Search Results

Showing 481-490 from 505

Configure Two Factor Authentication (in Xcitium Accounts Manager)

...Scan the QR code with the device camera. This will cause the Google app to generate the six digit code you need to complete pairing. Alternatively, enter the setup key using account name, your key and type of key as Time based provided in Two factor Authentication screen. Step 3 : After completing steps 1 and 2, a six digit authentication code is generated in the authenticator app. This code changes frequently and is unique to your account. Enter the verification code from authenticator app in the field Pin code  Click ' Register with two-factor app ' A success message...

http://help.comodo.com/topic-211-1-513-1400431-Configure-Two-Factor-Authentication.html
Monitoring Settings (in Comodo Internet Security)

...disable monitoring of an activity, entity or object using this interface it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for that activity . This 'Allow' setting over-rules any policy specific 'Block' or 'Ask' setting for that activity that you may have selected using the ' Access Rights ' and ' Protection Settings ' interface. Activities To Monitor   : Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks, including recording your keyboard strokes; modifying the behavior of the invaded application; stealing confidential data by sending confidential...

http://help.comodo.com/topic-72-1-284-3039-Monitoring-Settings.html
Appendix – Issue Codes For Monitors (in Comodo One MSP)

...Scan and attempt to fix the disk errors File Size Monitor 9029 - File size exceeds the limit allowed The selected file has exceeded the size imposed by the policy Check for reasons why the file size is exceeding in application logs and in system events None Folder Size Monitor 9030 - Folder size exceeds the limit allowed The selected folder has exceeded the size imposed by the policy Check for reasons why the folder size is exceeding in application logs and in system events None Ping Monitor 9035 - Device is not running The specified device is offline or it could...

http://help.comodo.com/topic-289-1-719-8591-Appendix-–-Issue-Codes-for-Monitors.html
Appendix 1b - Xcitium Services - IP Nos, Host Names And Port Details - US Customers (in Xcitium Enterprise)

...scans, deploy updates and more. You need to configure your firewall accordingly to allow these connections . All client to server communications are encrypted over https connections using the strongest TLS protocols, RSA 2048 bit keys and SHA 256 algorithms. The tables on this page show firewall requirements for the following Xcitium services: Communication Client (CC) Xcitium Client - Security (XCS) Xcitium Enterprise Server (on premise installations) Remote Control sessions   Remote Control Direct connection Remote Control Peer to Peer connection Remote Control Relay Connection   Diagnostic Tools All settings grouped by port   Communication Client (CC) Communication Client (CC) Service Purpose...

http://help.comodo.com/topic-463-1-1029-15797-Appendix-1b---Xcitium-Services---IP-Nos,-Host-Names-and-Port-Details---US-Customers.html
Logging Settings (in Xcitium Enterprise)

...Disabled )   Xcitium Client - Security Form Element Description Write to Local Log Database (Xcitium Format) The log is saved in native Xcitium format on the local endpoint. You can enable extended logging for the following additional items: Process creation events XCS components are enabled/disabled by CC Changes to XCS configuration made by CC Submitting files to CAMAS or Valkyrie Write to Syslog Server Xcitium log events are written to a remote syslog server. If enabled you have to specify the hostname/IP address and port number settings for the server. Host * The host name or IP address of the syslog server...

http://help.comodo.com/topic-463-1-1029-15685-Logging-Settings.html
Logging Settings (in Endpoint Manager)

...Disabled )   Xcitium Client - Security Form Element Description Write to Local Log Database (Xcitium Format) The log is saved in native Xcitium format on the local endpoint. You can enable extended logging for the following additional items: Process creation events XCS components are enabled/disabled by CC Changes to XCS configuration made by CC Submitting files to CAMAS or Valkyrie Write to Syslog Server Xcitium log events are written to a remote syslog server. If enabled you have to specify the hostname/IP address and port number settings for the server. Host * The host name or IP address of the syslog server...

http://help.comodo.com/topic-399-1-786-10675-Logging-Settings.html
Users (in Comodo Antispam Gateway)

...scans incoming emails from the internet, and instead sends the emails directly out to the destination. Filtering the outgoing user's mail also prevent spam from reaching end user mailboxes.   Configure User's Email Client for Outgoing Mail Filtering   The email clients of the users added for outgoing email filtering must be configured to point to CASG service.   In the Account Settings interface of the user's email client, enter the following details: Smtp server: mxpool1.spamgateway.comodo.com (for EU based service) or mxpool1.us.spamgateway.comodo.com (for US based service) according to your preferred CASG service domain . Connection Security: STARTTLS...

http://help.comodo.com/topic-157-1-288-4550-Users.html
Start The Virtual Desktop (in Endpoint Manager)

... Start the Virtual Desktop   Click 'Tasks' on the home screen Click 'Containment Tasks' > 'Run Virtual Desktop' You can start the virtual desktop from the home-screen shortcut, from the widget, or from the 'Containment Tasks' screen. You can also configure the virtual desktop to start automatically after you login to Windows. Note. If CCS is in Virtual Desktop...

http://help.comodo.com/topic-399-1-904-13788-Start-the-Virtual-Desktop.html
Start XCS (in Xcitium Enterprise)

... Start XCS After installation, XCS will automatically load whenever the endpoint starts. Real-time protection is enabled by default, so endpoints are protected immediately after the restart. We recommend you use a Xcitium Enterprise configuration template to manage XCS settings: Log into Xcitium Enterprise, click 'Assets' > 'Configuration Templates' > 'Profiles' See https://help.comodo.com/topic-463-1-1029-15670-Profiles-for-Windows-Devices.html for help to build and...

http://help.comodo.com/topic-463-1-1034-15984-Start-XCS.html
VirusScope Logs (in Comodo Internet Security)

... VirusScope Logs   Click 'Tasks' > 'Advanced Tasks' > 'View Logs' OR Click ‘Logs’ in advanced view of the CIS home screen Select 'VirusScope Events' from the drop-down at upper-left Date & Time - When the event occurred. Location - The installation path of the suspicious application Malware Name – The malicious item that was detected Action - How VirusScope handled the...

http://help.comodo.com/topic-72-1-766-9119-VirusScope-Logs.html
Pages 49 of 51 « Prev     Next »   Jump to page