Showing 681-690 from 854
...button
...running) Security Events (Data related to security policies) Web Access Events (Data related to web content policies) The data category available in the second drop-down depends on the selected event type in the first drop-down. Chart Type Select the chart type. The options are pie chart, bar chart and table. Group By elect the parameter by which data in the tile should be organized. The available parameters depend on the selected event type. For 'EAPI Events', the options available are: Client IP, SHA1 and File Name. 'Security Events' the options are: Location, Domain, File Name, File Type...
http://help.comodo.com/topic-436-1-842-10776-Customize-the-Dashboard.html...button. In the next screen, you can choose to configure your DNS Settings and Browser Home page. If you click 'Customize Installation' then you can choose advanced options . These include which CIS components you wish to install, the ability to choose CIS installation path and other advanced CIS configuration settings. DNS Settings Comodo Secure DNS service replaces your existing Recursive DNS Servers and resolves all your DNS requests exclusively through Comodo's proprietary Directory Services Platform. Comodo's worldwide network of redundant DNS servers provide fast and secure Internet browsing experience without any hardware or software installation. In addition, Comodo...
http://help.comodo.com/topic-72-1-522-6229-CIS-Pro---Installation-and-Activation.html...button. In the next screen, you can choose to configure your DNS Settings and Browser Home page. If you click ' Customize Installation ' then you can choose advanced options . These include which CIS components you wish to install, the ability to choose CIS installation path and other advanced CIS configuration settings. DNS Settings Comodo Secure DNS service replaces your existing Recursive DNS Servers and resolves all your DNS requests exclusively through Comodo's proprietary Directory Services Platform. Comodo's worldwide network of redundant DNS servers provide fast and secure Internet browsing experience without any hardware or software installation...
http://help.comodo.com/topic-72-1-522-6230-CIS-Complete---Installation-and-Activation.html...run on your system. Alerts appear at the bottom right hand side of your computer screen. The alert contains the name of the virus detected and the location of the virus on your disk and, if available, more information about the virus. Each alert has two main options - 'Clean' and 'Ignore'. Select either of these to view further options. 'Clean' presents you with the following options: Clean the file - Will delete the file. Quarantine the file. This will move the file to Quarantined Items OR Disinfect the file, If CCS has a disinfection routine available it will...
http://help.comodo.com/topic-467-1-1055-16370-Understand-CCS-Alerts.html...run by managed applications for analysis. This option lets you specify the total size of stored scripts. When the set limit is reached, the older scripts are deleted automatically. ( Default = 100 KB ) Runtime Detection Lets you select executables which should be analyzed during their execution. You can also add custom applications which you want to protect. Click the 'Runtime Detection' tab in the 'Script Analysis' settings interface Use the switch in the 'Heuristic Command-Line Analysis' column to enable/disable heuristic command line analysis for each application. Use the switch in the 'Embedded Code Detection' column to enable/disable embedded code detection...
http://help.comodo.com/topic-399-1-786-13783-Script-Analysis-Settings.html...run by managed applications for analysis. This option lets you specify the total size of stored scripts. When the set limit is reached, the older scripts are deleted automatically. ( Default = 100 KB ) Runtime Detection Lets you select executables which should be analyzed during their execution. You can also add custom applications which you want to protect. Click the 'Runtime Detection' tab in the 'Script Analysis' settings interface Use the switch in the 'Heuristic Command-Line Analysis' column to enable/disable heuristic command line analysis for each application. Use the switch in the 'Embedded Code Detection' column to enable/disable embedded code detection...
http://help.comodo.com/topic-463-1-1029-15693-Script-Analysis-Settings.html...button. See ' Account Management ' if you need more help with this. To import users via a .csv file: Click 'Domain' > select the domain for which you want to add users > click 'Manage domain' Click 'Account management' > 'Users' on the left hand menu. Click 'More Actions' > 'Import from CSV file'. Users should be listed in the following format in the .csv file: username1,domain.com,true username2,domain.com,false E.g. alice,example.com,true. True/false determines whether or not a user can access the CASG interface. Click 'Upload', navigate to where your file is saved and click 'Open...
http://help.comodo.com/topic-157-1-515-5949-Step-6---Add-Incoming-Users.html...run system maintenance. You can also transfer files and folders between the local and remote computers. You can manage Windows and Mac devices with the following tools: Comodo Remote Control - Windows and Mac OS devices. Recommended for most users Comodo Remote Monitoring and Management (RMM) - Windows only. This is a legacy tool for Comodo RMM and is not recommended for most users. Remote Control First, install the remote control application on your admin computer: Click 'Devices' > 'Bulk Installation Package' Select the 'Remote Control by ITarian' tab Choose the operating system of your admin machine Click 'Download' After installation, there...
http://help.comodo.com/topic-399-1-786-10138-Remote-Management-of-Windows-and-Mac-OS-Devices.html...button on the CIS interface Opening 'Sandbox Tasks' from the Tasks interface then clicking 'Open Shared Space' By default, sandboxed applications can access folders and files on your 'real' system but cannot save any changes to them. However, you can define exclusions to this rule by using the 'Do not virtualize access to...' links. To define exclusions for files and folders Enable the 'Do not virtualize access to the specified files/folders' check-box then click on the words 'the specified files/folders'. The 'Manage Exclusions' dialog will appear. Click the handle at the bottom to open the tools menu then click...
http://help.comodo.com/topic-72-1-623-7736-Configuring-the-Sandbox.html