Search Results

Showing 331-340 from 639

Transfer Items To / From The Remote Computer (in Endpoint Manager)

...help with this.   -  Refresh the content. The lower pane shows the progress of your transfers. You can stop, pause or resume on-going transfers: File Transfer Tool Lower Pane - Column Descriptions Column Header Descriptions Status  The progress of the transfer. Statuses include ‘Preparing’, 'In-progress', 'Pending', 'Completed', 'Canceled', ‘Paused’, ‘Conflict’ and 'Failed'. Source Path  Location of the file on the origin machine. Destination Location to which the file is being copied. Size File size. Speed The rate of the file transfer. Progress Shows the transfer process in percentage.   Time   Date and time of file...

http://help.comodo.com/topic-399-1-786-13950-Transfer-Items-to---from-the-Remote-Computer.html
View The Files On A Device (in Xcitium Enterprise)

... View the Files on a Device The 'File List' tab shows executable files found on a device along with their trust rating. View files on a Windows device Click 'Assets' > 'Devices' > 'Device List' Click the 'Device Management' tab Select a group on the left to view only its devices Or Select 'Show all' on the left to view...

http://help.comodo.com/topic-463-1-1029-15598-View-the-Files-on-a-Device.html
File List (in Endpoint Manager)

... File List The 'File List' pane displays a list of executable files and applications and executable files discovered on your system along with their file rating. CCS rates the files as: Trusted Unrecognized Malicious Trusted Files   Files with 'Trusted' rating are considered safe to run outside the sandbox. Files are identified as trusted in the following ways: Cloud-based...

http://help.comodo.com/topic-399-1-790-10397-File-List.html
Manage File Trust Ratings On Windows Devices (in Endpoint Manager)

...search for specific apps. Manage File Rating The File Rating interface allows you to: View the details of files in the list View Process Activities of a File Assign Admin rating to a file Hide/Display selected files in the list Export the list of selected files to a CSV file Remove files from the list Import Files View the details Simply click on a file in the list or select a file and click 'File Details' at the top. The 'file info' screen shows basic file details and the devices on which the file is present. You can also change...

http://help.comodo.com/topic-399-1-786-10102-Manage-File-Trust-Ratings-on-Windows-Devices.html
Profiles For Android Devices (in Xcitium Enterprise)

...help administrators lock-down mobile devices by limiting the applications that are able to run on a device. 'Locking' a device to particular applications can prevent users from opening other applications or straying into important device configuration areas. You can also block aspects of the OS should you wish. An example is a retail or school environment where only certain apps should be used on the device. Click 'Kiosk' from the 'Add Profile Section' drop-down Form Element Description Kiosk Mode Type The two Kiosk modes are: Default mode - Run multiple apps in Kiosk mode. Users will not be able...

http://help.comodo.com/topic-463-1-1029-15668-Profiles-for-Android-Devices.html
View History Of External Device Connection Attempts (in Endpoint Manager)

...search. To increase the number of results displayed per page up to 200, click the arrow next to 'Results per page' drop-down. Use the left and right arrows and the page numbers at the bottom to navigate to the page you want to view. Generate a report containing log of device connection attempts Click 'Security' > 'Device Control' Click the funnel icon  to apply filters to the report. Click the 'Export' button and choose 'Export to CSV': The report will be generated in .csv file format. The report can be accessed in the 'Dashboard' > 'Reports' interface...

http://help.comodo.com/topic-399-1-786-11181-View-History-of-External-Device-Connection-Attempts.html
LDAP Profile (in Xcitium Secure Email Gateway Enterprise)

... LDAP Profile The lightwe0ight directory access protocol (LDAP) is a protocol for querying and modifying data using directory services running over TCP/IP. If you integrate LDAP database with Secure Email Gateway then the service can check whether a recipient is a valid. If the recipient is not a valid user then the email is rejected. This avoids wasting resources by...

http://help.comodo.com/topic-443-1-898-11432-LDAP-Profile.html
Unrecognized Files (in Endpoint Manager)

... Unrecognized Files Once installed, the HIPS watches all file system activity on your computer. Every new executable file introduced to the computer, is first scanned against the Comodo certified safe files database. If they are not safe, they are added to the 'Unrecognized Files' for users to review and possibly submit to Comodo. Apart from new executables, any executables that...

http://help.comodo.com/topic-399-1-790-10399-Unrecognized-Files.html
Block Users (in Comodo KoruMail)

... Block Users   Administrators can block outgoing mails from users that are routed via KoruMail. The 'Block Users' interface also allows you to search for blocked users and domains. To open the 'Block Users' screen, click the 'SMTP' tab on the left and click 'SMTP-AUTH' then 'Block Users'. The interface allow administrators to: Add blocked users Block Lifetime  ...

http://help.comodo.com/topic-290-1-632-8093-Block-Users.html
Block Users (in Xcitium Secure Email Gateway Enterprise)

... Block Users   The 'Block Users' area lets you block outgoing mail that is routed through Secure Email Gateway. You can block individual users or entire domains. The interface lets you view existing blocks, add new block rules, and search users by name and domain. Click 'SMTP' > 'SMTP-AUTH' > 'Block Users' to open the interface.   The...

http://help.comodo.com/topic-443-1-898-11415-Block-Users.html
Pages 34 of 64 « Prev     Next »   Jump to page