Search Results

Showing 201-210 from 239

Introduction To Comodo Secure Email Gateway (in Xcitium Secure Email Gateway Enterprise)

...website then organizations may find their network compromised or infected. Comodo Secure Email Gateway (CSEG) is an antispam and threat prevention appliance that uses advanced filtering technologies, antivirus scanners and content analysis engines to quietly and effectively prevent unsolicited mail from entering your network. Key Features LDAP control Realtime blocking lists Fast integration of MX records Reverse DNS White / grey...

http://help.comodo.com/topic-443-1-898-11360-Introduction-to-Comodo-Secure-Email-Gateway.html
Appendix 1 - XCS How To... Tutorials (in Xcitium Enterprise)

...websites  Restore incorrectly quarantined item(s) - Restore files and executables that had been moved to quarantine by mistake Submit quarantined items to Xcitium Cloud Verdict for analysis - Send suspicious files/executables to Xcitium for analysis Enable file sharing applications like BitTorrent and Emule - Configure firewall for file sharing through popular software Block any downloads of a specific file type - Configure...

http://help.comodo.com/topic-463-1-1033-15829-Appendix-1---XCS-How-to...-Tutorials.html
Introduction To KoruMail Secure Email Gateway (in Comodo KoruMail)

...website then organizations may find their network compromised or infected. Comodo's KoruMail Secure Email Gateway is an antispam and threat prevention system that uses advanced filtering technologies, antivirus scanners and content analysis engines to quietly and effectively prevent unsolicited mail from entering your network. Key Features LDAP control Realtime blocking lists Fast integration of MX records Reverse DNS White...

http://help.comodo.com/topic-290-1-632-8025-Introduction-to-KoruMail-Secure-Email-Gateway.html
WAF Events (in Xcitium SIEM)

...website IP - The address of the source of the access request Country - The country from which the access request came Date - The date and time of the access request Choose action - Specify how to deal with future traffic from the same IP address. Allow - All traffic from the IP is permitted. This includes legitimate traffic, bots, malicious traffic etc. Block...

http://help.comodo.com/topic-285-1-848-11015-WAF-Events.html
WAF Events (in SOCaaP)

...website IP - The address of the source of the access request Country - The country from which the access request came Date - The date and time of the access request Choose action - Specify how to deal with future traffic from the same IP address. Allow - All traffic from the IP is permitted. This includes legitimate traffic, bots, malicious traffic etc. Block...

http://help.comodo.com/topic-466-1-1040-1150031-WAF-Events.html
Real Time Scanning (in Comodo Internet Security)

...Block Threats’ )     Note : Comodo Antivirus will handle the threats/infections based on the option selected from the drop-down, if the user selects 'No, I will try to clean myself' in the alert screen that is displayed whenever a threat/infection is discovered by real-time/on access scanning. Automatically update virus database - When this check box is selected, Comodo Internet Security checks for latest virus database updates from Comodo website...

http://help.comodo.com/topic-72-1-284-3011-Real-Time-Scanning.html
The Main Interface (in Comodo Cloud Antivirus)

...blocked the file before any other AV product in the industry viewed it as malicious. See ' Lucky You Statistics ' for more details. Send Feedback   - Allows you to provide comments to Comodo on the product. You can submit feedback over email or by leaving a comment on the Comodo forums. Mobile   - Download Comodo Mobile Security apps for Android phones and tablets. Click 'Mobile' to get Android apps such as 'Comodo Mobile Security', 'Comodo Anti-Theft', 'Comodo Back Up' and 'Comodo App Lock'. You can also get apps from our website...

http://help.comodo.com/topic-394-1-767-9218-The-Main-Interface.html
Select A Device For Session Profile (in Comodo Web Inspector)

... Select a Device for Session Profile   The storage device chosen previously for storing the configuration settings and the session profiles can be changed/configured by choosing this menu. Selecting this menu again starts building a list of available block devices for storing the configuration. Select and configure a storage device to use as a permanent storage for Live CD runtime...

http://help.comodo.com/topic-208-1-490-5167-Select-a-Device-for-Session-Profile.html
Understand Security Alerts (in Comodo Internet Security)

...block it. Alerts also let you specify how CIS should behave in future when it encounters activities of the same type. Some alerts also allow you to reverse the changes made to your computer by the applications that raised the security related event. Alert Types Comodo Internet Security alerts come in six main varieties. Click the name of the alert (at the start of the following bullets) if you want more help with a particular alert type. Antivirus Alerts - Shown whenever virus or virus-like activity is detected. AV alerts will be displayed only when Antivirus is enabled...

http://help.comodo.com/topic-72-1-766-9044-Understand-Security-Alerts.html
Appendix 3 - Glossary Of Terms (in Comodo Internet Security)

...Blocked' and 'Fully Virtualized'.   Conceptually, the auto-sandbox is designed to securely handle 'unknown' executables – those which are not present on Comodo's black-list (definitely malicious) or white-list (definitely safe). If the unknown file turns out to be malicious then it cannot cause any harm because the sand-boxing process denied it access to critical system resources. On the other hand, programs that are unknown but perfectly harmless will run just as well in the sandbox. This allows safe applications the freedom to run as intended while denying malicious applications the ability to cause damage...

http://help.comodo.com/topic-72-1-451-5862-Appendix-3---Glossary-of-Terms.html
Pages 21 of 24 « Prev     Next »   Jump to page