Search Results

Showing 451-460 from 638

View Security Events By Files (in Endpoint Manager)

...search fields to filter events by component, date, file name, and other criteria.  Click the funnel icon at top-right to view more filter options:   The file view interface lets you: Handle Quarantined Items Rate Files as Trusted, Malicious or Unrecognized View the details of a file Get Valkyrie Report of a file View Valkyrie analysis details of file Export the List of Files Handle Quarantined Items You can delete or restore quarantined items from the 'Security Dashboards' interface. Click 'Security' > 'Security Events' > 'File View.'  Select a company or group to view events in that...

http://help.comodo.com/topic-399-1-786-13041-View-Security-Events-by-Files.html
Data Loss Prevention Scans (in Xcitium Enterprise)

...search managed endpoints for sensitive data like card numbers, social security numbers and bank account numbers. You first create the discovery scan rules at 'Assets' > 'Configuration Templates' > 'Data Loss Prevention' You then add a 'Data Loss Prevention' section to a profile:  Click 'Assets' > 'Configuration Templates' > 'Profiles' > click the name of a Windows profile Click 'Add Profile Section' > 'Data Loss Prevention' Click the 'Add' button, then add the discovery rules you created in step 1. Save the profile. The scan can run on all devices on which the profile is active. 'Security' > 'Endpoint...

http://help.comodo.com/topic-463-1-1029-16148-Data-Loss-Prevention-Scans.html
Data Loss Prevention Scans (in Endpoint Manager)

...search managed endpoints for sensitive data like card numbers, social security numbers and bank account numbers. You first create the discovery scan rules at ‘Configuration Templates’ > ‘Data Loss Prevention’ You then add a ‘Data Loss Prevention’ section to a profile:  Click ‘Configuration Templates’ > ‘Profiles’ > click on the name of a Windows profile Click ‘Add Profile Section’ > ‘Data Loss Prevention’ Click the ‘Add’ button, then add the discovery rules you created in step 1. Save the profile. The scan will run on all devices on which the profile is active.  'Security' > 'Data Loss Prevention...

http://help.comodo.com/topic-399-1-786-15392-Data-Loss-Prevention-Scans.html
DLP Keyword Groups (in Xcitium Enterprise)

...searches for. For example, the 'Names' group is a list of common first names and surnames. Keyword groups are used in combination with an ‘information format’ to form a 'pattern'. An information format is the notation used by the type of data you want to find. For example, the information format of an SSN is a nine digit number in a 3-2-4 formation, like '123-45-6789'. The information formats are used in discovery rules to specify the type of sensitive information to be identified by a rule. Keyword groups are configured by your Endpoint Manager admin...

http://help.comodo.com/topic-463-1-1033-1400502-DLP-Keyword-Groups.html
DLP Keyword Groups (in Endpoint Manager)

...searches for. For example, the 'Names' group is a list of common first names and surnames. Keyword groups are used in combination with an ‘information format’ to form a 'pattern'. An information format is the notation used by the type of data you want to find. For example, the information format of an SSN is a nine digit number in a 3-2-4 formation, like '123-45-6789'. The information formats are used in discovery rules to specify the type of sensitive information to be identified by a rule. Keyword groups are configured by your Endpoint Manager admin...

http://help.comodo.com/topic-399-1-904-15437-DLP-Keyword-Groups.html
DLP Keyword Groups (in Advanced Endpoint Protection)

...searches for. For example, the 'Names' group is a list of common first names and surnames. Keyword groups are used in combination with an ‘information format’ to form a 'pattern'. An information format is the notation used by the type of data you want to find. For example, the information format of an SSN is a nine digit number in a 3-2-4 formation, like '123-45-6789'. The information formats are used in discovery rules to specify the type of sensitive information to be identified by a rule. Keyword groups are configured by your Endpoint Manager admin...

http://help.comodo.com/topic-467-1-1050-16680-DLP-Keyword-Groups.html
Protected Data Folders (in Comodo Internet Security)

... Protected Data Folders The data files in the folders listed under the Protected Data Folders area cannot be seen, accessed or modified by any known or unknown application that is running inside the sandbox.  Tip: Files and folders that are added to ' Protected Files ' interface are allowed read access by other programs but cannot be modified, whereas the files/folders...

http://help.comodo.com/topic-72-1-623-7753-Protected-Data-Folders.html
Protected Data Folders (in Comodo Internet Security)

... Protected Data Folders The data files in the folders listed under the Protected Data Folders area cannot be seen, accessed or modified by any known or unknown application that is running inside the sandbox.     Tip: Files and folders that are added to ' Protected Files ' interface are allowed read access by other programs but cannot be modified, whereas the...

http://help.comodo.com/topic-72-1-522-6384-Protected-Data-Folders.html
View Customer Activation History (in Xcitium Accounts Manager)

... View Customer Activation History The 'Customer Activations' screen shows licenses that have been activated for your customers. Each license is shown on a separate tile. Each tile specifies the product name, subscription ID, expiry date and other details. Click the arrow on the right to renew, upgrade or change auto-renew options. You can export a list of customer...

http://help.comodo.com/topic-211-1-1400012-1400496-View-Customer-Activation-History.html
Protected Data Folders (in Endpoint Manager)

... Protected Data Folders  The contents of folders listed in the 'Protected Data Folders' area cannot be seen, accessed or modified by any known or unknown application that is running inside the Comodo Container. Tip: Files and folders that are added to ' Protected Files '  interface are allowed read access by other programs but cannot be modified, whereas the files/folders...

http://help.comodo.com/topic-399-1-790-10406-Protected-Data-Folders.html
Pages 46 of 64 « Prev     Next »   Jump to page