Showing 281-290 from 1464
... Basic Configuration The configuration tab lets you configure the connection to your cWatch partner portal. View and modify the API connection parameters Click 'Extensions' on the left Select the 'My Extensions' tab Locate the cWatch tile and click 'Open' Click the 'Configuration' tab (if it is not already opened): Edit the URL and login credentials of your partner portal API...
http://help.comodo.com/topic-285-1-971-13750-Basic-Configuration.html...COMODO - Server Security : This configuration is activated by default. Realtime scan is enabled. Only commonly infected files/folders are protected against infection. Only commonly exploited COM interfaces are protected. Defense+ is disabled If you want to switch to another configuration, first you have to create and save a configuration profile in the panel. Then you can select it and make it active...
http://help.comodo.com/topic-213-1-517-6013-Comodo-Preset-Configurations.html...Comodo Click the 'Vendor Rating' link to open the 'Vendor List' screen. See Vendor List for more details. Trust files installed by trusted installers - CCS awards trusted status to files whose parent applications are listed in the 'Installer or Updater' rule in HIPS Rules . ( Default = Enabled ) Detect potentially unwanted applications (PUA) - CCS scans will flag applications that: (i) a user may or may not be aware is installed on their computer (ii) may contain functionality and objectives that are not clear to the user. Example PUA's include adware and browser toolbars. PUA's are often installed...
http://help.comodo.com/topic-399-1-904-11875-File-Rating-Settings.html...Comodo Click the 'Vendor Rating' link to open the 'Vendor List' screen. See Vendor List for more details. Trust files installed by trusted installers - CCS awards trusted status to files whose parent applications are listed in the 'Installer or Updater' rule in HIPS Rules . ( Default = Enabled ) Detect potentially unwanted applications (PUA) - CCS scans will flag applications that: (i) a user may or may not be aware is installed on their computer (ii) may contain functionality and objectives that are not clear to the user. Example PUA's include adware and browser toolbars...
http://help.comodo.com/topic-467-1-1050-16688-File-Rating-Settings.html...Comodo to you by email after the provisioning step is finished. Note: IP ranges should be in the format nnn.nnn.nnn.nnn/rr. Office 365 only accepts ranges (rr) between 24 and 32. Please change the rr from the Korumail instructions to the closest Office 365 allows you to set. For example, if the range you were provided with is 216.104.0.0/19, you can enter 216.104.0.0/24. Select the security restrictions you want: Click 'Save...
http://help.comodo.com/topic-290-1-932-12709-Inbound-Flow-Setup-on-Office-365.html... Manage Smart Hosts Smart hosts are an intermediate mail server that receive mail from an SMTP server and, after applying their own policy, forward them to end-user mail boxes. Smart hosts require authentication from the sender to verify that the sender is allowed to forward mails through the smart host. This differs from an open mail relay which forwards...
http://help.comodo.com/topic-290-1-632-8058-Manage-Smart-Hosts.html... Add an Email Flow Rule to Lock Down Exchange Online This rule ensures Exchange will only accept mails from Korumail. This stops spammers bypassing Korumail and flooding your network with junk mail. Log into your Microsoft Office 365 administrator center account Click 'Admin' in the left-hand menu Click 'Exchange': Click 'mail flow' on the left Click 'rules' in...
http://help.comodo.com/topic-290-1-932-12711-Add-an-Email-Flow-Rule-to-Lock-Down-Exchange-Online-.html... Setup Firewall Policies Select a website from the drop-down at top-left and choose 'Firewall' Click the 'Settings' button cWatch ships with built-in firewall policies to deal with a wide range of attacks, including SQL injections, bot traffic and more Each policy contains a set of firewall rules to filter traffic and take preventative measures when required...
http://help.comodo.com/topic-285-1-835-12537-Setup-Firewall-Policies.html... Give Contained Applications Write Access to Local Folders By default, applications running in the container can access files on your computer but cannot save changes to them You can define exceptions to this rule in containment settings Add exclusions to contained files and folders Click the 'Settings' icon on the CIS home screen Click 'Containment' > 'Containment Settings' ...
http://help.comodo.com/topic-72-1-766-12595-Give-Contained-Applications-Write-Access-to-Local-Folders.html... Configure Android Client Antivirus Settings The Android antivirus provides real-time protection against malware and malicious apps. You can also launch on-demand scans on Android devices from the Xcitium console. The antivirus settings area lets you configure whether threats are automatically removed or handled manually. Automatic Response - You have the choice to auto-uninstall or ignore the threat...
http://help.comodo.com/topic-463-1-1029-15783-Configure-Android-Client-Antivirus-Settings.html