Showing 401-410 from 502
...Update your Security Settings After signing in for the first time, change your password and enable Two-Factor Authentication (2FA) for your account. Changing your Password Changing your password frequently reduces the risk of your account being compromised. A strong password should contain a mix of uppercase and lowercase letters, as well as numbers and punctuation. To prevent possible dictionary attacks, a password should not spell out any words found in the dictionary. Passwords are case-sensitive. Follow the steps below to change your password. Step 1: Go to the profile menu and select Security. Step 2: Enter the following...
http://help.comodo.com/topic-1400010-1-1400013-1400506-Update-your-Security-Settings.html...Update your Security Settings After signing in for the first time, change your password and enable Two-Factor Authentication (2FA) for your account. Changing your Password Changing your password frequently reduces the risk of your account being compromised. A strong password should contain a mix of uppercase and lowercase letters, as well as numbers and punctuation. To prevent possible dictionary attacks, a password should not spell out any words found in the dictionary. Passwords are case-sensitive. Follow the steps below to change your password. Step 1: Go to the profile menu and select Security. Step 2: Enter the following...
http://help.comodo.com/topic-1400009-1-1400010-1400446-Update-Your-Security-Settings.html...manual scan on selected folders/files to check for viruses and other malware Create an Antivirus scanning schedule - Guidance on time-table scheduling of antivirus scans to be run on selected items at selected intervals Run an untrusted program inside sandbox - Guidance on executing a program that you do not trust to be safe, inside sandbox to protect any harmful effects of the program upon your system Restore an incorrectly quarantined item - Help to restore files and executables that were moved to quarantine by mistake Submit quarantined items to Comodo for analysis - Advice on how to send suspicious files/executables to Comodo...
http://help.comodo.com/topic-72-1-284-2949-Appendix-1-CIS---How-To...-Tutorials.html...manual full scans, quick scans, certificate scans and custom scans. See Scan and Clean your Computer to read more about running a scan. To view 'Actions' logs Click 'View Logs' on the home screen OR click the 'View Logs' button on the widget Choose 'Scan Actions' from the 'Log Type' drop-down at the top left of the 'Log' interface Column Descriptions 1. Date/Time – The precise date and time of the scan 2. Type – The type of scan profile 3. Path – The location scanned. This will be available for 'File', 'Folder' and 'Custom' scan 4. End Time – The precise date...
http://help.comodo.com/topic-394-1-767-9256-Scan-Actions-Logs.html...updates are available they will be downloaded and installed. The scan, based on the profile you selected, will begin immediately. The progress dialog shows the profile name, the location that is currently being scanned, the start time and duration of the scan, the total number of objects scanned so far, and the number of threats found: Click 'Pause' to suspend the scan Click 'Resume' to recommence the scan Click 'Stop Scan' to abort the scan altogether Results are shown at the end of the scan: Click the 'Results' button to see detailed file information. The results window lists all threats...
http://help.comodo.com/topic-399-1-925-12553-Run-a-Scan.html...update the details of a sin gle vendor record: Open the 'Vendors List', click a vendor name then click the 'Edit' button. See ' Manage Vendors ' for more details. The interface allows you to: Edit mass vendor records Delete vendor records Send email Import / export vendor records Find duplicate vendor records Edit common details of several vendor records Click 'All' > 'Vendors' to open the 'Vendors List' interface Select the vendors you want to edit Click 'Actions' > 'Edit' The 'Mass Editing Vendor' pop-up will appear: This interface contains three tabs: Vendor Details – Specify common details for vendor name, email...
http://help.comodo.com/topic-289-1-845-11979-Mass-Management-of-Vendors.html...update the details of a sin gle price book record: Open the 'Price Books List', click the price book name then click the 'Edit' button. See ' Managing Price Book ' for more details. The interface allows you to: Edit mass price book records Delete price book records Import / export price book records Find duplicate price book records Edit common details of several price book records Click 'All' > 'Price Book' to open the 'Price Book List' interface Select the price book you want to edit Click 'Actions' > 'Edit' The 'Mass Editing Price Books' pop-up will appear: This interface...
http://help.comodo.com/topic-289-1-845-11966-Mass-Management-of-Price-Books.html...manually enter details which could not be fetched from the .apk file. Prerequisite : The .apk file of the app should have been saved in the computer or in the network storage accessible through the computer, from which the Endpoint Manager console is accessed. To add Custom/Enterprise Android Apps Click 'Application Store' > 'Android Store' Click 'Add Enterprise Application' from the options at the top. Click 'Browse' under 'Source File', navigate to the location of the .apk file to be uploaded, select the file and click 'Open' The file will be uploaded and form details auto-populated. See the previous...
http://help.comodo.com/topic-399-1-786-10210-Add-Android-Apps-and-Install-them-on-Devices.html...Manually added networks. Agents - Roaming Windows and Mac devices that have the Secure Internet Gateway agent installed. Mobile Agents - Enrolled Android and iOS devices. Sites - Network sites imported by deploying the local resolver virtual appliance. Internal Networks - Internal objects within imported sites. Note - Policies applied to a site will over-rule policies applied to internal objects. You can apply a policy to any number of objects. Remark - Enter a description for the policy (optional). Click 'Next' or 'Settings' to configure the policy: Only B/W Mode - If enabled, you can only add blacklist and/or whitelist rules to the policy. You cannot...
http://help.comodo.com/topic-434-1-929-12680-Step-5---Build-and-Apply-your-Policy.html...manually or automatically by a profile active on the device. You can use the controls along the top to run remote tasks on the device: Manage Profiles - Add or remove device configuration profiles. See Assign Configuration Profiles to Selected Devices for more details. Remote Control - Establish a remote desktop connection to an endpoint. See Remote Management of Windows and Mac OS Devices for help to do this. Run Procedure - Execute script procedures on the device. See Apply Procedures to Windows and Mac Devices for more details. Instal l Mac OS Packages - Remotely install Xcitium Client Security (XCS) for Mac package...
http://help.comodo.com/topic-463-1-1029-15605-Manage-Mac-OS-Devices.html