Search Results

Showing 401-410 from 854

Step 5 – Configure Event Queries (in Xcitium SIEM)

...run a look-up on external IPs involved in the event. Once created, an event query can also be used for: Custom dashboards which show the query results as charts. See ' Configure Custom Dashboard ' for more details. Correlation rules which identify harmful events/incidents and assign them to customer admins for attention. See Manage Rules for more details. To configure custom queries Click the menu button...

http://help.comodo.com/topic-285-1-832-10597-Step-5-–-Configure-Event-Queries.html
Create Device Groups (in Xcitium Enterprise)

...run actions and apply profiles to multiple devices at once. OS-specific profiles will be automatically applied to relevant devices. Add a new device group Click 'Assets' > 'Devices' > 'Device List' Click the 'Group Management 'tab Click the 'Create Group' button Alternatively, place your mouse over the 'Default Customer' on the left and click the '+' sign that appears: The 'Add Group...

http://help.comodo.com/topic-463-1-1029-15584-Create-Device-Groups.html
How To Create A New Device (in Comodo Web Inspector)

...run PCI scan on private IP addresses that refer to machines internal to your network. Private IPs ranges are defined by RFC 1918 as: 10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192/168/16 prefix) Click the 'Add' button beside the text box.  The IP(s)/Domain(s) will be added to the device. If you want...

http://help.comodo.com/topic-208-1-490-5154-How-to-Create-a-New-Device.html
DLP Logs (in Xcitium Enterprise)

...running Windows device > Click 'Remote Tools' > 'File Explorer'. See Remotely Manage Folders and Files on Windows Devices for help to do this. Remote Control app – Click 'Assets' > 'Devices' > 'Device List' > 'Device Management' > select a Windows device > Click the 'File Transfer' button. You need to download and install the remote control app to do this...

http://help.comodo.com/topic-463-1-1029-16149-DLP-Logs.html
Trusted Applications (in Comodo Cloud Antivirus)

...button at the top of the 'Trusted Applications' interface You can add an application by : Browsing your computer - Enables you to select files on your hard drive(s) that you want to add to your list of trusted applications. Selecting from running processes - Enables you to choose files from processes which are currently running on your system. To add an application...

http://help.comodo.com/topic-394-1-767-9259-Trusted-Applications.html
Step 2 - Add Customers And Their Assets (in Xcitium SIEM)

...button in the row of the new zone will display the token and the key at the  bottom of the right pane. Now that you have added endpoints to be monitored in the Hard Assets area, the next step is to run the Nxlog and Rsyslog configuration files on endpoints with Nxlog and Rsyslog utilities. See Step 3 for more...

http://help.comodo.com/topic-285-1-832-10594-Step-2---Add-Customers-and-Their-Assets.html
View Active Internet Connections (in Endpoint Manager)

...running processes are unsafe and shut them all down with a single click. You can also use Killswitch to trace back to the malware that generated the process. Comodo KillSwitch can be directly accessed from the 'View Connections' by clicking the 'More' button.     If Comodo KillSwitch is already installed in your computer, clicking 'More' will open the Kill...

http://help.comodo.com/topic-399-1-790-10294-View-Active-Internet-Connections.html
View Active Internet Connections (in Xcitium Enterprise)

...running processes in granular detail – exposing even those that were invisible or very deeply hidden. You can simultaneously shut down every unsafe process with a single click and can even trace the process back to the parent malware. Click the 'More' button in the 'View Connections' to directly access Comodo KillSwitch   If Comodo KillSwitch is already installed in your...

http://help.comodo.com/topic-463-1-1033-15849-View-Active-Internet-Connections.html
View Active Internet Connections (in Advanced Endpoint Protection)

...running processes in granular detail – exposing even those that were invisible or very deeply hidden. You can simultaneously shut down every unsafe process with a single click and can even trace the process back to the parent malware. Click the 'More' button in the 'View Connections' to directly access Comodo KillSwitch     If Comodo KillSwitch is already installed in your...

http://help.comodo.com/topic-467-1-1050-16592-View-Active-Internet-Connections.html
View Active Internet Connections (in Endpoint Manager)

...running processes in granular detail – exposing even those that were invisible or very deeply hidden. You can simultaneously shut down every unsafe process with a single click and can even trace the process back to the parent malware. Click the 'More' button in the 'View Connections' to directly access Comodo KillSwitch     If Comodo KillSwitch is already installed in your...

http://help.comodo.com/topic-399-1-904-11759-View-Active-Internet-Connections.html
Pages 41 of 86 « Prev     Next »   Jump to page