Search Results

Showing 171-177 from 177

Appendix 1a - Endpoint Manager Services - IP Nos, Host Names And Port Details - EU Customers (in Endpoint Manager)

...keys and SHA 256 algorithms. The tables on this page show firewall requirements for the following Comodo services: Communication Client (CC) Xcitium Client - Security (XCS) Endpoint Detection and Response (EDR) Endpoint Manager Server (on premise installations)  Remote Control sessions Remote Control Direct connection Remote Control Peer to Peer connection Remote Control Relay connection   Diagnostic Tools All settings grouped by port   Communication Client (CC) Communication Client (CC) Service Purpose Hostname IP Port Criticality and notes CC Communication between device and EM server subdomain.cmdm. comodo.com Dynamic (Amazon load balancing) 443 Mandatory Enrollment To get client certificates mdmsupport.comodo.com...

http://help.comodo.com/topic-399-1-786-11019-Appendix-1a---Endpoint-Manager-Services---IP-Nos,-Host-Names-and-Port-Details---EU-Customers.html
Website Overview (in Xcitium SIEM)

...key information from cWatch scans. This includes malware scan results, vulnerability scan results, and site reputation checks. Malware Scan :    The result of the most recent manual or scheduled scan on the website and site files.   Click a stripe to see full malware details and read threat remediation advice. If no threats are found, the following message is shown on the tile: You need to upload the cWatch agent to your site to enable scans on website files. An alert message is shown if not enabled:   Click the stripe to enable the scanner. Vulnerability Scan OWASP Vulnerabilities...

http://help.comodo.com/topic-285-1-848-11010-Website-Overview.html
Configuring Nxlog And Rsyslog Servers To Send Logs To NxSIEM Server (in Xcitium NxSIEM)

... Configuring Nxlog and Rsyslog Servers to Send Logs to NxSIEM Server Comodo NxSIEM features agent-less log collection from Windows/Linux endpoints connected to customers' networks, through the use of Nxlog and Rsyslog utilities. This is useful for customers who do not wish to install agents on their endpoints. The NXLOG utility (Windows endpoints) and the RSYSLOG utility (Linux endpoints) need...

http://help.comodo.com/topic-325-1-675-8902-Configuring-Nxlog-and-Rsyslog-Servers-to-Send-Logs-to-NxSIEM-Server.html
Configure Nxlog And Rsyslog To Send Logs To CWatch Network Server (in Xcitium SIEM)

... Configure Nxlog and Rsyslog to Send Logs to cWatch Network Server   CWatch features agent-less log collection from Windows/Linux endpoints connected to customers' networks. This is achieved through the Nxlog and Rsyslog utilities. The NXLOG utility (for Windows) and the RSYSLOG utility (for Linux) need to be configured to send logs to the cWatch Network server. Comodo cWatch Network...

http://help.comodo.com/topic-285-1-833-10546-Configure-Nxlog-and-Rsyslog-to-Send-Logs-to-cWatch-Network-Server.html
Introduction To KoruMail Secure Email Gateway (in Comodo KoruMail)

...Key Features LDAP control Realtime blocking lists Fast integration of MX records Reverse DNS White / grey / black list configuration IP scoring via Korumail reputation network Office 365 integration Active Directory Integration Extensive reports Webmail for end-users Containerization of untrusted attachments Guide Structure This guide is intended to take the user through the installation, configuration and use of Comodo KoruMail. Introduction to KoruMail Secure Email Gateway Korumail Deployment Process Access the System Access via CLI Console   Access via Web Console The Main Interface   The Dashboard   System Usage Graphics About Software Change your Password   User Management...

http://help.comodo.com/topic-290-1-632-8025-Introduction-to-KoruMail-Secure-Email-Gateway.html
Kill Chain Report (in Xcitium Verdict Cloud)

...license holders and Xcitium users who have a 30-day trial can request new Kill Chain reports. To view 'Kill Chain' report Click the hamburger button top-left Click 'Recent Analysis Requests' Click the 'Send to Kill Chain Report' icon  to generate a Kill Chain report for the selected file. It will take up to 30 minutes to generate the report. Once the report is ready, click the 'Kill Chain Report' icon  to download it. You can view files that belong to your Xcitium account by choosing your login name from the 'Recent Analysis Requests'. Summary The summary...

http://help.comodo.com/topic-397-1-773-11310-Kill-Chain-Report.html
CIS Installation (in Comodo Internet Security)

...Key points: All CIS critical security features will continue to work on Windows 7, including auto-containment, antivirus, and firewall. We will also continue to fix critical and blocker issues for CIS on Windows 7. However, future CIS releases may contain features that are not included/do not work on Windows 7. We understand that many customers still use Windows 7, and hope that this information helps you make an informed decision about transitioning those machines to Windows 10 / 8.1 / 8. Click the links below for detailed explanations: CIS Premium - Installation CIS Pro - Installation CIS Complete - Installation Activate CIS Pro/Complete Services...

http://help.comodo.com/topic-72-1-772-9552-CIS-Installation.html
Pages 18 of 18 « Prev       Jump to page