Showing 571-580 from 638
...help page for details on how to configure your email account settings. Enter the SMTP server name of your email service provider, SMTP Port and your email address in the respective fields. The same email address will be used for both sender and recipient address for sending the photograph taken by your device. If your SMTP server requires user authentication for sending mails, select the check box 'My outgoing server (SMTP) requires authentication' and enter your username and email password in the respective fields. Tip: In most of the cases, your username would be the string that comes before...
http://help.comodo.com/topic-168-1-408-4329-Configuring-Anti-Theft-Settings.html...search raw logs in the 'Investigation' screen. Click 'Policy Management' on the left to manage EDR security policies: The screen shows general information about policies and lists the default 'Comodo Recommended Security Policy'. A check-mark beside a policy indicates it is currently active. Create and Activate a Policy Click 'Create Policy': Create a name for the policy and press enter: Now, click on the policy name to view and edit its current details: The new policy is automatically assigned a set of default rules. You can add new rules, edit or delete rules as required. The policy interface...
http://help.comodo.com/topic-444-1-907-12715-Step-3---Manage-EDR-Policies.html... Log Settings Click 'Settings' > 'General Settings' > 'Logging' Comodo Internet Security keeps detailed records of all antivirus, firewall, HIPS, containment, website filtering, VirusScope and secure shopping events Logs are also created for 'Alerts Displayed', 'Tasks Launched', 'File List' changes, 'Vendor list changes', 'Trusted Certificate Authorities changes' and 'CIS Configuration Changes' Log settings let you specify the log storage...
http://help.comodo.com/topic-72-1-766-9135-Log-Settings.html... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...
http://help.comodo.com/topic-399-1-904-11892-Blocked-Zones.html... Create a New Role Click 'Assets' > 'User Management' > 'Role Management' Click the 'Roles' tab Click 'Add Role': Enter a name and description for the role then click 'OK'. The new role is added to the list in the 'Roles' screen. Click on the new role to edit its permissions, assign users, and specify which entities the role is...
http://help.comodo.com/topic-463-1-1029-15579-Create-a-New-Role.html... Configure Site Settings in Comodo Dragon The site settings area lets you control whether sites can access your personal data, your computer hardware, or send you notifications. Click the menu button at the top-right corner Select 'Settings' > scroll down and click 'Advanced' Click 'Site settings' in the 'Privacy and security' section to open the dialog: You...
http://help.comodo.com/topic-120-1-279-2557-Configure-Site-Settings-in-Comodo-Dragon.html... Miscellaneous Settings Click 'Settings' > 'Advanced Protection' > 'Miscellaneous' The 'Miscellaneous' panel allows you to: Configure protection against shellcode injections (buffer overflow attacks) Show alerts if applications try to change your browser settings Skip automatic cleanup of suspicious certificates Specify what actions are taken if CIS detects unrecognized auto-start entries or scheduled tasks Open the miscellaneous interface Click...
http://help.comodo.com/topic-72-1-766-11485-Miscellaneous-Settings.html... Filtering Defense+ Logs CAVS allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged events for...
http://help.comodo.com/topic-213-1-517-5992-Filtering-Defense+-Logs.html... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones' A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...
http://help.comodo.com/topic-72-1-766-9193-Blocked-Zones.html... Smart Scan A smart scan is a targeted scan of critical areas of your computer which are highly prone to attack by malware. These include system memory, auto-run entries, hidden services, boot sectors, critical registry keys, and important operating system files/folders. These areas are responsible for the stability of your computer so keeping them clean is essential. Your...
http://help.comodo.com/topic-119-1-328-3568-Smart-Scan.html