Search Results

Showing 181-190 from 239

What Is Comodo Internet Security Essentials (in Comodo Internet Security Essentials)

...using a trusted SSL certificate. CISE blocks man-in-the-middle attacks attempts by verifying certificates against Comodo's trusted root certificate list. This functionality is especially important if you are accessing sensitive websites while on a public Wi-Fi such as those found in an cafe, park or airport. Please note, Internet Explorer is currently the only supported browser. ...

http://help.comodo.com/topic-435-1-841-12397-What-is-Comodo-Internet-Security-Essentials.html
Introduction To Comodo CWatch Office (in Xcitium SIEM)

...websites.   You can can apply a default protection policy to all devices or set specific policies for individual devices. cWatch's powerful dashboard provides an over-arching summary of blocked threats and the browsing history of devices in your network. Features Default security policies provide blanket protection from online threats for local, roaming and mobile devices Simple interface make...

http://help.comodo.com/topic-285-1-918-12317-Introduction-to-Comodo-cWatch-Office.html
Protected Content (in Comodo Dragon Web Browser)

... Protected Content   Some downloaded or streaming videos require authorization in order to preserve copyright restrictions (for example, Netflix). The 'Protected Content' area allows you to configure settings which allow these services to identify you. Click the menu button at the top-right Select 'Settings' > Scroll down to 'Advanced' OR Click the hamburger icon at top-left Click 'Advanced...

http://help.comodo.com/topic-120-1-279-7183-Protected-Content.html
Block Insecure Content (in Comodo Dragon Web Browser)

...Block Insecure Content You will see this message if the page you are visiting is served over a HTTPS connection, but the page is serving some content from a non-secure, HTTP, source. If a website is secured using HTTPS then all javascript, plugins and CSS stylesheets used by the page must also be securely delivered. If these other items...

http://help.comodo.com/topic-120-1-279-3567-Block-Insecure-Content.html
Relay Restrictions (in Comodo Antispam Gateway)

...website and auto-populate the Organization name field. Choose the acceptance policy for emails from the organization's mail server: Accept - All mails from the selected organizations will be accepted. Those from other organizations will be blocked. Reject - All mails from the selected organizations will be blocked. Those from other organizations will be accepted. Click 'Save' for the rule...

http://help.comodo.com/topic-157-1-288-7954-Relay-Restrictions.html
Relay Restrictions (in Xcitium Secure Email Gateway MSP)

...website and auto-populate the Organization name field. Choose the acceptance policy for emails from the organization's mail server: Accept - All mails from the selected organizations will be accepted. Those from other organizations will be blocked. Reject - All mails from the selected organizations will be blocked. Those from other organizations will be accepted. Click 'Save' for the rule to take...

http://help.comodo.com/topic-445-1-914-12200-Relay-Restrictions.html
Comodo Secure Shopping (in Comodo Internet Security)

...website will be opened in a security hardened, virtual environment. When inside this environment, your browser cannot be accessed or potentially attacked by other processes running on your computer. Your session will be protected by all Secure Shopping technologies (full process isolation, key-logger protection, remote connection warnings, screenshot blocking and SSL certificate checking). See Use Comodo Secure Shopping Environment...

http://help.comodo.com/topic-72-1-766-9213-Comodo-Secure-Shopping.html
Appendix 1 - CAVS How To... Tutorials (in Comodo Antivirus for Servers)

...websites. Restoring Incorrectly Quarantined Item(s) - Help to restore files and executables that were moved to quarantine by mistake Submitting Quarantined Items to Comodo for Analysi s - Advice on how to send suspicious files/executables to Comodo for analysis Blocking any Downloads of a Specific File Type - Explains how to configure Defense+ to block downloads of files of a specific type...

http://help.comodo.com/topic-213-1-517-6054-Appendix-1---CAVS-How-to...-Tutorials.html
Special Features (in Xcitium Enterprise)

... Special Features Auto-Containment Automatically runs unknown files inside a secure container which is isolated from the rest of your computer Contained programs cannot cause damage because they are denied access to the operating system, to the registry, and to user data This nullifies malware and ransomware by totally removing their ability to interact with the host computer Simultaneously, the...

http://help.comodo.com/topic-463-1-1033-15832-Special-Features.html
Firewall Settings (in Endpoint Manager)

...website filtering rules which let you determine which sites certain users can or cannot access. Background note on rules: Both application rules and global rules are consulted when the firewall is determining whether or not to allow or block a connection attempt. For Outgoing connection attempts, the application rules are consulted first then the global rules. For Incoming connection attempts...

http://help.comodo.com/topic-399-1-790-10358-Firewall-Settings.html
Pages 19 of 24 « Prev     Next »   Jump to page