Showing 221-230 from 239
...block the traffic intercepted by the rule. Address Settings Incoming Interface - Choose the interface device through which the traffic is received, from the drop-down. Source Address - Choose the firewall object or the object group that covers the IP address, IP address range or the subnet, on which the traffic to be intercepted by the rule, is received. If a firewall object covering the IP address/IP Address range or the subnet to be specified has not been created under the Firewall Objects interface previously, you an create a new object from this interface too. To create a new firewall object...
http://help.comodo.com/topic-451-1-936-12833-Manage-Firewall-Policy-Rules.html...Website from which the file originated. Source IP IP address of the domain from which the file originated. # of Endpoints Number of endpoints on which the file was contained. Status Shows whether the file was contained, or contained + uploaded to Valkyrie for analysis. Valkyrie is Comodo's file analysis system. It runs a barrage of tests on unknown files to discover their behavior and assign them a trust rating. The 'Search' button allows you to find specific files by numerous criteria: Click a file row to view its details: MIME Type – File type SHA 1 – Hash value of the file...
http://help.comodo.com/topic-436-1-842-10856-Unknown-Threat-Statistics.html...website filtering and traffic monitoring. The application is provisioned in OVA or ISO format. These formats can be installed on bare-metal appliances and virtual servers such as Virtualbox and Vmware. This module is optional (available for Enterprises and MSP) and can be added after creating a Comodo One account. See ' Add Comodo Dome Firewall Virtual Appliance ' for more details. Comodo Data Loss Protection - Allows companies to prevent data leaks by implementing strict controls on confidential data in motion and at rest. This module is optional and is only available for enterprise customers. See ' Add Data Loss Prevention ' for more...
http://help.comodo.com/topic-289-1-716-8481-The-Admin-Console.html...websites with the intent of circumventing filters. Compromised Web pages that have been compromised by someone other than the site owner, which appears to be legitimate, but houses malicious code. Criminal Skills/Hacking Activities that violate human rights including murder, sabotage, and bomb-building. Information about illegal manipulation of electronic devices, encryption, misuse, and fraud. Warez and other illegal software distribution. Hate Speech Web pages that promote extreme right/left-wing groups, sexism, racism, religious hate and other discrimination. Phishing/Fraud Manipulated web pages and emails used for fraudulent purposes, also known...
http://help.comodo.com/topic-1400010-1-1400014-1400530-Content-Filtering-Level-Descriptions.html...websites with the intent of circumventing filters. Compromised Web pages that have been compromised by someone other than the site owner, which appears to be legitimate, but houses malicious code. Criminal Skills/Hacking Activities that violate human rights including murder, sabotage, and bomb-building. Information about illegal manipulation of electronic devices, encryption, misuse, and fraud. Warez and other illegal software distribution. Hate Speech Web pages that promote extreme right/left-wing groups, sexism, racism, religious hate and other discrimination. Phishing/Fraud Manipulated web pages and emails used for fraudulent purposes, also known...
http://help.comodo.com/topic-1400010-1-1400013-1400509-Content-Filtering-Level-Descriptions.html...block unwanted and harmful mail from entering your network. Comodo Secure Email Gateway Enterprise is available only to C1 Enterprise customers. There are two ways to add Secure Email Gateway Enterprise to your account: Add-on for 'Comodo Secure Web Gateway' – The email gateway is available as an add-on, at discounted prices, for customers who already have a Secure Web Gateway (SWG) license. If you own an SWG license then the add-on will be selected when you subscribe for Secure Email Gateway Enterprise. Stand-alone version - The stand-alone version can be added to your account...
http://help.comodo.com/topic-289-1-716-11357-Add-Comodo-Secure-Email-Gateway-Enterprise.html...block unwanted and harmful mail from entering your network. Xcitium Secure Email Gateway Enterprise is available only to Xcitium (CD) Enterprise customers. There are two ways to add Secure Email Gateway Enterprise to your account: Add-on for 'Xcitium Secure Web Gateway' – The email gateway is available as an add-on, at discounted prices, for customers who already have a Secure Web Gateway (SWG) license. If you own an SWG license then the add-on will be selected when you subscribe for Secure Email Gateway Enterprise. Stand-alone version - The stand-alone version can be added to your account...
http://help.comodo.com/topic-457-1-981-14352-Add-Xcitium-Secure-Email-Gateway-Enterprise.html...block unwanted/dangerous mail from reaching your customer's networks. Available only to C1 - MSP customers. Comodo Firewall Central Manager - Firewall Central Manager allows you to manage several Firewall Virtual appliances installed on your customers' networks from a single central console. Comodo Secure Web Gateway - A real time web traffic scanning solution that provides comprehensive web content and security control to your customers. Includes URL filtering, malware protection, Valkyrie real-time file verdicting and portable containment. Customer Relationship Management (CRM) - Sales automation tool which lets businesses create fluid workflows to generate, nurture and close customer leads. Comodo Dome Firewall Virtual...
http://help.comodo.com/topic-289-1-716-8478-Introduction-to-Comodo-One.html...Blocks Viruses, Trojans and Spy-ware before they can ever get onto your system; Prevents unauthorized modification of critical operating system files and registry entries; Includes new Sandbox feature to completely isolate untrusted files from the rest of your computer Advanced Network Firewall Engine The Firewall component of Comodo Internet Security offers the highest levels of perimeter security against inbound and outbound threats - meaning you get the strongest possible protection against hackers, malware and identity thieves. Now we've improved it again by adding new features like, Stealth Mode to make your PC completely invisible to opportunistic port...
http://help.comodo.com/topic-72-1-284-2953-Special-Features.html...website. See Comodo Secure Shopping for more details. Internet Security Essentials – Installs Internet Security Essentials, an application that protects you from the man-in-the-middle attacks while using the internet for services such as online banking and so on. See Comodo Internet Security Essentials for more details. Click 'Close' when you are satisfied with your settings. Click 'Accept and Install' in the 'Welcome' screen to begin installation. Step 2 – Installation Progress The selected components will be installed: Step 3 - Finalization The last step is to set some CIS options: Change my DNS provider to COMODO Secure...
http://help.comodo.com/topic-72-1-772-9446-CIS-Complete---Installation-and-Activation.html