Manage-Trusted-Networks.html...Comodo Dome Cloud Firewall allows administrators to create backups of DCF state including the configuration settings, logs and database dumps at various time points. You can restore to a backup if you want to roll-back the DCF state to a previous state. You can also restore the appliance to the factory default settings should this be required. Backups can be manually created at any time or scheduled for creation at set intervals. The backups can be encrypted, stored locally, on a USB stick or can be emailed for storage in a remote location. To open the 'Backup' interface, click...
http://help.comodo.com/topic-451-1-940-12905-Create-and-Schedule-Backup-of-DCF-State.html... Network Configuration A firewall device should have network adapter ports to connect to different network zones. By default, port 1 on the FW device is automatically configured for LAN with IP 192.168.0.15. The number of ports shown in the configuration screen depends on the number of adapters on the FW device. These ports will be shown as Port 2, Port...
http://help.comodo.com/topic-451-1-939-12874-Network-Configuration.html