Search Results

Showing 221-230 from 241

Step 7 - Create Configuration Profiles (in Xcitium Enterprise)

...website onto the home-screen of target devices. This section allows you to choose an icon, label and target URL for the web-clip. Wi-Fi - Specify the name (SSID), security configuration type and password (if required) of your wireless network to which the devices are to be connected. App Lock - Configure restrictions on usage of device resources for selected applications. See Profiles for iOS Devices in the main guide for more details on this area. In brief, iOS device profiles are more detailed than Android profiles. Create a Mac OS Profile Click 'ITSM' > 'Profile Management' > 'Profiles' Click...

http://help.comodo.com/topic-463-1-1030-15807-Step-7---Create-Configuration-Profiles.html
The Admin Console (in Comodo One MSP)

...website filtering and traffic monitoring. The application is provisioned in OVA or ISO format. These formats can be installed on bare-metal appliances and virtual servers such as Virtualbox and Vmware. This module is optional (available for Enterprises and MSP) and can be added after creating a Comodo One account. See ' Add Comodo Dome Firewall Virtual Appliance ' for more details. Comodo Data Loss Protection - Allows companies to prevent data leaks by implementing strict controls on confidential data in motion and at rest. This module is optional and is only available for enterprise customers. See ' Add Data Loss Prevention ' for more...

http://help.comodo.com/topic-289-1-716-8481-The-Admin-Console.html
Unknown Threat Statistics (in Comodo Secure Web Gateway)

...Website from which the file originated. Source IP IP address of the domain from which the file originated. # of Endpoints Number of endpoints on which the file was contained. Status Shows whether the file was contained, or contained + uploaded to Valkyrie for analysis. Valkyrie is Comodo's file analysis system. It runs a barrage of tests on unknown files to discover their behavior and assign them a trust rating. The 'Search' button allows you to find specific files by numerous criteria: Click a file row to view its details: MIME Type – File type SHA 1 – Hash value of the file...

http://help.comodo.com/topic-436-1-842-10856-Unknown-Threat-Statistics.html
Content Filtering Level Descriptions (in Web Protection)

...websites with the intent of circumventing filters.    Compromised  Web pages that have been compromised by someone other than the site owner, which appears to be legitimate, but houses malicious code.    Criminal Skills/Hacking  Activities that violate human rights including murder, sabotage, and bomb-building. Information about illegal manipulation of electronic devices, encryption, misuse, and fraud. Warez and other illegal software distribution.    Hate Speech  Web pages that promote extreme right/left-wing groups, sexism, racism, religious hate and other discrimination.    Phishing/Fraud  Manipulated web pages and emails used for fraudulent purposes, also known...

http://help.comodo.com/topic-1400010-1-1400013-1400509-Content-Filtering-Level-Descriptions.html
Manage Firewall Policy Rules (in Comodo Dome Firewall)

...block the traffic intercepted by the rule. Address Settings Incoming Interface - Choose the interface device through which the traffic is received, from the drop-down. Source Address - Choose the firewall object or the object group that covers the IP address, IP address range or the subnet, on which the traffic to be intercepted by the rule, is received. If a firewall object covering the IP address/IP Address range or the subnet to be specified has not been created under the Firewall Objects interface previously, you an create a new object from this interface too. To create a new firewall object...

http://help.comodo.com/topic-451-1-936-12833-Manage-Firewall-Policy-Rules.html
Content Filtering Level Descriptions (in Web Protection)

...websites with the intent of circumventing filters.    Compromised  Web pages that have been compromised by someone other than the site owner, which appears to be legitimate, but houses malicious code.    Criminal Skills/Hacking  Activities that violate human rights including murder, sabotage, and bomb-building. Information about illegal manipulation of electronic devices, encryption, misuse, and fraud. Warez and other illegal software distribution.    Hate Speech  Web pages that promote extreme right/left-wing groups, sexism, racism, religious hate and other discrimination.    Phishing/Fraud  Manipulated web pages and emails used for fraudulent purposes, also known...

http://help.comodo.com/topic-1400010-1-1400014-1400530-Content-Filtering-Level-Descriptions.html
Add Xcitium Secure Email Gateway Enterprise (in Xcitium Platform)

...block unwanted and harmful mail from entering your network. Xcitium Secure Email Gateway Enterprise is available only to Xcitium (CD) Enterprise customers. There are two ways to add Secure Email Gateway Enterprise to your account:  Add-on for 'Xcitium Secure Web Gateway' – The email gateway is available as an add-on, at discounted prices, for customers who already have a Secure Web Gateway (SWG) license. If you own an SWG license then the add-on will be selected when you subscribe for Secure Email Gateway Enterprise. Stand-alone version - The stand-alone version can be added to your account...

http://help.comodo.com/topic-457-1-981-14352-Add-Xcitium-Secure-Email-Gateway-Enterprise.html
Add Comodo Secure Email Gateway Enterprise (in Comodo One MSP)

...block unwanted and harmful mail from entering your network. Comodo Secure Email Gateway Enterprise is available only to C1 Enterprise customers. There are two ways to add Secure Email Gateway Enterprise to your account: Add-on for 'Comodo Secure Web Gateway' – The email gateway is available as an add-on, at discounted prices, for customers who already have a Secure Web Gateway (SWG) license. If you own an SWG license then the add-on will be selected when you subscribe for Secure Email Gateway Enterprise. Stand-alone version - The stand-alone version can be added to your account...

http://help.comodo.com/topic-289-1-716-11357-Add-Comodo-Secure-Email-Gateway-Enterprise.html
The Admin Console (in Xcitium Platform)

...websites for their customers. See the dedicated online help guide ‘ Secure Internet Gateway ’ for more details. The 'Gold' version of Secure Internet Gateway is free for all customers You can upgrade to 'Platinum' version at anytime. The platinum version has more security features than the Gold version. See Upgrade Secure Internet Gateway for more details on features covered by different license types and guidance on adding platinum license to your account. Technology Assessment Platform (TAP) - A utility that helps MSPs audit their client’s network and create plans to address their needs. See ‘ Technology Assessment Platform ’ for more details. Service...

http://help.comodo.com/topic-457-1-981-14317-The-Admin-Console.html
CIS Complete - Installation And Activation (in Comodo Internet Security)

...website. See Comodo Secure Shopping for more details. Internet Security Essentials – Installs Internet Security Essentials, an application that protects you from the man-in-the-middle attacks while using the internet for services such as online banking and so on. See Comodo Internet Security Essentials for more details. Click 'Close' when you are satisfied with your settings. Click 'Accept and Install' in the 'Welcome' screen to begin installation. Step 2 – Installation Progress The selected components will be installed:   Step 3 - Finalization The last step is to set some CIS options:     Change my DNS provider to COMODO Secure...

http://help.comodo.com/topic-72-1-772-9446-CIS-Complete---Installation-and-Activation.html
Pages 23 of 25 « Prev     Next »   Jump to page