Search Results

Showing 211-220 from 239

Appendix 2 - Glossary Of Common Terms (in Comodo Antivirus for Servers)

...website in question. Back to the top Dynamic IP The procedure of allocating temporary IP addresses as they are needed. Dynamic IP's are often, though not exclusively, used for dial-up modems. Back to the top E Encryption Encryption is a technique that is used to make data unreadable and make it secure. Usually this is done by using secret keys and the encrypted data can be read only by using another set of secret keys. There are two types of encryption – symmetric encryption and asymmetric encryption. Symmetric encryption is applying a secret key to a text to encrypt...

http://help.comodo.com/topic-213-1-517-6066-Appendix-2---Glossary-of-Common-Terms.html
The Home Screen (in Comodo Internet Security)

...blocked by firewall since the start of the current session. Refer to the section 'Firewall Logs ' for more details.   Adding tasks to the Task Bar The task bar contains a set of shortcuts which will launch common tasks with a single click. You can add any task you wish to this toolbar. Click the handles < > on the left and right sides of the task bar to scroll through all tasks. To add a task to the Task Bar, first open the tasks interface by clicking the curved arrow at the top right: Expand...

http://help.comodo.com/topic-72-1-623-7680-The-Home-Screen.html
The Home Screen (in Comodo Internet Security)

...blocked by firewall since the start of the current session. Refer to the section ' Firewall Logs ' for more details.   Adding tasks to the Task Bar The task bar contains a set of shortcuts which will launch common tasks with a single click. You can add any task you wish to this toolbar. Click the handles < > on the left and right sides of the task bar to scroll through all tasks. To add a task to the Task Bar, first open the tasks interface by clicking the curved arrow at the top right: Expand...

http://help.comodo.com/topic-72-1-522-6239-The-Home-Screen.html
The Home Screen (in Comodo Internet Security)

...website filtering. The bottom of the panel shows the number of unrecognized files and contained applications. Auto-Containment - If enabled, any files with an 'Unknown' trust rating will be automatically run in the container to prevent them from accessing other processes or your personal data. Unknown files are those that are neither 'known-malicious' nor 'known-safe'. Such files are run in the container until their true trust status can be established. Click on the security level itself to change it. Click 'Auto-Containment' to open the 'Auto-Containment Settings' interface. See ' Auto-Containment Rules ' for more details. HIPS - Click...

http://help.comodo.com/topic-72-1-766-9110-The-Home-Screen.html
Miscellaneous Settings (in Advanced Endpoint Protection)

...website run by a hacker. CCS can detect and remove fake root certificates from the endpoint during on-demand and scheduled scans. Disable 'Do not automatically cleanup suspicious certificates' to activate this feature. Define actions to be taken on unrecognized auto-start entries/scheduled tasks Apply the selected action to unrecognized autorun entries related to new / modified registry items  - Specify what CCS should do if applications added to  Scrip Analysis  >  Autoruns Scans  try to create or modify one of the following registry items: Windows services Auto-start entries Scheduled tasks The available options are: Ignore...

http://help.comodo.com/topic-467-1-1050-16698-Miscellaneous-Settings.html
Appendix 1 CIS How To... Tutorials (in Comodo Internet Security)

...block Internet connection Setup HIPS for maximum security and usability - A brief outline of how to set Host intrusion Protection for the optimum balance between security and usability Setup Behavior Blocker for maximum security and usability - A brief outline of how to set Behavior Blocker for the maximum security against untrusted applications Password protect your CIS settings - Explains how to protect your CIS settings Reset a Forgotten Password (Advanced) - Explains how to create a new password for CIS Run an instant Antivirus scan on selected items - Guidance on initiating a manual scan on selected folders/files to check for viruses...

http://help.comodo.com/topic-72-1-451-4797-Appendix-1-CIS-How-to...-Tutorials.html
Add Your Domain(s) (in Email Protection)

...website, or your Office 365 domain name. Port: 25 is the default SMTP port. All mail servers use port 25 unless configured otherwise. Note: To ensure your server can receive mail from Email Protection, check that your firewall is open to receive SMTP traffic on Port 25 from your Email Protection server. MX Lookup: Allows you to use the MX records of a different domain to identify the destination server. This option is not used by most customers (default: disabled). RBL Checks: The RBL (Realtime Blackhole List) test checks the IP address of all mail servers sending mail to your...

http://help.comodo.com/topic-1400009-1-1400011-1400476-Add-Your-Domain(s).html
Step 7 - Create Configuration Profiles (in Xcitium Enterprise)

...website onto the home-screen of target devices. This section allows you to choose an icon, label and target URL for the web-clip. Wi-Fi - Specify the name (SSID), security configuration type and password (if required) of your wireless network to which the devices are to be connected. App Lock - Configure restrictions on usage of device resources for selected applications. See Profiles for iOS Devices in the main guide for more details on this area. In brief, iOS device profiles are more detailed than Android profiles. Create a Mac OS Profile Click 'ITSM' > 'Profile Management' > 'Profiles' Click...

http://help.comodo.com/topic-463-1-1030-15807-Step-7---Create-Configuration-Profiles.html
Introduction To Xcitium Secure Internet Gateway (in Xcitium Secure Internet Gateway)

...websites. Fast import of networks and roaming devices. Local resolvers can encrypt and forward DNS queries from endpoints to Secure Internet Gateway DNS servers. Advanced reporting grants full visibility of events on your Secure Internet Gateway perimeter. Easy to setup. Just set your DNS servers to Secure Internet Gateway. Guide Structure This guide takes you through the configuration and use of Secure Internet Gateway and is broken down into the following main sections: Introduction Purchase a License Login to Secure Internet Gateway Setup Options Explained Tutorial To Add Networks to Secure Internet Gateway Tutorial To Add Roaming Endpoints to Secure...

http://help.comodo.com/topic-434-1-840-10755-Introduction-to-Xcitium-Secure-Internet-Gateway.html
Configuring The Agent (in Comodo Web Inspector)

... Configuring the Agent  To start the configuration, boot the device through the Live CD or the Live USB. Step 1 The agent starts building a list of block devices for storing the configuration files. The agent detects hard disks, USB memory drives and/or other available block devices containing with live file system (like FAT 12, FAT16, FAT 32, VFAT...

http://help.comodo.com/topic-208-1-490-5163-Configuring-the-Agent.html
Pages 22 of 24 « Prev     Next »   Jump to page