Search Results

Showing 291-300 from 639

Exclusions (in Endpoint Manager)

... Exclusions   The 'Exclusions' panel displays a list of paths and files for which you have selected ' Ignore' from the Scan Results window, or have added as an exclusion from an antivirus alert. To open the Exclusions panel Click Security Settings > Antivirus > 'Exclusions' tab in the 'Advanced Settings' panel. The Exclusions panel has two tabs: Excluded Paths - Displays...

http://help.comodo.com/topic-399-1-790-10378-Exclusions.html
Mail Logs Report (in Xcitium Secure Email Gateway Enterprise)

... Mail Logs Report Click 'Reports' and then click 'Mail Logs' The 'Mail Logs' report provides complete details of incoming and outgoing mails for all domains that have been added to Secure Email Gateway. The logs show the subject of the mail, date and time received by Secure Email Gateway, the result of the filtering process and more. Mail Logs Report...

http://help.comodo.com/topic-443-1-898-11454-Mail-Logs-Report.html
Apply Policies To Networks And Roaming/Mobile Devices (in Xcitium Secure Internet Gateway)

...help on this interface: Create new policies and deploy them to networks and devices Edit a policy Test whether your policy work Delete a policy   Create a new policy Click 'Configure' > 'Policy' Click 'Add New Policy'   Policy Name - Enter a label for the policy Objects - Select the items to which the policy should apply.This can be a network, roaming device, site, internal network or mobile device. You can select multiple instances of each. Note - The 'Objects' menu only shows networks, devices or sites that do not yet have a policy. Networks - List of manually added networks Agents...

http://help.comodo.com/topic-434-1-840-10766-Apply-Policies-to-Networks-and-Roaming-Mobile-Devices.html
View And Manage Blocked Threats (in Xcitium Enterprise)

...help with this. Mac OS Devices: Threats only appear in this list if 'Auto-Quarantine' is disabled in the profile on the device. Threats will NOT appear in this list if: 'Auto quarantine' is enabled in 'Realtime scanning', 'Manual Scanning' and 'Scheduled Scanning' 'Auto quarantine' is disabled but the user chooses to quarantine the item from an alert See Configure Antivirus Settings in Antivirus Settings for Mac OS Profile under Create a Mac OS Profile for more details. Linux Devices: Threats only appear in this list if 'Auto-Quarantine' is disabled in the profile on the device. Threats will...

http://help.comodo.com/topic-463-1-1029-15766-View-and-Manage-Blocked-Threats.html
Manage Aggregation Rules (in Xcitium SIEM)

...search results for the aggregated event query will open. Click the export button on the right of the table to generate a .csv file of the results. You can also view the graphical representation of the number of events from source ip to destination ip. Click the 'Bar Chart' tab to view the bar chart representation of the aggregated events.   Click the 'Pie Chart' tab to view the pie chart representation of the aggregated events.   To re-arrange the event fields, Select the field you want to re-positon Click the up/down  arrow button on the bottom...

http://help.comodo.com/topic-285-1-833-10569-Manage-Aggregation-Rules.html
The Dashboard (in Comodo Secure Web Gateway)

...help with this.   Top Blocked File Types The 'Top Blocked File Types' chart displays the file types that were most blocked by SWG. The results are displayed for the top 10 categories. Placing your mouse cursor over a sector will display further details. Clicking on a particular sector on the chart will open the 'View Logs' screen which displays full details of the blocked file types. You can filter details according to your needs. See ' Viewing Web Overview Dashboard Logs ' for more details. Most Downloaded File Types 'Most Downloaded File Types' shows the details of file types that were...

http://help.comodo.com/topic-436-1-842-10775-The-Dashboard.html
CIS Pro - Installation And Activation (in Comodo Internet Security)

...search item will be provided by Yahoo Send Program Usage Data Comodo collects collects the usage details from millions of CIS users to analyze their usage patterns for the continual enhancement of the product. Your CIS instillation will collect details on how you use the application and send them periodically to Comodo servers through a secure and encrypted channel. Also your privacy is protected as this data is sent anonymous. This data will be useful to the engineers and developers at Comodo to identify the areas to be developed further for delivering the best Internet Security product. Disable this option...

http://help.comodo.com/topic-72-1-623-7677-CIS-Pro---Installation-and-Activation.html
View List Of File Verdicts (in Xcitium Enterprise)

...helps enterprises quickly create definitive whitelists of trusted files. Xcitium Verdict Cloud is also available as a standalone service. Contact your Xcitium account manager for further details. T he Verdict Cloud interface View file details Export the Verdict Cloud file list T he Verdict Cloud interface Click 'Security' > 'Endpoint Security' > 'File Verdicts' Column Heading Description Name The label of the unknown item Path The install location of the file on the endpoint Click the icon to copy the file path to the clipboard. Hash The SHA1 hash value of the unknown file. Hash values uniquely identify a file...

http://help.comodo.com/topic-463-1-1029-15761-View-List-of-File-Verdicts.html
Keyboard And Mouse Shortcuts For Comodo Dragon (in Comodo Dragon Web Browser)

...Help Center in a new tab. Text shortcuts Key Combination Description Ctrl+C Copies highlighted content to the clipboard. Ctrl+V or Shift+Insert Pastes content from the clipboard. Ctrl+Shift+V Paste content from the clipboard without formatting. Ctrl+X or Shift+Delete Deletes the highlighted content and copies it to the clipboard. Webpage shortcuts Key Combination Description Ctrl+P Prints your current page. Ctrl+S Saves your current page.  F5 or Ctrl+R Reloads your current page.  Esc Stops the loading of your current page.  Ctrl+F Opens the find bar.  Ctrl...

http://help.comodo.com/topic-120-1-279-2579-Keyboard-and-Mouse-Shortcuts-for-Comodo-Dragon.html
HIPS Rule Sets (in Comodo Internet Security)

...help guide if you have not already done so. Although each application's ruleset could be defined from the ground up by individually configuring its constituent rules, this practice may prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Internet Security contains a selection of rulesets according to broad application categories. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type of application. Users can, of course, modify these predefined rulesets to suit their environment and requirements. To configure this category...

http://help.comodo.com/topic-72-1-522-6305-HIPS-Rule-Sets.html
Pages 30 of 64 « Prev     Next »   Jump to page