Search Results

Showing 381-390 from 505

Installing Comodo Internet Security 2012 Complete (in Comodo Internet Security)

...disable this option. Choosing Installation Location   Click the 'Files Locations' tab to choose the installation path.   This interface allows you to set the installation folder for Comodo Internet Security. The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location.   After customizing your installation, click the 'Back' button to return to the installation configuration screen.   Click the 'Agree and Install' button to proceed with the installation.   Step 2 – Installation progress   The next step...

http://help.comodo.com/topic-72-1-284-3050-Installing-Comodo-Internet-Security-2012-Complete.html
View CWatch Reports (in Xcitium SIEM)

...scanning enabled Malware - Domains upon which malicious items were found CMS - Domains that have vulnerabilities specific to content management systems OWASP - Domains that have a top-10 vulnerability from the Open Web Application Security Project Blacklist - Domains that have been marked as suspicious by a blacklisting organization (e.g. Spamhaus) Backup - Domains on which the backup service has been activated Language - Breakdown of domains based on languages Customers - Sites Click 'Reports' in the top-menu Click 'Customers - Sites' on the left Customers Select the time period from the drop-down at the top left The graph shows the numbers of customers...

http://help.comodo.com/topic-285-1-927-15273-View-cWatch-Reports.html
CIS Pro-Installation And Activation (in Comodo Internet Security)

...disable this option. Choosing Installation Location   Click the 'Files Locations' tab to choose the installation path.     This screen allows you to select the folder in your hard drive for installing Comodo Internet Security. The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location.   After customizing your installation, click the 'Back' button to return to the installation configuration screen.   Enter the License key that you received through email.   Copy and save your license...

http://help.comodo.com/topic-72-1-284-3005-CIS-Pro-Installation-and-Activation.html
View Security Events By Files (in Endpoint Manager)

...scan. Malware removed from infected file. Detected item ignored. Detected file blocked. File added to exclusions. File added to trusted files list. File reported as false positive from the results screen. Containment: File run inside container with different restriction levels:  Restricted Virtually File blocked. File ignored. Application Control: File added - An unrecognized or malicious file was added to the ‘File List’ in CCS on the endpoint. File deleted - A file was removed from the ‘File List’ in CCS on the endpoint. This is because it rating was changed to ‘Trusted’, or because the file was deleted from the endpoint...

http://help.comodo.com/topic-399-1-786-13041-View-Security-Events-by-Files.html
Step 6 - Create Firewall Policy (in Comodo Dome Firewall)

...disable Intrusion Prevention and Application Detection settings for the rule. You can create different rules for different configurations for each of these components. The rules will be applied to the inbound and outbound packets in order. Before creating a firewall policy, you must first create firewall address objects, an advanced threat protection (ATP) profile, URL filters, and an intrusion prevention profile. Once done, these objects and profiles can be used in firewall, source network address translation (SNAT) and system access rules.  Firewall Address Objects Firewall Address Object Groups (Optional) ATP Profiles URL Filter Profiles Intrusion Prevention Profile Configure Firewall...

http://help.comodo.com/topic-451-1-937-12848-Step-6---Create-Firewall-Policy-.html
CIS Pro - Installation And Activation (in Comodo Internet Security)

...disable this option. Choose the Installation Location Click the 'Files Locations' tab to choose the installation path. This  screen allows you to select the folder in your hard drive for installing Comodo Internet Security. The default path is C:/Program Files/COMODO/COMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location. After customizing your installation, click the 'Back' button to return to the installation configuration screen.   Click the 'Agree and Install' button to proceed with the installation. Step 3 - Installation Progress ( Click...

http://help.comodo.com/topic-72-1-623-7677-CIS-Pro---Installation-and-Activation.html
CIS Complete - Installation And Activation (in Comodo Internet Security)

...disable this option. Choosing Installation Location Click the 'Files Locations' tab to choose the installation path. This interface allows you to set the installation folder for Comodo Internet Security. The default path is C:/Program Files/COMODO/COMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location.   After customizing your installation, click the 'Back' button to return to the installation configuration screen. Click the 'Agree and Install' button to proceed with the installation. Step 3 - Installation progress ( Click to go back to Step...

http://help.comodo.com/topic-72-1-623-7678-CIS-Complete---Installation-and-Activation.html
Manage Alerts (in Endpoint Manager)

...scan tasks have the 'Default Alert' template applied to them. Click 'Configuration Templates' > 'Alerts' > 'Default Alert' to view these settings. You can activate or deactivate alerts as per your requirement. If you want different alert settings for a specific event then you must create a new alert in this interface. For example, you may want the alert to be sent to specific recipients, or certain metrics to be included in the alert. Example: Click 'Procedures' > 'Predefined Procedures' > 'Monitors' > 'Alert if a new scheduled Task is Created'. You will notice the 'Default Alert' is used...

http://help.comodo.com/topic-399-1-786-10972-Manage-Alerts.html
Configuring Rules For Auto-Containment (in Endpoint Manager)

...disable the rule. CCS ships with a set of pre-defined auto-containment rules that are configured to provide maximum protection for your system. The following table tells you settings of these pre-defined rules:   Rule Action Target Restriction Level Rating Source Log Action Limit Maximum memory Limit Program Execution Time Quarantine Created by Located on Downloaded from 1 Block File Group - All Applications N/A Malware Any Any Any On N/A N/A On 2 Block File Group - Suspicious Locations N/A Any Any Any Any On N/A N/A Off 3 Applicable only for Windows 8.0 and 8.1 Ignore All Metro...

http://help.comodo.com/topic-399-1-790-10386-Configuring-Rules-for-Auto-Containment.html
CIS Complete - Installation And Activation (in Comodo Internet Security)

...disable this option. Choosing Installation Location Click the 'Files Locations' tab to choose the installation path. This interface allows you to set the installation folder for Comodo Internet Security . The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location.   After customizing your installation, click the 'Back' button to return to the installation configuration screen. Click the 'Agree and Install' button to proceed with the installation. Step 3 - Installation progress ( Click to go back to Step...

http://help.comodo.com/topic-72-1-522-6230-CIS-Complete---Installation-and-Activation.html
Pages 39 of 51 « Prev     Next »   Jump to page