Search Results

Showing 641-650 from 1132

System Requirements (in Endpoint Manager)

...firewall: To allow communication with camas.comodo.com IP that needs to be allowed: 199.66.201.30 Port that needs to be allowed: port 80 for TCP Direction: Outgoing (Endpoints to CAMAS) To allow communication with our File Lookup Servers (FLSs): IPs that need to be allowed: 91.209.196.27 91.209.196.28 199.66.201.20 199.66.201.21 199.66.201.22 199.66.201.25 199.66.201.26 Ports that need to be allowed: 4447 UDP and 4448 TCP Direction...

http://help.comodo.com/topic-399-1-790-10282-System-Requirements.html
Filtering Defense+ Logs (in Comodo Internet Security)

...select the next filter type and click 'Add'. You can also remove a filter type by clicking the 'X' button at the top right of the filter pane.   Click 'Apply' for the filters to be applied to the Firewall log viewer. Only those Defense+ entries selected based on your set filter criteria will be displayed in the log viewer.   ...

http://help.comodo.com/topic-72-1-451-4726-Filtering-Defense+-Logs.html
Website Categories (in Comodo Internet Security)

...Firewall' > ' Website Filtering' tab from the 'Advanced Settings' interface. 2. Click the 'Categories' link to open the 'Categories' pane. 3. Select the 'Category' to be removed. 4. Right-click then select 'Remove' button from drop-down menu. Note : You cannot remove a category if it is currently being used in a website filtering rule. Make sure to first remove...

http://help.comodo.com/topic-72-1-766-9195-Website-Categories.html
Log Settings (in Comodo Internet Security)

...Firewall and Defense+ events. Logs are also created for 'Alerts Displayed', 'Tasks Launched' and 'Configuration Changes'. This 'Logging' interface allows you to specify whether you want to enable logging; the maximum size of the log file and how CIS should react if the maximum file size is exceeded. Note: If you wish to actually view, manage and export logs, then...

http://help.comodo.com/topic-72-1-522-6294-Log-Settings.html
Log Settings (in Xcitium Enterprise)

...firewall, HIPS, containment, device control, VirusScope and autorun events. Logs are also created for 'Alerts Displayed', 'Tasks Launched', 'File List' changes, 'Vendor list changes' and 'XCS Configuration Changes'. Log settings let you specify the storage location, the maximum size of log files, and how XCS should react if the maximum file size is exceeded. Note : You can view logs themselves...

http://help.comodo.com/topic-463-1-1033-15920-Log-Settings.html
Log Settings (in Comodo Internet Security)

...Firewall and Defense+ events. Logs are also created for 'Alerts Displayed', 'Tasks Launched' and 'Configuration Changes'. This 'Logging' interface allows you to specify whether you want to enable logging; the maximum size of the log file and how CIS should react if the maximum file size is exceeded. Note: If you wish to actually view, manage and export logs, then...

http://help.comodo.com/topic-72-1-623-7720-Log-Settings.html
Customize User Interface (in Comodo Internet Security)

...Firewall Tasks , Containment Tasks and Advanced Tasks will request the password. This setting is of value to parents and network admins as it prevents users from changing settings and possibly exposing the machine to threats ( Default = Disabled ). Enable password protection Select the 'Enable Password Protection' check-box then click ' Set Password '. Enter and confirm your password then click 'OK': Make...

http://help.comodo.com/topic-72-1-766-9133-Customize-User-Interface.html
Log Settings (in Advanced Endpoint Protection)

...firewall, HIPS, containment, device control, VirusScope and autorun events. Logs are also created for 'Alerts Displayed', 'Tasks Launched', 'File List' changes, 'Vendor list changes' and 'CCS Configuration Changes'. Log settings let you specify the storage location, the maximum size of log files, and how CCS should react if the maximum file size is exceeded. Note : You can view logs themselves...

http://help.comodo.com/topic-467-1-1050-16636-Log-Settings.html
Website Filtering Rules (in Xcitium Enterprise)

...Firewall implements rules in the order they are in this list. Should a conflict exist between individual rules, then the rules at the top takes priority. Click the 'Move Up' or 'Move Down' buttons at the top to change a rule's priority. Open the website filtering rules section Click 'Settings' at the top left of the XCS home screen...

http://help.comodo.com/topic-463-1-1033-15949-Website-Filtering-Rules.html
The Sandbox - An Overview (in Comodo Internet Security)

...Firewall, Defense+ and Antivirus modules. Applications in the sandbox are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of the real system. This delivers the smoothest user experience possible by allowing unknown applications to run and operate as they normally would while denying them the potential to cause lasting damage...

http://help.comodo.com/topic-72-1-451-4891-The-Sandbox---An-Overview.html
Pages 65 of 114 « Prev     Next »   Jump to page