Showing 1051-1060 from 1464
... Manage Permissions and Users Assigned to a Role Click 'Users'> 'Role Management' on the left. Click the 'Roles' tab. Click a role name to view its details. The role management area lets you: Edit the name and description of the role Add or remove permissions assigned to a role View the users assigned with the role...
http://help.comodo.com/topic-399-1-786-10160-Manage-Permissions-and-Users-Assigned-to-a-Role.html... Downloading and Installing the NxSIEM Agent on Endpoints There are two methods administrators can use to collect logs from endpoints connected to customer networks: Collection Agent – A Log Collection Agent installed on Windows and Linux endpoints forwards the logs to the NxSIEM server Agent less Collection – On target endpoints, administrators use our pre-defined scripts to configure RSYSLOG or NXLOG...
http://help.comodo.com/topic-325-1-675-8368-Downloading-and-Installing-the-NxSIEM-Agent-on-Endpoints.html...COMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location. After customizing your installation, click the 'Back' button to return to the installation configuration screen. Once you are satisfied with your settings, click 'Agree and Install' to begin installation ( Click to go back to Step 2 ). Step 3 - Installation Progress The installation progress will be displayed... ...and on completion, the successfully completed dialog will be displayed. Click the 'Close' button. Step 4 - Restarting Your System In order for the installation to take effect, your computer...
http://help.comodo.com/topic-72-1-522-6228-CIS-Premium-–-Installation.html...Comodo Internet Security . The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location. After customizing your installation, click the 'Back' button to return to the installation configuration screen. Click the 'Agree and Install' button to proceed with the installation. Step 3 - Installation progress ( Click to go back to Step 2 ) The installation progress will be displayed... ...and on completion, the restart dialog will be displayed. Step 4 - Restarting Your System In order...
http://help.comodo.com/topic-72-1-522-6230-CIS-Complete---Installation-and-Activation.html...Comodo Internet Security . The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location. After customizing your installation, click the 'Back' button to return to the installation configuration screen. Click the 'Agree and Install' button to proceed with the installation. Step 3 - Installation Progress ( Click to go back to Step 2 ) The installation progress will be displayed... ...and on completion, the restart dialog will be displayed. Step 4 - Restarting Your System In order for the installation to take...
http://help.comodo.com/topic-72-1-522-6229-CIS-Pro---Installation-and-Activation.html...Comodo Internet Security. The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location. After customizing your installation, click the 'Back' button to return to the installation configuration screen. Click the 'Agree and Install' button to proceed with the installation. STEP 3 - Installation Progress ( Click to go back to step 2 ) The installation progress will be displayed... ...and on completion, the restart dialog will be displayed. STEP 4 - Restarting Your System In order for the installation to take...
http://help.comodo.com/topic-72-1-284-3004-CIS-Premium-Installation.html... Sender Blacklist CSEG automatically blocks all emails from blacklisted senders. Blocked messages are not quarantined and most mail servers will send a bounce message to the sender. The sender blacklist interface allows admins to: Add users to sender blacklist Export the list to CSV file for use in future Remove users from sender blacklist Reset the list - Delete all...
http://help.comodo.com/topic-445-1-914-12221-Sender-Blacklist.html...COMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location. After customizing your installation, click the 'Back' button to return to the installation configuration screen. Once you are satisfied with your settings, click 'Agree and Install' to begin installation . Step 3 - Installation Progress ( Click to go back to Step 2 ) The installation progress will be displayed... ...and on completion, the successfully completed dialog will be displayed. Click the 'Close' button. Step 4 - Restarting Your System In order...
http://help.comodo.com/topic-72-1-451-4689-CIS-Premium-–-Installation.html...Comodo Internet Security . The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location. After customizing your installation, click the 'Back' button to return to the installation configuration screen. Click the 'Agree and Install' button to proceed with the installation. Step 3 - Installation progress ( Click to go back to Step 2 ) The installation progress will be displayed... ...and on completion, the restart dialog will be displayed. Step 4 - Restarting Your System In order...
http://help.comodo.com/topic-72-1-451-4691-CIS-Complete---Installation-and-Activation.html...Comodo by telling us if the address is one, or both, of the following: Non-human – A mailing list, or other non-personal email address. For example, info@yourdomain.com or sales@yourdomain.com. Public email – A contact address that you make freely available for people to contact you. You might put this address on your website, twitter feed or Facebook page. You can choose whether containment feature should be enabled / disabled for the user. This setting overrides the containment settings configured for the domain. Enable - Attachments that have an unknown trust rating are run in a secure container when the user opens them...
http://help.comodo.com/topic-445-1-914-12225-User-Account-Management.html