Showing 481-490 from 639
...help to do this. To view threats recorded on Android devices, go to 'Security' > 'Endpoint Security' > 'Antivirus' > 'Android Threat History'. Xcitium retains security event logs for 12 months for PCI-DSS compliance. Events that are captured include: Antivirus - Windows, Mac OS, and Linux devices File blocked, moved to quarantine, or ignored File restored/removed from quarantine File skipped by a virus scan File rated as trusted, or submitted as a false positive, at the scan results screen File added to the exclusions list Containment - Windows devices File blocked, ignored, or run in the container by: Auto-containment rules...
http://help.comodo.com/topic-463-1-1029-15749-View-Alerts-and-Security-Events.html...help. Auto Remediation on alert - Choose how you want to respond to the alert: Taken no action - No automatic response is made to the alert. You can, of course, manually run a procedure in response to the alert. Run below procedure - Select a procedure to run on affected endpoints in response to the alert. The procedures listed here are defined in the Procedures interface. Type the first few characters of the procedure and select from the list. Click 'Save'. Click the 'Conditions' tab followed by 'Edit' to define monitor thresholds Click 'Add Condition'. Choose the parameter you want to monitor...
http://help.comodo.com/topic-399-1-786-15345-Monitors-for-Windows-Devices.html...help. Auto Remediation on alert - Choose how you want to respond to the alert: Take no action - No automatic response is made to the alert. You can, of course, manually run a procedure in response to the alert. Run below procedure - Select a procedure to run on affected endpoints in response to the alert. The procedures listed here are defined in the Procedures interface. Type the first few characters of the procedure and select from the list. Click 'Save'. Click the 'Conditions' tab followed by 'Edit' to define monitor thresholds Click 'Add Condition' Choose the parameter you want...
http://help.comodo.com/topic-463-1-1029-15737-Monitors-for-Windows-Devices.html...searches for known weaknesses in your content management system (CMS). The following CMS types are supported: WordPress Joomla Drupal ModX Typo3 Scanned items include core site, current CMS version, plugins, themes, and more The 'CMS Scan' pane shows results from the last scan and lets you: Run on-demand scans your website Schedule a weekly scan You can view details about each vulnerability and read guidance on how to fix them 2. OWASP Top Ten Threats SOCaaP Web Protection scans your sites for the top-ten vulnerabilities published by the Open Web Application Security Project (OWASP). It automatically blocks...
http://help.comodo.com/topic-466-1-1040-1150026-Vulnerability-Scans.html...search for a specific interface Source Address - Choose the firewall address object or the object group from which traffic originates. Please note that only the firewall address objects and object groups created for the selected organization/device will be available in the drop-down. See Manage Firewall Address Objects for guidance on creating firewall address objects. Outgoing Interface - Choose the interface through which the traffic is sent. The drop-down shows the common interfaces and the custom interfaces created for the selected organization or the device. Destination Address - Choose the firewall address object or group to which traffic is sent. Please...
http://help.comodo.com/topic-451-1-939-12880-Configure-Firewall-Policy-Rules.html...searches for known weaknesses in your content management system (CMS). The following CMS types are supported: WordPress Joomla Drupal ModX Typo3 Scanned items include core site, current CMS version, plugins, themes, and more The 'CMS Scan' pane shows results from the last scan and lets you: Run on-demand scans your website Schedule a weekly scan You can view details about each vulnerability and read guidance on how to fix them 2. OWASP Top Ten Threats cWatch scans your sites for the top-ten vulnerabilities published by the Open Web Application Security Project (OWASP). It automatically blocks any threats that...
http://help.comodo.com/topic-285-1-848-11492-Vulnerability-Scans.html...search by various parameters. You can perform the following tasks from the auto-runs page: View details of a terminated autorun item Restore autorun item on devices Delete autorun item from devices Rate autorun items as unrecognized, trusted or malicious Export the list of autorun items as a CSV file View Details of a Terminated Autorun Item Click 'Security Sub-Systems' > 'Antivirus' > 'Autoruns Items.' Click the file name of an item in the list: This will open the file details interface which shows: File Info - General information such as file-name, hash, file rating, number of devices...
http://help.comodo.com/topic-399-1-786-15299-View-and-Manage-Autorun-Alerts.html...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type...
http://help.comodo.com/topic-72-1-766-9175-Firewall-Rule-Sets.html...search engine will be set to Yahoo! Click the 'Next' button. In the next screen, you can choose to install PrivDog and read the license agreements for CIS and PrivDog. PrivDog PrivDog is a browser extension that improves the transparency, privacy and speed of your online experience by automatically detecting and blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types...
http://help.comodo.com/topic-72-1-451-4689-CIS-Premium-–-Installation.html...search engine will be set as Yahoo! Click the 'Next' button. In the next screen, you can choose to install PrivDog and read the license agreements for CIS and PrivDog. PrivDog PrivDog is a browser extension that improves the transparency, privacy and speed of your online experience by automatically detecting and blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types...
http://help.comodo.com/topic-72-1-451-4690-CIS-Pro---Installation-and-Activation.html