Search Results

Showing 491-500 from 638

Firewall Rule Sets (in Comodo Internet Security)

...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type...

http://help.comodo.com/topic-72-1-766-9175-Firewall-Rule-Sets.html
Firewall Rule Sets (in Endpoint Manager)

...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type...

http://help.comodo.com/topic-399-1-904-11872-Firewall-Rule-Sets.html
Firewall Rule Sets (in Advanced Endpoint Protection)

...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset  could  be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Comodo to optimize the security level...

http://help.comodo.com/topic-467-1-1050-16653-Firewall-Rule-Sets.html
File Groups (in Comodo Internet Security)

...search icon at upper-right and enter the name of a file group in full or part. Controls : The buttons at the top provide the following options: Add - Create a new file group. Add files, folders or running processes to an existing group. Edit - Rename a group. Change the file path of items in a file group. Remove - Delete a file group, or specific items in a group. Purge - Runs a check to verify that all files in a group are actually installed at the path specified. If not, the file or file group is removed from the list...

http://help.comodo.com/topic-72-1-766-9180-File-Groups.html
Manage Your Licenses (in Xcitium Enterprise)

...help: License table columns Add a license Delete a license View license details, change allocation type Renew a license Configure usage report settings Export list of licenses License table columns   Column Description Allocation Type States whether you can use the license for multiple customers or a single customer. Note: This applies only for Xcitium products for Managed Service Provider (MSP) customers. Licenses purchased by Xcitium Enterprise customers can be used only for their organization, that is single customer. Global (G) - You can use the license for multiple customers Allocated (C) - You can use the license on a single customer...

http://help.comodo.com/topic-463-1-1029-16142-Manage-your-Licenses.html
Firewall Rule Sets (in Xcitium Enterprise)

...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Xcitium Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Xcitium to optimize the security level of a certain type...

http://help.comodo.com/topic-463-1-1033-15927-Firewall-Rule-Sets.html
Auto-Containment Rules (in Comodo Internet Security)

...help to add or modify a file group. Folder – Apply the rule to a folder or drive. File Hash – Create a hash value from a file and use it as the rule target. A hash value is a large number which is generated by passing the file through a hashing algorithm. The number uniquely identifies and represents the file, and it is extremely unlikely that two files will ever generate the same hash value. The benefit of using a file hash is that the rule will still work even if the file name changes. Process Hash – Create a hash value...

http://help.comodo.com/topic-72-1-766-9170-Auto-Containment-Rules.html
CIS Premium – Installation (in Comodo Internet Security)

...search engine will be set to Yahoo! Please review and/or modify the settings in the dialog. End User License Agreements Read the complete User License Agreements by clicking the 'License Agreement' links of Comodo Internet Security and PrivDog respectively before proceeding with the installation. To read the PrivDog privacy policy link, click the Privacy Policy link next to it. After reading the agreements, click the 'Back' button to return to the installation configuration screen. Once back at the main installer screen, if you wish to configure advanced options, click ' Customize Installation ' . Otherwise, click 'Agree and Install' to begin installation . Customizing...

http://help.comodo.com/topic-72-1-522-6228-CIS-Premium-–-Installation.html
CIS Pro - Installation And Activation (in Comodo Internet Security)

...search engine will be set as Yahoo! Please review and/or modify the settings in the dialog. End User License Agreement Read the complete User License Agreements by clicking the 'License Agreement' links of Comodo Internet Security and PrivDog respectively before proceeding with the installation. To read the PrivDog privacy policy link, click the Privacy Policy link next to it. After reading the agreement, click the 'Back' button to return to the installation configuration screen. Once back at the main installer screen, if you wish to configure advanced options, click ‘ Customize Installation ’. Otherwise, click ‘Agree and Install’ to  begin installation...

http://help.comodo.com/topic-72-1-522-6229-CIS-Pro---Installation-and-Activation.html
CIS Premium – Installation (in Comodo Internet Security)

...search engine will be set to Yahoo!   Click the 'Next' button. In the next screen, you can choose to install PrivDog and read the license agreements for CIS and PrivDog.   PrivDog PrivDog is a browser extension that improves the transparency, privacy and speed of your online experience by automatically detecting and blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types...

http://help.comodo.com/topic-72-1-451-4689-CIS-Premium-–-Installation.html
Pages 50 of 64 « Prev     Next »   Jump to page