Search Results

Showing 651-660 from 1132

Manage Subscriptions, Usage, Billing And Settings (in Comodo One MSP)

...licenses if required Usage - Statistics which show how much data has been used by a particular application Billing - View payment history and pending payments for each subscribed module Settings - Configure whether the app is to be shown or hidden in the application management interface and the URLs for the Comodo Dome Firewall Central Manager, Dome Antispam and Dome Data Protection applications. ...

http://help.comodo.com/topic-289-1-716-11175-Manage-Subscriptions,-Usage,-Billing-and-Settings.html
The Sandbox - An Overview (in Comodo Internet Security)

...Firewall, Defense+ and Antivirus modules. Applications in the sandbox are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of the real system. This delivers the smoothest user experience possible by allowing unknown applications to run and operate as they normally would while denying them the potential to cause lasting damage...

http://help.comodo.com/topic-72-1-623-7754-The-Sandbox---An-Overview.html
Alerts Logs (in Xcitium Enterprise)

...firewall, HIPS, containment, VirusScope and secure shopping. Description - Name of the file or event that caused the alert. Advice -The recommendation, or informational text in the alert. This text is intended to help users decide to respond to the threat. Answered - Whether or not the alert was answered by the user. You will see the date and time of the response...

http://help.comodo.com/topic-463-1-1033-15910-Alerts-Logs.html
Filtering Viruscope Logs (in Comodo Internet Security)

...Firewall or Antivirus event Restore: Displays events of the applications that were quarantined and restored Block: Displays events of the applications that were blocked Reverse: Displays events where the actions of malware were reversed False Positive: The Viruscope detected files that were submitted as false positive by the user  For example, if you checked the 'Quarantine' box then selected...

http://help.comodo.com/topic-72-1-623-7952-Filtering-Viruscope-Logs.html
Website Filtering Logs (in Comodo Internet Security)

...Firewall Settings > Website Filtering. For more details on configuring the Website Filter, refer to the section Website Filterin g . The Website Filtering log enables you to analyze the attempts made by the other users to access the blocked or allowed websites. The 'Website Filtering' logs can be viewed by choosing the 'Website Filtering' from the 'Show' drop-down of the log viewer...

http://help.comodo.com/topic-72-1-522-6379-Website-Filtering-Logs.html
Website Filtering Rules (in Endpoint Manager)

...Firewall implements rules in the order they are in this list. Should a conflict exist between individual rules, then the rules at the top takes priority. Click the 'Move Up' or 'Move Down' buttons at the top to change a rule's priority. Open the website filtering rules section Click 'Settings' at the top left of the CCS home screen...

http://help.comodo.com/topic-399-1-904-11893-Website-Filtering-Rules.html
The Sandbox - An Overview (in Comodo Internet Security)

...Firewall, Defense+ and Antivirus modules. Applications in the sandbox are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of the real system. This delivers the smoothest user experience possible by allowing unknown applications to run and operate as they normally would while denying them the potential to cause lasting damage...

http://help.comodo.com/topic-72-1-522-6313-The-Sandbox---An-Overview.html
Website Filtering Logs (in Comodo Internet Security)

...Firewall Settings > Website Filtering. For more details on configuring the Website Filter, refer to the section Website Filtering . The Website Filtering log enables you to analyze the attempts made by the other users to access the blocked or allowed websites. The 'Website Filtering' logs can be viewed by choosing the 'Website Filtering' from the 'Show' drop-down of the log viewer...

http://help.comodo.com/topic-72-1-623-7698-Website-Filtering-Logs.html
File Groups (in Endpoint Manager)

...firewall rules, containment rules and more. CCS ships with a set of predefined file groups. You can also create your own file groups and edit existing groups as required. Open the 'File Groups' interface Click 'Settings' on the CCS home screen Click 'File Rating' > 'File Groups' Search Option : Click the search icon at upper-right and enter the name...

http://help.comodo.com/topic-399-1-904-11876-File-Groups.html
SMTP IPS/FW (in Xcitium Secure Email Gateway Enterprise)

...Firewall (FW) module provide protection against Denial of Service (DoS) and SYN attacks. SYN attacks are dealt with using SYN Cookies and SYN Cache features. DoS attacks are blocked by deploying various usage limitations. For example, Secure Email Gateway can limit the number of connections it accepts in a certain time-period. The IPS/FW module will block IPs that want...

http://help.comodo.com/topic-443-1-898-11422-SMTP-IPS-FW.html
Pages 66 of 114 « Prev     Next »   Jump to page