Search Results

Showing 481-490 from 502

CMS Vulnerability Scans (in Xcitium SIEM)

...manually start a CMS scan at anytime: Open the cWatch dashboard Select the target website from the menu at top-left Click the 'Scan' tab then 'Vulnerability Scan’ cWatch will begin scanning the domain for CMS vulnerabilities Scan results are shown in the 'Last Scan' box on the right Click the 'Refresh' icon at top-right to reload the results of the scan Alerts will be generated if any vulnerabilities are found. Click 'View Full Report' for a comprehensive overview of discovered vulnerabilities See View detailed results of the last scan for more details View detailed results Select the target...

http://help.comodo.com/topic-285-1-848-11012-CMS-Vulnerability-Scans.html
Enroll Roaming Devices (in Xcitium Secure Internet Gateway)

...manually install the agent on devices or install it remotely through Endpoint Manager (formerly ITSM). Once installed, you can deploy policies to the devices as required. Roaming devices cannot connect to internal domains unless configured appropriately in the 'Network' interface. Add new devices Click 'Configure' > 'Objects' > 'Roaming Devices' Click 'Download Agent' at the top-right.   Choose your download options in the 'Download Agent' dialog: Select Company - MSPs only. Select the customer organization for which you want to enroll devices. Download for Windows - The agent installation package for Windows devices. See Enroll Windows devices for more details. Download...

http://help.comodo.com/topic-434-1-929-12678-Enroll-Roaming-Devices.html
Add And Manage Policy Routing Rules (in Comodo Dome Firewall)

...manually re-add it. Note on ToS – The Type of Service (ToS) is a eight bit field in the header of an IPv4 packet for managing the routing of the datagram packet between its source and the destination depending on is priority, latency, throughput and reliability. The ToS value can be from: Eight priority values for Class Selectors (CS0-7), which denote backward compatibility with the TOS field. In other words, these are ‘true’ TOS values. Twelve latency values for Assured Forwarding (AF*xy*, where x being a class from 1 to 4 and y being a ‘drop precedence’ from...

http://help.comodo.com/topic-451-1-936-12820-Add-and-Manage-Policy-Routing-Rules.html
Disable Behavior Blocker And Auto-Sandboxing On A Per-application Basis (in Comodo Internet Security)

...Updater Applications' , 'Start Up Folders' etc. For more details on file groups, refer to the section File Groups . Files - Opens the 'Open' window and enables you to navigate to the application or file you wish to add. Folder - Opens the 'Browse for Folders' window and enables you to navigate to the folder you wish to add. Running Processes - As the name suggests, this option allows you to select an application or executable from the processes that are currently running on your PC. 6. Click 'OK' in the Behavior Blocker interface. 7. Select whether the child processes of the application also...

http://help.comodo.com/topic-72-1-522-6359-Disable-Behavior-Blocker-and-Auto-Sandboxing-on-a-Per-application-Basis.html
Introduction To Xcitium Verdict (in Xcitium Verdict Cloud)

...updated. If the vendor is whitelisted, then certificate validation is done to ensure that certificate chain is valid and not revoked or expired. Reputation System Reputation data of files that are collected from millions of endpoints through Xcitium network and products are evaluated on a big data platform and converted to intelligence form to be used by Verdict. Big Data VirusScope Analysis System VirusScope, a part of Xcitium Security products, is a dynamic application analyzer system that detects malicious behavior of a file, blocks and reverses those actions when necessary. The detected malware are reported to Xcitium servers and this...

http://help.comodo.com/topic-397-1-773-9563-Introduction-to-Xcitium-Verdict.html
Key Concepts (in Endpoint Manager)

...manually or by importing user groups from an AD server. Device Group - An admin-defined grouping of Android, iOS, Linux, MAC or Windows devices. Configuration profiles applied to a device group will be deployed to all devices in the group. Quarantine - Malware found on managed networks can either be deleted or isolated in a secure environment known as 'quarantine'. Files moved to quarantine are encrypted so they cannot be executed. Admins can review quarantined items and delete or release the files. Quarantined files can also be added to the local whitelist and submitted to Comodo as a potential false-positive...

http://help.comodo.com/topic-399-1-786-10089-Key-Concepts.html
Step 6 - Analyze Events (in Xcitium EDR)

...manually. Enter the relevant details of the event fields.   The following example shows a search for 'Adaptive Event Name' = 'Run Untrusted Executable' AND 'Device Name' = 'DESKTOP-7J8UVDU': Next, select the time period for the custom query and click 'Search' The search results for the custom query will be displayed: Please note the results for the query will also display details for other fields also. See ' View Query Results ' for more information. You can also build custom queries using the search results. See the topic ' Event Search ' for more information. Use Sample Queries EDR ships with built-in sample queries...

http://help.comodo.com/topic-444-1-907-11930-Step-6---Analyze-Events.html
Add A Purchase Order (in Comodo One MSP)

...manually or by selecting a Price Book . Click the ' Discount ' link to offer discounts on the List Price. Select '%Price' to provide discount by percentage  Select 'Direct Price Reduction' to provide flat discount on price  Click 'Tax' link to change the tax structure. Please note this will be available for 'Individual' tax mode Enter the new applicable tax(es) Tax Mode Individual If this option is selected, the 'Tax' link will be displayed allowing you to edit the individual tax rate defined for the product . Group If this option is selected, all the taxes that are enabled...

http://help.comodo.com/topic-289-1-845-10962-Add-a-Purchase-Order.html
Step 5 - Configure Network Connections For Firewall Devices (Optional) (in Comodo Dome Firewall)

...updated on the FW device. To add new network zone interfaces Click 'Interfaces' on the left Select an organization or device from the drop-down in the title bar (next to the word 'Interfaces') Select an organization to manage interfaces for all devices belonging to the organization Select an individual device to manage the interfaces for a specific device The 'Zones' screen shows all the interfaces created for the selected organization/device. The following sections explain how to configure network zone interfaces: Add untrusted external network zones like WAN for connecting to the internet Add trusted internal network zones like...

http://help.comodo.com/topic-451-1-937-12847-Step-5---Configure-Network-Connections-for-Firewall-Devices-(Optional).html
CMS Vulnerability Scans (in SOCaaP)

...manually start a CMS scan at anytime: Open the SOCaaP Web Protection dashboard Select the target website from the menu at top-left Click the 'Scan' tab then 'Vulnerability Scan’ SOCaaP Web Protection will begin scanning the domain for CMS vulnerabilities Scan results are shown in the 'Last Scan' box on the right Click the 'Refresh' icon at top-right to reload the results of the scan Alerts will be generated if any vulnerabilities are found. Click 'View Full Report' for a comprehensive overview of discovered vulnerabilities See  View detailed results of the last scan  for more details...

http://help.comodo.com/topic-466-1-1040-1150027-CMS-Vulnerability-Scans.html
Pages 49 of 51 « Prev     Next »   Jump to page