Showing 491-500 from 638
...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type...
http://help.comodo.com/topic-72-1-766-9175-Firewall-Rule-Sets.html...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type...
http://help.comodo.com/topic-399-1-904-11872-Firewall-Rule-Sets.html...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Comodo to optimize the security level...
http://help.comodo.com/topic-467-1-1050-16653-Firewall-Rule-Sets.html...search icon at upper-right and enter the name of a file group in full or part. Controls : The buttons at the top provide the following options: Add - Create a new file group. Add files, folders or running processes to an existing group. Edit - Rename a group. Change the file path of items in a file group. Remove - Delete a file group, or specific items in a group. Purge - Runs a check to verify that all files in a group are actually installed at the path specified. If not, the file or file group is removed from the list...
http://help.comodo.com/topic-72-1-766-9180-File-Groups.html...help: License table columns Add a license Delete a license View license details, change allocation type Renew a license Configure usage report settings Export list of licenses License table columns Column Description Allocation Type States whether you can use the license for multiple customers or a single customer. Note: This applies only for Xcitium products for Managed Service Provider (MSP) customers. Licenses purchased by Xcitium Enterprise customers can be used only for their organization, that is single customer. Global (G) - You can use the license for multiple customers Allocated (C) - You can use the license on a single customer...
http://help.comodo.com/topic-463-1-1029-16142-Manage-your-Licenses.html...search feature to look for a specific ruleset Predefined Rulesets Although each application's firewall ruleset could be defined from the ground up by individually configuring separate rules, this practice would prove time consuming if it had to be performed for every single program on your system. For this reason, Xcitium Firewall contains a selection of predefined rulesets according to broad application category. For example, you may choose to apply the ruleset 'Web Browser' to the applications 'Internet Explorer', 'Firefox' and 'Chrome'. Each predefined ruleset has been specifically designed by Xcitium to optimize the security level of a certain type...
http://help.comodo.com/topic-463-1-1033-15927-Firewall-Rule-Sets.html...help to add or modify a file group. Folder – Apply the rule to a folder or drive. File Hash – Create a hash value from a file and use it as the rule target. A hash value is a large number which is generated by passing the file through a hashing algorithm. The number uniquely identifies and represents the file, and it is extremely unlikely that two files will ever generate the same hash value. The benefit of using a file hash is that the rule will still work even if the file name changes. Process Hash – Create a hash value...
http://help.comodo.com/topic-72-1-766-9170-Auto-Containment-Rules.html...search engine will be set to Yahoo! Please review and/or modify the settings in the dialog. End User License Agreements Read the complete User License Agreements by clicking the 'License Agreement' links of Comodo Internet Security and PrivDog respectively before proceeding with the installation. To read the PrivDog privacy policy link, click the Privacy Policy link next to it. After reading the agreements, click the 'Back' button to return to the installation configuration screen. Once back at the main installer screen, if you wish to configure advanced options, click ' Customize Installation ' . Otherwise, click 'Agree and Install' to begin installation . Customizing...
http://help.comodo.com/topic-72-1-522-6228-CIS-Premium-–-Installation.html...search engine will be set as Yahoo! Please review and/or modify the settings in the dialog. End User License Agreement Read the complete User License Agreements by clicking the 'License Agreement' links of Comodo Internet Security and PrivDog respectively before proceeding with the installation. To read the PrivDog privacy policy link, click the Privacy Policy link next to it. After reading the agreement, click the 'Back' button to return to the installation configuration screen. Once back at the main installer screen, if you wish to configure advanced options, click ‘ Customize Installation ’. Otherwise, click ‘Agree and Install’ to begin installation...
http://help.comodo.com/topic-72-1-522-6229-CIS-Pro---Installation-and-Activation.html...search engine will be set to Yahoo! Click the 'Next' button. In the next screen, you can choose to install PrivDog and read the license agreements for CIS and PrivDog. PrivDog PrivDog is a browser extension that improves the transparency, privacy and speed of your online experience by automatically detecting and blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types...
http://help.comodo.com/topic-72-1-451-4689-CIS-Premium-–-Installation.html